This C3 Pathways Podcast series discusses Active Shooter Incident Management (ASIM). The Podcast features instructors and special guests discussing key elements and challenges of Active Shooter Incident Management and the implications for law enforcement, fire, and EMS responders. The bad guy and the clock both kill innocent victims. Don't miss the opportunity to gain key insights that may help you save lives!
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Interviews, stories and lessons learned from experienced crisis leaders. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of crisis management. Your host, Tom Mueller, is ...
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Page It to the Limit is a podcast that focuses on what it means to operate software in production. Hosted by the PagerDuty Community Team, we cover the leading practices used in the software industry to improve both system reliability and the lives of the people responsible for supporting it.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Leading Las Vegas is a podcast produced by the Emergency and Crisis Management Program at the University of Nevada, Las Vegas. Each season, students in a Leadership, Innovation and Adaptability class interview prominent leaders, who discuss their leadership approaches, and how they prepare for, respond to, and recover from shocks and stresses faced by the community. Las Vegas is known for being the entertainment capital of the world. However, it is also a complex environment, with a highly d ...
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
…
continue reading
If you are one of the first arriving officers at an active shooter incident, you may have to step up as team leader. You’ll be making critical decisions to accomplish the mission. You can prepare for leadership, just as you prepare for entry – put yourself in the role and plan how you would handle it. View this episode on YouTube at https://youtu.b…
…
continue reading
1
Transformation in Cyber Security Leadership: Carlo Schreurs, Global CISO at FrieslandCampina
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57
Host Yonatan Lipschitz is joined in this conversation by Carlo Schreurs, Global CISO at FrieslandCampina. Carlo shares his journey from aeronautical engineering to becoming the CISO of Friesland Campina. He discusses the shift from IT to OT security, the importance of a transformational mindset in cybersecurity leadership, and the challenges of sta…
…
continue reading
1
Understand implications of IT procurement using cabinets as an example
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Felicia stressed the importance of informed decision-making in technology services and products, and the need for involving skilled professionals in decision-making processes. She also discussed the longevity of structural furniture, the challenges in network switch installation, and the need for a formal procurement process in the IT department. F…
…
continue reading
1
EP 36 Artificial Intelligence for crisis planning and support: Entrepreneur Justin Snair and Preppr.ai
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36
Send us a Text Message. Can AI really revolutionize crisis management? Today, we're joined by Justin Snair, the brilliant mind behind Preppr.ai, to discuss how artificial intelligence is transforming the landscape of emergency preparedness. From his roots in the Marine Corps to his innovative work with under-resourced organizations, Justin shares h…
…
continue reading
1
ESRM a Transformation Catalyst with Radek Havlis
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47
Amongst the industry verticals classified as critical infrastructure, few would argue that telecommunications belongs in the top that list, placing even more weight on a risk management program due to cascading impacts. Consequently, safe reliable operations are essential for success while continuing to grow in a highly competitive marketplace. A s…
…
continue reading
1
How to Perform Strategic Lead Generation with Tim Fitzpatrick
1:00:14
1:00:14
Play later
Play later
Lists
Like
Liked
1:00:14
In the third episode of MSP Tutor, host Steve Taylor welcomes guest Tim Fitzpatrick, who specializes in marketing strategy, planning, and leadership for IT marketing. Tim stresses the importance of strategy before delving into marketing tactics, emphasizing the creation of a unique point of view to attract ideal clients. Key Takeaways Crafting a un…
…
continue reading
1
Behind the Lock Screen: Strategies for Device Defense & Cyber Resilience
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24
Send us a Text Message. Ever misplaced your phone and felt that momentary pulse of panic? Listen in as we recount a cautionary tale of lost phones and the perils of unsecured devices, illustrating just how easily our personal and work data can be compromised. Wendy's harrowing experience at a shoe store losing her phone inside a boot serves as a po…
…
continue reading
1
The Power of Shaping Your Legacy | A Conversation with Alex Brueckmann | The Soulful CXO Podcast with Dr. Rebecca Wynn
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59
Guest: Alex Brueckmann, WSJ Bestselling Author, Brueckmann Strategy Consultants Website | https://brueckmann.ca On LinkedIn | https://www.linkedin.com/in/alexanderbrueckmann/ Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s Sponsors Ar…
…
continue reading
