show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

Unsubscribe
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Unsubscribe
Unsubscribe
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Blak Cyber

George McPherson

Unsubscribe
Unsubscribe
Monthly
 
"Securing Our Place In The Industry"​ The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry. Support this podcast: https://podcasters.spotify.com/pod/show/blakcyber/support
  continue reading
 
Digital Self-Defense is a podcast that explains the basics of cybersecurity and data protection in an accessible, user-friendly voice. DSD instructs listeners in understanding the basics of cybersecurity, dissects and explains significant current events relating to cybersecurity, and helps listeners learn how to keep themselves from hacks and threats. Hosted by cybersecurity professional Tim Honker (CISSP), Digital Self Defense avoids technical jargon at all costs and provides an overview ab ...
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Send us a Text Message. Ready to fortify your software development practices against security risks? Join us as we unearth critical strategies for mitigating vulnerabilities in your code. From the seamless integration of Static Application Security Testing (SAST) into your CI/CD pipelines to refactoring code to eliminate buffer overflow issues, thi…
  continue reading
 
Join our expert panel for an insightful discussion on essential tips, tricks, and strategies for passing your CISSP exam. Whether you're considering a career in cyber security or are already a seasoned professional, the CISSP exam is a crucial milestone. Tune in to learn how you can ace your CISSP exam on your first attempt. With Nathan House CISSP…
  continue reading
 
In this episode, Ryan Williams and Elizabeth Stephens discuss the recent IT outage caused by a bad patch from CrowdStrike that impacted Microsoft systems. They emphasize the importance of investing in people, processes, and tools to prevent such incidents and highlight the need for digital resilience. They also address the role of AI in cybersecuri…
  continue reading
 
In this episode, the hosts discuss their recent activities and media consumption. They mention watching documentaries, TV shows, and movies, as well as their experiences with family activities like bowling. They also talk about exploring different cuisines and cooking healthier meals. Additionally, they mention their interest in Japanese culture an…
  continue reading
 
In this conversation, Ryan Williams Sr. interviews Miguel Clarke, a retired Supervisory Special Agent from the FBI, now a Cybersecurity and GRC Evangelist, at Armor Defense. Miguel shares his background in law enforcement and his transition into cybersecurity. He discusses the early days of cyber investigations and the collaboration between differe…
  continue reading
 
The podcast discusses a recent article about a Russian troll farm that uses AI-enhanced software to spread disinformation. The hosts highlight the importance of verifying information and diversifying news sources to combat the spread of fake news. They also discuss the need for social media platforms to implement better troll detection and verifica…
  continue reading
 
Worried about hotel hacking? This episode unveils the cybersecurity protocols of resorts like Atlantis. ️ Dive deep into the unique challenges of cybersecurity in hospitality, from balancing guest convenience with ironclad defenses to training a diverse workforce. Tsega Thompson, Executive Director of Cybersecurity and Data Privacy at Atlantis Reso…
  continue reading
 
The conversation discusses a recent article about a new attack on a 30-year-old protocol called RADIUS. The protocol is widely used in networks for client-server interactions, including VPN access, DSL and fiber connections, and 5G authentication. The attack, called Blast Radius, exploits vulnerabilities in the MD5 hash used in the protocol. The at…
  continue reading
 
Send us a Text Message. Ever wondered how a data breach could impact cloud security, or what measures you need to take to secure sensitive information? Join us in this episode of the CISSP Cyber Training Podcast as we break down the recent AT&T data breach and its implications on cloud environments like AWS and Snowflake. Discover how attackers gai…
  continue reading
 
AT&T experiences another major data breach, exposing call and text records of millions of customers, including non-AT&T users. The breach highlights the vulnerability of personal information and the potential for location tracking and targeted attacks. Snowflake, a third-party platform, was involved in the breach, but investigations suggest user er…
  continue reading
 
In this conversation, Ryan and Shannon discuss various topics, including cybersecurity news, movies, and TV series. They mention OpenAI being victims of espionage, the impact of password compilations, and the role of CISOs. They also talk about the movies they watched, such as 'The Beekeeper' and 'Clipped,' and the TV series 'Barbershop.' They shar…
  continue reading
 
Send us a Text Message. Can AI revolutionize your cybersecurity career? Join me, Sean Gerber, on today's thrilling episode of the CISSP Cyber Training Podcast as we uncover the transformative impact of artificial intelligence on cybersecurity jobs, based on a revealing article by Joe McKendrick from ZDNet. With 88% of cybersecurity professionals pr…
  continue reading
 
The conversation discusses the increasing scrutiny of CISOs by the government after a major breach. It highlights the challenges faced by CISOs, including being the fall guy for breaches and lacking decision-making power in the C-suite. The importance of communication, collaboration, and documentation is emphasized as a way for CISOs to protect the…
  continue reading
 
In this episode, Ryan and Shannon discuss a recent security alert about a hacker who uploaded 10 billion passwords to a crime forum. They explain the concept of credential stuffing and the risks of using the same password for multiple accounts. They emphasize the importance of enabling multi-factor authentication and suggest that biometrics may be …
  continue reading
 
