show episodes
 
In this EP we introduce you to the concept of sharing industry insights via the pod. This Show was created by the Awin Strategy team and is hosted by Benjamin Mullen; Senior Business Development and Client Strategies Manager for Awin Nordic. This podcast will cover many industry topics and offer insights to the community.
 
Radio Lorico Lian presents Timor Agora, the first ever Tetum podcast. Join us as we find answers to all questions related to current events and hot topics in Timor Leste from why we earn less than international consultants to what it is like to live with HIV to whether our government is really committed to stopping human trafficking.Radio Lorico Lian halo Timor Agora, primeru podcast iha Tetum. Mai hamutuk ho ami no buka resposta ba ami nia pergunta sira kona ba eventu, topiku no problema ih ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
Loading …
show series
 
The goals and needs of IT and Cybersecurity are different. IT is more focused on uptime and keeping systems running. Cybersecurity is focused on reducing the risk of data breaches, ransomware and other negative impacts from threat actors. The holistic approach to balance these elements can be accomplished with effective Governance, Risk and Complia…
 
The US government has made cybersecurity a key focus for national security. As such, different organizations within the Government have issued guidance related to to cybersecurity standards. The impact of these actions and what it means for private organizations is a complex topic. We break it down with TrustMAPP CTO and CISO Allan Alford.…
 
The blockchain, cryptocurrency, tokenization, social media, gaming, and the metaverse have created a new class of assets unique to the digital world. These assets have made many rich, but they are vulnerable to theft and fraud. We discuss this topic with Prosegur Global Director of Innovation and Product Development José Daniel García Espinel.…
 
Organizations should understand what happens when they are breached, in order to measure the value or their tools and understand how long it takes for them to detect threat actors. SCYTHE is an Adversary Emulation tool that enables organizations to do this in a repeatable and secure way. CTO Jorge Orchilles joins the episode to discuss how this met…
 
LogRhythm recently released a report on 'Security and the C-Suite: Making: Security Priorities Business Priorities'. In the report, they evaluated the influence of security leaders in enterprise organizations. LogRhythm Chief Security Officer and VP of R&D James Carder joins the episode to give his expert insights into the topic. Read the report at…
 
The term Secure Access Service Edge (SASE) was coined in 2019 to describe an emerging security and network framework. Since then, the term has taken off with many companies marketing their solutions as part of the SASE concept. Our guest for today’s episode is Nate Smolenski who is the Head of Cyber Intelligence Strategy at Netskope. Netskope is to…
 
Nearly every computer that runs Windows has Active Directory (AD). This structure helps organizations manage user identities, privileges, and much more. The power that AD has means threat actors are often targeting it to execute attacks. Our guest for the episode is Christopher Keller, who is Senior Security Engineer at Tenable. We cover the common…
 
The root cause of untold cyber attacks is the age-old technique of social engineering. KnowBe4 Security Awareness Advocate James McQuiggan joins the episode to lend his expert analysis and insight. We discuss the concepts of social engineering and how cybercriminals use it to manipulate people. October is Cybersecurity Awareness Month. One of the t…
 
The threats that organizations are facing today look a lot different than 20 years ago. Cybersecurity concerns are now a core topic. David Fernicola Vice President of Global Risk Services at Prosegur joins this episode to discuss what has changed and how a modern organization should view risk management and security. For more information on Prosegu…
 
Last May, Colonial Pipeline was hacked. This caused massive impacts around the United States. Recently the Biden Administration took a series of steps to guide companies in the utility industry to improve their cybersecurity. We discuss the topic with Brian Maloney in today's episode. Brian has extensive experience designing cyber solutions for com…
 
Cipher recently held a webinar with Cmd on how to secure digital connections. Cmd delivers runtime security for cloud workloads and Linux assets. The session was hosted by Cmd's Chief Security Officer Jake King and Cipher CTO David Rickard. They go over different attack techniques and how to stop them. We present an audio recording of the session n…
 
Neste episódio, falamos sobre "Gestão de equipes de alta performance em tempos de pandemia”, como realizar a gestão da sua equipe remotamente, quais os desafios, formas de liderança, como ajudar sua equipe com as metas e, outras informações. Para essa conversa, convidamos o David Tudino, que está na Cipher há mais de 10 anos, onde atuou como direto…
 
