Isaca Podcast public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
  continue reading
 
Loading …
show series
 
In this episode of the Unsecurity Podcast, the guys sit down with Michael Kennedy of Ostra to discuss burnout and share their personal experiences and strategies for preventing and managing work-related stress. Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-d…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad, and Oscar discuss the CISSP Mentorship Program with Brian Kelley now that this year's course has officially wrapped up, and touch on challenges and roadblocks for security professionals in the job market. 00:00 Intro 01:56 Ransomware and Security Best Practices 06:32 CISSP Mentorship Program and Lear…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad, Oscar, and Pinky discuss recent news stories about IP and central manager flaws, as well as a vulnerability enrichment project by CISA. They also share an interesting incident response story involving internal domains and proxy auto-configuration files. Please send any questions, comments, or feedbac…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad interviews guest Ryan Cloutier as part of our Meet the Mentors series. They discuss the importance of the CISSP Mentor Program and the value of different perspectives in teaching. They also discuss the release of an exploit code for the Palo Alto Networks Zero Day vulnerability and the ethics of publi…
  continue reading
 
Are you curious about how to maximize the strategic value and impact of your bug bounty program? In this episode, you can learn how Adobe continuously develops and improves its bounty program to engage security researchers and hackers globally and improve its security posture from an adversary perspective. In this ISACA Podcast, Chris McGown, ISACA…
  continue reading
 
Episode 218 of the Unsecurity Podcast is now live! This time, Brad is joined by Ron Woerner for another episode of our "Meet the Mentors" series introducing the 2024 CISSP Mentor Program instructors! Links & information: Find Ron on LinkedIn https://www.linkedin.com/in/ronwoerner/ Please send any questions, comments, or feedback to unsecurity@proto…
  continue reading
 
Episode 217 of the Unsecurity Podcast is now live! This time, Brad is joined by Chris Foulon for the first episode in our "Meet the Mentors" series, introducing our 2024 CISSP Mentor Program instructors! Links & information: Chris's Podcast (Breaking Into Cybersecurity) https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698 …
  continue reading
 
Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie Dann, Director of Professional Standards at the UK Cyber Security Council, in a compelling discussion about the standardization of specialisms in cybers…
  continue reading
 
Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we often make these choices subconsciously, even actions that don’t appear as choices include several microscopic risk-based calculations. These judgments are executed based on some estimate of risk,…
  continue reading
 
ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century, technology, security, and the workforce have evolved, while certain challenges remain the same. In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he started writing for the Journal, societal s…
  continue reading
 
Episode 216 of the Unsecurity Podcast is now live! This time, Oscar and Brad are joined by FRSecure's Matt Dowd to discuss the difference between vulnerability scanning and penetration testing. Links & information Cisco Critical Vulnerabilities https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-communication-devices/ …
  continue reading
 
Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability manageme…
  continue reading
 
Episode 215 of the Unsecurity Podcast is now live! This time, Brad is joined by FRSecure's Dave Tuckman to discuss an upcoming webinar series about securing home networks with ISACA and select FRSecure staff leading the sessions. Links & information ISACA home network webinar series: Session 1: 2/12 - Household Computer Safety, Using The Internet S…
  continue reading
 
Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and more. Pursuing every national and international certification individually results in a repetitive cycle of ongoing walkthroughs, interviews, testing, …
  continue reading
 
Episode 214 of the Unsecurity Podcast is now live! This time, Brad and Oscar sit down with FRSecure's Mike (Pinky) Thompson for a Breachmas report and some news from around the industry. News links Mandiant's X (Twitter) Account Hacked https://thehackernews.com/2024/01/mandiants-x-account-was-hacked-using.html CISCO Patch https://www.securityweek.c…
  continue reading
 
In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common challenges neurodiverse auditors face in the workplace. Neurodivergent auditors can bring a fresh and dynamic energy to projects if given appropriate accommodation. Join us as ISACA's Robin Lyons chats with Program External Audit IT Program Manager Ama…
  continue reading
 
With the increasing demand for audits and risk assessments, artifact requests will not be going away anytime soon. However, the burden these activities bring to the organization can be drastically reduced when audit and risk work together. In this ISACA Podcast episode, Paul Phillips, Director of Event Content Development at ISACA, hosts Staff Gove…
  continue reading
 
