Best Socialengineer podcasts we could find (Updated April 2019)
Related podcasts: Ping Look Jordan Harbinger Hadnagy Engineer Ekman Kennedy Deception Social David Psychology Marketing Business Tech Social Sciences Science Socialengineering Negotiation Persuasion  
Socialengineer public [search 0]
×
Join millions of Player FM users today to get Socialengineer news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
 
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
 
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
 
A podcast about the human element in social engineering, security, infosec, business and beyond. Jenny Radcliffe talks to experts from a wide variety of disciplines which go to make up the skill set she uses.
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIO's, CEO's and CISO's discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry called cyber security.
 
Loading …
show series
 
Gregg Henriques is a psychologist and professor with expertise in depression, suicide and personality disorders. He developed a new theoretical system for psychology and joins us today to share it with us. As we discuss his theory we will talk about: His new theory of psychology The 4 interlocking peices and how we can apply them in every day l ...…
 
Leading the sales team at Next Generation Security is the latest incarnation for Paul who has wide industry experience and strong opinions on the information security industry, lifelong learning and how sales professionals should go about doing their job. Pulling no punches, this is a fascinating interview that covers how this infosec professio ...…
 
Gregg Henriques is a psychologist and professor with expertise in depression, suicide and personality disorders. He developed a new theoretical system for psychology and joins us today to share it with us. As we discuss his theory we will talk about: His new theory of psychology The 4 interlocking peices and how we can apply them in every day l ...…
 
Gregg Henriques is a psychologist and professor with expertise in depression, suicide and personality disorders. He developed a new theoretical system for psychology and joins us today to share it with us. As we discuss his theory we will talk about: His new theory of psychology The 4 interlocking peices and how we can apply them in every day l ...…
 
Mo has extensive experience in helping organisations with the cultural and behavioural side of cyber security. He has gained this experience in roles across the public and private sector having worked on business as usual activities, security improvement programmes, transformation projects, large scale implementation programmes as well as proje ...…
 
Dr. Lydia Kostopoulos consults on the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for ...…
 
Thomas has over 30 years of experience in the IT industry ranging from software development to infrastructure & network operations and architecture to settle in information security. He has an extensive security background covering roles from incident responder to security architect at fortune 500 companies, vendors and consulting organisations ...…
 
In this episode @LargeCardinal aka Mark Carney talks about his wide ranging career in IT and retro computers. His unusual route into the profession, and his views on the industry. A fellow Liverpudlian Mark has expertise in many different areas and is the founder of Bsides Leeds. Hacker & Mathmo, formerly a Musician; Having started out on helpd ...…
 
Chase Hughes is an ex-military Chief that wanted to learn how to better the study of influence. He wanted to see if he could teach anyone to use these skills fast and with precision. Join us this month as we discuss this very topic with Chase and try to answer: Can we train people in influence like we train animals? Can we control our own minds ...…
 
Chase Hughes is an ex-military Chief that wanted to learn how to better the study of influence. He wanted to see if he could teach anyone to use these skills fast and with precision. Join us this month as we discuss this very topic with Chase and try to answer: Can we train people in influence like we train animals? Can we control our own minds ...…
 
Chase Hughes is an ex-military Chief that wanted to learn how to better the study of influence. He wanted to see if he could teach anyone to use these skills fast and with precision. Join us this month as we discuss this very topic with Chase and try to answer: Can we train people in influence like we train animals? Can we control our own minds ...…
 
Ed Tucker is the co-founder of Human Firewall, an operationalised security awareness platform that enables a single employee to protect the whole organization. Ed is also co-founder of EmailAuth, a solution designed to increase adoption of DMARC, providing enhanced email deliverability and customer protection. Ed was previously CIO at security ...…
 
Liz Hardwick is Co-Founder of DigiEnable, an award-winning Digital Training & Services Company, based in Lancashire. She designs and delivers tech-based and online marketing workshops and is a professional speaker, appearing at conferences and events across the UK and beyond. Liz’s career started in broadcasting working for a number of the majo ...…
 
Zach is a former professional poker player whose first book, Reading Poker Tells, is often called the best book on the subject. He’s written two other books: Verbal Poker Tells, and Exploiting Poker Tells. And he has a video series that’s currently more than 10 hours of content. He’s also consulted for two World Series of Poker Main Event final ...…
 
Whitney Merrill is a privacy attorney, worked with the EFF and runs the Crypto and runs the Crypto Privacy Village at DEF CON. (See a pattern yet?) This month we have a very fun and lighthearted chat with Whitney about things like: Is it possible to remain private today? Is it possible to be safe and date online? How dangerous is OSINT? And so ...…
 
Whitney Merrill is a privacy attorney, worked with the EFF and runs the Crypto and runs the Crypto Privacy Village at DEF CON. (See a pattern yet?) This month we have a very fun and lighthearted chat with Whitney about things like: Is it possible to remain private today? Is it possible to be safe and date online? How dangerous is OSINT? And so ...…
 
