Best Informationsecurity podcasts we could find (Updated June 2018)   Informationsecurity public [search 0]
show episodes
 
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
 
Where you can listen to commentary on the state of information security
 
Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
Universidad Politécnica de Madrid
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Every week I spend 5-20 hours consuming books, articles, and podcasts in the areas of Sᴇᴄᴜʀɪᴛʏ, Tᴇᴄʜɴᴏʟᴏɢʏ, and Hᴜᴍᴀɴs. I then take that content and curate it into a concise, 30 minute summary that's ready for you every Monday morning.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
S
Security By Design
Monthly
 
The Security By Design Podcast is a software security focused podcast for all Developers, DevOps Engineers, Product Owners, UI and UX Designers. Good security practices start before a single line of code is written and the tools, methods and type of attacks being faced are changing faster than ever. This podcast is about finding ways to get and stay ahead of the security challenge.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
B
Breach
Weekly+
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history's most notorious data breaches. Hosted by journalist Bob Sullivan and producer/hacking victim Alia Tavakolian. Season 1 - a tech giant, a Russian conspiracy, and the greatest digital heist of all time.
 
R
Risky Business
Weekly+
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
7
7 Minute Security
Weekly
 
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at https://www.patreon.com/theinsiderthreat. I don't want to be too pushy for this, but a couple of you have asked about ways that you can sup ...
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at www.southernfriedsecurity.com.
 
P
Power of Possible
Monthly
 
U.S. Bank subject matter experts and their invited guests share insights about financial topics like banking innovation, financial education, corporate social responsibility, personal finance, cybersecurity and diversity and inclusion. Each month, we will bring you an un-filtered, easy-to-understand conversation that you can apply to your financial life to see what’s possible.
 
R
ROOT ACCESS
Rare
 
A closer look at the notable stories inside Information Security and why they matter. Brought to you by Cisco.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
S
Security Nation
Monthly+
 
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
 
I
ISF Podcasts
Monthly
 
Podcast by Information Security Forum
 
Information Security is the name of the game. Don’t let the hackers win!
 
I
Infosec Dojo
Monthly
 
Information Security Podcast
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
R
Risky Business
Weekly+
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Straight Talk About Information Security
 
Welcome to the BitSight Risk Review. Listen as we discuss the latest cybersecurity trends, current events, and talk more in-depth about the application of security ratings.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
B
Breach
Weekly+
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history's most notorious data breaches. Hosted by journalist Bob Sullivan and producer/hacking victim Alia Tavakolian. Season 1 - a tech giant, a Russian conspiracy, and the greatest digital heist of all time.
 
S
SecuriTEA Podcast
Daily+
 
A podcast that revolves around cybersecurity. We talk about the latest news, hacks, conventions, and more!
 
Loading …
show series
 
In this episode, Mark Overton, Softcat’s Information Security Officer, Adrian Richings, Softcat’s SIEM lead and Adam Louca, Softcat’s Chief Technologist for security join host Michael Bird to play out a security incident scenario. Together they follow a path consisting of six steps that demonstrate the best way to deal with a breach or other se ...…
 
The last episode on Season 2! It was a short one, but we feel we covered the major components of what it takes to evolve as a Systems Administrator in the modern era. We also congratulate Mike on his new job, his second Father's Day, discuss our migration to the software realm, and talk about health in a world of stimulants and sedentary career ...…
 
SMTP Strangeness - Possible C2 https://isc.sans.edu/forums/diary/SMTP+Strangeness+Possible+C2/23770/ Encrypted Office Documents https://isc.sans.edu/forums/diary/Encrypted+Office+Documents/23774/ Recent Port 8000 Scans https://www.bleepingcomputer.com/news/security/all-that-port-8000-traffic-this-week-yeah-thats-satori-looking-for-new-bots/ New ...…
 
Analyzing a Compromised Wordpress Site https://isc.sans.edu/forums/diary/A+Bunch+of+Compromized+Wordpress+Sites/23764/ Breacking Bluetooth Low Energy Smart Padlock https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ WIM Disk Image Vulnerability https://blog.talosintelligence.com/2018/06/vulnerability-spotlight- ...…
 
