Hacked Into The Minds Of Cybersecurity Leaders public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Navigating Cyber Risk

John Riley and George Usi

Unsubscribe
Unsubscribe
Monthly+
 
Cyber risk resilience for executives. Hackers are winning and lawmakers are taking action with new cyber risk mandates. In an increasingly internet delivered world, new cyberlaws and regulations with steep sanctions have been levied against leaders unable to prove their reasonable governance of the data privacy and cybersecurity problems. With cyber threats evolving at an alarming pace, cyber risk awareness and governance is needed as compliance alone is no longer enough for all businesses. ...
  continue reading
 
Loading …
show series
 
In today’s digital landscape, organizations need to build a secure foundation to protect their data. Yasir Ali is the Founder and CEO of PolymerHQ DLP, a company that offers a unique approach to data loss prevention designed for SaaS applications. He brings valuable insights about protecting your organization’s data and his approach to data loss pr…
  continue reading
 
Artificial intelligence is sweeping every aspect of the digital space right now, and it always finds its way into our personal lives in more ways than one. Despite its many benefits, concerns regarding data privacy arise. Caroline McCaffery of ClearOPS is here to discuss the state of data privacy laws and regulations as AI becomes more ubiquitous. …
  continue reading
 
Cybersecurity incidents usually stem from human-enabled actions. But to err is human; it is only by learning from those mistakes that we can improve. In this episode, John Riley and George Usi sit down with Wendy Epley, Principal Analyst and Information Security expert at the University of Arizona. As a seasoned professional with over 15 years of e…
  continue reading
 
Effective cybersecurity isn't just a checkbox – it's an ongoing investment in resilience. It starts from the top, where collaboration between IT and leadership paves the way for a secure digital future. In this episode, we have Seth Guntharp to shed light on the challenges and triumphs of achieving CMMC (Cybersecurity Maturity Model Certification).…
  continue reading
 
In this pilot episode, John Riley and George Usi discuss the recent cyberattacks on Las Vegas casino giants MGM Resorts International and Caesars Entertainment. Their conversation centers not so much on the technical aspect but more on the leadership side, discussing how business executives should swiftly act and appropriately react. John and Georg…
  continue reading
 
As technologies become even more interconnected and deeply embedded in our lives, facing cyber risks has become more real than ever. Cyber security could be the only thing that keeps you and your business safe. In this episode, John Riley and George Usi sit down with the President of PingWind, Inc., Clarence Dingman, to discuss how executives and l…
  continue reading
 
There are a lot of parallels between web design and cybersecurity, and keeping your website secure may be the first step to making sure your business is safe from threats from bad actors. Mary Putnam, the CEO at DesignYourSite.net, straddles this intersection by providing comprehensive web services for businesses that include security audits and se…
  continue reading
 
Safeguarding your business is not rocket science, but you may want to seriously consider hiring experts to do it, even if you have an IT team on your premises. Join John Riley and George Usi in this episode of Navigating Cyber Risk as they engage with Ryan Grimes, a seasoned IT professional with a unique passion for both cybersecurity and growing f…
  continue reading
 
In the ever-accelerating world of cybersecurity, it's not a question of 'if,' but 'when' you'll face a breach. Join John Riley and George Usi co-founders of Omnistruck, as they unravel the high-stakes landscape of cyber risk management in Navigating Cyber Risk. This podcast, designed by executives for executives, delivers real-world insights into t…
  continue reading
 
From crafting dreams to engineering realities, 3D printing is reshaping industries and bridging the gap between imagination and innovation. So, what’s the catch? In this episode, we sit down with Abraham Feld, a visionary expert in additive manufacturing and co-founder of Creative 3D Technologies, to explore the world of 3D printing. Abraham takes …
  continue reading
 
