Info y juegos que tal vez no conozcas, o no hayas jugado; discusiones y mucha risa. Mate y facturas, y 7 amigos que graban sus charlas sobre videojuegos. Desde la actualidad hasta los clásicos, y muchas anécdotas!
…
continue reading
Recent studies show that 82% of cyber incidents result from unintended human behavior. Further, the errant behavior of only 5% of all users creates most of this risk. This is pretty alarming, and yet no one is talking about it. Modifying the behavior of these few individuals can have a force multiplier effect on reducing overall enterprise cyber risks. Welcome to Friendly Fire: Mitigating Unintentional User Risk. Where we explore Human Risk, to raise awareness across the industry, and stimul ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The View From The Trenches: The Role Of Leaders And Human Resources In Human Risk Management Kristina Belnap Of HealthEquity
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41
Security awareness training is not enough to protect ourselves from cyber risks. But how can we control these risks? Today, Kristina Belnap, the SVP and CISO of HealthEquity, brings the role of human resources in bringing human risk management into the organization. Educating everyone on AI and bringing awareness into the space are keys to protecti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Theoretical Floor And The Importance Of Resilience With Allison Miller Of Cartomancy Labs
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15
Cybersecurity is a high-stakes card game, and sometimes, it's not about winning every hand but mastering the game as a whole. In this episode, we welcome Allison Miller of Cartomancy Labs for an illuminating discussion on "The Theoretical Floor" and why resilience is the secret sauce to defending against modern cyber threats. She expounds on the wo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding Human And API Security With Karl Mattson
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15
For an API security platform to succeed in today’s fast-paced society, it must be widely familiar with the current trends of the digital world and keep its most skilled people for a long time. Tyler Shields sits down with Karl Mattson, CISO at Noname, to discuss these two vital factors. Karl explains how they approach cybersecurity as an up-to-date…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dissecting The Human Issues In Product Security With Joern Freydank
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15
Product security has greatly changed over time. How does human contribute to the changes going on? In this episode, Joern Freydank, a Lead Cyber (Application) Security Engineer, dissects the human issues in product security. He emphasizes the value of humans in providing a higher level of order intelligence operating the systems. Joern also shares …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing Digital Health: A Journey Into Healthcare Cybersecurity With Esmond Kane
37:42
37:42
Play later
Play later
Lists
Like
Liked
37:42
We should embrace the human side of cybersecurity, where knowledge and vigilance become our most potent weapons in the age of digital health. In this episode, Esmond Kane, a CISO at a leading healthcare organization, sheds light on the critical role of human risk management in safeguarding our digital lives. He emphasizes that no matter the technol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Navigating The Intersecting Worlds Of Cyber Security Threats, AI, And Government Policy With Mark Weatherford
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01
As technology advances, so does the threat posed in cyberspace. In this episode, Mark Weatherford, the SVP and Chief Security Officer at AlertEnterprise, navigates us through cyberspace and how AI and Government Policy impact change in cybersecurity threats. There is a monumental shift in positioning, treating, and regulating CISOs within the compa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Stop Dancing With Risk And Start Driving User Cyber Behaviors With Andre Russotti
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03
People make mistakes, and these unintentional mistakes drastically impact an organization. You shouldn't dance with risks and wait for cyber attacks to steal your stage. It's time to take action with Andre Russotti of Altria Client Services as he explains how Zero Trust does not solve the user-behavior problem that causes insider risks. Would you r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
IAM And Zero Trust: Preparing For A New Era In Cyber Defense With Christine Owen
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
In this episode, we unravel the complexities of Identity and Access Management (IAM) and explore the cutting-edge concept of Zero Trust. Join host Tyler Shields as he sits with Christine Owen, a recovering attorney who found solace in IAM and Zero Trust principles. Christine sheds light on the modern challenges of protecting digital assets in an ev…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Greg Silberman: Risk And Privacy... Can You Choose One?
