John Bambenek public
[search 0]
More
Download the App!
show episodes
 
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and ho…
  continue reading
 
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.…
  continue reading
 
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he …
  continue reading
 
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCart…
  continue reading
 
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?…
  continue reading
 
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize securit…
  continue reading
 
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can…
  continue reading
 
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations …
  continue reading
 
Daniel DeCloss is Founder and CEO of PlexTrac and has over 15 years of experience in Cybersecurity. Dan started his career in the Department of Defense then moved to private sector consulting where he worked at companies like Veracode as a Principal Consultant in Penetration Testing. He also served as a Principal Security Engineer for the Mayo Clin…
  continue reading
 
Michael Manrod, CISO at Grand Canyon Education Mike Manrod, MSISE, CCSBA, CSSBB, CISSP, Chief Information Security Officer--Mike presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff and information asset…
  continue reading
 
Anu Kukar is an industry award winner, international keynote speaker and diverse executive with 20 years of experience in both consulting and industry. She has spoken 60+ events, published articles and been a guest on podcasts globally across 9 countries. She shares insights and provides practical tips through her unique storytelling whilst taking …
  continue reading
 
Alex Rhodes is a Cybersecurity Research Engineer and Space Cyber affluent. He also serves on the board of advisors and as Youth and Community Director for Whole Cyber Human Initiative. He's retired from the U.S. Army in 2018 as the Assistant Special Agent in Charge of the Digital Forensics Research Branch for the Army Criminal Investigative Divisio…
  continue reading
 
About Valmiki Mukherjee: Valmiki (Val) is Chairman and Founder of Cyber Future Foundation and a globally recognized expert in the cyber and cloud security industry with a focus on innovation and collaboration to address the Information Security needs of the future. He previously served as an Executive Director in the Cyber Advisory Services at EY. …
  continue reading
 
About Michael Gregg: Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues. With Michael’s cyber experience span being over a period of two decade…
  continue reading
 
About Christophe Foulon: Christophe Foulon, senior manager and cybersecurity consultant at F10 FinTech, brings over 15 years of experience as a CISO, vCISO, information security manager, adjunct professor, author, and cybersecurity strategist with a passion for customer service, process improvement, and information security. He also has spent more …
  continue reading
 
About Shefali Mookencherry Shefali Mookencherry is CISO at Edward-Elmhurst Health, has extensive experience in healthcare cybersecurity, HIPAA, PCI, Promoting Interoperability and revenue cycle areas, including 30+ years in the healthcare industry, with fifteen spent in senior management positions. She is currently a CISO, who is responsible for de…
  continue reading
 
John Bambenek - Principal Threat Hunter at Netenrich; Chief Architect of the Cyber Panopticon; Incident Handler for Internet Storm Center About John Bambenek: John Bambenek is an information security practitioner from Champaign, Illinois. As a graduate from the University of Illinois with a B.A. in Theoretical Astrophysics (emphasis in extragalacti…
  continue reading
 
CHRISTOPHER RUSSELL, CISO, tZERO Group About Christopher Russell: Christopher Russell is the Chief Information Security Officer for tZERO. Apart from holding a master’s degree in cybersecurity, he also has several certifications in cloud security, endpoint detection and response, SIEM, NGFWs, and blockchain. He has a background as a human intellige…
  continue reading
 
VALARIE FINDLAY, President / Chief Scientist, TIGIR Secure About Valarie Findlay: Professionally, Valarie has over twenty years in national security, intelligence and threat analysis for US and Canadian governments. From this experience, she developed the methodology and functionality for TIGIR to meet a growing risk assessment and compliance need …
  continue reading
 
Dr. Chase Cunningham is the Chief Security Strategy Officer (CSO) at Ericom Software. Previously he was Principal Analyst at Forrester serving Security and Risk professionals. Prior to Forrester Research, Chase was the director of cyber threat intelligence with Armor, where he designed and managed the cloud security and intelligence engine for thei…
  continue reading
 
About Paul Cummings: Visionary Paul Cummings is a retired 20-year US Navy Information Systems Technology Chief, currently working as an Information Systems Security Engineer and Cyber Security Research Engineer for Stephenson Technologies Corporation. He brings a comprehensive background in executive-level planning, managing IT and Cyber Security t…
  continue reading
 
Josh Mason is the CEO and Founder of Cyber Supply Drop. He runs giveaways that provide participants with free vouchers for training and certification exams. He’s also a Red Team instructor at INE, a huge advocate and mentor to veterans breaking into cyber, and a very active contributor in the community. He’s also an instructor for WithYouWithMe, an…
  continue reading
 
