Best informationsecurity podcasts we could find (Updated May 2018)
Related podcasts: Security Infosec Software Development Information Security Technology Tech Cybersecurity Hacking Information Business Cyber Privacy Web Podcasting Computersecurity Regulatory Pentesting Owasp Compliance Cissp  
Informationsecurity public [search 0]
show episodes
 
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
 
Where you can listen to commentary on the state of information security
 
Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Every week I spend 5-20 hours consuming books, articles, and podcasts in the areas of Sᴇᴄᴜʀɪᴛʏ, Tᴇᴄʜɴᴏʟᴏɢʏ, and Hᴜᴍᴀɴs. I then take that content and curate it into a concise, 30 minute summary that's ready for you every Monday morning.
 
S
Security By Design
Monthly
 
The Security By Design Podcast is a software security focused podcast for all Developers, DevOps Engineers, Product Owners, UI and UX Designers. Good security practices start before a single line of code is written and the tools, methods and type of attacks being faced are changing faster than ever. This podcast is about finding ways to get and stay ahead of the security challenge.
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
C
Cybersecurity Sense
Monthly+
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
R
Risky Business
Weekly+
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
7
7 Minute Security
Weekly
 
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at https://www.patreon.com/theinsiderthreat. I don't want to be too pushy for this, but a couple of you have asked about ways that you can sup ...
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at www.southernfriedsecurity.com.
 
P
Power of Possible
Monthly
 
U.S. Bank subject matter experts and their invited guests share insights about financial topics like banking innovation, financial education, corporate social responsibility, personal finance, cybersecurity and diversity and inclusion. Each month, we will bring you an un-filtered, easy-to-understand conversation that you can apply to your financial life to see what’s possible.
 
R
ROOT ACCESS
Rare
 
A closer look at the notable stories inside Information Security and why they matter. Brought to you by Cisco.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
S
Security Nation
Monthly+
 
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
 
Information Security is the name of the game. Don’t let the hackers win!
 
I
ISF Podcasts
Monthly
 
Podcast by Information Security Forum
 
I
Infosec Dojo
Monthly
 
Information Security Podcast
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Straight Talk About Information Security
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
S
SecuriTEA Podcast
Daily+
 
A podcast that revolves around cybersecurity. We talk about the latest news, hacks, conventions, and more!
 
R
Risky Business
Weekly+
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Privacy and information security
 
We at Dangerous Minds Podcast, are seeking to explore further weekly, the tech and the people behind this growing community of Biohacking, Grinding, Implantable Technology, Hard Sciences, and Information Security. Please feel free to reach out to us with questions, or comments. You are welcome to find us here, at dangerousminds.io or email us at info@dangerousminds.io and, perhaps we might one day talk to you about the work and or projects you’re exploring and developing. Society considers u ...
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Welcome to the BitSight Risk Review. Listen as we discuss the latest cybersecurity trends, current events, and talk more in-depth about the application of security ratings.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Loading …
show series
 
Malicious SYLK Files Used to Execute Code in Excel https://isc.sans.edu/forums/diary/Malware+Distributed+via+slk+Files/23687/ BMW Releases Patches for Several Cars https://keenlab.tencent.com/en/Experimental_Security_Assessment_of_BMW_Cars_by_KeenLab.pdf Mac Crypto Miners https://blog.malwarebytes.com/threat-analysis/mac-threat-analysis/2018/05 ...…
 
Malicious SYLK Files Used to Execute Code in Excel https://isc.sans.edu/forums/diary/Malware+Distributed+via+slk+Files/23687/ BMW Releases Patches for Several Cars https://keenlab.tencent.com/en/Experimental_Security_Assessment_of_BMW_Cars_by_KeenLab.pdf Mac Crypto Miners https://blog.malwarebytes.com/threat-analysis/mac-threat-analysis/2018/05 ...…
 
CISSP, Certified Information Systems Security Professional. Member of ISSA, Information Systems Security Association, formerly on Board of Directors of ISSA Hampton Roads and ISSA Northern Virginia Chapters. ISSA International Ethics Committee Member. Member, AFCEA; Cambridge Who's Who of Executives, Professionals, & Entrepreneurs, & the Nation ...…
 
Over 15 years in information security space; began career with military and National Security Agency cyberintelligence groups including two intelligence-related missions to Iraq; chief security office for Fortune 1000 company; founder of security firm with over 140 employees; thought leader and expert in cybersecurity field frequently on nation ...…
 
A security breach is always a sensitive topic - but especially so during a merger or acquisition. Ofer Israeli, CEO of Illusive Networks, discusses how deception technology can help prevent disruption by a cyberattack during M&A activity.
 
A great conversation with William Borghetti about automation in the title insurance and lending worlds and how fast technology is advancing. William Borghetti is the president of Title iO, Inc., a Salt Lake City, UT-based technology company that provides data integration and automation solutions for title and escrow companies, law firms and mor ...…
 
Our guest this episode has had a front-row seat at some of the most game-changing innovators in the Internet Era - Netscape, Netflix, and now Informatica. He has seen the Information Security industry change dramatically since he first cut his proverbial teeth on it in the nineties. Our discussion touched across 20+ years of dramatic changes in ...…
 
Ransomware attacks have been on the rise for the last three years, particularly against public entities like hospitals, school districts, and state and local governments.Cyber events in Atlanta, Baltimore, Dallas, Denver, and elsewhere have demonstrated the vulnerabilities our cities face from emerging cyber threats. Recently, Atlanta's compute ...…
 
In The Sausage Hut 100 Part 2, Soulmet, our resident information security expert, kicks things off talking about protecting your information (change your passwords regularly, everybody!). Then our resident executive, C-Suite, guides us through a comprehensive history of The Sausage Hut: Bowling For Dollars, The Daily, The Huffy Toss, Garageband ...…
 
Guest: Udo HelmbrechtEastWest Institute Global Vice President Bruce McConnell speaks with Udo Helmbrecht, executive director of ENISA, on a proposed mandate for the EU cyber agency to create a harmonized cybersecurity certification scheme in Europe.Helmbrecht has been in the position since 2009. Prior to his appointment, he served as the Presid ...…
 
Ryan Maple is an information security specialist, a connoiseur of everything alcohol, and often works at home in his PJs if he's lucky! Listen in as Ryan and Eckie discuss security, people's personalities and drives, and most importantly of all - bourbon.
 