Additional Resources Get your copy of Tidy First? Join a future episode! https://bit.ly/PageItBookClub PagerDuty Home Page Episode edited by Mandy Moore Transcripts by RevBy Mandi Walls
…
continue reading
The Transport Group Supervisor is responsible for more than just calling ambulances and getting them to the scene. In today’s episode we discuss the issues that arise when considering ambulance exchange points and transportation and the need for collaboration with tactical and triage. View this episode on YouTube at https://youtu.be/GwRFhW7yHrg…
…
continue reading
In this interview at Black Hat Asia 2024, we spoke with Adrian Wood and Mary Walker, security engineers from Dropbox, about the critical issues surrounding AI security, backdoors, and malware. Adrian and Mary explained that many users rely on pre-existing machine learning (ML) models from public repositories rather than creating their own. This int…
…
continue reading
1
MSP Website Strategy for Lead Generation with Nate Freedman
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53
In this episode of RocketMSP, host Steve Taylor is joined by Nate Freedman, digital marketing expert and founder of TechProMarketing and MSPsites.com. Together they delve into the effective website strategy for managed service providers (MSPs), emphasizing lead generation, user experience, and simplification. Key Takeaways Emphasizing the simplicit…
…
continue reading
In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul’s military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does P…
…
continue reading
1
PCI Monthly Update: Latest News and Updates to Requirement 12
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the impact of PCI v4.0 and how organizations are adjusting. In case you missed it - Andy Kerr joined PCI Practice Partner Stewart Fey for an interactive Q&A …
…
continue reading
During an active shooter event, our primary focus is to stop the killing, but when the suspect is no longer actively killing people or preventing you from treating the wounded, sometimes negotiations need to begin – and that job may fall to the contact team. In today’s episode, the panel discusses safety priorities, situational awareness, best prac…
…
continue reading
1
EP 35 Leading in a crisis - lessons and advice from a first time PIO and Deputy (Part 2)
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
Send us a Text Message. On this episode, we continue our conversation with Will Fitzgerald and Celina Cardenas from Occidental Petroleum recounting their first time serving in leadership roles for a major crisis exercise. Ever wondered how leaders maintain composure and maneuver through the chaos of a crisis? That's exactly what we uncover with Wil…
…
continue reading
1
EP 34 Inside Occidental Petroleum's Gulf of Mexico Oil Spill Drill with Will Fitzgerald and Celina Cardenas
21:50
21:50
Play later
Play later
Lists
Like
Liked
21:50
Send us a Text Message. On this episode, two first time leaders in a major oil spill response drill share their experiences, thoughts, and insights into leading during a major crisis. Occidental Petroleum tapped Will Fitzgerald and Celina Cardenas to serve as public information officer and deputy PIO for a recent drill, giving them their first tast…
…
continue reading
1
Episode 138: Is Consuming SaaS an Information Security Faustian Bargain? w/ William Eshagh
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30
By John Verry
…
continue reading
Now in its fourth year we'll be starting this year's series at a heightened time of risk and significant activity across the security domain - the opening episodes will be discussing how these events impact private security and emergency services and what may be the broader requirements and implications. To open the series, which will run regular e…
…
continue reading
1
Incident Response Stories w/ Mike (Pinky) Thompson
39:07
39:07
Play later
Play later
Lists
Like
Liked
39:07
In this episode of the Unsecurity Podcast, Brad, Oscar, and Pinky discuss recent news stories about IP and central manager flaws, as well as a vulnerability enrichment project by CISA. They also share an interesting incident response story involving internal domains and proxy auto-configuration files. Please send any questions, comments, or feedbac…
…
continue reading
1
How to Run a Tabletop Exercise for Incident Response with Matt Lee
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20
In this episode, host Steve Taylor and guest Matt Lee dive into the critical process of building and executing effective incident response plans in the MSP industry. They emphasize the importance of readiness and preparation, highlighting the value of conducting tabletop exercises to simulate and practice incident response scenarios. *Key Takeaways…
…
continue reading
1
Winning Approach for Tech, Security, and Operations | A Conversation with Petri Kuivala | The Soulful CXO Podcast with Dr. Rebecca Wynn
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36
Guest: Petri Kuivala, CISO for Hoxhunt On LinkedIn | https://www.linkedin.com/in/petrikuivala/ Website | https://hoxhunt.com Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Cha…
…
continue reading
Welcome to an insightful episode of Breakfast Bytes, featuring an in-depth discussion about Zero-Trust Cybersecurity, a vital approach to modern cybersecurity practices. Understand why this network layer protection strategy is essential to guard your business and residential networks against harmful threats. From a reflective analysis of the cybers…