Analyzing a Compromised Wordpress Site https://isc.sans.edu/forums/diary/A+Bunch+of+Compromized+Wordpress+Sites/23764/ Breacking Bluetooth Low Energy Smart Padlock https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ WIM Disk Image Vulnerability https://blog.talosintelligence.com/2018/06/vulnerability-spotlight- ...…
 
Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+June+2018+Patch+Tuesday/23758/ Apple Code Signing Verification Vulnerability https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ Google Chrome Restricting Inline Extension Install https://blog.chromium.org/2018/06/improving-extension- ...…
 
Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+June+2018+Patch+Tuesday/23758/ Apple Code Signing Verification Vulnerability https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ Google Chrome Restricting Inline Extension Install https://blog.chromium.org/2018/06/improving-extension- ...…
 
More Malspam Pushing Lokibot https://isc.sans.edu/forums/diary/More+malspam+pushing+Lokibot/23754/ Ethereum JSON RPC Theft https://twitter.com/360Netlab/status/1006065566728085504 CryptoCurrency Miner Plays hide-and-seek https://www.bleepingcomputer.com/news/security/cryptocurrency-miner-plays-hide-and-seek-with-popular-games-and-tools/ Apple O ...…
 
Introduction In this episode wecover the victimization of phishing, some insider threat news, and more. Don't touch that dial! Welcome back! This isepisode 39 of The Insider Threat podcast, for the week of June 4th, 2018. Infosec Trivia Question It's time for yourInfosec Trivia Question, where Google is king and the prize isnonexistent! The que ...…
 
The Seven Properties of Highly Secure Devices https://www.microsoft.com/en-us/research/wp-content/uploads/2017/03/SevenPropertiesofHighlySecureDevices.pdf Finding Deserialisation Issues With Burp https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/june/finding-deserialisation-issues-has-never-been-easier-freddy-the-serialisati ...…
 
Critical Adobe Flash Update https://helpx.adobe.com/security/products/flash-player/apsb18-19.html SuperMicro Firmware Vulnerability https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/ FOSCAM Video Camera Vulnerabilities https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ Sof ...…
 
Larry Snow with the Secure Transportation and Executive Protection News for Monday, June 4th, 2018. In Driving News From Business Insider Judge finds Apple Watch wearer guilty of distracted driving It's probably a bad idea to check your Apple Watch while driving. That's the lesson from a Canadian judge who found a woman guilty of distracted dri ...…
 
In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from the CyberWire and Joe Carrigan from the Johns Hopkins University Information Security Institute discuss noteworthy social engineering schemes and ways to detect them. Author Christopher Hadnagy discusses his book The Art of Human Hacking. Thanks to our show sponsor ...…
 
Helen Rabe is an internationally experienced security professional who specialises in complex deliveries with a strong emphasis on security service management. Helen is currently the CISO at CBRE, previously holding the Director of Information Security role at Costa Coffee.Three takeaways:- Security needs to be a lifestyle choice- Make the secu ...…
 
Welcome to show number 2018.43! We’re shellebrating Turtle Day! and also GDPR day! There are three basic responses to GDPR: shut down the site, block European peeps, or comply. Racism Watchdog is Jon’s new favourite Twitter account Kelly is shipping art out for the season before she goes to Prince Edward Island (it’s pronounced “pay”) 09:00 – K ...…
 
Episode 17 of the Career Tipper podcast features Dr. Shelley C. Safian. Dr. Safian has been teaching Health Care Administration, Health Information Management, and Medical Billing and Coding, both onsite and online, for more than 15 years. She is the author of seven HIM textbooks. Her latest book, “Let’s Code It!” was released by McGraw Hill in ...…
 
A security breach is always a sensitive topic - but especially so during a merger or acquisition. Ofer Israeli, CEO of Illusive Networks, discusses how deception technology can help prevent disruption by a cyberattack during M&A activity.
 
