CISO public
[search 0]
×
Best CISO podcasts we could find (updated May 2020)
Best CISO podcasts we could find
Updated May 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the busi ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe on Apple Podcasts, SoundCloud, or Google Podcasts to get new episodes as they become available.
 
The CIO exchange podcast features technology and business leaders from around the world, discussing some of the hardest problems they've had to solve on a national and a global scale. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. ...
 
Security Conversations is a cybersecurity podcast series curated by journalist and security strategist Ryan Naraine. These conversations with security practitioners cover a wide range of topics, including threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted threat activity. Connect with Ryan on Twitter (Open DMs). Disclosure: Ryan is a security strategist at Intel Corp. Ryan produces this podcast in hi ...
 
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon has over 19 years of experience in government and corporate cybersecurity providing you expertise that you will find value from the very first weekly podcast. Shon will provide you detailed CISSP training along with sample CISSP exam questions while utilizing colorful commentary to enhance the over ...
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIO's, CEO's and CISO's discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry called cyber security.
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Welcome to the Zero Hour Podcast hosted by Karl Sharman and Karla Reffold, sponsored by BeecherMadden and Cyber Security Professionals. The podcast that speaks to the best talent in the cybersecurity industry. Each episode provides insights, techniques and tools required to be successful in the cybersecurity space. This podcast is now available on Stitcher, ITunes, SoundCloud and Spotify. Please follow our content at: Instagram: @zerohourexperience Twitter: @zero_hourpod Music by: Clark Henr ...
 
The Linux Security Podcast covers key concepts in security, reviews some of the latest exploits and discusses the tools enterprises use to detect, prevent and recover from cyber attacks. The show features insights from Mike Shinn, co-founder and CEO of Atomicorp, and Scott Shinn, co-founder and CTO of Atomicorp as well as PM for OSSEC. Scott was also chief network manager at the White House and interim CISO at the Department of the Interior earlier in his career. Mike contributed to the firs ...
 
Technology is changing the very fabric of how, when and where healthcare is delivered. Issues like security and privacy, electronic medical records, interoperability, big data, population health and telehealth are dominating the conversations of everyone from physician all the way up to the federal government. Technology that Drives Healthcare will explore these and other issues effecting the how patient care and outcomes is changing with the advent of cutting edge technologies.
 
Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
 
Contrast Security provides the industry’s only DevOps-Native AppSec Platform using instrumentation to continuously analyze and protect software from within the application. This enables businesses to see more of the risks in their software and less development delays and AppSec complexity. The Contrast platform integrates seamlessly into development pipelines, enabling easier security bug and vulnerability fixes that significantly speed release cycles. The Contrast Inside AppSec Podcast feat ...
 
IT LEADERSHIP: Topics include - Cost Center vs Business Force Multiplier - End User Influence - Selling IT to Upper Management - Getting a Seat at the Table *****DISCLAIMER***** All views, opinions, and statements made by guests on this show do not represent the beliefs of Phil Howard, or any entity whatsoever with which I have been, am now, or will be affiliated. Any statements, views, random thoughts, or opinions expressed by myself do not necessarily reflect my personal beliefs (could eas ...
 
Peerlyst is the largest community of security professionals building the biggest repository of security knowledge in the form of resources, code, scripts, and discussions. Over half a million users from 191 countries learn and share on Peerlyst daily - from Fortune 500 CISOs to industry experts, pen testers, researchers, security managers, independent security contractors and security teams. Top executives from companies like Apple, Airbnb, AMEX, Google, and Facebook are all on Peerlyst. Adv ...
 
The Futurum Tech Podcast (FTP), featuring Daniel Newman, Olivier Blanchard, and Fred McClimans, is a weekly podcast covering the latest in tech news, new products and services, mergers, earning, regulations, and so much more. From startups to industry leaders, from emerging tech to the latest in artificial intelligence and cyber security. If it's worth discussing, you'll find it here each week as the Futurum team of tech and equity analysts, and the occasional guest, discuss their Story of t ...
 