…
continue reading
1
Incident response and mitigating supply chain attacks
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44
In this episode of Breakfast Bytes with Felicia King, we navigate the complex but crucial realm of cyber security. We explore the emerging menace of supply chain attacks and underscore the vital need for proactive incident response planning. Felicia reveals the staggering average cost of a cyber-attack, per employee and endpoint, and explains why s…
…
continue reading
Not every Active Shooter event unfolds in the same way. When there’s a deviation from the norm, the potential for something to go wrong increases. Our response training needs to be adaptable and inventive to address diverse scenarios. In today’s episode our panel discusses the need for training in various types of scenarios to meet the main objecti…
…
continue reading
Now in its fourth year we'll be starting this year's series at a heightened time of risk and significant activity across the security domain - the opening episodes will be discussing how these events impact private security and emergency services and what may be the broader requirements and implications. To open the series, which will run regular e…
…
continue reading
1
EP 33 John Breed on counseling CEOs and leading in a crisis
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05
Send us a Text Message. Unlock the secrets of crisis leadership with the wisdom of corporate communication maestro, John Breed, manager of community and external affairs at ChampionX. We think John wins the award for working with most CEOs in a career, and he shares some of his tips for managing those relationships, particularly in a crisis. Our co…
…
continue reading
1
InfoSec Beat: Careers in Information Security – Tech & Ops
21:01
21:01
Play later
Play later
Lists
Like
Liked
21:01
This episode of the InfoSec Beat podcast mini-series focused on information security careers highlights the journey of Arun Chandrasekaran in conversation with Accenture CISO Kris Burkhardt. Listen to how Arun started as a senior network analyst to become infrastructure tools and standards lead today for our Information Security organization’s Tech…
…
continue reading
We speak with Alina Tan, Ethical Hacker and Security Architect based in Singapore. Alina is a former Top 30 Women in Cybersecurity Singapore (now the Top Women in Security ASEAN Region Awards). GISEC Global 2024 attracted more than 20,000 attendees from over 130 countries to the Dubai World Trade Center. Taking place over three days, April 23-25, t…
…
continue reading
1
Episode 398 - Filipino spokesperson for Armed Forces advocating for international cybersecurity collaboration
We speak with Col Francel Margareth Padilla-Taborlupa, Armed Forces of the Philippines Spokesperson. A C4S Officer with 27 years experience in Technology and Security, Francel is an International Lecturer, Moderator/Panelist and experienced Information Technology Professional with a demonstrated history of working in the Army Management Information…
…
continue reading
We speak with THNG, Chin Hwee, Vice President, Public Safety & Security, ST Engineering and NG Yeow Boon, Deputy Chief Executive (Development), HTX at the inaugural Milipol Asia-Pacific - TechX Summit (MAP-TXS) that took place from 3 to 5 April 2024 at Sands Expo & Convention Centre, Singapore. Co-organised by Singapore’s HTX, GIE Milipol, and Come…
…
continue reading
1
K12 Technology and Cybersecurity Challenges and Solutions
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12
In today's episode of Breakfast Bytes, hosted by Felicia King, we delve into the pressing issue of cybersecurity in K-12 education with special guest, Chris Rule, a Technology Director with 25 years of experience. We discuss the urgent need for tangible action in this area and explore operational maturity practices like third-party information secu…
…
continue reading
Additional Resources Techtonica Ada Developers Academy PagerDuty Home Page Episode edited by Mandy Moore Transcripts by RevBy Mandi Walls
…
continue reading
When resources are coming from multiple directions, sometimes communications fail. Training for these failures, making a plan in advance, and finding solutions to these technology issues is critical to getting the information out and the mission on track. Today’s episode looks at various ways to work around radio transmission issues. View this epis…
…
continue reading
1
EP 32 Mastering Crisis Leadership with Incident Commander Dan Smiley
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05
Send us a Text Message. Emergency situations don't come with a playbook, but when they strike, it's leaders like incident commander Dan Smiley who orchestrate the chaos into coherence. In our latest episode, Dan reveals the behind-the-scenes drama when multiple agencies, such as the EPA and Coast Guard, must unite under the banner of Unified Comman…
…
continue reading
1
Practical example of how operational maturity improves productivity while reducing risk
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20
In this episode of Breakfast Bytes, vCISO Felicia King of QPC Security uses an example of dark web data and how it can be leveraged. She describes how operational maturity in an organization can make that organization more competitive, lower risk, improve collaboration, improve culture and employee retention, while reducing risk. She explores why a…
