show episodes
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Data security impacts all of us. How can we safeguard our identity, devices, and apps in the era of AI, ML, and cloud? Tune in to learn about the latest on data security, best practices to secure your data, and the future of data governance and protection with leading experts from all over the world.
  continue reading
 
Loading …
show series
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone CDK auto dealer software unlikely to be restored before June end, memo says | Reuters 10 billion stolen passwords shared online in record-breaking leak Prudential Data Breach Victim Count Soars to 2.5M Polyfill supply…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake | WIRED Data breach affects over 60,000 customers of luxury retailer Neiman Marcus Cisco Talos warns of wider security implications following Sn…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone Microsoft Patch Tuesday for June Rockstar Games Veeam vulnerability Microsoft researcher alerted the business of the SolarWinds hack, but was ignored Hot topic 2024 Verizon DBIR Introduction Key Findings Top Threat Ac…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. 00:00 Intro 03:02 Agenda 04:13 Who are you wearing? 09:16 Nerd Zone * Santander/Ticketmaster * Dell * AT&T 24:17 Hot topic(s) * SaaS sprawl ** What is SaaS sprawl? ** Scary stats ** How SaaS sprawl introduces risk ** Common approaches to managing SaaS sprawl **…
  continue reading
 
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the impact of PCI v4.0 and how organizations are adjusting. In case you missed it - Andy Kerr joined PCI Practice Partner Stewart Fey for an interactive Q&A …
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. hot topic * SPECIAL EDITION: United HealthGroup and the Backlash of MFA not-Everywhere That’s a Wrap * Cybersecuritygrowth.com and cybersecuritygrowth.com/blog * Live on Twitch bi-weekly, Fridays at 10:30 AM EDT, 7:30 AM PDT, 3:30 PM GMT in your pod feeds a few…
  continue reading
 
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. nerd zone How can we still trust Microsoft (redux)? hot topic Building a SOC, Where Do I Start? lets be humans Music stuff Non-security tech job market Resume workshop that’s a wrap Cybersecuritygrowth.com and cybersecuritygrowth.com/blog Live on Twitch weekly,…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Nerd Zone Breaches are still happening every day AT&T breach How can we still trust Microsoft? Hot topic FBI Internet Crime Report 2023 War stories 2 BlackBerry’s…..one Adversary Remote access policy Lets be humans Music stuff Non-security tech Job market Resum…
  continue reading
 
In this edition of the PCI Monthly Update, we’re counting down to the launch of PCI 4.0! We start this month's podcast with a reminder that v4.0 goes into full effect on March 31. Our focus then shifts to Requirement 10 covering logging and monitoring all access to system components and card holder data and what is changing with v4.0. This podcast …
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Hot topic NIST CSF 2.0 Nerd Zone Pôle Emploi - France’s unemployment office War stories Microsoft Secure Score SaaS sprawl Lets be humans Music stuff Non-security tech Job market Resume workshop That’s a Wrap Cybersecuritygrowth.com and cybersecuritygrowth.com/…
  continue reading
 
What's next after season 2? About this Episode In the grand wrap-up of season two of the podcast 'Your Cyber Path', hosts Kip Boyle and Jason Dion reflect on their four-year podcast journey. They also reveal that for the time being, there won't be a season three as originally planned. Several factors have influenced this decision, the primary being…
  continue reading
 
SDP 10: Separation of Privileges About this Episode In this episode of the Your CyberPath podcast, Kip Boyle and Jason Dion delve into the concept of the separation of privilege as a vital component of their series on security architecture and design principles. Jason and Kip talk about how the separation of privilege illustrates its significance t…
  continue reading
 
In this January edition of the PCI Monthly Update, we’re on the brink of exciting changes with version 4.0 just around the corner! We start with a spotlight on the ongoing Request for Comments (RFC) period for PCI DSS v4.0, inviting insights from industry experts. Plus, we discuss the Global Content Library, showcasing insights from the 2023 Commun…
  continue reading
 
As 2023 came to a close, new SEC cybersecurity regulations came into effect and the State of New York issued new cybersecurity regulations for financial services. The new regulations include pointed requirements for response plans in the event of a data incident. As data’s strategic value becomes more recognized, these types of regulations are expe…
  continue reading
 
About this episode In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18. The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comp…
  continue reading
 