Neste episódio, falamos sobre "os riscos da alta exposição de suas informações pessoais”, como se proteger dos golpes de engenharia social, os perigos em publicar a imagem do cartão de vacina da covid-19, como ter uma navegação segura na internet e, outras informações. Para essa conversa, convidados o Fernando Amatte, diretor de red team e cyber in…
 
Neste episódio, falamos sobre como a comunicação e o marketing estão posicionados em tempos de pandemia e em como a Cipher enxerga o crescimento de marketing digital com o mercado de cybersegurança. Para essa conversa, convidados a Patricia Teixeira - diretora de marketing para América Latina da Cipher. Ouça agora e fique por dentro de mais um epis…
 
Como as ferramentas de segurança conseguem ajudar as empresas estarem em compliance com a LGPD? Neste episódio, falamos sobre a proteção das informações PII no ambiente integrando outras tecnologias como DAM, SIEM e como saber onde estão as informações que precisam ser protegidas. Apresentação: Wesney Bolzan - Latin America, Information Security an…
 
Our final podcast episode of the year looks at the immense cyber attack that took place recently. SolarWinds software was hacked, which led to government and private organizations being breached. We look at how it happened and what organizations should do to stay secure. Visit NSA and Department of Homeland Security websites for more information: h…
 
Cipher joined forces with the American Health Information Management Association (AHIMA) to present a panel discussion on cybersecurity for healthcare. During the session, our expert panel discussed hot topics of the day related to cybersecurity. This episode presents a recording of the discussion.By Peter Hackett, Scott Croskey, and others
 
We dive into the future of IoT and Internet-connected devices in this episode. This episode comes in the form of a recording from a recent live stream with Prosegur USA's Director of IoT Greg Kuhn. Greg and the hosts cover what the use-cases for connected devices exist today, where things are heading, and how cybersecurity factors in. Watch a recor…
 
We are kicking off Cybersecurity Awareness Month by investigating a scam technique that has resulted in $26 billion in loss since 2013. This technique is Business Email Compromise (BEC). Attackers compromise or spoof emails and convince victims to give money or perform other negative actions. To dive deep on the topic we welcome FireEye Cybersecuri…
 
Vulnerability management is a critical task for IT teams. Every day, software companies release patches and new vulnerabilities are discovered. In this episode, we cover the ins and outs of how teams manage vulnerabilities using traditional methods like scanning. Cipher Cyber Intelligence Manager André Pinheiro joins the episode to discuss how Ciph…
 
Over 300,000 companies in the US could become subject to the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) soon. This new certification is required for companies that do business with the DoD, either directly or as a sub-contractor. Chris Saucier is the CMMC Lead for NetBrain Technologies and he shares his expertise …
 
Retired Navy Rear Admiral Danelle Barrett joins the podcast to discuss her strategy for managing the cybersecurity landscape of a huge organization like the Navy. She covers her first-hand experience with digital transformation at the Department of Defense. Admiral Barrett strongly advocates thinking like the adversary in order protect networks. Do…
 
Video monitoring and IoT use is on the rise with 5G being rolled out. In addition, security teams are turning to monitoring as buildings continue to be empty due to COVID-19 restrictions. The monitoring goal is to keep the areas secure. The Cybersecurity element of the monitoring should also be secured, or data could be stolen and access disrupted.…
 
In this episode, we present a recording from a live Virtual Tech Talk we held on Cloud Cybersecurity last week. The trio of Cloud Experts went through common cloud misconceptions, tips for securing platforms, working with partners and more. Learn about CipherBox, which is our solution for securing Cloud-connected systems.…
 
In this episode, we look at what the Payment Card Industry (PCI) regulations and compliance is all about. We welcome Principle Cybersecurity Consultant Juan Munera to cover the top questions he encounters regarding PCI. Juan goes over what to look for when picking an Approved Scanning Vendors (ASV) or Qualified Security Assessor Companies (QSAC). H…
 
Managing cybersecurity and remote work at a large enterprise is challenging. Archer Daniel Midland (ADM) is a leader in the food industry. They have over 30,000 employees and $60 billion in revenue. ADM CISO Tom Dager joins the podcast to give an expert view on how he manages both his team and the company's cyber posture. Topics covered include wor…
 