OpenAI's internal AI details were stolen in a 2023 breach, but the company did not disclose it until now. The hacker gained access to the internal messaging systems and stole details about the design of OpenAI's artificial intelligence technologies. Although the actual technologies were not compromised, the breach raises concerns about the lack of …
  continue reading
 
Send us a Text Message. Is a four-year college degree necessary to break into the world of cybersecurity? Discover why practical experience and industry certifications might just be your golden ticket to a thriving career in IT. In this episode of the CISSP Cyber Training Podcast, host Sean Gerber unpacks Domain 7.3 of the CISSP exam, emphasizing t…
  continue reading
 
In this episode, the hosts discuss their week and what they've been watching. Shannon talks about his week and shares his thoughts on the TV show 'My Adventures with Superman' and the Netflix movie 'A Family Affair'. Chris talks about watching local news and streaming anime on Crunchyroll. Daniel shares his experience with stomach problems and his …
  continue reading
 
In this episode, Ryan and Shannon discuss a recent article about a massive HTTP DDoS attack that reached a record high of 71 million requests per second. They highlight the increasing sophistication and frequency of DDoS attacks, as well as the potential life-threatening effects of such attacks in the future. They also discuss the role of IoT devic…
  continue reading
 
Send us a Text Message. Ever wondered how to secure your SaaS environment while mastering essential security testing techniques? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we navigate the complexities of cybersecurity, starting off with some personal July 4th reflections and an insightful Forbes article on the pressing threats and…
  continue reading
 
Is your penetration testing just a compliance formality? This episode of the SecurityMetrics Podcast redefines pen testing as a strategic partnership, empowering you to get the most out of your assessments. Join Jen Stone and James Farnsworth as they discuss: The critical role of scoping: Learn how to align business needs with technical assessments…
  continue reading
 
The conversation revolves around the lack of comprehensive privacy legislation in the United States and the need for stronger data protection measures. The discussion highlights the failure of the American Privacy Rights Act and the removal of civil rights protections from the bill. The hosts express frustration with the slow progress in implementi…
  continue reading
 
The conversation discusses a recent cybersecurity attack on Evolve Bank, which was initially mistaken for an attack on the Federal Reserve. The hackers, known as Lockbit, threatened to release sensitive information unless a ransom was paid. However, it was later revealed that the Federal Reserve was not hacked, and it was actually Evolve Bank that …
  continue reading
 
The conversation discusses the article titled 'TikTok confirms it offered US government a kill switch' from BBC.com. The hosts express concerns about data sharing and the potential infiltration of Chinese companies. They question the effectiveness of a kill switch in protecting user data and highlight the need for transparency and regulation in soc…
  continue reading
 
Send us a Text Message. Ever wondered how to fortify your organization against cyber threats? Join Sean Gerber as we uncover the essentials of Domain 6.3 of the CISSP exam, from security assessments to account management and backup verification. Learn about tools like Nessus and Qualys and the role of ethical hacking in identifying vulnerabilities.…
  continue reading
 
In this episode, Ryan, Shannon, and Chris discuss their week and share their experiences. They talk about family time, vacations, and their favorite TV shows and games. They also mention their podcast content and ask for feedback. The conversation touches on topics like cybersecurity, movies, and pop culture. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Th…
  continue reading
 
In this episode of the Unsecurity Podcast, the guys sit down with Michael Kennedy of Ostra to discuss burnout and share their personal experiences and strategies for preventing and managing work-related stress. Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-d…
  continue reading
 
Send us a Text Message. Could a seemingly minor breach at a smaller bank signal bigger vulnerabilities in our financial system? On this episode of the CISSP Cyber Training Podcast, we deliver eye-opening insights on a recent cybersecurity incident involving the notorious ransomware group LockBit. While the U.S. Federal Reserve remained untouched, E…
  continue reading
 
Rebekah Skeete, COO of BlackGirlsHack, discusses the organization's mission and initiatives in the cybersecurity field. The organization was founded by Tennisha Martin to provide support and resources for black women interested in cybersecurity. BlackGirlsHack offers a monthly book club, weekly trainings, and cohorts for technical skill development…
  continue reading
 
The conversation discusses the use of AI in art and the impact it has on artists. Artists are using anti-AI poison to create images that confuse and disrupt AI-generated art. While AI makes it easier for people to create art, it also threatens the livelihood of artists. The use of poisoning tools like Glaze and Nightshade can prevent AI from genera…
  continue reading
 
The city of Cleveland refuses to pay a ransom demand by cyber attackers, which is a positive sign. The team speculates that the city of Cleveland likely have good cyber hygiene and a recovery plan in place. It's important to not pay ransom demands as it encourages more attacks. Cleveland's segmentation of networks and adherence to best practices is…
  continue reading
 