57:38
57:38
Play later
Play later
Lists
Like
Liked
57:38
Balancing risk and privacy is a delicate dance, but with the right solutions and strategies, organizations can effectively manage potential threats to their security while protecting their users' data. For today’s episode, Matthew Stephenson interviews renowned privacy and technology attorney Greg Silberman to discuss the fascinating and complex wo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Brian Proctor: Keeping The People Cool, Warm And Secure
48:11
48:11
Play later
Play later
Lists
Like
Liked
48:11
If there is one sector that is keeping people cool, warm, and secure, that would be the utility sector. They are the ones who have been ensuring that our basic needs are well-provided and, in that process, well-functioning for decades. However, with the cyber element growing and taking root in the sector, threats to how utilities are delivered have…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Kip Boyle: People Make the Cybersecurity World Go Around
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31
There are a lot of factors that cause problems within the cybersecurity space, but the human element ranks as the top reason. With the huge communication chasm among IT experts, C-suite leaders, and hiring managers, there is still work to be done in bridging these gaps. Matthew Stephenson discusses how to solve this disconnect with the Founder and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Theresa Payton: Security And Privacy In The World Of Insider Threats
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55
"Privacy isn't dead, but people need to be made more aware of the invasiveness of the internet of things, digital devices, and tracking." – Theresa Payton. Every company has a duty of care to ensure they are tracking their employees on a certain level to ensure people are who they say they are, working when they say they're working, and taking care…
…
continue reading
This digital information age puts businesses vulnerable not only to external attacks but internal as well. Even more threatening when these happen to those in a highly-regulated industry with a significant amount of information needed securing. Suffice to say, friendly fires happen and must be dealt with as much as other threats. In this episode, T…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Insight Global: The Human-Centric Side Of Security With Jonathan Waldrop
35:06
35:06
Play later
Play later
Lists
Like
Liked
35:06
Insight Global is a massive company that connects talent with the companies that need that talent. As such, it plays a critical role in the cybersecurity industry. In this episode, Jonathan Waldrop, the Senior Director at Insight Global, talks about how the company uses the human element when it comes to security. Jonathan discusses that changing t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Kai Roer - Awareness... Culture... Behavior... OH MY!
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52
Awareness, culture, and behavior. How are these things related to technology and security? In this episode, Kai Roer, the author of Build a Security Culture, provides some insights into the importance and impact of security culture. Kai highlights that there are social and cultural triggers that drive human behavior. Matthew Stephenson and Kai Roer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ira Winkler: Stop Relying On The Human Firewall
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39
Data security awareness is indeed valuable, but how is it actually framed? Most people in the security space rely solely on the human firewall, and that is where the problem occurs. In this episode, Ira Winkler, author of Security Awareness for Dummies, explains why organizations should stop depending on user awareness alone in protecting their dat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chad Skipper: The Landscape Looks Partly Cloudy With Major Chances Of Breaches
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49
Most organizations don’t want to have adversarial conversations about cybercrime. They either don’t care enough or they don’t really understand it. But this lack of visibility within your network can result in a huge risk to your organization. Not knowing if you are dealing with an insider threat is scary. You can't prepare for it or set up counter…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tim Brown: Lessons Learned When Crisis Strikes
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03
When a cybersecurity breach happens, expect things to go crazy. You will have to deal with legal teams and an all-out investigation with the authorities. You will have to find out who did it as soon as possible. Is it an attack from the outside or due to neglect from someone from the inside? How are your customers doing? How can you circumvent futu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Gary Barnabo and Eric Eames: Inspiring the C Suite to Think Different
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41
A lot of cybersecurity assessments are done with a checklist of how many high-risk, medium-risk, and low-risk vulnerabilities there are. It's very non-human, which is something a lot of people will get turned off by. If you truly want executive leaders to start paying attention to cybersecurity, you need to present it in a more humane so that it’s …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Elsine Van Os: Securing Humanity... One Person at a Time
43:17
43:17
Play later
Play later
Lists
Like
Liked
43:17
Securing Humanity is a collective responsibility. In this episode, Matthew Stephenson interviews Elsine Van Os, the founder and CEO of Signpost Six, Insider Risk Management consultancy firm with behavioral science at its heart. Elsine discusses cybersecurity and risk management within the organization, and shares the psychological aspect of it all.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Eric Anderson: How Do You Secure Everything?
