Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
…
continue reading
A podcast about the makers and breakers shaping cybersecurity. New episodes every other Monday! Go to https://hackerculture.fm for more information!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Privacy vs. Profit: Inside the Ad Tech Ecosystem
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27
Award-winning data ethics and responsible media luminary Arielle Garcia is the Director of Intelligence at Check My Ads. In her role, she partners with businesses and organizations to lead research and develop standards and solutions that foster a healthier market, protect civil and human rights, and promote industry accountability. A steadfast adv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E22: Daniel Shechter - Application Detect & Response (ADR)
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44
- For folks not familiar with you or the Miggo team, can you tell us a bit about your background? - How do you define ADR and why do you think we have seen the need for this new category of security tooling to come about? - Most organizations are struggling with vulnerability overload, with massive vulnerability backlogs and struggles around vulner…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Predators and Digital Dangers: Keeping Children Safe Online
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29
Angeline Corvaglia is the Founder of Data Girl and Friends, where she is committed to helping young people thrive in an AI-driven digital world. Her strategy encompasses three key pillars: privacy and security awareness, critical thinking skills, and balancing the benefits and risks of AI. Angeline is on a mission to equip young minds with the tool…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Innovation, Security, and Privacy: A CIO’s Playbook for Operational Success
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29
Christina Shannon is an accomplished Chief Information Officer (CIO) in the CPG chemical manufacturing sector. With a career spanning over two decades, she transitioned from senior security leadership roles in Fortune 100 companies to executive technology leadership positions in mid-to-large-sized, private equity-owned firms. Christina's journey in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Supporting Ukrainian Electrical Grid Resilience in Wartime
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19
Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Operationalizing Privacy: A Blueprint for Success
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
Aaron Mendelsohn is currently Director - Privacy Officer at the LEGO Group in Denmark, where he leads data protection and privacy compliance within the Digital Technologies teams, including LEGO.com, LEGO Insiders, LEGO Marketing, and LEGO Retail. Prior to joining the LEGO Group, Aaron held leadership roles in data protection, privacy, and informat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E21: Christoph Kern - Dissecting Secure-by-Design
45:51
45:51
Play later
Play later
Lists
Like
Liked
45:51
- First off, for those that don't know you or your work, would you mind telling us a bit about your background? - You recently published a paper titled "Secure-by-Design at Google" which got a lot of attention. Can you tell us about the paper and some of the key themes it emphasizes? - In the paper you discuss some of the unique aspects of software…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Revolutionizing Privacy: Automation, AI, and OneTrust’s Innovative Approach
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24
Kabir Barday’s career journey illustrates the power of innovation in privacy. As the Founder, CEO, and Chairman of OneTrust, he has transformed the landscape of privacy automation. He holds a Fellow of Information Privacy with the IAPP, the highest designation of a privacy professional, and is a Henry Crown Fellow at the Aspen Institute. With a BS …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E20: Joe McCaffrey - Securing the Digital Arsenal of Democracy
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34
- First off, for folks that don't know you, can you tell us a bit about your current role and background? - On that same note, can you tell the audience a bit about Anduril, the mission of the organization and some of the current initiatives it is working on? - What are some of the biggest challenges of being a new entrant in a space such as the Do…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E19: Madison Oliver - Open Source & GitHub Advisory Database
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00
- For those that don't know you or haven't come across you quite yet, can you tell us a bit about your background in tech/cyber and your role with GitHub? - What exactly is the GitHub Advisory Database and what is the mission of the team there? - There's been a big focus on vulnerability databases, especially lately with some of the challenges of t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Maintaining Compliance With SEC Cyber Rules and Security Regulations
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48
Charlotte Baker is the CEO and Co-founder of Digital Hands, a leading cybersecurity services provider. Under Charlotte’s leadership, Digital Hands has won numerous industry awards, with the most recent in 2023, which includes “Most Innovative MSSP”: at CyberDefenseCon and Inc’s “Power Partner of Privacy and Security.” With a 100% US-based delivery …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E18: Stephen Carter - VulnMgt Modernization & FedRAMP
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
- For those don't know your background or Nucleus Security, can you start by telling us a bit about both? - You have experience and a background in the Federal environment, and Nucleus recently achieved their FedRAMP authorization, can you tell us a bit about that process? - When you look at the Federal/Defense/IC VulnMgt landscape, what are some o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E17: Jimmy Mesta - Kubernetes, Runtime and Supply Chains