…
continue reading
1
Episode 137: Strategies and Insights w/ Sagi Brody
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57
By John Verry
…
continue reading
1
Navigating the Minefield of Personalized Phishing Attacks: How to Outsmart Cybercriminals
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18
Send us a Text Message. Ever found yourself staring at an email, questioning its legitimacy? You're not alone. These days, it's hard to tell what's real and what's not. On the new episode of the Bee Cyber Fit podcast, we explore the murky waters of cybersecurity in an AI-dominated era. We swap stories of deception and discuss how the cleverness of …
…
continue reading
1
Unlocking the Key Skills for Success | A Conversation with Camille Stewart Gloster | The Soulful CXO Podcast with Dr. Rebecca Wynn
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52
Guest: Camille Stewart Gloster, Former Deputy National Cyber Director for Technology & Ecosystem, Award-winning Strategist & Attorney Website: https://camillestewart.com LinkedIn: https://www.linkedin.com/in/camillestewartesq X (Twitter): https://www.twitter.com/camilleesq Instagram: https://www.instagram.com/camilleesq/ Host: Dr. Rebecca Wynn On I…
…
continue reading
1
April Book Club - Flow Engineering by Steve Pereira and Andrew Davis
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54
Additional Resources Learn more, join the newsletter and office hours at https://flowengineering.org/ Order Flow Engineering More on OODA If you’re not familiar with the parable of the blind men and the elephant Our prior episodes with Helen Beal on Value Stream Management and Dominica DeGrandis on Making Work Visible PagerDuty Home Page Episode ed…
…
continue reading
1
PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
…
continue reading
1
AI-Powered License Plate Reading With Amped DeepPlate
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17
Marco Fontani joins the Forensic Focus podcast to discuss Amped Software’s latest AI-powered tool, DeepPlate. DeepPlate is a deep learning system designed to read license plates affected by common issues introduced by surveillance systems, making it a valuable asset for forensic video analysts. Marco provides an in-depth overview of DeepPlate, expl…
…
continue reading
In the aftermath of an active shooter incident, what can a civilian on the scene do to help? In today’s podcast, our panel delves into the steps civilians can take to help first responders on the scene, from compliance and providing information, to offering first aid support. View this episode on YouTube at https://youtu.be/MUpRVrjKdcg…
…
continue reading
1
EP 31 Incorporating Artificial Intelligence into a crisis response, with Dan Smiley
20:06
20:06
Play later
Play later
Lists
Like
Liked
20:06
Send us a Text Message. Prepare to navigate the stormy seas of crisis management as we welcome the unparalleled expertise of Dan Smiley, whose storied career has taken him from the decks of the Coast Guard to the forefront of oil spill response. Now, as a consultant and podcast voice on crisis leadership, Dan steps aboard our show to chart the inte…
…
continue reading
In this episode of the Unsecurity Podcast, Brad interviews guest Ryan Cloutier as part of our Meet the Mentors series. They discuss the importance of the CISSP Mentor Program and the value of different perspectives in teaching. They also discuss the release of an exploit code for the Palo Alto Networks Zero Day vulnerability and the ethics of publi…
…
continue reading
Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Br…
…
continue reading
In an active shooter incident, a Rescue Task Force is a medical mission with a security component. RTF1, the first through the door, bears additional responsibilities. In today’s episode Tom Billington, Bill Godfrey, Kami Maertz, and Ron Otterbacher shine a light on both the fire and law enforcement duties of RTF1 and how they manage a casualty col…
…
continue reading
1
Secrets to Building a Resilient Cybersecurity Program | A Conversation with Rick Howard | The Soulful CXO Podcast with Dr. Rebecca Wynn
26:19
26:19
Play later
Play later
Lists
Like
Liked
26:19
Guest: Rick Howard, Chief Security Officer for N2K, Chief Analyst and Senior Fellow for The Cyberwire On LinkedIn | https://www.linkedin.com/in/rickhoward/ Website | https://thecyberwire.com/ YouTube | https://www.youtube.com/channel/UCIC1L2vbbyotqEF0ZLhaOdw Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-…
…
continue reading
1
Wing's Take on Cloud Development With Elad Ben-Israel
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01
Additional Resources Winglang - A programming language for the cloud Winglang Playground Wing Cloud PagerDuty Home Page Episode edited by Mandy Moore Transcripts by RevBy Tiago Barbosa
…
continue reading
1
Edna Conway: Collaboration in Cybersecurity Policy and Practice
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49
Edna Conway, an innovative executive and thought leader with over 30 years of experience leading cybersecurity, risk management, and value chain transformation at Fortune 10 technology companies, highlights how collaboration in cybersecurity is critical for the development of and adherence to policy and practice in this Kitecast episode. Edna is cu…
…
continue reading