Whitney Merrill is a privacy attorney, worked with the EFF and runs the Crypto and runs the Crypto Privacy Village at DEF CON. (See a pattern yet?) This month we have a very fun and lighthearted chat with Whitney about things like: Is it possible to remain private today? Is it possible to be safe and date online? How dangerous is OSINT? And so ...…
 
Following graduation from the Royal Air Force (RAF) Collage Cranwell Nick has over 30 years senior leadership and executive management experience, mainly in the technical and intelligence environments internationally. As a Royal Air Force Officer, his time was mainly spent in Military Intelligence and included serving with the British Army. Aft ...…
 
Sharif is the Head of Training and Advisory Services for AXIS Capital’s Insurance segment, a market leader in cyber insurance. Sharif is responsible for providing cyber expertise to the underwriting teams across AXIS Insurance, as well as for brokers and clients. Sharif has developed GCHQ accredited broker and risk-manager training programmes a ...…
 
In this episode Chad Boeckmann interviews Adam Stone about the new California Consumer Privacy Act of 2018 (CCPA). The discussion leads off with the comparison of GDPR to CCPA some similarities and differences between the two. The latter half of the interview dives into a role-play of scoping a business for CCPA compliance. Adam guides our list ...…
 
Aubrey works with teams across the business to provide greater opportunities for everyone to join Atlassian and do the best work of their lives there. Her work spans the talent lifecycle from increasing access to technical education for underrepresented minorities through recruiting, retention, and advancement of all Atlassians. She relies heav ...…
 
Kristin Judge brings a very interesting background in counseling, teaching, public service and leadership to drive cybersecurity awareness and learning to the masses. Ron Woerner and Kristin have a conversation about the qualities of a good leader and how this can translate into driving change and awareness across the cyber security landscape. ...…
 
We catch up with the previous guest, Richard De Vere, on the changes to the Anti-Social Engineer business and the state of the industry. Richard De Vere is the Principal Consultant for The AntiSocial Engineer Ltd, he has an extensive background in penetration testing and social engineering assessments, including ‘red team’ exercises and informa ...…
 
Join us with our guest Clint Watts as we ask questions about: Misinformation campaigns and their success. How is misinformation used? Why is it so powerful? How can we be safe from falling victim? So much more Clint can be followed on his Twitter Account @selectedwisdom and on https://www.fpri.org/contributor/clint-watts/ Clint also recommends ...…
 
Join us with our guest Clint Watts as we ask questions about: Misinformation campaigns and their success. How is misinformation used? Why is it so powerful? How can we be safe from falling victim? So much more Clint can be followed on his Twitter Account @selectedwisdom and on https://www.fpri.org/contributor/clint-watts/ Clint also recommends ...…
 
Join us with our guest Clint Watts as we ask questions about: Misinformation campaigns and their success. How is misinformation used? Why is it so powerful? How can we be safe from falling victim? So much more Clint can be followed on his Twitter Account @selectedwisdom and on https://www.fpri.org/contributor/clint-watts/ Clint also recommends ...…
 
Neil is a veteran information security professional and data protection and privacy expert. He holds more than 20 years of experience in the information security industry with 15 years experience as a leading security practitioner for organisations like Deutsche Bank, Swiss Re and Camelot Group before spending the past five years as Deputy CISO ...…
 
Bob Zukis, CEO of Digital Directors Network and Professor at USC Marshall School of Business, took time out of his busy schedule to talk about cyber risk and board awareness with Chad Boeckmann on this episode. Bob discusses the results of a panel survey from the NACD (National Association of Corporate Directors) annual summit in Washington DC ...…
 
For this episode, Kai returns to the podcast so we can discuss his fascinating 2018 Security Culture Report. Kai is an engaging and award-winning specialist on security behaviors and security culture, he provides organisations around the world with advice on assessing, building and maintaining good security culture using the Security Culture Fr ...…
 
Ron Woerner connects with Joyce Brocaglia, CEO of Alta Associates and Founder of Executive Women's Forum. Joyce covers the importance of investing in one's own career and how to grow into a leadership CISO role to gain the proverbial "seat at the table" with the business. Further discussion leads to describing the importance and approach to bui ...…
 
If you have written off your local library you may be underestimating the true value it can deliver that "automatically" brings you privacy. Take a journey on this very special episode to uncover the treasures The New York Public Library holds and also specific privacy rules around the use of any library's resources. Bill Marden is our guest an ...…
 
Joe Navarro immigrated to American not knowing any English. How did this mold and shape him to become one of the most well known FBI agents and now one of the world's leading expert's in body language? Join us in this discussion to find out: Why did he write this book? We will see more of him before another 8 years? How has nonverbal reading ch ...…
 
Joe Navarro immigrated to American not knowing any English. How did this mold and shape him to become one of the most well known FBI agents and now one of the world's leading expert's in body language? Join us in this discussion to find out: Why did he write this book? We will see more of him before another 8 years? How has nonverbal reading ch ...…
 
