show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork
 
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

Unsubscribe
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Macro Voices

Hedge Fund Manager Erik Townsend

Unsubscribe
Unsubscribe
Weekly
 
Weekly market commentary by Hedge Fund Manager Erik Townsend and interviews with the brightest minds in the world of finance and macroeconomics. Made possible by funding from Fourth Turning Capital Management, LLC
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
Artwork
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
  continue reading
 
Artwork
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
BUILDINGS Podcast

Endeavor Business Media

Unsubscribe
Unsubscribe
Monthly
 
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to buildingspodcast@gmail.com Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Modern CTO is the #1 place where technology leaders and CTOs hang out. We live to bring tech leaders value. Listen in on our fun, intelligent and engaging podcast. We hang out with interesting and popular CTOs in Aerospace, Artificial Intelligence, Robotics + Many more industries. All of this, right here, right now, on the Modern CTO Podcast. What do you think of the show? Let us know here!
  continue reading
 
Artwork
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
  continue reading
 
Leading practitioners in risk management share their knowledge and experiences. In each episode we'll cover topical risk issues or interview a leader in the field. Feedback and input are always welcome - tell us who you'd like to hear from and what subjects are of particular interest. Enjoy! Audio track: 'Saturn' by Marsel Minga
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
  continue reading
 
Artwork

1
Church Security Accelerator

Worship Security Academy

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to the Church Security Accelerator – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Loading …
show series
 
In this special GSX 2024 edition of the SM Highlights podcast, sponsored by Sign In Solutions, Orange County Convention Center security administrator Earl Biggett, Jr., CPP, shares some career advice—especially for people changing from the public to the private sector—and how working in concierge security positions changed his approach to his job a…
  continue reading
 
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
  continue reading
 
Today, on Cyber Work Hacks, my guest, Infosec Skills author Cicero Chimbanda, gave us a Hack involving the role of Cybersecurity Manager. Studying security management techniques academically is one thing, but how do you develop your security manager skills ON THE JOB? Cicero has many insights, and we talk a bit about the importance of rapport and u…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Ken Johnson (@cktricky) abandons the podcast this week to attend a conference and play business, so Seth (@sethlaw) bring in Cloud Security Partners CTO John Poulin (@forced_request) as a co-host. John and Seth start off by discussing the difference in virtual and in-person training. This is followed by two articles. The first is from CrankySec, wh…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
In this more technical episode, we dive deep into the complexities of DNS and DNS resolution in the context of Attack Surface Management (ASM). Join us as we explore the unseen challenges that arise when scaling asset discovery, particularly when dealing with DNS wildcards and their implications for security scanning solutions. Our hosts, Michael a…
  continue reading
 
Absolute AppSec welcomes Darren Meyer (@DarrenPMeyer on infosec.exchange and X platform) from Endor Labs as a guest on the show to discuss Endor Lab’s newly released 2024 Dependency Management Report. Implementation of reachability analysis as a sine qua non of effective dependency management is one of the top-line takeaways from the newly released…
  continue reading
 
Greg Schaffer, founder of vCISO Services, LLC and a returning guest on Security Confidential, brings over 35 years of experience in IT and security, with 15 years as a CISO. He hosts the Virtual CISO Moment podcast and is the author of Information Security for Small and Midsized Businesses. 00:58 Our Guest01:59 What’s new with Greg?03:37 Changes in…
  continue reading
 
The conversation delves into various pressing cybersecurity issues, including a recent attack on Hezbollah involving explosive pagers, the implications of cyber warfare, election interference by Iranian hackers, the severe impact of ransomware on healthcare, and the ongoing challenges of data privacy. The discussion also critiques the effectiveness…
  continue reading
 
The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emp…
  continue reading
 
MacroVoices Erik Townsend & Patrick Ceresna welcome back, Matt Barrie. They’ll discuss everything AI, exploring recent developments and what the future holds. https://bit.ly/3XslYP3 ⚫ Follow Matt Barrie on X: https://www.x.com/Matt_Barrie ✅Sign up for a FREE 14-day trial at Big Picture Trading: https://bit.ly/3WbYmgH 🔴 Subscribe to Patrick’s Youtub…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Not all educat…
  continue reading
 
Jim Alkove, CEO and co-founder of Olaria, shares his career journey and insights on cybersecurity training and becoming a board advisor. He emphasizes the importance of starting at the beginning and gaining experience in software engineering during his time at Microsoft. Alkove highlights the need for a more diverse pool of candidates and situation…
  continue reading
 
This episodes features a discussion with Lawrence Hamtil and Douglas Ott. Lawrence is a partner and portfolio manager at Fortune Financial, and Douglas is the founder and chief investment officer at Andvari Associates. I’ve had Lawrence on the podcast before and I encourage you to check out that podcast, where we talked about a wide variety of topi…
  continue reading
 
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
  continue reading
 
Do you know how asymmetric encryption works? While at the Kansas City Developers Conference, Richard sat down with Eli Holderness to discuss many of the encryption technologies being used today—and the new options coming in the future! Eli talks about how symmetrical encryption and public key encryption have been the focus of modern encryption, esp…
  continue reading
 