43:29
43:29
Play later
Play later
Lists
Like
Liked
43:29
Adobe is one of the most ubiquitous brands worldwide, being present in almost every tool or industry imaginable these days. How do you secure everything and keep data safe from cyberattacks when running such a huge company? Eric Anderson, Director of Enterprise Security at Adobe, joins Matthew Stephenson to discuss how they approach cybersecurity w…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Christine Gadsby: Are Insider Threats Always Intentional?
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17
In this digital age, leaving your data unprotected will surely invite cyber attackers to take advantage of your precious information. On top of ensuring a foolproof strategy that keeps away hackers, you must also be wary of insider threats that may jeopardize your data. Matthew Stephenson chats with Christine Gadsby, the Vice President of Product S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Derek Fisher: Securing From The Inside Out
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24
How secure is your security? How can you ensure it is free from defects and critical vulnerabilities? In this episode, Derek Fisher, the author of the Application Security Program Handbook, shares how developers can position themselves to minimize risk in the space created. Derek tries to map everything back to risks in developing software to ensur…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Kurtis Minder- Whisper To The Insiders To Protect Them From The Outsiders
36:21
36:21
Play later
Play later
Lists
Like
Liked
36:21
More often than not, the first thing that comes to mind with the term "cyber threat" is something external. But did you know that internal threats are just as serious as external ones? In this episode, Matthew Stephenson sits down with technologist Kurtis Minder, the Founder of GroupSense, to discuss how to watch out for cybersecurity attacks from …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Arun Vishwanath: The Right Intent And The Wrong Approach
51:56
51:56
Play later
Play later
Lists
Like
Liked
51:56
In this new technological age, it may seem like we have already made so much progress towards advancing with science, machines, software, and technology as a whole—but we actually still may not be as far off as we think we are. In this episode, Matthew Stephenson sits down with Arun Vishwanath and discusses cybersecurity, how much it has done so fa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building A Secure Security Program With Sean Cassidy, Head Of Security At Asana
31:08
31:08
Play later
Play later
Lists
Like
Liked
31:08
How secure is your security program? The rampant issues of unauthorized access, use, and modification of customer data require a security program to further secure and protect this information. In this episode of Friendly Fire, Sean Cassidy, the Head of Security at Asana, sits with Matt to share his insights on how you can build a secure security p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Robert Fly: Pretty Fly For A Security Guy
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24
Research shows that 80% of the users of your tools cause 8% of your security incidents. You cannot safeguard your entire business until you know who these people are. When identifying risky employees, reducing future incidents, and defending the workforce, Robert Fly is your security guy! In this episode, he sits with Matthew Stephenson to share hi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Masha Sedova: Employee Security Mistakes Are inevitable, Resulting Incidents Aren’t
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45
8% of your employees are going to cause 80% of your security incidents. Employee mistakes are inevitable, no matter how much training you give them. That is why you need to change the way you think about security and plan ahead. Instead of trying to put out fires, prevent them from happening in the first place. Join Matthew Stephenson as he talks t…
…
continue reading
Having a diverse background in our careers rewards us with diverse experiences and insights. Janet Heins brings the breadth of her career experience to her role as the Chief Information Security Officer (CISO) at iHeartMedia. In this episode, she sits down with Matthew Stephenson to tell us about her journey from the cruise line industry, manufactu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A Psychoanalytical Perspective on Being a CISO with Mark Eggleston
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45
The role of a CISO is one with many responsibilities. How do people in this position manage and balance everything that comes with their role? Here to shed light with a psychoanalytical perspective on the role is Mark Eggleston, CSC's chief information security officer (CISO). He is responsible for the global security and privacy program design, op…
…
continue reading