Joe Navarro immigrated to American not knowing any English. How did this mold and shape him to become one of the most well known FBI agents and now one of the world's leading expert's in body language? Join us in this discussion to find out: Why did he write this book? We will see more of him before another 8 years? How has nonverbal reading ch ...…
 
Stefan works for the Internet Security Team at German company DATEV eG. Having started with computers and starting to be puzzled by reality in the 80s, he started out as a programmer in the early 90s. Since 2000 he has been securing networks and computers for various enterprises in Germany and Scotland. His main focus nowadays is raising securi ...…
 
Jim is a passionate storyteller, using his incredible skills to bring humour and relevance to internal and external communications via film. The entertaining educational videos that Twist and Shout produce make them, and more importantly the messages they are portraying stand out, particularly in the security awareness field. During the episode ...…
 
Information security poverty line - Ron and George discuss the segment of teams who can succeed and those are are handicapped. Diving deeper George uncovers his current project for a book he is writing titled "9 Habits to Be Cyber Secure". Ron inquires with George about cultivating good habits for a community of professionals. As an industry we ...…
 
In the first of what will become a semi-regular series, the Tin Foil Hats Club, I chat with a previous guest, Ian Trump, about a few topics. We delve into what some news items actually mean and how they affect the information security industry. Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter ...…
 
Are you ready? This is an action packed, information filled episode with Allan Alford the CISO for Mitel. Allan covers 4 key points to achieve GDPR "alignment" and takes us through the journey of accomplishing these four key phases as a CISO. Towards the latter half of the episode we dive into evolution of relationship between privacy and secur ...…
 
This episode is an interview about running internal cyber awareness campaigns within a big firm. It highlights how experts in PR and marketing use film, events and other media to spread the cyber security message within their firm and gives tips and tricks on how to keep the message fresh, current and present in the minds of employees. Don't fo ...…
 
Did you know that Walmart sells smoothies? Well we didn't either (and we still don't think they do), but this smooth talking Brit will have all of you driving to your local walmart ordering a Crypto AI Blockchain smoothie from Walmart before you are done listening. Nick Furneaux, lord of all OSINT and new author about crypto currency sheds ligh ...…
 
Did you know that Walmart sells smoothies? Well we didn't either (and we still don't think they do), but this smooth talking Brit will have all of you driving to your local walmart ordering a Crypto AI Blockchain smoothie from Walmart before you are done listening. Nick Furneaux, lord of all OSINT and new author about crypto currency sheds ligh ...…
 
Did you know that Walmart sells smoothies? Well we didn't either (and we still don't think they do), but this smooth talking Brit will have all of you driving to your local walmart ordering a Crypto AI Blockchain smoothie from Walmart before you are done listening. Nick Furneaux, lord of all OSINT and new author about crypto currency sheds ligh ...…
 
James has an 18-year career in IT, with eight years in roles within financial services. Using his specialist knowledge he is able to produce working information security policies and procedures from international standards and frameworks such as CIS, NIST, NSA-IA, AusDSD and NESA-IAS. As a proponent for educating staff in appropriate ways depen ...…
 
Chris Hadnagy joins Ron Woerner on this season 2 episode 6 titled Hacking the Human. A master of social engineering, Chris starts the episode with real-world scenarios that interesting and entertaining based on real-life social engineering exercises he has conducted. Further in the episode Chris shares valuable insight into understanding people ...…
 
MlleLicious is a well-known face in the Information Security industry. She assists organisations who are interested in improving inclusion as well as fostering genuine diversity in both the industry and conferences. She discusses her extensive experience of the subject, why it's so important to get the message right and her role as a "Brit as a ...…
 
Ben Rothke joins Ron Woerner on this episode to discuss Ben's experience that lead to his book titled Computer Security: 20 Things Every Employee Should Know (McGraw-Hill). Ben addresses the question "what has changed in 20 years" and also reviews some best practices that are very relevant today. Focusing security on the data is where the conve ...…
 
Adam Shostack is the author of the book titled Threat Modeling: Designing for Security (Wiley, 2014). He also is a co-author of The New School of Information Security (Addison-Wesley, 2008). Adam is a veteran in the cyber security industry having spent over eight years with Microsoft where he focused on threat model tools and techniques. In thi ...…
 
What is DevSlop you ask? Tanya Janca take us through the landscape of DevSecOps (application security in a DevOps environment) and compares this to more traditional approaches to security and application development lifecycles. Tanya addresses the requirements for a success lifecycle process no matter the model and takes us through how to be su ...…
 
Robert Baldi joins Ron Woerner on the Business of Security Podcast Series for a discussion about Cyber Security Audit and using the audit capability as a way to leverage change and enhance overall security performance. Robert discusses using a mathematical formula for risk and translating this back into the investments for a Board discussion. C ...…
 
Google login Twitter login Classic login