Effective IT issue management is crucial for organizations to mitigate financial loss, reputational damage, and operational disruptions. Issue management tools streamline the process by tracking and resolving issues, while risk rating helps prioritize responses based on their impact and likelihood. In this ISACA Podcast episode, ISACA's GRC Profess…
  continue reading
 
Episode 213 of the Unsecurity Podcast is now live! This time, Brad and Oscar sit down with FRSecure's Amy MacElroy to discuss company culture and how she helps maintain it in her role as head of HR. Vulnerabilities Apache Struts https://www.securityweek.com/recent-apache-struts-2-vulnerability-in-attacker-crosshairs/ Microsoft Patch Tuesday https:/…
  continue reading
 
Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and more. Pursuing every national and international certification individually results in a repetitive cycle of ongoing walkthroughs, interviews, testing, …
  continue reading
 
Episode 212 of the Unsecurity Podcast is now live! This time, Brad and Oscar sit down with FRSecure's Shawn Pollard to discuss our new free BIA starter kit, CMMC, and more. Water facilities report falling to hackers in separate breaches https://arstechnica.com/security/2023/11/2-municipal-water-facilities-report-falling-to-hackers-in-separate-breac…
  continue reading
 
Episode 211 of the Unsecurity Podcast is now live! This time, Brad and Oscar sit down with FRSecure's Eric Hanson and Seth Bowling to discuss R&D and defensive evasion. Blackcat report company they breached to SEC https://www.bleepingcomputer.com/news/security/ransomware-gang-files-sec-complaint-over-victims-undisclosed-breach/ About FRSecure: http…
  continue reading
 
Understanding product security risk starts before a single code line is written. Teams can discover threats to the architecture of a system early in the development life cycle with Threat Modeling. While it’s not a new concept, how do we transform traditional ways of Threat Modeling to meet the complexities of modern software development at scale? …
  continue reading
 
Episode 210 of the Unsecurity Podcast is now live! This time, Brad is joined by Megan Larkins to discuss her role as FRSecure's security consulting manager, as well as Proofpoint's 2023 Voice of the CISO report. Proofpoint's 2023 Voice of the CISO https://www.proofpoint.com/us/resources/white-papers/voice-of-the-ciso-report Give this episode a list…
  continue reading
 
Security risks introduced by vendors have become a top-of-mind concern for executives today, driven by recent supply chain incidents that have exposed organizations to operational and reputational risks. A robust vendor security program is now a must, as it helps ensure compliance and proactively identifies and mitigates these risks throughout the …
  continue reading
 
If we want people to bring their most creative, innovative selves to work, we need to cultivate a culture where inspiration is given, encouraged, and fostered. In this ISACA Podcast, Kristi Hedges, executive coach, and leadership development consultant, speaker, and author, gives a sneak peek of her upcoming member-exclusive 'Cultivating Inspired L…
  continue reading
 
Neurodiversity within cybersecurity offers many benefits but requires organizations and hiring managers to re-evaluate hiring practices and job descriptions typically structured for neurotypical applicants. Join ISACA's Director of Professional Practices and Innovation as he hosts a conversation with a company helping to remove barriers and maximiz…
  continue reading
 
Episode 207 of the Unsecurity Podcast is now live! This week, Brad and Pinky discuss Defcon 2023, Huntin' Ground, and the recent CloudNordic ransom case. CloudNordic says it can't, and won't, pay the ransom demand (article): https://www.theregister.com/2023/08/23/ransomware_wipes_cloudnordic/ Send any questions, comments, or feedback to unsecurity@…
  continue reading
 
Agile Scrum is a lightweight framework that promises to significantly improve internal audits by creating a mindset that generates stakeholder value through adaptive solutions for complex auditing problems. This mindset is needed as organizations face unprecedented changes and pressures in today's business landscape. Internal audits must keep leade…
  continue reading
 
Chronic workplace stress can lead to burnout, which poses a significant risk to the mental health of busy professionals, such as auditors. But how can these professionals protect themselves from burnout? And how can their employers help them do so? If you are interested in learning the answers to these questions, then watch as ISACA’s Robin Lyons a…
  continue reading
 
While users of technology are becoming more educated in how to avoid cyberattacks such as phishing, a distracted user might be more prone to missing signs of social engineering. This project explored whether users immersed in augmented reality applications were more inclined to fall for an on-screen text message that prompted familiarity (such as a…
  continue reading
 