We trudge into the cyberspace, potentially vulnerable to identity theft or cyber-attacks. Your company should be protected against potential attacks. In this episode, Ken Morris, the CEO of KnectIQ, offers valuable insights on preventing attacks and breaches through modernizing cybersecurity. He mentions building a technology that removes the need …
  continue reading
 
We are seeing a number of bank failures happening recently, leaving those of us not from that sector wondering what is going on. Is our money safe? Is there a concern for our data? In this episode, Jay Williamson, the President and CEO of American Southwest Credit Union, joins John Riley and George Usi to shed light on the state of the banking indu…
  continue reading
 
Humans are producing endless amounts of organic waste every single day, and despite being mostly recyclable, a massive chunk of it only piles up in landfills. Jean-Louis Kindler wants to help reduce trash in the world by maximizing the impact of hydrogen production. Joining John Riley and George Usi, he talks about their work at Ways2H, where they …
  continue reading
 
Businesses are required to undergo cybersecurity assessments to ensure data security. This process ensures that they have the necessary safeguards against cyberattacks, breaches, and data leaks. However, many fail to meet the regulatory requirements set by the Cybersecurity Maturity Model Certification and National Institute of Standards and Techno…
  continue reading
 
Ransomware is not just about money. It is also about lives frozen in uncertainty. It's time to unmask the dark reality, fortify our defenses, and protect the very essence of our digital existence. Our guest for today's episode is the CEO of Stash Global, Janine Darling, a leading expert in the field of cybersecurity. Janine discusses the shadowy wo…
  continue reading
 
What would happen to the entire world if the internet suddenly shuts down? In this captivating episode, Eric Jenkusky of T.J. Clark International delves into the realms of cyber risks and the best way to navigate them. He shares an insider's look at the intersection of technology and defense, uncovering the hidden nuances that shape the military's …
  continue reading
 
Data loss can be catastrophic for businesses of all sizes. But with the right routine, frameworks, and security measures in place, it's not a matter of if a backup will save you, but when. For today’s episode, we have Chris Marshall, a programming wizard, and CEO of Verified Backups LLC. Chris shares his expertise in backups, frameworks, and encryp…
  continue reading
 
With quantum computers, some of the encryption we use breaks quickly. What should we do to keep it resilient? In this episode, Kosta Vilk, the Founder of QuSecure, delves into cryptography as the new frontier for quantum resilience in more advanced systems. He explains that by bringing in management, monitoring controls, and controlling how things …
  continue reading
 
As aviation technology continues to evolve, more sophisticated inventions will continue to show up, with unmanned planes leading the charge. Brendan McKittrick of Aeroband Limited contributes to this evolution by integrating blockchain into aircraft. Joining John Riley and George Usi, they talk about how Web3 technology can make aviation more acces…
  continue reading
 
In an already disruptive space, the changes happening, both big and small, have an even more significant impact. We are part of the ongoing evolution, and if we don’t adapt, then we risk finding success, let alone staying in the game. Anoush D'Orville is very familiar with this fact, having been in the industry for years to finally establish his ow…
  continue reading
 
It is very hard to find people who have that great combination of technical skills and personable skills. Both skillsets are equally needed to build a successful career in tech, and having both in the same person is a rare find. This is why the issue of finding and, more importantly, retaining employees is something the keeps tech entrepreneurs up …
  continue reading
 
Drones are an essential tool in construction projects. They are typically used in area mapping and surveying the outdoors. But Kyle Orciuch wants to go further and develop drones that can fly indoors. Sitting down with John Riley and George Usi, the Founder of CausalTwin shares how their invention can help architects get eyes in the sky and even in…
  continue reading
 
We are seeing the rapid growth of the space industry, especially as it becomes more commercial with more businesses working with each other. And along with these changes are new sets of challenges we need to confront in the industry today. Here to take us to space and tell us more about it is István Lőrincz, the President of Morpheus Space. He join…
  continue reading
 