A great conversation with William Borghetti about automation in the title insurance and lending worlds and how fast technology is advancing. William Borghetti is the president of Title iO, Inc., a Salt Lake City, UT-based technology company that provides data integration and automation solutions for title and escrow companies, law firms and mor ...…
 
A great conversation with William Borghetti about automation in the title insurance and lending worlds and how fast technology is advancing. William Borghetti is the president of Title iO, Inc., a Salt Lake City, UT-based technology company that provides data integration and automation solutions for title and escrow companies, law firms and mor ...…
 
Our guest this episode has had a front-row seat at some of the most game-changing innovators in the Internet Era - Netscape, Netflix, and now Informatica. He has seen the Information Security industry change dramatically since he first cut his proverbial teeth on it in the nineties. Our discussion touched across 20+ years of dramatic changes in ...…
 
In The Sausage Hut 100 Part 2, Soulmet, our resident information security expert, kicks things off talking about protecting your information (change your passwords regularly, everybody!). Then our resident executive, C-Suite, guides us through a comprehensive history of The Sausage Hut: Bowling For Dollars, The Daily, The Huffy Toss, Garageband ...…
 
Guest: Udo HelmbrechtEastWest Institute Global Vice President Bruce McConnell speaks with Udo Helmbrecht, executive director of ENISA, on a proposed mandate for the EU cyber agency to create a harmonized cybersecurity certification scheme in Europe.Helmbrecht has been in the position since 2009. Prior to his appointment, he served as the Presid ...…
 
Ryan Maple is an information security specialist, a connoiseur of everything alcohol, and often works at home in his PJs if he's lucky! Listen in as Ryan and Eckie discuss security, people's personalities and drives, and most importantly of all - bourbon.
 
How can we protect health care from hackers? Join Kevin Charest, BCBSTX Chief Information Security Officer, and Kristin Conley, BCBSTX DSVP of Enterprise Risk Management, and co-host Ross Blackstone, BCBSTX Director of Strategic Influence, for this discussion about cybersecurity, risk management and the evolving digital health landscape. You ca ...…
 
Comic books, information security, and family discussions of best security practices around the dinner table. Gary and Sam reminisce about their military careers and how they got started, as well as what they’ve learned about security from raising children and reading sci-fi novels. The post Gary Hayslip – VP & global CISO, Webroot inc appeared ...…
 
Makers of internet of things devices - especially those that handle health information - must implement protections into their product development lifecycle to effectively safeguard consumers' data, says regulatory attorney Elliot Golding.
 
Data integrity and privacy issues are among potential concerns related to voice-activated "virtual assistant" tools that some vendors are beginning to offer for their electronic health record systems, says privacy and security expert Kate Borten.
 
Question: What do you get when you connect a bunch of friends who have worked in or written about security for a long time over a few drinks and fried chicken? Answer: A 62-minute dissection of the RSA Conference, security buzzwords, marketing missteps and lots more that's top-of-mind in the industry. This semi-annual podcast was recorded this ...…
 
WeekdayHOPS - the show that combines cybersecurity, a beer, and a side of humor with conversation that EVERYONE can understand. This week: * Beer of the Week! (Citrus IPAs!) * What I.S. (information security) News? * Flux Capacitor (epiphany of the week) * Security or Dirty (the game show to guess if a term is a bedroom term or an obscure cyber ...…
 
Cheryl Costa is a native and resident of upstate New York who saw her first UFO at age 12. A military veteran, she’s a retired information security professional from the aerospace Industry. She’s been a speaker at the International UFO Congress and at the MUFON Symposium. Cheryl writes the UFO column “New York Skies” for SyracuseNewTimes.com. B ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Join Stu (@CyberSecStu) as he talks with Itai Tevet (@itaitevet), a former team lead at Israel's CERT, and current CEO of Intezer, a malware analysis and threat intelligence company. In addition to Itai's history, they'll also discuss: Programming, scripting, and information security. What to look for when facing state actors. APT code fingerpr ...…
 
Montecito Bank & Trust's Community Reinvestment Act Officer & Certified Regulatory Compliance Manager and Community Reinvestment Managr, Sykes joined Montecito Bank & Trust as Chief Risk Officer in 2009. Laurel is responsible for consumer compliance, Bank Secrecy Act (BSA) /Anti-Money Laundering (AML), fraud prevention, information security, ve ...…
 
Google login Twitter login Classic login