Dr. Bonime-Blanc spent two decades as a c-suite global corporate executive at Bertelsmann, Verint, and PSEG overseeing legal, governance, risk, ethics, corporate responsibility, crisis management, compliance, audit, InfoSec and environmental health and safety, among other functions. She began her career as an international corporate lawyer at Clear…
  continue reading
 
Lola Obamehinti has a background in journalism and technology. Lola is Business Ethics Officer, Security Awareness & Training Lead at eBay. She graduated with a BA in Journalism from SMU and obtained an MS in Information Science from UNT in 2017. Currently, Lola is the Global Information Security Training & Communications Lead and a Business Ethics…
  continue reading
 
George Finney, CSO at Southern Methodist University; Author of Well Aware: Master The Nine Cybersecurity Habits to Protect Your Future George Finney is the Chief Security Officer (CSO) and Director of Digital Interests for Southern Methodist University. George works in a variety of areas at SMU including facilitating IT Security and Compliance, inc…
  continue reading
 
Steve Zalewski was formerly the Chief Information Security Officer at Levi Strauss & Co., a global leader in jeanswear. Prior to Levi Strauss & Co., Steve was the Managing Enterprise Security Architect responsible for cybersecurity critical infrastructure protection at Pacific Gas & Electric Company. Earlier in his career, Steve has held leadership…
  continue reading
 
About Our Diary Entry: Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champ…
  continue reading
 
About Nick Werner: Nick is an application security engineer and penetration tester and he is passionate about mentoring and helping others in the community break into cybersecurity. He has published a hand full of articles that discuss how to get your foot in the door, what skills are necessary for certain security positions, and how to gain those …
  continue reading
 
Shawn Bowen is the Vice President and Chief Information Security Officer of World Fuel Services, a Fortune 500 energy, commodities, and services company. He was formerly the Global Head of IT Security and Compliance (Chief Information Security Officer) for Restaurant Brands International (parent company of Burger King, Popeyes Louisiana Kitchen, an…
  continue reading
 
This week’s guest is persistent and has turned her passion into fuel to fight the good fight and help entry level people break into cybersecurity, while movin’ past the gatekeepers. Naomi Buckwalter, CISSP CISM is the Director of Information Security & IT at Beam Technologies. She has over 20 years' experience in IT and Security and has held roles …
  continue reading
 
About Chris Morales: We’re here this week with an AI and threat modeling guru, Chris Morales! He’s Netenrich’s FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company’s security solutions and processes. Chris has 20-something years of information security experience, having …
  continue reading
 
This week we chat with the guy who served as the first CISO for the state of Michigan, Dan Lohrmann in May 2002. Today he serves as Chief Security Officer at Security Mentor, Inc. He has advised senior leaders at the White House, National Governors™ Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security…
  continue reading
 
This episode includes quite the pair – Greg Hatch, CEO, and Dan Ward, CTO, of a new cybersecurity startup focused on Continuous Security Improvement™ (CSI). As serious as cybersecurity is for everyone and businesses, Greg still finds time to keep a sense of humor and have a positive impact on others. Dan is more than the technical brains behind Sae…
  continue reading
 
Les Correia, Global Head of Application Security at The Estée Lauder Companies – Powerful Intriguing Force! This week we welcome the worldly Les Correia, who is the Global Head of Application Security at The Estée Lauder Companies Inc. In a previous life he held Senior/Advisory roles providing thought leadership at AT&T, Lucent, INS (now BT Profess…
  continue reading
 
This week captures the one and only, James Azar, CISO – CISSP, Host of CISO Talk Podcast and CyberHub Podcast. Hopped up on his daily espressos he brings passion, energy and opinions to share about his journey into cybersecurity and views on leadership. As much as he challenges all of us, not just on cybersecurity, but on geopolitical issues, he is…
  continue reading
 
This week we have the pleasure of having Mary N. Chaney, someone who's had one heck of a journey through our industry. Mary is a former Federal Bureau of Investigation (FBI) Special Agent where she investigated cybercrime and served as their Information Systems Security Officer. Currently, she practices cyber law for her own firm, specializing in h…
  continue reading
 
The CISO Diaries is focused on the human side of CISO leadership. Not one path is alike and that draws the allure of getting to know those that are keeping businesses and people protected. This introduction episode is a kick off to get to know hosts, Leah McLean and Syya Yasotornrat. Guests and audiences will experience authenticity, thoughtful con…
  continue reading
 
Loading …

Quick Reference Guide