Best Infosec podcasts we could find (Updated September 2018)
Related podcasts: Tech Security Business Exploits Cyber Business News Podcasting Security News Pwnage Vulnerabilities Breach Governance Careers Hacking US Government Software Development Information Education  
Infosec public [search 0]
show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
RallySecurity is a weekly information security podcast that discusses news and breaches from both the red team and blue team perspectives. RallySec is part of the purple team. We stream live every Wednesday at 7pm on https://www.rallysecurity.com and twitch.tv/rallysecurity
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
I
Infosec Dojo
Monthly
 
Information Security Podcast
 
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
 
Security awareness and IT training insight from the trenches
 
D
Drunk Infosec
Monthly+
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
Loading …
show series
 
Happy Anniversary to InfoSecICU! They guys celebrated the 52nd week of shows by discussing the HITRUST CSF framework for standardizing security certifications for healthcare-related vendors. They introduce a creepy story of Airbnb hosts using IoT devices to spy on guests. Finally, they discuss research that dives into the long term impact to a ...…
 
This week, we discuss the continuing fallout from the BA breach, the compromise of 5,000 Npower customers' details, DoJ charges against a North Korean computer programmer, and this month's Microsoft updates
 
This week, we discuss the continuing fallout from the BA breach, the compromise of 5,000 Npower customers' details, DoJ charges against a North Korean computer programmer, and this month's Microsoft updates
 
On this episode of the CyberSpeak with InfoSec Institute podcast, Lisa Hedges, content analyst at Software Advice, Gartner Digital Markets, talks about the many cybersecurity challenges facing the healthcare sector.In the podcast, Hedges and host Chris Sienko discuss: What can be done to prevent cyber-attacks against devices like pacemakers? (1 ...…
 
Steve and Gerry cover Health and Human Services Office of Civil Rights (HHS OCR) briefing presented to MUSC recently and discuss the clarification it brought with it. They cover the details of the recent British Airways hacked that compromised 380,000 individuals credit card information. Given the impending Hurricane Florence, the guys refresh ...…
 
https://motherboard.vice.com/en_us/article/pa8emg/russian-indicted-jp-morgan-chase-hack https://www.zdnet.com/article/us-government-releases-post-mortem-report-on-equifax-hack/ https://www.zdnet.com/article/phishing-alert-north-korean-hacking-attacks-shows-your-email-is-still-the-weakest-link/ https://www.verizon.com/about/news/lifting-lid-cybe ...…
 
https://motherboard.vice.com/en_us/article/pa8emg/russian-indicted-jp-morgan-chase-hack https://www.zdnet.com/article/us-government-releases-post-mortem-report-on-equifax-hack/ https://www.zdnet.com/article/phishing-alert-north-korean-hacking-attacks-shows-your-email-is-still-the-weakest-link/ https://www.verizon.com/about/news/lifting-lid-cybe ...…
 
On this episode of the CyberSpeak with InfoSec Institute podcast, Ron Gula, president of Gula Tech Adventures and co-founder of Tenable Network Security, talks about the evolution of cybersecurity and security awareness, his career shift from the NSA to growing Tenable to funding other cybersecurity startups, and a variety of other topics.In th ...…
 
This week, we discuss a data breach at Plusnet, poor security at tvlicensing.co.uk, why most BEC scams succeed, and what causes most data breaches
 
This week, we discuss a data breach at Plusnet, poor security at tvlicensing.co.uk, why most BEC scams succeed, and what causes most data breaches
 
Steve and Gerry discuss the privacy ramifications of the Google MasterCard deal that recently came to light. They discuss Instagram’s decision to support two-factor authenticator apps and the issues with SMS as a 2nd factor. They finish up discussing the dependence and concerns of using your phone number as your identity and authenticator. Show ...…
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into the DPO’s role – who needs one, what they do and their role in a data breach.
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into the DPO’s role – who needs one, what they do and their role in a data breach.
 