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12
- For those unfamiliar, please tell us a bit about your background, as well as about RAD Security. What do you all focus on and specialize in? - Your team recently was part of the RSAC Innovation Sandbox. Can you tell us a bit about that experience, and being able to highlight the innovative capabilities of RAD to such a key audience? - You recentl…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Compliance in the Modern Age: Building Effective Privacy Programs With Gretchen Herault
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51
Gretchen Herault is Chief Privacy Officer at Randstad USA and the global job board Monster.com. She has held several privacy leadership roles, including Chief Privacy Officer at Haven Healthcare, HIPAA Privacy Officer at GE Healthcare, and Chief Privacy Officer of Nuance Communications. In this episode… Since the introduction of CCPA and as of this…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Privacy and Security Defenses for Cloud Software With Michael Moore
14:33
14:33
Play later
Play later
Lists
Like
Liked
14:33
Michael Moore is the Chief Privacy Officer at Lacework, handling privacy and cybersecurity, product counseling, transactions, intellectual property strategy, and open-source software. He holds the IAPP privacy qualifications of CIPP-US, CIPP-E, CIPP-C, CIPM, and CIPT. Michael is also an inventor on 10 patents and author of over 20 published article…
…
continue reading
In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul’s military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does P…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30
- You recently presented at Wiz's MisCONfigured at RSA, where you covered some of the most relevant cloud threats and risks, can you touch on what some of those are? - We know Wiz just announced a massive capital raise and there's been talks about M&A plans for Wiz, I know you help with looking at potential products/firms - what are some key things…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AdTech Confidential: Mastering Vendor Due Diligence and Privacy with Richy Glassberg
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52
Richy Glassberg is the CEO and Co-founder of SafeGuard Privacy, a company established in 2019 to help businesses manage privacy compliance with effectiveness and efficiency. He is a digital media veteran with more than 25 years of experience. Richy has led seven startups and held executive roles at renowned brands and businesses, such as CNN, MTVN,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Offensive Cybersecurity Strategies with Bryson Bort
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10
Bryson Bort is the CEO and Founder of SCYTHE, a threat emulation platform. He is Co-founder of GRIMM, a cybersecurity consultancy and ICS Village, a 501c3 for industrial control security systems. He is recognized as a Top 50 in Cyber by Business Insider and SANS Difference Maker Awards’ Innovator of the Year. In this episode… Any security or privac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The CISO and The SEC Cyber Regulations and Their Impact on Privacy and Security
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40
Svetlana Braunscheidel is the General Counsel and VP of Operations at PNG Cyber, a forensic investigations and remediation business. In her role, she deals in digital forensics, incident response, threat actor communications, and cyber risk compliance services. Her previous experience spans executive operations, business development, and national s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24
By Chris Hughes
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E14: Dr. Georgianna Shea: Cyber-Physical Resilience & Supply Chain Security
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23
- For folks not familiar with it, can you tell us a bit about the report, its intent, and how it came about? - Some may be asking, what's the big deal, its just software. Can you help explain the pertinent risk we face with increasingly seeing physical systems, infrastructure and society run on software? - The report makes some key recommendations …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Strategies for Privacy Professionals in the Boardroom With Judy Titera
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11
Judy Titera is the owner of J Titera Solutions, where she provides privacy and security consulting services. She is also a faculty member of IANS Research and serves as Independent Director on the Mitsui Sumitomo Transverse Insurance board. Judy retired from USAA, where she served as the Chief Privacy Officer. She now spends her free time participa…
…
continue reading
Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Br…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pixel Litigation, Ad Tech, and Digital Advertising Privacy With Alysa Hutnik
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11
Alysa Hutnik is the Chair of the Privacy and Information Security practice at Kelley Drye. She is one of the nation’s leading ad tech attorneys, active in the industry, and well-versed in the unique legal challenges faced by advertisers and data-focused companies. Alysa has spent the past two decades working with and growing Kelley Drye & Warren LL…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey
35:41
35:41
Play later
Play later
Lists
Like
Liked
35:41
- First off, for folks not familiar with your background can you tell us a bit about your background from your journey in your earlier IT/Cyber and military time to eventually being a Founder and CEO? - What made you decide to take that leap and found not just one, but two cybersecurity companies, moving from being a practitioner? - What did you fi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building Privacy Programs for Global Businesses