Drones are fun and cool. But they can also be dangerous. And by dangerous we mean potentially deadly and devastating. That is why as this emerging technology continues to develop and rise in popularity, the need for tighter measures in airspace security also increases. But very few organizations that can potentially be harmed by unauthorized drones…
  continue reading
 
As an application developer, it is very important to trust the data you consume. You need to believe that it is secure in order to create an equally secure application. However, this process can be difficult, especially with the challenges and threats in cybersecurity. Good thing that Ockam is offering solutions to make this simple. In this episode…
  continue reading
 
Have you ever considered how one day our efforts to manage cyber risk might not be able to catch up with how fast new technologies are advancing together with their attendant risks? This is not a far-fetched thought. Things like artificial intelligence are evolving at an exponential rate and people are very quick to jump into the bandwagon. But are…
  continue reading
 
Securing the skies is not just a matter of protecting our airspace, but safeguarding the future of drone technology. Effective cybersecurity frameworks are essential to unlocking the full potential of drones, enabling innovation, and ensuring public safety. In this episode, we sit down with Bronwyn Morgan, CEO of Xeo Air, drone pilot, FAA Safety Te…
  continue reading
 
With more and more children being raised as digital natives, there is an urgent need for brand-new teaching methods. As their attention span lessens and their dependency on technology increases, education has to adapt rapidly. Joining John Riley and George Usi is Janet Ivey-Duensing, who shares the joys and struggles of teaching STEM to these digit…
  continue reading
 
We may not hear about it very much but the space economy is huge. And given the trajectory of its growth in the past few years, it is expected to grow exponentially bigger in the near future. This is what keeps Michael Bloxton up at night. At Nebula Space Enterprises, Michael is busy coming up with innovative solutions to space problems, including …
  continue reading
 
Protecting your systems from cyber threats is not just about using the latest technology. It's about understanding the risks and having a comprehensive solution in place. In this episode, we have Brad Sollar, the Chief Technology Officer of Mainsail Industries, a US security company specializing in next-generation secure virtualization. Brad shares…
  continue reading
 
They say prevention is better than cure, but how can we prevent a security breach? Mitigating risks in cybersecurity is best done through awareness. In this episode, Ryan Hogge, the Chief Executive Officer of Nebula Cybersecurity, delves into building a security-aware culture in organizations. Building a human firewall through awareness and use tra…
  continue reading
 
Arguably, one of the biggest threats to security are the people who wish to do no harm. These are the people in the hallway, your employees, your managers, who think they’re just doing their jobs. One wrong click and they’ve opened something they shouldn’t have, and it’s almost always not their fault. It’s for this reason that Michael Crandall view…
  continue reading
 
In this digital age, almost anybody is hackable, even the big names. That is why there can never be too much when it comes to cybersecurity risk management. You have to do your checks and balances to properly assess your level of risk and prevent future attacks. In this episode, the CEO and vCISO of CyberCulture, Ranbir Bhutani, joins us to discuss…
  continue reading
 
It is pretty alarming that many businesses do not pay that much attention to cybersecurity attacks. They do not take risk management seriously, putting their assets, employees, and profits in harm’s way. Diving deep into this topic with John Riley and George Usi is Jonathan Addington, President at J.M. Addington Technology Solutions and Founder of …
  continue reading
 
The vast majority of US SMEs do not have enough awareness around cybersecurity issues, and a lot of them fall prey to phishing and other attacks because of this. Greg Johnson believes that security awareness needs to be the norm for business, no matter the size. With his team at Webcheck Security, they are driving business enablement to organizatio…
  continue reading
 
Drones are the future. We’re not talking about 40-50 years from now. At this very moment, smart people are working on overdrive to make things like drone delivery possible. But that doesn’t mean there aren’t a lot of hurdles along the way. Finding solutions to these problems and getting to the market as fast as possible is what keeps Mike Dicosola …
  continue reading
 
In this podcast, Ben chats with David Yakobovitch, a Data Scientist and host of the HumAIn Podcast. The conversation covers the ethics behind Artificial Intelligence, Robots and the importance of higher education in the field.By Talking cybersecurity with nexus IT Security group
  continue reading
 