On this episode of the CyberSpeak with InfoSec Institute podcast, instructor Elias Papatestas, who has extensive history in the IT industry dating back to the 1980s and currently works as a trainer and consultant, discusses the path to becoming a network admin.In the podcast, Papatestas and host Chris Sienko discuss: What drew you to networking ...…
 
https://www.zdnet.com/article/this-destructive-ransomware-has-made-crooks-6m-by-encrypting-data-and-backups/ https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/ https://www.databreachtoday.com/art-steal-fin7s-highly-effective-phishing-a-11286 https://www.wired.com/story/notpetya-cyb ...…
 
https://www.zdnet.com/article/this-destructive-ransomware-has-made-crooks-6m-by-encrypting-data-and-backups/ https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/ https://www.databreachtoday.com/art-steal-fin7s-highly-effective-phishing-a-11286 https://www.wired.com/story/notpetya-cyb ...…
 
In this week's podcast, we discuss the data breach at Air Canada, Huazhu Hotels, and West Ham Football Club
 
In this week's podcast, we discuss the data breach at Air Canada, Huazhu Hotels, and West Ham Football Club
 
Steve is fresh from Gartner Catalyst and shares his experience and lessons learned. The guys discuss a follow up story from election officials that tells the other side of the story from the recent voting village hacks at DEF CON 26. They finish up with a discussion around the damages of NotPetya a year later with a case study of Maersk. Show N ...…
 
It's been three months since the EU's General Data Protection Regulation (GDPR) went into effect. On this episode of the CyberSpeak with InfoSec Institute podcast, returning guest Susan Morrow and host Chris Sienko take a look back at the initial rollout of GDPR, the compliance steps organizations have taken so far, and the potential future imp ...…
 
Professionals with the Certified in Risk and Information Systems Control (CRISC) certification earn an average of $127,507 each year, making it the highest-paying IT certification available.On this episode of the CyberSpeak with InfoSec Institute podcast, Leighton Johnson, the CTO of Information Security Forensics Management Team and a CRISC-ce ...…
 
In this week's podcast, we discuss the data incident at Superdrug, Facebook and Twitter removing accounts, and the ICO website being down.
 
In this week's podcast, we discuss the data incident at Superdrug, Facebook and Twitter removing accounts, and the ICO website being down.
 
Gerry and Brandon discuss the long term effect of the recently published Augusta University Medical Center Breach. They cover behavior based analysis for malicious activity on the network and utilizing RITA, a security tool from Black Hills Security Group to assist. Finally they touch on the recently enacted NIST Small Business Cybersecurity Ac ...…
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into reporting on staff training, awareness and IT Governance products and solutions for organisations that suffer a data breach
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into reporting on staff training, awareness and IT Governance products and solutions for organisations that suffer a data breach
 
On this episode of the CyberSpeak with InfoSec Institute podcast, Paraben CEO Amber Schroader discusses her path to becoming a computer forensics investigator and provides advice to those who may be considering computer forensics as a career.In the podcast, Schroader and Chris Sienko, host of CyberSpeak with InfoSec Institute, discuss: The begi ...…
 
Organizations still catching their breath from the May 2018 implementation of the EU’s General Data Protection Regulation (GDPR) have been hit with another wide-reaching privacy law. In late June, lawmakers in California, the fifth largest economy in the world, rushed through and signed into law the “California Consumer Privacy Act of 2018.”Acc ...…
 
This week, we discuss a new flaw affecting Intel processors, a $13.5 million cyber attack on an Indian bank, the release of version 1.3 of the Transport Layer Security protocol and the highlights from this month's Microsoft patches.
 
This week, we discuss a new flaw affecting Intel processors, a $13.5 million cyber attack on an Indian bank, the release of version 1.3 of the Transport Layer Security protocol and the highlights from this month's Microsoft patches.
 
Gerry is back from BlackHat and he’s ready to tackle the oft-ignored member of the Confidentiality-Integrity-Availability triad as he digs into a new attack that tampers with medical device data to disastrous effect. While in Vegas, Gerry also had the opportunity to interview Jeremiah Grossman, CEO of BitDiscovery, to talk about the unique way ...…
 
This episode of the CyberSpeak with InfoSec Institute podcast goes into detail about the popular and often controversial topic of passwords. Susan Morrow has worked in the IT security sector since the early 1990s — working across diverse sectors such as file encryption, digital rights management, digital signing and online identity.In the podca ...…
 
Earning your PMP certification can increase your earnings by as much as 20 percent. A Project Management Professional (PMP) certification proves to employers that you know what it takes to manage projects efficiently, within budget and on-schedule. InfoSec Institute instructor Chris Danek and sales manager Jarrod Mayes discuss how the PMP certi ...…
 