How can we protect health care from hackers? Join Kevin Charest, BCBSTX Chief Information Security Officer, and Kristin Conley, BCBSTX DSVP of Enterprise Risk Management, and co-host Ross Blackstone, BCBSTX Director of Strategic Influence, for this discussion about cybersecurity, risk management and the evolving digital health landscape. You ca ...…
 
Comic books, information security, and family discussions of best security practices around the dinner table. Gary and Sam reminisce about their military careers and how they got started, as well as what they’ve learned about security from raising children and reading sci-fi novels. The post Gary Hayslip – VP & global CISO, Webroot inc appeared ...…
 
Makers of internet of things devices - especially those that handle health information - must implement protections into their product development lifecycle to effectively safeguard consumers' data, says regulatory attorney Elliot Golding.
 
Business Continuity Management (BCM) is always trying to progress itself - sometimes successfully and sometime with not so much. For BCM and Disaster Recovery (DR) to stay relevant with other industries such as Privacy, Security, Information Security et al, it needs to think differently. We'll be joined by BCM thought leaders and authors David ...…
 
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs. • About Robert Hudyma • Robert is a Professor at Ryerson Univer ...…
 
Data integrity and privacy issues are among potential concerns related to voice-activated "virtual assistant" tools that some vendors are beginning to offer for their electronic health record systems, says privacy and security expert Kate Borten.
 
Question: What do you get when you connect a bunch of friends who have worked in or written about security for a long time over a few drinks and fried chicken? Answer: A 62-minute dissection of the RSA Conference, security buzzwords, marketing missteps and lots more that's top-of-mind in the industry. This semi-annual podcast was recorded this ...…
 
WeekdayHOPS - the show that combines cybersecurity, a beer, and a side of humor with conversation that EVERYONE can understand. This week: * Beer of the Week! (Citrus IPAs!) * What I.S. (information security) News? * Flux Capacitor (epiphany of the week) * Security or Dirty (the game show to guess if a term is a bedroom term or an obscure cyber ...…
 
Cheryl Costa is a native and resident of upstate New York who saw her first UFO at age 12. A military veteran, she’s a retired information security professional from the aerospace Industry. She’s been a speaker at the International UFO Congress and at the MUFON Symposium. Cheryl writes the UFO column “New York Skies” for SyracuseNewTimes.com. B ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Hour 1​​ What really happened two years ago in Florida?...NEW news on Pulse night club killer, and it’s big…media narrative was totally wrong...ISIS terror attack or gay hate crime?... here’s the evidence...armed guns stopped another mass shooting; this time, at Disney...media silence is deafening...The media has lied to and manipulated us agai ...…
 
Montecito Bank & Trust's Community Reinvestment Act Officer & Certified Regulatory Compliance Manager and Community Reinvestment Managr, Sykes joined Montecito Bank & Trust as Chief Risk Officer in 2009. Laurel is responsible for consumer compliance, Bank Secrecy Act (BSA) /Anti-Money Laundering (AML), fraud prevention, information security, ve ...…
 
Check out this week's episode of the At The End of The Day. Great discussions on current events and insight from two kind-of-like minds trying to meet somewhere in the middle. Find out why we think Trump is being out-trolled by Stormy Daniels. Also find out where we stand artificial intelligence, the lack of information security with Facebook, ...…
 
Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.
 
Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.
 
Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.
 
Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.
 
AOTB Top 5 March 15, 2018Tickets to ATL "Intro To CryptoART & CryptoMUSIC" available here:https://www.eventbrite.com/e/introduction-to-cryptoart-cryptomusic-tickets-44182783896and check out the Facebook link:https://www.facebook.com/events/762311900639902/1. March 7, 2018. The Blockchain Is Just Another Way To Make Art All About Money by Oliver ...…
 
Topics include:-- The importance of privacy and encryption in cryptowallets.-- 4th amendment concerns and repercussions of Ross Ulbircht’s case and updates on appeal.-- Blockchain technology integration with musical artists and their content.About the Guests:- Paul Puey is the CEO, Co-Founder of Edge, a blockchain-inspired, decentralized, open- ...…
 
When you are starting a small business, there is plenty to worry about. How do you make your product amazing? How are you going to make sure your potential customers know about what you have to offer? How do you hire the right people? With so much going on, it is easy to see why protecting your data and securing your network can get pushed down ...…
 
“Activity Round-up”: This week, we talk about new techniques being used by Iran's "MuddyWater" (TEMP.Zagros) and Vietnam's APT32. We discuss our Mandiant response efforts into large Chinese espionage campaigns that have picked up in the past year, highlighting both APT20 targeting of service providers and some fresh TEMP.Periscope activity at m ...…
 
Privacy breaches and security incidents are occurring more often and are increasingly involving larger amounts of personal data. Why are security incidents continuing to increase? For a variety of reasons. While basic information security and privacy concepts are still the same as they have been for the past 30+ years, too many organizations do ...…
 
Google login Twitter login Classic login