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment highlighting the PCI SSC's TRA Guidance. Next, we delve into Requirement 8 of the PCI DSS, dedicated to identifying users and authenticating access to system componen…
  continue reading
 
In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”. The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government. Security Design Principle #9 is a crucial concept in the field of cybersecur…
  continue reading
 
https://www.yourcyberpath.com/112/ In this episode, Kip and Jason jump into answer questions directly from our listeners! We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling e…
  continue reading
 
Ari Paul, Director of Product Marketing at Clumio, dispels the commonly held notion that the public cloud is immune from ransomware. Join him as he outlines what public cloud providers recommend customers do to ensure data resilience, and how Clumio has helped customers quickly and fully recover from ransomware incidents. Watch the on-demand video …
  continue reading
 
Join Lindsay Piper, Clumio Product Marketing Manager, as she explains why AWS’s reliable infrastructure isn’t enough to protect your data and how Clumio’s architecture simplifies and secures your data while lowering costs. She also shares some real world customer examples across a variety of use cases. Watch the video Clumio is redefining data prot…
  continue reading
 
https://www.yourcyberpath.com/111/ In this episode, Kip and Jason delve into the specific security design principle of Open Design. Open Design does not equate to open-source software but refers to transparency in revealing the mechanisms and inner workings of security controls. The hosts discuss the misconceptions surrounding Open Design, emphasiz…
  continue reading
 
In this podcast episode, Woon, the co-founder and CTO of Clumio, joins Andrew Jackson from Atlassian to discuss their successful collaboration in the realm of cloud data backup and recovery. Andrew, a Senior Engineer at Atlassian, provides insights into the challenges faced by their team in ensuring data resiliency, especially with the vast amount …
  continue reading
 
Cybersecurity Awareness Month is the perfect time to review the NIST Cybersecurity Framework (CSF) to ensure your organization is well prepared against cyber threats. Of the five pillars in the framework, Recovery is arguably the most complex, involving coordination across multiple teams and dependencies on a well designed data protection plan to b…
  continue reading
 
https://www.yourcyberpath.com/110/ In this episode, hosts Kip Boyle and Jason Dion discuss the topic of ageism in cybersecurity careers. They address a listener's question about whether it is too late for a career change into cybersecurity at the age of 60-65. The hosts acknowledge that ageism does exist in the industry, but they provide tips and s…
  continue reading
 
https://www.yourcyberpath.com/109/ In this episode, we are returning to the Security Design Principles series, this time with Complete Mediation. Complete mediation means the system checks the user trying to access a file or perform an action is authorized to access this file or perform this action. Complete mediation is also implemented in the sec…
  continue reading
 
Dive into the latest in the PCI landscape with our October update. We kick off with a news segment spotlighting the new SAQ SPOC (Software PIN Entry on COTS) which includes portions of PCI DSS Requirements 3, 8, 9, and 12. Transitioning to Requirement 7, we discuss restricting access to system components and cardholder data based on business necess…
  continue reading
 
https://www.yourcyberpath.com/108/ In this episode, we discuss a critically important topic which is Selfcare. Cybersecurity is a great career, however it is not 100% stress free, burning out and working yourself into oblivion is very common. In this episode our hosts Jason and Kip give you some tips to make sure you have your selfcare in check. Th…
  continue reading
 
Catch the latest news in our September "PCI Monthly Update" from Tuesday, September 26, 2023. We kick things off with key insights from the recent PCI Community Meeting. Next, we dive into Requirement 6, discussing the essence of secure software development, from processes to security vulnerabilities, web application protection, and change manageme…
  continue reading
 
https://www.yourcyberpath.com/107/ In this episode, we go back to the Security Design Principles series, this time we are discussing Failsafe Defaults. Failsafe defaults simply means that the default condition of a system should always be to deny. An example of a failsafe default is the security reference monitor (SRM) that has been implemented in …
  continue reading
 
https://www.yourcyberpath.com/106/ In this episode, we are discussing the much-anticipated topic of Internships! Internships are not that common in cybersecurity and that's because they are a huge long-term investment, which is risky for lots of organizations especially in the private sector. Some of the issues that come along with internships are …
  continue reading
 
https://www.yourcyberpath.com/105/ In this episode, we are returning to the Security Design Principles series, this time with Work Factor. Work factor refers to how much work it’s going to take an adversary to attack your assets and succeed in doing so. This is coming directly from the world of physical security that was imported into the cybersecu…
  continue reading
 
