Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Welcome to EZ 𝐓𝐡𝐞 𝐄𝐧𝐠𝐥𝐢𝐬𝐡 𝐙𝐨𝐧𝐞. This is your host Ziyad. My goal is to help you practice and improve your English the easy way through fun, motivational, and English skill-based content. I have 10+ years of English teaching experience. Practice with EZ on TikTok here https://www.tiktok.com/@theenglishzone Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
Episode 415 - The Risk Story – Software Supply Chain Security
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
…
continue reading
1
Episode 414 - Winning the OT Security Battle
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
…
continue reading
1
168. BOOST Your English with Atomic Habits | 4 Laws to Accelerate Your Learning
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21
Learning English is NOT difficult; rather, it is EASY! It's just difficult for you to practice and stay focused for even 5 minutes! Watch this video to help you build the habits YOU NEED for boosting your English in no time! Watch the YouTube video HERE! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Episode 413 - Operational Technology (OT) Cybersecurity - Episode 4
1:00:06
1:00:06
Play later
Play later
Lists
Like
Liked
1:00:06
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
…
continue reading
1
Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson
1:11:49
1:11:49
Play later
Play later
Lists
Like
Liked
1:11:49
Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
…
continue reading
1
167. This Technique is Better and More Effective than Manifestation!! | English for Advanced Learners
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22
We are living at an age where success is only measured by achieving goals and never failing and they say that if you think positive things only, you will attract ONLY good and positive things. That's a wrong approach. Here's a better and more effective alternative to "manifestation". You can also watch the Youtube video lesson here! --- Support thi…
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
166. Asking for Directions | Listen to the Story and Practice! Beginner English
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50
This is part of a 30 day English course for beginner English learners. You can watch this lesson on YouTube as well as the other lessons. Click here. Subscribe on Youtube: https://www.youtube.com/@theenglishzone Follow on Instagram: @TheEnglishZone_ --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
Episode 412 - AI, ML & Automation | Aligning Safety & Cybersecurity - Episode 6
1:02:41
1:02:41
Play later
Play later
Lists
Like
Liked
1:02:41
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
Cyber Essentials - Part 2:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting compl…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
165. The Scary Pool Incident | A Short Story in Past Tense for Beginner and Intermediate English
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31
Practice your English on The English Zone podcast with short and fun stories and motivational content to help you take your English to the next level the EZ way! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
164. How to Reprogram Your Mind into Thinking that Everything is EASY Including Learning English
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28
Watch this with SUBTITLE on YouTube: https://youtu.be/NGMCf03yOZk?si=rXOKb63NAQJsFBCk --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson
58:11
58:11
Play later
Play later
Lists
Like
Liked
58:11
Send us a text Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon. Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capt…
…
continue reading
In this interview, we sat down with Greg Smith (Head of Global Product and Solution Marketing, Certinia) to get his insights into the stages of data maturity within the AI adoption journey. Greg advices that a key distinction in the nature of data handling between generative and predictive AI. Unlike predictive AI, which primarily analyzes existing…
…
continue reading
We speak with Nick McKenzie, CI&SO and Sunil Joshi, Head of Digital & Communication Solutions, APJC, Orange Business about the CISO perspectives in the Asia Pacific Region. #mysecuritytv #bugcrowd For the full interview and to join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/…
…
continue reading
Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain defence and Third Party Risk Management (TPRM). To join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/ #bugcrowd #mysecuritytvBy MySecurity Media
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist?
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47
Send us a text Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.” “Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing la…
…
continue reading
1
Episode 408 - Series Insight 2 of 4 - Hack the Hacker Series introduction with Bugcrowd's CSO & TISO
Unlock the secrets of effective threat management with cybersecurity experts plus representatives from the Hacker community. This series will dive into the realm of cybersecurity and cybercrime analytics as our line-up of hackers and technologists debate the crucial role ethical hacking plays in fortifying digital defences. This includes exploring …
…
continue reading
1
163. Make These 7 Mindset Shifts and See Miracles Unfold! Most People Believe in the Opposite | Learn English with Wisdom from These 7 Life Paradoxes
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11
Make these 7 shifts in your life and see miracles unfold! Sadly, most people believe in the opposite. These Seven Paradoxes will make you RESHAPE your thinking! Instagram: @TheEnglishZone_ --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
Episode 407 - Series Insight 1 of 4 - Bugcrowd’s future plans for growth and expansion throughout the Asia Pacific
Hot on the heels of Bugcrowd recently achieving Unicorn status, following their recent USD $102 million fund raise, Bugcrowd's CEO Dave Gerry and founder and Chief Strategy Officer, Casey Ellis outline Bugcrowd’s vision for the future and plans for growth and expansion throughout the Asia Pacific region in 2024/5 and beyond. Dave Gerry has been in …
…
continue reading
Prior to Joining Seaco as CIO, Damian Leach held the position of Chief Technology Officer for Workday Asia Pacific and Japan. Prior to his CTO position at Workday Damian spent 13 years in the Banking and Finance industry in Global Technology roles, most recently working for Standard Chartered Bank based in Singapore. Damian led the Digital Transfor…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Visit …
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Show N…
…
continue reading
1
162. Moving is Not Fun | Practice Present and Past Tense | Intermediate English
19:47
19:47
Play later
Play later
Lists
Like
Liked
19:47
Practice your grammar, pronunciation and vocabulary with this lesson by listening to the story and answering questions about the story. Follow me on Instagram @TheEnglishZone_ --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
Cyber Essentials - Part 1:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements t…
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02
Send us a text In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when de…
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
Episode 10 - Detecting and Preventing Phishing Attacks
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04
Send us a text Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing involves not…
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals a…
…
continue reading
1
Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48
Send us a text Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as spear phish…
…
continue reading