This week, we discuss new research into attacks on industrial control systems, Reddit's recent breach, and an apparent crackdown on SIM swap fraud
 
This week, we discuss new research into attacks on industrial control systems, Reddit's recent breach, and an apparent crackdown on SIM swap fraud
 
Brandon is back in the co-pilot’s chair as we talk about the recent GAO report that HHS is failing to protect PHI. We also share our intrigue surrounding the PHI breach at Iowa Health Group that was actually a Business Email Compromise attack. There’s also good news for Boston Childrens’ Hospital, as the hacktivist charged with disrupting their ...…
 
On this episode of the CyberSpeak with InfoSec Institute podcast, Keatron Evans, InfoSec Institute instructor and managing consultant at KM Cyber Security, LLC, discusses the path you can take to become an incident responder.In the podcast, Evans and Chris Sienko, host of CyberSpeak with InfoSec Institute, discuss: When did you become intereste ...…
 
Business email compromise (BEC) attacks are expected to cost businesses $9 billion by the end of 2018, according to Trend Micro estimates. In this discussion with Roger Sels, VP of information security at DarkMatter, and Jack Koziol, CEO of InfoSec Institute, you'll learn more about BEC attacks and measures you can take to begin protecting your ...…
 
This week, we discuss the 10 million affected by Dixons Carphone's 2017 data breach, the exposure of hundreds of thousands of clothes shoppers' details, Yale University's ten-year old data breach, and a return to typewriters for government workers in Matanuska-Susitna Borough in Anchorage.
 
This week, we discuss the 10 million affected by Dixons Carphone's 2017 data breach, the exposure of hundreds of thousands of clothes shoppers' details, Yale University's ten-year old data breach, and a return to typewriters for government workers in Matanuska-Susitna Borough in Anchorage.
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into cyber incident response management and IT Governance products and solutions for organisations which suffer a data breach.
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into cyber incident response management and IT Governance products and solutions for organisations which suffer a data breach.
 
Gerry and Steve cover the recently released practical guidance from NIST on securely integrating mobile devices into clinical practices. They discuss then poke holes in a recent, widely distributed report discussing America’s most cyber insecure airports, and with Blackhat on the horizon they provide a preview of things to expect from the event ...…
 
https://www.straitstimes.com/singapore/personal-info-of-15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most https://www.bankinfosecurity.com/labcorp-still-recovering-from-ransomware-attack-a-11235 https://www.securityweek.com/cyber-axis-evil-rewriting-cyber-kill-chain https://arstechnica.com/information-technology/2018/07/prolifi ...…
 
https://www.straitstimes.com/singapore/personal-info-of-15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most https://www.bankinfosecurity.com/labcorp-still-recovering-from-ransomware-attack-a-11235 https://www.securityweek.com/cyber-axis-evil-rewriting-cyber-kill-chain https://arstechnica.com/information-technology/2018/07/prolifi ...…
 
On the first episode of the CyberSpeak with InfoSec Institute podcast, Leighton Johnson, the CTO and founder of ISFMT (Information Security Forensics Management Team), discusses the path you can take to become a security architect.In the podcast, Johnson and Chris Sienko, host of CyberSpeak with InfoSec Institute, discuss: How you can become a ...…
 
This week we discuss Google Chrome flagging sites that use HTTP as not secure, BA's GDPR fail, and a massive data breach affecting more than 100 manufacturing companies.
 
This week we discuss Google Chrome flagging sites that use HTTP as not secure, BA's GDPR fail, and a massive data breach affecting more than 100 manufacturing companies.
 
Gerry and Steve discuss organizations challenge of securing their supply chain, citing a recent robotics company that lost IP from major car vendors. They provide an update on the Healthcare Sector Coordinating Councils efforts on executing on the 2017 Healthcare Cybersecurity Taskforce report. They dive into Emotet malware and how it has evolv ...…
 
# Social MediaFacebook: https://www.facebook.com/drunkinfosec/Twitter: https://twitter.com/DrunkInfoSec# Download/Subscribe LinksTuneIn: https://tunein.com/podcasts/Technology-Podcasts/Drunk-Infosec-p1132065/Apple ITunes: https://itunes.apple.com/us/podcast/drunk-infosec/id1393699888?mt=2Youtube: https://www.youtube.com/channel/UCTMQ2SNVxgam2eZ ...…
 
Google login Twitter login Classic login