Tune in to the August edition of our PCI Monthly Update. We kick off with a sneak peek into the upcoming PCI North America Community Meeting in Portland and introduce the newly launched PCI Community Job Board—a dedicated platform for security talent and job postings in the payment industry. Next, we delve into Requirement 5, shedding light on anti…
  continue reading
 
https://www.yourcyberpath.com/104/ In this episode, our awesome host Jason Dion is back again with another episode of the Your Cyber Path podcast. This time, he’s accompanied by an amazing guest, Meridith Grundei. Meridith is a renowned public speaking coach and owner of Grundei Coaching who specializes in public speaking and presentation skills. M…
  continue reading
 
SQL Server DBAs and IT Ops teams often need to balance database performance and application uptime against necessary backup operations for recovery scenarios. This equation gets more complicated when dealing with SQL Server in the cloud. Renowned database technologist David Klee, Founder and Chief Architect of Heraflux Technologies, shares his insi…
  continue reading
 
https://www.yourcyberpath.com/103/ In this episode, we are back with our Security Design Principles series, this time discussing Compromise. In the constantly evolving tech world, we are constantly bombarded with new products, updates, and software changes. To navigate through this ever-changing landscape, we require a foundation of stability. This…
  continue reading
 
Dive into the latest PCI news in our July PCI Update. This episode covers key PCI developments, an in-depth exploration of Requirement 4, and a helpful QSA Q&A. We kick off this episode by previewing the upcoming PCI Community Meeting in Portland and discuss our hosts' presentation on "Generative AI: Your New Secret Weapon or an Insider Threat?" We…
  continue reading
 
https://www.yourcyberpath.com/102/ In this episode, we are back with one of our favorite guests, Ed Skipka, to talk about his latest achievements, studying and passing both CISSP and CISM exams. To start, Ed goes on about how you should find your own way of studying and figure out the most efficient way to digest information, whether that is online…
  continue reading
 
https://www.yourcyberpath.com/101/ In this short episode, we are back discussing the Security Design Principles, with the third principle, Economy of Mechanism. Jason and Kip explain the principle of Economy of Mechanism and how you want to apply it in your career as a cybersecurity professional without falling into the trap of overcomplicating thi…
  continue reading
 
https://www.yourcyberpath.com/100/ We're celebrating the 100th episode of Your Cyber Path podcast with a special edition episode. It's going to be a little different this time. We are going to sit back and reflect on all our 100 previous episodes and take in the things that we learned, so basically welcome to the highlight reel of the Your Cyber Pa…
  continue reading
 
https://www.yourcyberpath.com/99/ In this episode, we are going over the latest trend in AI and NLP, ChatGPT, with our guest, Sean Melis, seasoned multi-modal developer and designer and the founder of bot•hello. In the beginning, Sean explains how chatbots work and the main difference between them and ChatGPT, explaining that ChatGPT leverages a hu…
  continue reading
 
https://www.yourcyberpath.com/98/ In this episode, we are back discussing Security Design Principles, and this time we are focusing on Psychological Acceptability. The Security design principles are crucial for your work as a cybersecurity professional, they will not only help you do really well, they will also help your work stand out. Psychologic…
  continue reading
 
You already know patient data needs to be backed up, air-gapped, immutable and encrypted. As applications and workloads in the cloud trend toward more unstructured data, the path to achieving HIPAA and HITECH compliant data protection can seem unclear. In this webinar with Clumio’s Field CTO, learn the easy, HIPAA-compliant way to automate protecti…
  continue reading
 
Amazon RDS provides the foundation for modern applications, bringing the benefits of cloud to relational databases. And while RDS databases are simple to use and easy to manage, long-term retention of RDS data can be a hassle. This is especially true for customers in regulated industries such as healthcare, financial services, and manufacturing, wh…
  continue reading
 
https://www.yourcyberpath.com/97/ In today’s episode, we discuss the emerging topic of passwordless authentication with our guest James Azar, CTO and CSO of AP4 group who are well known for their work in critical infrastructure. Passwords have been here for decades, but with the ever-changing nature of the technology industry, passwords are becomin…
  continue reading
 
Loading …

Quick Reference Guide