We discuss business resiliency and disaster recovery with the CTO of Webair Sagi Brody in this episode. Confidentially, integrity and availability are the foundation of a successful cybersecurity posture. Availability is the key aspect covered. Sagi goes into what the difference is between just doing backups and having a robust disaster recovery st…
 
In this episode, we talk with Cipher’s Security Operations Center Manager in Portugal, Gonçalo Amaro. He goes over his real-world experience stopping hackers at each step of the cyber kill chain. Frameworks like MITRE ATT&CK are utilized to understand what the attackers are doing and at what stage of an attack they are doing certain malicious activ…
 
Neste episódio, vamos falar de um assunto tem sido cada vez mais comentado nos dias de hoje – o home office em tempos de isolamento social. Convidamos a Vandreia Oliveira, nossa gerente de RH da Cipher Brasil para uma conversa leve e repleta de informações da Cipher com seus colaboradores durante o isolamento social. Confira!…
 
This topic of this episode is Red vs. Blue Team operations. Cipher Director of Technology and SOC Manager Ricardo Encinosa explores Blue Teams, which are tasked with defending a company from cyber attacks. He talks about the different systems used to defend the digital assets of companies and their benefits. Ricardo covers how logs and data paint t…
 
Cipher's Portugal CTO Sergio Alves joins the podcast with an eye-opening episode on penetration testing. He covers the difference between a vulnerability assessment and penetration test. Sergio understands how hackers operate. Then he goes into the Cyber Kill Chain components, including phishing and web server exploits. The guys also go over notewo…
 
Prosegur USA CTO Mike Dunn joins the podcast for an episode looking at how cyber and physical security are intertwined. Cipher is the Cybersecurity Division of Prosegur, so the relationship is especially important to understand. Physical devices like entry control and video cameras have a digital footprint. Dunn covers how to properly secure these …
 
Neste episódio vamos falar de um assunto que desperta curiosidade em muitas pessoas sejam elas da área da segurança da informação ou não - Riscos de Segurança em Dispositivos Móveis. Para falar deste místico tema, nós convidamos Alexandre Armellini e Gabriel Barbosa, nossos membros de Red Team Services para América Latina.…
 
Cipher Director of GRC & Data Protection Officer UK Clive Boonzaaier joins the podcast. He talks about why risk is an issue that should be discussed at the board level. Clive says understanding cybersecurity risks faced by an organization is not just the responsibility of IT. The risk is a problem to the whole of a business and deserves attention b…
 
Cybersecurity is an attractive career path. The demand for talented practitioners is strong. The work is interesting. How can someone join the field? Beyond credentials and certifications, there are some core soft skills and technical know-how that it takes to get into the industry and succeed. Cipher Director of Marketing Bill Bowman joined the gu…
 
Uncertainty is the theme of the day. There is an unprecedented amount of unknowns with regards to workforce size, remote work, business demand and more. At the same time, cybersecurity risk has increased. Gareth Jones joins the conversion to comment on how CISOs and business leaders are adapting. Register for our upcoming webinar on the same topic …
 
No doubt you have heard the term MDR (Managed Detection and Response), but what exactly is it? Gartner said that “The marketing around MDR is increasingly confusing for buyers.” Separating the hype and buzz from the reality is what this podcast will do. We will compare MDR vs. MSS, look at deployment options and more. Get a Free Trial of CipherBox …
 
Delivering exceptional service to customers is what helps business grow. Cipher's VP of North America shares how Cipher is operating to help customers during these unique times. In 2019, Cipher became the Cybersecurity Division of Prosegur. The benefits for customers as a result of this new arrangement are are also covered. Prosegur provides physic…
 
Desde que a pandêmia foi decretada pela OMS – Organização Mundial da Saúde, estamos vivenciando uma vida diferente e com muitas incertezas. Sabemos que muitas pessoas se aproveitam da fragilidade de muitos para ganhar dinheiro e oferecer produtos milagrosos. Na DarkWeb não é diferente. Nosso diretor de Red Team Services para América Latina, Fernand…
 
Cyber Intelligence is a term that is thrown around by people in cybersecurity frequently. In the podcast, we break through the jargon to talk about what cyber intelligence really is and how it helps companies in reality. To accomplish this mission, we welcome special guest André Pinheiro, Cipher Director of Cyber Intelligence.…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login