In a Zero Trust model, you have to always assume a breach. This is a model that everyone needs to be aware of because everyone wants to know that they are being protected, especially in school. Parents want to know that their children are in a safe environment. This is what the Chief Information Security Officer at SMU, George Finney is tasked with…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Paul Connelly: The First CISO at the White House
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25
Do you think your job is hard? Well, being the Chief Security Officer at HCA Healthcare, Paul Connelly was able to wrap his arms around an industry where there are 275,000 employees and 36 million patient care encounters each year. But how does he do that? In today’s episode, Paul Connelly shares his endeavours as a Chief Security Officer who built…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dynamic Trust And Zero Trust – What’s The Difference? With Luke Simonetti
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26
Zero Trust has been a thing for a few years now, and people have leaned into it. However, Booz Allen's Commercial Practice is changing that narrative and looking to the future to evolve the notion of Trust. In this episode, Matthew Stephenson welcomes the Vice President of Booz Allen's Commercial Practice, Luke Simonetti. Luke explains what Dynamic…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Camille Morhardt: Inspiration Is Better Than Motivation
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59
Many people in workplaces around the world have been clicked dubious links thinking they’re important emails from work. These people have become victims of spear phishing, one of the biggest threats to workplace security right now. How can we protect ourselves from the bad actors that do this? In this episode, Camille Morhardt, the Director of Secu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Nick Ryan: Striving to be the smartest may not be the best idea.
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26
If you are the smartest person in your organization, then you're doing something wrong. Listen to your host Matthew Stephenson as he talks with Nick Ryan, the CISO at Baker Tilly, about the value of being the dumbest person in the room. Together, they discuss team culture and the different elements that shape successful mergers and acquisitions. Ni…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dr. Justin Pelletier: Protect The Outside By Protecting The Inside
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11
A cyberattack is a real and ongoing danger for businesses today. Cybersecurity training can help you protect your company from the inside so you can feel as prepared as possible. The Cyber Range and Training Center in RIT's Global Cybersecurity Institute does just this. They train people by giving them immersive scenarios and emulation training. Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Insight CISO Jason Rader: He Doesn’t Have 50 People On His Security Team... He Has 12,000
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40
Leading a team takes a lot of skill. Imagine what it takes to lead a team of 12,000! Find out how first-time CISO and Vice President for Insight and Microsoft's 2022 Security Changemaker of the Year, Jason Rader, powers through his day as he talks about the vital role his team plays in his or any organization. With more than 25 years of providing s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Must Demonstrate How They Deliver Trust With Sean Murphy
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49
Cybersecurity can help an organization do strategic development and whole lot of other things. But the biggest thing it brings to the table is trust. If you work in cybersecurity, the people in the organization has to trust you and you need to have the credentials for that. There is not trust without credibility. Trust is key in the world of cybers…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dan Lohrmann: From A Football Team To Government To The SOC… Culture Is The Key
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17
"Be yourself" is always good advice. But as hackers get smarter, they can be you too! In this digital age, more people spend time online, from connecting with family and friends to doing business. At the same time, online risks keep growing. So do we take offense or defense? In this episode, Dan Lohrmann, Field CISO for Public Sector & Client Advis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding The Importance Of Building A Culture Of Trust With Dr. Shayla Treadwell
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Leaders and entrepreneurs know that there are a lot of factors in growing an organization. You must think about structures, making better decisions, and what truly matters. Matthew Stephenson sits down for a conversation with Dr. Shayla Treadwell on the importance of building a culture of trust in your organization to drive excellent results and ha…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Human Interaction Make Security Systems Vulnerable With FC