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25
Jordan Smith is the VP of Privacy Compliance for Peloton Interactive and is responsible for their global privacy program. Before joining Peloton, Jordan built compliance and global data privacy programs for startups as well as publicly traded companies. Jordan’s resumé includes the development of policies for regulatory oversight, data privacy, fra…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Measuring Cybersecurity and Privacy With a Scorecard With Owen Denby
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27
Owen Denby is the General Counsel of SecurityScorecard, a late stage VC backed cybersecurity company. He is a veteran of SaaS technology startups and a corporate M&A lawyer by training. Additionally, he is a Charter Member of TechGC — an independent, invitation-only, peer community for general counsels. In this episode… Every organization and busin…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Privacy and Security Concerns in Data Retention With Bill Piwonka
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23
Bill Piwonka is the Chief Marketing Officer for Exterro, a data risk management and privacy platform. Over the past 30 years, he has led marketing teams and initiatives spanning strategy, product marketing, product management, demand generation, and business development. As a semi-retired tech executive, he also spends his time as a philanthropist,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55
Can you each tell us a bit about your background, before we dive in? For those not in the DoD or familiar with the term, what is a “Software Factory”? What is BESPIN? What is the current state of mobile security within the DoD? Why do you think there’s such a delay in maturing policy, process and pathways for mobile in DoD, given the big emphasis t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18
- First off, for folks that don't know you can you give them a brief overview of your background/organizations? - Josh, let's start with you. Can you explain some of what is going on with the drama around NVD and what happened that caught everyone's attention? - Dan - I know you've raised concerns around the implications for the community when it c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Protecting Children’s Privacy in the Social Media Age With Titania Jordan
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26
Titania Jordan is the Chief Marketing Officer and Chief Parent Officer of Bark Technologies, an online safety company that helps nearly seven million kids stay safe online and in real life. She is a renowned thought leader on digital parenting, contributing to pieces in The Wall Street Journal, Forbes, The New York Times, Huffington Post, USA Today…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E10: Adam Bateman - Securing the Modern Identity Perimeter
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
- It is often now said that identity is the new perimeter, why do you think that phrase has taken hold and what does it mean to you? - How much do you think the complicated identity landscape plays a role, for example most organizations have multiple IdP's, as well as external environments such as SaaS and so on that they have identities and permis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03
- First off, you have an incredible background evolving from software engineer to management roles and ultimately a CISO for some of the industry leading organizations such as Siemen's and HP. I would love to hear about that journey and how you found yourself ultimately becoming an industry leading CISO along the way. - How do you think the CISO ro…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Essentials of Privacy Engineering With Jay Averitt
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27
Jay Averitt is the Senior Privacy Product Manager and a Privacy Engineer at Microsoft. He began his career as a software engineer and also attended law school, practicing for 10 years as a corporate attorney specializing in software license agreements. Jay was exposed to privacy during his time as an attorney and has since become an expert in the f…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
U.S. Privacy Law Models Across the States With Keir Lamont
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29
Keir Lamont is the Director for U.S. Legislation at the Future of Privacy Forum. In this position, he supports research and independent analysis concerning federal, state, and local consumer privacy laws and regulations. His background includes privacy and policy positions at The Ohio State University’s Moritz College of Law and the Computer & Comm…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E8: Erez Yalon - AppSec, Supply Chain and Security Research
47:17
47:17
Play later
Play later
Lists
Like
Liked
47:17
- What are some of the most interesting developments in the world of software supply chain security (SSCS) in the last 12 months or so? - It's now been a couple of years since the major fall out of notable incidents such as SolarWinds and Log4j, do you feel like the industry is making headway in addressing software supply chain threats? - For organ…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New Technologies and Navigating Privacy Risk With Joe Toscano
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09
Joe Toscano is the Founder and CEO of DataGrade, a technology company helping companies discover, analyze, and manage data privacy risk. He has advised US Attorney Generals on Facebook and Google antitrust cases, helped shape privacy law across multiple states, and worked with large organizations such as the World Economic Forum. In addition to his…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing, Defending, and Bringing Resilience to Infrastructure
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41