Loading …
show series
 
As the Chief Information Security Officer at Kuwait Oil Company, Dr. Reem Al-Shammari protects one of the world’s leading oil and gas companies. Known as a “wild card” among colleagues during her professional rise, Dr. Reem applies innovative solutions from both an engineering and management perspective. She honed her unique strategies after comple…
 
This episode I welcome another special guest. The Chief Information Security Officer from Optiv. We discuss ransomware in this new remote work world we find ourselves in and the challenges for businesses and individuals working at home. Optiv Website - https://www.optiv.com/ Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast w…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/great-security-program-too-bad-we-cant-implement-it/) Security theory only goes so far. If you want your security program to work, everyone has to do their part. This week’s episode of CISO/Security Vendor Relationship Podcast features me, David Spark (@dspark…
 
Sponsored by: https://sparqglobal.com/For more on cybersecurity, visit us at cybersecurityventures.com/Follow Cybersecurity Ventures / Cybercrime Magazine here:LinkedIn: linkedin.com/company/cybercrime-magazine/Twitter: twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magazine PodcastBy Cybercrime Magazine
 
Historically, application security was only in the peripheral purview of the CISO/CSO. But times are changing according to executive cybersecurity recruiter André Tehrani (partner at Recrewmint). In this podcast (part two of a two-part series), André discusses why his firm’s clients are placing application security at the top of the list of skillse…
 
Career Transitioning After Decades With Another Organization Being with the same organization for a long period of time is a wonderful achievement, but when you’re ready for a change of scenery, the transition can be tough after such a long stint with one organization. Being able to set up into your new role with fresh eyes and ears to really liste…
 
Today, we are joined by Naveen Vasadula. Naveen is an Information Security Risk professional with a strong financial services experience knowledge built over the past 23 years working in London, Paris, Zurich, Singapore, Hong Kong, and Japan. Covering a range of Global Senior Executive Management positions. Including Security Risk, Control and Comp…
 
With the rate of cyber attacks on the rise, firms should be ramping up their cybersecurity procedures and teams. At the same time the role of the Chief Information Security Officer or CISO is changing as the role gains prominence and must evolve in this rapidly changing space. In this DerivSource podcast, we spoke to Joe Krull, Senior Analyst, at A…
 
In the leadership and communications section, Burnt out CISOs are a huge cyber risk, to build strategy, start with the future, 78% of Organizations Use More than 50 Cybersecurity Products to Address Security Issues, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode…
 
Many people in the Cyber Security profession aspire to be the Chief Information Security Executive of their organization some day. Listen to the Chief Information Security Officer of Ciena, Andy Bonillo describe his journey from humble beginnings to becoming a CISO on Episode #114 of Task Force 7 Radio. Mr. Bonillo talks about how the totality of t…
 
Dr. Pablo Molina, AVP and CISO at Drexel University speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System). Dr. Molina discusses how the university transitioned faculty, staff and students…
 
On this special edition of the Futurum Tech Podcast - Interview Series, host Daniel Newman welcomes Mark Hughes, Senior Vice President of Security at DXC Technology to discuss the CISO’s playbook for leading security during COVID-19. The Current Cybersecurity Landscape Cybersecurity challenges and threats are not getting any better or easier to man…
 
Global CSO of TikTok Roland Cloutier speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). A seasoned executive, Roland provides guidance on being successful when starting a new…
 
On today’s episode, Guy Podjarny talks to Kelly Shortridge about security, microservices, and chaos engineering. Kelly is currently VP of product strategy at Capsule8, following product roles at SecurityScorecard, BAE Systems Applied Intelligence, as well as co-founding IperLane, a security startup which was acquired. Kelly is also known for presen…
 
In this special episode of the Futurum Tech Podcast - Interview Series, host Daniel Newman is joined by Scott Harrell, Senior Vice President and General Manager of Intent Based Networking Group at Cisco to discuss the challenges and opportunities in the enterprise introduced by the pandemic and how existing technology will help us safely return to …
 