Send us a text BIO Danyetta Fleming Magana is a Certified Information Systems Security Professional (CISSP) and Fellow with Institute of Strategic Risk Management (ISRM), who founded Covenant Security Solutions in 2003. Her goal is to push the envelope regarding how we think about our information and find new and innovative ways to secure our digit…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Since the very first days of the Internet, Warner Moore has been part of tech. His love for technology and for building things, for easily and effectively sharing information, and for communicating with people across the world are why he is dedicated to helping companies improve their tech. As the founder of Gamma Force, a large part of what he doe…
  continue reading
 
Guest: Mark Moore, VP Fraud Strategy and Prevention Episode Highlights: The Fraud-Tech Fusion: Mark shares his unique journey from InfoSec to Fraud, highlighting the increasing overlap between cybersecurity and fraud prevention in today's digital landscape. Outsmarting the Scammers: From the resurgence of check fraud on Telegram to sophisticated mu…
  continue reading
 
In this episode, we discuss the importance of security and compliance for everyone in an organization. We emphasize that security is not just the responsibility of cybersecurity experts or compliance professionals, but something that every employee needs to be aware of. We highlight the risks of human error and the need for a culture of compliance …
  continue reading
 
Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech. Evgeniy Kharam has authored “Architecting Success: The Art …
  continue reading
 
SAP systems are treated differently than many other enterprise applications from a cybersecurity perspective. Most SAP security teams are siloed and left to meet security objectives on their own. Since SAP is so integral to organizations, it is unusual for SAP security objectives to not be on the radar of an existing 24/7 cybersecurity team executi…
  continue reading
 
Supply Chains are the lifeblood of modern organisations - and over time, we have increasingly come to rely on them to get the products (and services in this digital age) we need to continue doing business. Additionally, customer expectations have soared in respect of what 'timely delivery' means. In this discussion, Blake Tablak, CEO of Trax Techno…
  continue reading
 
Today’s episode is the first of three conversations with ISF CEO Steve Durbin around the coming impact of technological development on society and business. We know that new technologies have always tested organisations, and technological innovation and integration into our lives and enterprises — it’s only accelerating. We offer an analysis of pot…
  continue reading
 
Today on Cyber Work Hacks, my guest, Infosec Skills author Cicero Chimbanda, gives us another Hack for our Cybersecurity Managers. If you want to know more about Cicero’s Security Manager learning path for Infosec Skills, this is the episode for you, as we break down everything you’ll learn and how to apply it to your career! 0:00 - Infosec's secur…
  continue reading
 
Today, we’re talking to Alan Williamson, CTO & Author. We discuss why it’s crucial to grow beyond your technical skills, the best methods for communicating outside of your department, and how to actually use vision to define your path as CTO. All of this right here, right now, on the Modern CTO Podcast! To learn more about Alan Williamson and his b…
  continue reading
 
In this episode, Ricardo introduces the AI-Driven Project Manager Certification, explaining the rationale behind this certification. He highlights the growing hype around AI, with many project managers using AI terms without understanding the technology. The certification aims to ensure that professionals have the knowledge needed to manage AI-driv…
  continue reading
 
In this conversation, Myself and Aaron Shah from Cybermaxx discuss the complexities of cybersecurity, emphasizing the importance of understanding both offensive and defensive strategies. We explore the dichotomy in cyber operations, the adversarial mindset, and the common misconceptions clients have about their risk levels. The discussion also cove…
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityDan Lohrmann is an internationally recognized cybersecurity leader, keynote speaker, and author with over 30 years of experience. He served as Chief Security Officer, CTO, and CISO for Michigan's government and received numerous national awards, including CSO of the Year and Computerworld Premier 100 IT Lead…
  continue reading
 
MacroVoices Erik Townsend & Patrick Ceresna welcome back, Jim Bianco. They’ll discuss why Jim thinks the Fed has become political and risks a policy error, they also cover long-term inflationary trends, the role of precious metals in today's economy, and more. https://bit.ly/4d372MT ⚫ Follow Jim Bianco on X: https://www.x.com/biancoresearch 🔻Downlo…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Russell Spitler, CEO and co-founder, Nudge Security. In thi…
  continue reading
 
Seth and Ken take the podcast global this week while traveling to Melbourne, Australia. The duo is joined this episode are joined by Paul McCarty and Daniel Ting, both involved in the local application security community. The discussion starts with a comparison of industries in Australia and the United States, both differences and similarities. Thi…
  continue reading
 
SecurityDNA podcast host Steve Lasky has an impactful discussion with Donna Chapman, Director of the A&E Program at HID Global North America, about the challenges in dealing with veteran suicide after her 24-year-old son, Army National Guard Sgt. William Davidson, committed suicide during in Operation Enduring Freedom. Chapman is working to help tr…
  continue reading
 
Today, we explore the world of asset discovery and reconnaissance, particularly how these practices have evolved over time. Historically, discussions around reconnaissance have been overly simplistic and tool-centric, often focusing solely on the latest tools rather than the underlying principles and methodologies. Join us as we break down our appr…
  continue reading
 
Send us a text Best Selling Author Former Spy Ranked #9 in the world Body Language Expert Guest host on NBC News Radio Trainer/Teacher/Mentor Hypnotist, Mind Control and NLP Practitioner BIO Gavin Stone served as a security and intelligence covert specialist. He has over 20 years of applied experience, globally de- ployed by government organization…
  continue reading
 
In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security a…
  continue reading
 
Loading …

Quick Reference Guide