Paul McGough is an industry veteran having been on the forefront of cybersecurity with the government in the 80’s. He has seen the evolution of hackers, the profession, and how skills are defined. We also debate certifications vs. experience and how it plays into todays job market. Paul shares some great ideas on how complexity may not be the best …
  continue reading
 
We dive deep into Chaos Engineering’s use in security and Aaron Rinehart’s brain child, ChaoSlinger. Aaron dives into the impact of objective monitoring for security components and techniques for learning how components actually function in the environment. We also dive into the difference between building a program based on regulations vs. buildin…
  continue reading
 
Travis Baker and Ben go back in forth about recruitment techniques given the unique landscape of the security profession. We talk about how candidates are consumers, techniques for proactive recruitment, effectively identifying key skills, non-traditional talent, and why culture can make or break your recruitment efforts. We also dive into effectiv…
  continue reading
 
Allen Burzen experienced first-hand the impact of having your identity stolen. He has now taken his misfortune and made it his mission to help others who have been impacted in a similar way. Having lead a post-breach incident response team, he shares insight to the evolution of data breaches, how they are advancing, how to build and test a post bre…
  continue reading
 
Come take a dive into the minds and motivations of Black Hats from across the world. E.J. Hilbert shares stories and insights of his time in the cyber crime unit of the FBI, being on the forefront of identify and financial data theft, and working with Max Popov, a Ukrainian prisoner shackled to a conference room desk at Ant City. We also dive into …
  continue reading
 
Ben chats with Chris Barnes about the importance of cybersecurity for small to mid-sized business. Chris talks about his SMB advisory practice, threat landscape for SMB’s, ways to build an effective program with few to no resources, and the importance of a trusted advisor when building a program. During Overrated/Underrated, we get his take on secu…
  continue reading
 
Sandra Crosswell, CISO/CSO @sonicwall joins the HACKED podcast. We dive deep into Red Teams and all sorts of penetration testing topics. She gives an inside look to her role and the challenges of being the first individual in the seat. Additionally, she shares her thoughts on the talent gap and hiring penetration testers. During Overrated/Underrate…
  continue reading
 
On this episode of HACKED: Into the Minds of Cybersecurity Leaders, Ben gets to grill Joshua Danielson (CISO at Copart) on all sort of topics in Infosec. We discuss end user training programs, vulnerabilities and vulnerability management, establishing effective relationships with the C-suite, and the future of the CISO role. During Overrates/Underr…
  continue reading
 
Brett Kelsey, VP and Chief Technology Strategist at McAfee, gives an alternative view on the security talent gap. We dive deep into security challenges with IoT and autonomous vehicles, ethics behind ransomware, and solutions that have potential to shake up the industry. During overrated/underrated, Brett shares his opinion on public cloud and the …
  continue reading
 
On this episode, we chat with Todd Thomas. Todd is the CIO at Austin Radiological Association and has been in the healthcare industry for over 20 years. We chat about compliance and how that impacts IT strategy, AI tools, and how security solutions can impede caregivers workflow. During overrated/underrated, we get his take on every IT role being a…
  continue reading
 
On this episode of HACKED, we pick the mind of Southern Methodist University’s Chief Security Officer and prolific Author, George Finney. George discusses academic cybersecurity theories such as the Happy Gilmore Effect and how cybersecurity fits into Maslow’s Hierarchy of Needs. We also talk about security awareness and end user training technique…
  continue reading
 
Brian Clinkenbeard, the best hacker you have never heard of, takes a deep dive into the technology and root cause of the biggest breaches in history. Having hacked into Texas Instruments mainframe in the mid 80’s, we get a view into the creation of hacking and identity theft. This one is for you die-hard security professionals – filled with stories…
  continue reading
 
Loading …

Quick Reference Guide