Best Cissp podcasts we could find (Updated April 2018)
Related podcasts: Security Persistent Breach Data Advanced Tech Cyber Hacking Computersecurity Cpes Issmp Gray Threat Informationsecurity Regulatory Pentesting Owasp Compliance Cisa Application  
Cissp public [search 0]
show episodes
 
C
CISSP Training
Daily+
 
CyberSecStudy is the most efficient and effective way to prepare for the CISSP exam. Add audio to your study process and gain a new perspective.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Jay Schulman's goal is to help grow information security professionals and developers. As an industry, we're short quality professionals who understand how to communicate security to executives and other business people. Additionally, too few developers understand security and can help build it into their software. Through interviews with infosec professionals and developers, you'll learn how others have grown their careers in security.
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
Experiments in Risk Science
 
The Only Opinions That Matter Since 2006!
 
I
ITSPmagazine
Weekly+
 
Founded in 2015 and formally launched in 2016 by Sean Martin, CISSP, and Marco Ciappelli, ITSPmagazine is an online InfoSec publication that brings together a select team of editors, journalists, and other industry professionals focused on Information Technology and IT Security and the influence that it has on our everyday lives – as individuals and as the Society we live in. And, for a change, the other way around.Our mission is to raise awareness for cybersecurity and privacy by making it ...
 
Bring Your Own Security Radio is hosted by two CISSP's who bring you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in length, and often can provide you one CPE/CEU for your tech certifications simply for listening.
 
Loading …
show series
 
Becky Havlisch (Banner Health) and Bob Chaput (Clearwater) lead their respective organization’s search for better cyber risk management. Havlisch has an unusual title: vice president of business health. That title reflects her organization’s innovative approach to cyber risk. Chaput describes why the 2009 HITECH Act led to the explosion of heal ...…
 
Is it possible to completely change careers and built a successful new career in accounting? What is the difference between working for a public accounting firm and the public-sector? What certifications are most desirable? In this episode of Life In Accounting: The Where Accountants Go podcast, Amy Barrett, CPA shares her expertise on these to ...…
 
A Peerlyst Peertalk podcast on CISO war stories with industry experts.Show notes:The participants in this podcast were:Moderator: Chris Hodson, EMEA CISO, ZscalerEric Klein, COO at Cloudonix.ioTal Arad, CISO at Ceva LogisticsIf you have questions for any of the participants, or if you have feedback, you will be able to ask your questions in thi ...…
 
SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh… T ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Simple CISSP Exam QuestionsAuthor: Phil MartinNarrator: Phil MartinFormat: UnabridgedLength: 18 hrs and 40 minsLanguage: EnglishRelease date: 09-26-17Publisher: Phil MartinRatings: 4 of 5 out of 2 votesGenres: Science & Technology, TechnologyPublisher's ...…
 
What is Wannacry? How to Protect yourself, and where did it come from? Wannacry Threat Brief from Debra Baker, CISSPBy cysreport@gmail.com (Debra Baker).
 
Joseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security & virtualization, access controls, and privileged account management. He currently serves as Chief Security Scientist at Thycotic. Jose ...…
 
Joseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security & virtualization, access controls, and privileged account management. He currently serves as Chief Security Scientist at Thycotic. Jose ...…
 
In this episode: Feature interview with Genevieve Southwick - aka Bana Sidhe (pronounced Banshee) - Denver's wrangler of security conferences. Also news from Palo Alto Networks, Secure64, Swimlane and Automox. Full show notes: https://www.colorado-security.com/news/2017/7/15/24-717-show-notesGirl Scouts - selling cookies, camping and... hacking ...…
 
Direct Link to Download: http://traffic.libsyn.com/brakeingsecurity/2017-022-windows_and_AD_Hardening.mp3 This week, we discuss hardening of windows hosts, utilizing CIS benchmarks. We talk about the 'auditpol' command. And we dredge up from the ancient times (2000) the Microsoft article from Scott Culp "The 10 Immutable Laws of Security Admini ...…
 
In this episode: Brad Feld is the feature interview this week. Brad is managing partner for Foundry Group, and co-founder of Techstars. News from Amazon, ID Watchdog, Sphero, Optiv, Ping Identity, and Swimlane. https://www.colorado-security.com/news/2017/6/24/21-626-show-notesAlex will never be lonely againThe summer is in full swing, though th ...…
 
In this episode: Alex interviews infosec lawyer Dave Navetta. News from Amazon, ViaWest, Notion, Ping Identity, ProtectWise, Webroot, LogRhythm, and Optiv. Full show notes here: https://www.colorado-security.com/news/2017/6/16/20-619-show-notesPing is a leader (but we knew that already, right?)Need that Amazon order this afternoon? Well I have ...…
 
In this episode: Alex sits down with Joe Bonnell, CEO and Founder at Alchemy Security. News from Bad Axe Throwing, Amazon, root9B, Optiv, ManagedMethods, and Webroot. Full show notes: https://www.colorado-security.com/news/2017/6/9/19-612-show-notesAxes hurdling toward DenverNot sure where to take your sweetie on your next hot date? Canadian ax ...…
 