Guests: J Patrick Turner, CIO Schoolcraft College CIO Exchange on Twitter: https://twitter.com/vmwcioexchange Host Yadin Porter de Leon: https://twitter.com/porterdeleon Subscribe to the Podcast On Apple Podcast: https://podcastsconnect.apple.com/my-podcasts For more podcasts, video and in-depth research go to https://www.vmware.com/cio…
 
Trump's press secretary made an innocent mistake to prove a point but revealed sensitive banking information at the same time. She flashed a check that was a donation of Trump's salary to a government department. However, she showed the whole check that contained everything a hacker would want. This episode talks about this and what you should be c…
 
In this special episode of the Futurum Tech Webcast — Interview Series, host Shelly Kramer interviews Rob Walker, Pega’s VP of decisioning and analytics to discuss the role AI is playing in the pandemic, the launch of Pega’s Responsible AI ethical bias check, how empathy and ethics come into play and impact the bottom line, and also how organizatio…
 
What is the value of identity in a larger security conversation? Why does CyberArk partner with so many technology vendors? What’s the value to you, the customer? It’s an opportunity to talk about Privileged Access Management solution integrations with market leading software applications in the vulnerability management, SIEM, storage, discovery, o…
 
This week, MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting and response with CTI, and more! Visit https…
 
Contact tracing is a key strategy for preventing the spread of COVID-19, and smartphone-assisted contract tracing automates a laborious process. But contact tracing technologies face criticism from privacy advocates concerned about the potential for abuse. F-Secure privacy expert and global technical director Tomi Tuominen argues that the issue is …
 
In this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerabi…
 
A study of insider breaches revealed that the great insider threats are employees that are leaving the company soon or are deemed flight risks. This episode talks about this and things you can do as a security program leader to help identify these behaviors ahead of time. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with…
 
Sponsored By: www.mastercard.us/en-us.htmlFor more of our podcasts visit: cybersecurityventures.com/podcasts/For more on cybersecurity, visit us at cybersecurityventures.com/Follow Cybersecurity Ventures / Cybercrime Magazine here:LinkedIn: linkedin.com/company/cybercrime-magazine/Twitter: twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magaz…
 
Sponsored by: https://stellarcyber.ai/To join Stellar Cyber for a live magic show: https://stellarcyber.ai/security-is-not-black-magic/For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/Twitter: https://twitter…
 
Careers often take interesting, meandering journeys and coalesce in unexpected ways. With a Ph.D. in Medical Genetics, today’s guest, Dr. Wendy Ng did not envision herself working in DevSecOps. However, she has combined her academic skills with technical prowess to now hold the role of DevSecOps Security Managing Advisor at Experian. We kick the ep…
 
Beth Anne Stuebe, ILTA Director of Publications and Press, sits down with Rachel Shields Williams, Senior Manager, Experience Management, Sidley Austin LLP, to talk about her recognition in 2019 as a Young Professional to Watch, a part of ILTA's Distinguished Peer Awards. Tune in! To learn how to nominate yourself or others for a 2020 ILTA Distingu…
 
Developers are embracing Python programming language in growing numbers. It is the most studied language among developers and is used for myriad applications. As a dynamic programming language (as opposed to Java and C that are static languages), variable type is not determined in the application until runtime. For application security to accuratel…
 
In this episode, Malcolm Harkins and Chad Boeckmann speak with John Brennan, Partner at YL Ventures. This episode provides a perspective of how venture capital firms are reacting to and supporting their cybersecurity portfolio companies during an unprecedented pandemic in our modern time. In this episode we discuss trends of security teams and John…
 
In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Steve Hanna joins us to talk about COVID 19 and the security risks that go along with the "new normal" that has emerged out of the pandemic. While organizations face challenges securing remote workers, Steve also sees more than a glimmer of a silver lining to the disrup…
 
On this episode of the Futurum Tech Podcast - Interview Series, host Daniel Newman welcomes Amanda Mountain, the Global Vice President of Marketing for Digital Commerce at SAP to discuss digital software buying, COVID-19 and some key findings from the 2019 B2B Digital Buyers’ Journey: Trends, Challenges, and Predictions report. B2B Digital Buyers’ …
 