A comprehensive information security awareness program must be in place to ensure that employees are aware of and educated about the threats they may encounter at the workplace. The workforce needs to be prepared to know how to respond to these threats. It all starts with a risk assessment to identity the most critical of risks that need to be miti…
  continue reading
 
This podcast speaks about how an Information Systems (IS) Auditor can prepare for the Interruptions, Disruptions and the Emergence events that happen to the business and to technology. Describing the features of Interruptions, Disruptions and Emergence events and distinguishing the differences between them, special guest Anantha Sayana outlines how…
  continue reading
 
This month, we're doing a crossover episode with The Hackle Box! For those who are not yet aware, The Hacklebox is another FRSecure podcast focused on the technical end of current events and happenings within the security industry. It's hosted several times a month by FRSecure's Technical Services Team. Discussed this month: MOVEit Attacks Microsof…
  continue reading
 
Episode 205 of the Unsecurity Podcast is now live! This week, Oscar and Brad sit down to discuss ChatGPT, mobile malware, and the recent Super Mario malware. Don't forget: The show is available in audio or video form wherever you get your podcasts! Give this episode a listen or watch and send any questions, comments, or feedback to unsecurity@proto…
  continue reading
 
Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind how Engagement Works.' In this podcast, Scott gives a sneak peak at his upcoming member-exclusive, CPE-eligible event. Scott will discuss the essential frameworks for understanding and operationalizing engagement and building enduring connections with your networks and…
  continue reading
 
Episode 204 of the Unsecurity Podcast is now live! This week, Oscar and Brad sit down to discuss the recent MOVEit, Fortinet, and Barracuda Vulnerabilities. Links: Fortigate/Fortinet Vulnerability https://projecthyphae.com/threat/the-fortigate-to-mordor-has-been-left-open/ Critical MOVEit Transfer Vulnerability https://projecthyphae.com/threat/hack…
  continue reading
 
In security, aligning with product teams has never been more important, especially when outmaneuvering adversaries. To foster a truly productive and action-oriented cybersecurity culture, security teams must begin addressing their product engineering counterparts as customers they serve rather than entities they govern. In this podcast, ISACA’s Chr…
  continue reading
 
Episode 203 of the Unsecurity Podcast is live! This week, Oscar and Brad sit down to discuss 'malvertising' and 'malverposting'. Links: “Malverposting” — With Over 500K Estimated Infections... https://labs.guard.io/malverposting-with-over-500k-estimated-infections-facebook-ads-fuel-this-evolving-stealer-54b03d24b349 Give this episode a listen or wa…
  continue reading
 
We, as a society, have always lived by certain norms that are driven by our communities. These norms are enforced by rules and regulations, societal influence and public interactions. But is the same true for artificial intelligence (AI)? In this podcast we discuss and explore the answers to some of the key questions related to the rapid adoption o…
  continue reading
 
Organizations today struggle with vulnerability management. More specifically, remediating vulnerabilities in a timely manner poses a challenge. With vulnerability remediation backlogs growing at an alarming rate, what can organizations do to meet their established remediation timelines and to protect the organization from cybersecurity threats. Cy…
  continue reading
 
Guests Jack Freund and Natalie Jorion discuss the need for additional data for quantitative risk analyses and methods to derive that data when it does not exist. They cover how this was done in the past and their updated method for interpolation of such data from record losses and other firmographic data. They end with a discussion of the role of m…
  continue reading
 
This week, Oscar and Brad sit down to discuss passwordless tech, and the FBI's recent move to take down The Hive, one of the world's most notorious ransomware gangs. FBI Takedown of The Hive https://therecord.media/hive-ransomware-decryptors-fbi-bryan-smith-interview-click-here Give this episode a listen and send any questions, comments, or feedbac…
  continue reading
 
Are you wondering about the ever-changing landscape of IT compliance and risk management? Look no further. Hyperproof, a leading SaaS compliance operations provider, conducts an annual survey of over 1,000 IT risk, compliance, and security professionals to uncover their top challenges. Tune in to this exclusive episode to hear about the top five mo…
  continue reading
 
The world of business has changed dramatically over the past few years. Our digital world is more connected than ever, leaving security and technology teams stretched even thinner. Privacy and data regulations are increasing on a state and national level, threat actors are learning and evolving, and cybersecurity has finally become a boardroom prio…
  continue reading
 
Loading …

Quick Reference Guide