Martin is an absolute techie at heart, having been involved in IT for over 15 years. He has spent the majority of his career at Chester Zoo, working his way up to Head of IT. However, he is now moved on to be Head of IT at Moneypenny. Over the years he has been mainly focussed on the Network and Security side of IT, but has always thought of hi ...…
 
Colin Bartol has led a team that built 46% of the servers for Tricare West which covers 2.6 million people for the military which required security for NIST, PCI, and HIPPA. He has his MBA from Carlson school of management, CISSP, and is a SME for the CompTIA Project+ exam. Having been a consultant at 5 Fortune 100 companies in e-commerce, fina ...…
 
There’s a shortage of people qualified to work in cybersecurity, and we need to do something about that. But what is that “something?” Let’s be honest here, we’re not going to change that situation overnight. It takes years to acquire the kind of skills needed to pursue the education, experience and credentials required. But what can we do in t ...…
 
Download this latest thrilling episode! Dear friends, Welcome to this latest thrilling episode in a collector’s series, in which Tracy and Paul discuss: Topic One: Information Security Certifications are Worthless and Causing More Harm than Good Paul and Tracy talked about the pros and cons of popular InfoSec certifications like Network + and S ...…
 
Download this latest thrilling episode! Dear friends, Welcome to this latest thrilling episode in a collector’s series, in which Tracy and Paul discuss: Topic One: Information Security Certifications are Worthless and Causing More Harm than Good Paul and Tracy talked about the pros and cons of popular InfoSec certifications like Network + and S ...…
 
Let’s accept the fact that we want to feel secure in some way, whether it is secure in our jobs, our relationships, or our personal safety and wellbeing. We want the best for our families, our business endeavors or, as in healthcare, for the other people for whom we have some degree of responsibility. But how do you place a value on the effort ...…
 
We discuss how physical security tends to be overlooked while we focus so much time and energy on the technology side of security. Keeping your firm’s people and assets safe can rely on good physical security planning and design. Speakers: Heath Stanley is the SVP of Information Security. He holds the CISA, CISSP and C|CISO certifications. Heat ...…
 
We discuss how physical security tends to be overlooked while we focus so much time and energy on the technology side of security. Keeping your firm’s people and assets safe can rely on good physical security planning and design. Speakers: Heath Stanley is the SVP of Information Security. He holds the CISA, CISSP and C|CISO certifications. Heat ...…
 
Is your bank or credit union protected against cyber attacks? Never before have we been under greater threat from the dangers that lurk online. Viruses, malware, phishing, hacking, identity theft, ransomware. Those are just a handful of things that should be of great concern to any business, but especially to a financial institution. Are you at ...…
 
For Show Notes with links that work: https://www.colorado-security.com/news/2017/3/11/podcast-6-313-show-notesTwo Feature Interviews and... what's a SNOWFROC?This Thursday Denver OWASP's annual conference (SnowFROC - Front Range OWASP Conference) hits the Cable Center, come see Robb deliver the opening keynote presentation. Registration for RMI ...…
 
Welcome to Code Red, HIMSS’s new health IT cyber security podcast. Code Red focuses on cyber security challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cyber securit ...…
 
Peter’s career spans 47 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all siz ...…
 
Red Teaming (with Joe Vest & James Tubberville) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 34 GUEST:Joe Vest & James Tubberville January 23, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, Blubrry, and YouTube. NOTE: The opinions expressed in ...…
 
Red Teaming (with Joe Vest & James Tubberville) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 34 GUEST:Joe Vest & James Tubberville January 23, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, Blubrry, and YouTube. NOTE: The opinions expressed in ...…
 
Red Teaming (with Joe Vest & James Tubberville) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 34 GUEST:Joe Vest & James Tubberville January 23, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, Blubrry, and YouTube. NOTE: The opinions expressed in ...…
 
Host Matt Fisher chats with Brian Edds Vice President, Product Strategy and Tom Saine, CISSP Chief Information Officer at Spok (@spoktweets) about secure communication in healthcare.
 
In this episode of the IoT Time Podcast, Ken Briodagh, editorial director at IoT Evolution (iotevolutionworld.com), sits down with Robert Vamosi (linkedin.com/in/robertvamosi), CISSP, Synopsys, and author of "When Gadgets Betray Us," one of the first books about IoT security.This episode is sponsored by the IoT Evolution Expo (IoTEvolutionExpo. ...…
 
Nick Santora is the founder and CEO at Curricula. Curricula is a cyber security company that helps teach other companies how to not get hacked. The Curricula team develops short animated stories that teach organizations and their people about cyber security. The Aware platform tracks the entire learner experience including analytics on learner ...…
 
Materials: https://media.defcon.org/DEF CON 24/DEF CON 24 presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks-UPDATED.pdf Picking Bluetooth Low Energy Locks from a Quarter Mile Away Anthony Rose Hacker Ben Ramsey, Hacker Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These devices ...…
 
Google login Twitter login Classic login