A software company called CDK was hacked, causing 15,000 car dealerships across North America to be crippled. The dealerships relied on CDK's software for various operations, including car sales and maintenance. Some dealerships had to resort to pen and paper, while others were unable to perform any tasks. The attack had a significant impact on the…
  continue reading
 
Send us a Text Message. Want to ensure your organization's sensitive data remains secure in today's mobile-centric world? Tune in to our latest CISSP Cyber Training Podcast episode, where we unravel the complexities of federated identities and robust credential management. Learn from the high-profile data breach involving Change Healthcare and disc…
  continue reading
 
In this episode, Ryan and Daniel discuss Daniel's experiences in Japan. Daniel talks about house hunting and the unique architecture of houses in Japan, exploring the city of Yokosuka and the abundance of food options. Daniel shares his arcade and lounge experiences in Tokyo, highlighting the social aspect of arcades in Japan. They also mention TV …
  continue reading
 
In this lost episode from December 4, 2022, Ryan and Shannon how hackers are using the trending TikTok invisible challenge to spread malware. Threat actors are tricking users into downloading malware by capitalizing on the invisible challenge, where users apply a filter that leaves behind a silhouette of their body. The malware is hidden inside Pyt…
  continue reading
 
Send us a Text Message. Ready to conquer the CISSP exam? This episode promises to arm you with crucial insights into the OSI model and its real-world applications. We kick things off by unraveling the intricacies of VPN tunnels and the pivotal role the data link layer plays in encapsulating data packets for secure internet travel. Next, you'll gras…
  continue reading
 
Microsoft and Google are offering cyber help to rural hospitals in an initiative by the Biden administration. The hospitals, which are critical for surrounding areas, often lack proper cybersecurity measures and are vulnerable to cyber-attacks. Microsoft is offering discounts on security products and free licenses to upgrade their systems, while Go…
  continue reading
 
This episode of the SecurityMetrics Podcast is a valuable resource for MSPs who want to learn more about HIPAA compliance and how to better serve their healthcare clients. Join Jen Stone and David Sims to learn more about how Managed Service Providers (MSPs) can empower healthcare organizations to achieve HIPAA compliance. Learn about: The challeng…
  continue reading
 
The conversation discusses the trend of regulated industries adopting military-grade cyber defenses and the importance of information sharing and collaboration in the cybersecurity field. It emphasizes the need for a collective approach to cybersecurity and the adoption of strategies like zero trust. The conversation also highlights the significanc…
  continue reading
 
"You can find your top 5 cyber risks using a “top down” approach with the NIST Cybersecurity Framework. Along the way, you can shift your organization towards better practice of reasonable cybersecurity. Know how? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. You can see ou…
  continue reading
 
In this episode, Ryan and Daniel discuss the recent Microsoft cybersecurity hearing and the implications for the company's relationship with the government. They highlight the importance of Microsoft's role in the federal sector and the need for improved security practices. The breach attributed to China and the loss of encryption keys are discusse…
  continue reading
 
Send us a Text Message. Are multi-layer protocols the key to safeguarding our digital world amidst the rising tide of cyberattacks? Join me, Sean Gerber, as I unravel the complexities of these protocols and their vital role in cybersecurity, drawing from the CISSP ISC² domains 4.1.4 and 4.1.5. By sharing my firsthand experiences and highlighting th…
  continue reading
 
In this episode, Ryan, Shannon, and Daniel discuss their recent activities and interests. They talk about their media consumption, including TV shows, movies, and comedy specials. They also share updates on their personal lives, such as graduations and college orientations. Ryan mentions his plans for the podcast and upcoming appearances, while Sha…
  continue reading
 
Send us a Text Message. Ready to conquer the CISSP exam? Unlock the secrets of threat modeling with our latest episode! Join me, Sean Gerber, as we break down the STRIDE methodology—Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Learn how to decode these critical security concepts and master…
  continue reading
 
Mariah Simone' Denson is the founder and president of Global Patch, a nonprofit organization that focuses on getting people, especially BIPOC individuals, into the gaming, eSports, digital production, and tech industries. The organization provides education and career pathways, as well as focuses on the safety of individuals in these spaces. Mariah…
  continue reading
 
The conversation discusses the shortage of cybersecurity professionals and the role of certifications in job hunting. The article mentioned states that there are around 469,930 open cybersecurity positions in the US that are not being filled due to a lack of certifications. The hosts debate the importance of certifications versus degrees and the ne…
  continue reading
 
Microsoft recalls screenshot feature after outcry due to privacy concerns raised by the UK and EU. The feature, called Recall, was meant to store screenshots of desktop activity but raised concerns about the security of sensitive information, such as passwords, being captured and stored in plain text. Microsoft responded by making the feature opt-i…
  continue reading
 
The conversation discusses the recent data breach targeting the customers of cloud storage firm Snowflake. The breach has resulted in hundreds of customer passwords being found online, potentially exposing millions of accounts. The conversation highlights the ease of access to hacking tools and the importance of using multi-factor authentication to…
  continue reading
 
Send us a Text Message. What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the…
  continue reading
 
Loading …

Quick Reference Guide