Is China an enemy or a competitor to the United States? Former Director of the NSA and the former Commander of U.S. Cyber Command, Admiral Michael Rogers weighs in on this topic and much more on Episode #111 of TF7 Radio! Admiral Michael Rogers reviews China's 100 year strategy, what it means to the United States, and what the U.S. should do in the…
 
In the Security News, Hackers target the air-gapped networks of the Taiwanese and Philippine military, Stored XSS in WP Product Review Lite plugin allows for automated takeovers, Remote Code Execution Vulnerability Patched in VMware Cloud Director, Shodan scan of new preauth RCE shows 450k devices at risk including all QNAP devices, and The 3 Top C…
 
HTTP security headers are an easy and effective way to harden your application against all kinds of client side attacks. We'll discuss which security headers there are, what functions they have and how to use them properly. To learn more about Netsparker, visit: https://securityweekly.com/netsparker Visit https://www.securityweekly.com/psw for all …
 
Nothing you are about to hear is true… but it all happened… -- Fred Cohen 11 May, 2020 What happens when you get two legends of the security industry together for a chat about everything? Well… first, you can throw the carefully created outline right out the window because there is no way anyone can corrall these two into talking about just a few t…
 
The guests on Trust Me I'm Certified have dropped some real knowledge and I'd like to distill that down as well as talk about building technical skills, looking at your career as a 'thing' that needs care and feeding, and the BSidesNH conference. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.security…
 
In this segment we'll discuss why email security is still not a solved problem and how now that people are increasingly working from home, it poses an increased risk. We'll also share some interesting attacks that we've uncovered in the past several weeks since the beginning of shelter-in-place. Visit https://www.securityweekly.com/esw for all the …
 
In this episode of the Futurum Tech Webcast — Interview Series, host Shelly Kramer is joined by Jeff Nicholson, global head of CRM at Pega to discuss how businesses are adapting customer service strategies in times of disruption. This conversation is intended as a preview to Pega’s upcoming Pegaworld iNspire virtual event being held on June 2, 2020…
 
Whether it's an external red team, internal red team, vulnerability scanning data, or a self-assessment questionnaire, results from all of these different types of assessments must be tracked and managed. Dan from Plextrac will walk you through how to track and manage all of these activities in one place! To learn more about PlexTrac or to claim yo…
 
RSA Conference 2021 Changes Date from February to May 2021, Docker partners with Snyk on container image vulnerability scanning, Venafi acquires Jetstack to bring together developer speed and enterprise security, Onapsis expands assessments for its Business Risk Illustration service, Volterra launches VoltShare to simplify the process of securely e…
 
Sponsored by: www.kroll.com/enFor more on cybersecurity, visit us at cybersecurityventures.com/Follow Cybersecurity Ventures / Cybercrime Magazine here:LinkedIn: linkedin.com/company/cybercrime-magazine/Twitter: twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magazine PodcastBy Cybercrime Magazine
 
Sponsored by: https://www.arcserve.com/For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/Twitter: https://twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magazine Podcast…
 
This podcast—the first in a two-part series—features an interview with André Tehrani, a partner at Recrewmint, a firm focused singularly on cybersecurity recruiting services at the executive level. André explains how the role of the CISO/CSO has never been so difficult. C-suite executives and boards of directors are seeking CISOs/CSOs with not only…
 
In this episode of the Futurum Tech Podcast, Interview Series, host Shelly Kramer speaks with Marc Andrews, VP of Financial Services and Insurance at Pega, to discuss how banks are capitalizing on pandemic-fueled digital transformation to serve their customers. This conversation is intended as a preview to Pega’s upcoming Pegaworld iNspire virtual …
 
For this episode of The Secure Developer Podcast, we welcome Scott Helme to chat with us about front end security. Scott is the force behind Security Headers and Report URI and he is also a Pluralsight author and an award-winning entrepreneur! We get to hear about Scott's professional trajectory since leaving college, the interesting developments a…
 
Loading …
Google login Twitter login Classic login