Psymetis creates Operational Technology (OT) security solutions that quickly and prevent electric grid outages and catastrophic infrastructure failures. Psymetis’ Werewolf system provides condition monitoring and threat mitigation for the power grid, detecting cyberattacks, equipment failures, and physical damage in real-time. In this episode of Ha…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Selecting and Leveraging Privacy Software and Generative AI’s Impact on Privacy With Ben Brook
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41
Ben Brook is the CEO and Co-founder of Transcend, a company helping the world’s largest companies control their data by simplifying compliance, unlocking strategic growth, and improving business resilience. Prior to co-founding Transcend, Ben studied computer science, astrophysics, and neuroscience at Harvard University. Originally from Toronto, Ca…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E7 - Chinmayi Sharma & Jim Dempsey - Software Liability and Safe Harbor
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06
- First off, for folks not familiar with your backgrounds, can you please each tell us a bit about yourselves? - Let's set the table a bit, what is software liability and what is driving the increased calls for it? For example the recently released National Cyber Strategy, and commentary by U.S. leaders such as from CISA's Jen Easterly - What are s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Best Tips for Privacy Experts To Elevate Their Practice With Jamal Ahmed
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30
Jamal Ahmed is a Global Privacy Consultant at Kazient Privacy Experts and has been dubbed the "King of Data Protection" by the BBC. He is a passionate advocate for privacy rights and is the acclaimed author of the international #1 bestselling book The Easy Peasy Guide to the GDPR. He has transformed the complex world of data compliance into an acce…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Expert Negotiation Tips When Your IT Network Is Held Hostage
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15
Chris Voss is the CEO and Founder of The Black Swan Group, an organization that teaches strategies found in hostage negotiations and applies them to the business world. He is also the best-selling author of the book Never Split the Difference: Negotiating As If Your Life Depended On It. Prior to 2008, Chris was the Lead Negotiator for the FBI Inter…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E6 - Crystal Poenisch - Cybersecurity Product Marketing
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11
- First, please tell us a bit about your background and how you got into the role you are now in your career? What drew you to the marketing side of cybersecurity? - I have to be honest, many in the cyber practitioner community often bemoan cyber marketers, often citing poor tactics or interactions. What do you think has contributed to this systemi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISA’s Critical Infrastructure Protection Mission with Jen Easterly
50:54
50:54
Play later
Play later
Lists
Like
Liked
50:54
As America’s Cyber Defense Agency and the National Coordinator for Critical Infrastructure Security and Resilience, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every day. In this episode of Hack the Plant,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Levi’s Values Influences its Privacy Program With Karen McGee
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39
Karen McGee is the Chief Privacy Officer at Levi Strauss & Co., overseeing its privacy program and upholding the company’s principles. She specializes in translating intricate legal frameworks into manageable and legible systems. Karen’s preceding career includes Managing Privacy Counsel at Intel, CPO at LifeLock and General Counsel at ID Analytics…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E5 - Jeevan Singh - Scaling Application Security
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59
- Let's start off by discussing everyone's favorite topic, vulnerability management. When it comes to AppSec, obviously there's been a big push to "shift security left" which comes with CI/CD pipelines, SAST, DAST, Secrets Scanning, IaC scanning etc. How have you handled scaling AppSec effectively without burdening Dev teams with massive vulnerabil…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breaking Down the Washington State My Health, My Data Act With Mike Hintze
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43
Mike Hintze is a recognized expert in privacy and data protection with more than 20 years of experience in the field. He is a Member Partner at Hintze Law, a boutique firm that specializes in privacy and cybersecurity. Previously, Mike was the Chief Privacy Counsel at Microsoft, developing his expertise in data protection and privacy policy for ove…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E4 - Joseph Lewis - A Year in the Seat - a CISO's Retrospective
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06
- First off, tell us about your journey to the role of the CISO. What did that look like, what steps did you take, what helped prepare you and so on? - To many, the CISO is considered the pinnacle of the cyber career field. How did it feel when you landed the role and looking back a year now, what are some thoughts that come to mind? - We know as y…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S6E3 - Ross Haleliuk - Cyber for Builders & The Cyber Ecosystem
1:02:42
1:02:42
Play later
Play later
Lists
Like
Liked
1:02:42
- First off, tell us a bit about your background and how you got to where you are now in your career - What led you to write the book? Tell us a bit about the process and the experience so far, given you didn't take a traditional route with a standard publisher etc - Your book is broken into different sections, such as security as an industry, unde…
…
continue reading