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39
For any system that involves humans, there is always the potential for vulnerabilities. Whether it is a system of communication or a physical security system, if humans are involved in any way, there is always the potential for someone to exploit a weakness. In this episode, F (freakyclown) C, Co-CEO at Cygenta, explores some ways that any system i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The True Need For Cybersecurity: Creating A Secure World In The Modern Era With Dr. Ed Amoroso
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34
Cybersecurity is one of the most important issues facing businesses and organizations today. The increasing reliance on technology has also increased the threat of cyberattacks. While there are many challenges associated with cybersecurity, there are also opportunities for organizations to improve their cybersecurity posture. Dr. Edward Amoroso, CE…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Brent Deterding On CISO Leadership And Calculating Risks
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43
Being a CISO requires you to be the team's incident commander. You need to be willing to tackle problems and risks with good leadership. Users are looking up to you to help solve problems effectively. You need to guide these people so they won't get compromised. Join us as we talk to Brent Deterding about what it takes to engage your people as a CI…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
People-Centric Approach To Cybersecurity Culture With Jessica Barker
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16
Companies need to put more effort into empowering their people when it comes to creating a cybersecurity culture. This is what’s called the people-centric approach to cybersecurity culture. When someone comes forward because they clicked a malicious link, reward them. Don't punish them because then they will keep quiet about what they're doing. Hum…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Prioritizing Security in Healthcare With Eddie Borrero
32:06
32:06
Play later
Play later
Lists
Like
Liked
32:06
There is a looming threat in the healthcare industry today: ransomware. Eddie Borrero, Vice President and Chief Information Security Officer at Blue Shield of California, advocates that companies must start prioritizing security to ensure the safety of businesses and, most importantly, people whose lives are on the line when systems go down. In tod…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Finding Unwitting Vectors Of Internal Risk With Wade Baker
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30
A lot of people think that insider threats are always malicious, but most of the time, they are unwitting vectors of risk. Join Harris Schwartz as he talks to Co-Founder of the Cyentia Institute, Wade Baker, about his research on internal risks. Discover how much of it comes from human risks like email phishing or downloading malware. Learn how the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How To Protect Your Business And Counter Human Risk In Cybersecurity With Mark Sangster
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32
When it comes to cybersecurity and protection, it's easy to blame the individual. But what are more effective methods to counter human risk? Joining Harris Schwartz for this episode is Mark Sangster. Mark is the Chief of Strategy for Adlumin. He is also an award-winning speaker and the author of No Safe Harbor: The Inside Truth About Cybercrime and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FriendlyFire Podcast - Final de temporada - "Especial juegos de Star Wars"
2:01:30
2:01:30
Play later
Play later
Lists
Like
Liked
2:01:30
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FriendlyFire Podcast - S05E29 - "Los videojuegos en argentina"
2:34:22
2:34:22
Play later
Play later
Lists
Like
Liked
2:34:22
Esta semana tuvimos el placer de recibir en la mesa a Juli de Gamer con mate y Crios Devs, y charlamos de todo. Desde su formación como diseñadora gráfica hasta su pasión por los videojuegos, y la industria en el país. Y como no? de lo más importante en esta semana sobre lo que pasó con los videojuegos. Nos pueden seguir en estas redes: Facebook: h…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FriendlyFire Podcast - S05E28 - "Se rompió la maldición"
2:24:13
2:24:13
Play later
Play later
Lists
Like
Liked
2:24:13
Nos pueden seguir en estas redes: Facebook: https://www.facebook.com/friendlyfirevg/ Ivoox: https://ar.ivoox.com/es/friendly-fire Grupo de Facebook: https://www.facebook.com/groups/1501995776765178/ Twitter: @FriendlyFireVG Instagram: FriendlyFire_Podcast Blog: friendlyfirepodcast.blogspot.com/ Esta semana se rompió la maldición que impedía que Nic…
…
continue reading