CISO สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
T
The New CISO

1
The New CISO

Steve Moore

Unsubscribe
Unsubscribe
รายเดือน
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
C
CISO Tradecraft

1
CISO Tradecraft

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
รายสัปดาห์
 
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
C
CISO Stories Podcast

1
CISO Stories Podcast

Todd Fitzgerald

Unsubscribe
Unsubscribe
รายสัปดาห์
 
The Cybersecurity Collaborative is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.securityweekly.com/csc.
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a CISO. Cybersecurity Futurist. Speaker. Author. Mentor. For more than two decades, Jaime C. has served as a Trusted Advisor to Fortune Global 500 organizations on the future of technology and cybersecurity and how it will impact our lives. CSO Magazine called him “a man who’s barreling down a road that most people are still trying to merge onto” regarding his visionary leadership in cyberse ...
 
T
The Virtual CISO Moment

1
The Virtual CISO Moment

Greg Schaffer

Unsubscribe
Unsubscribe
รายสัปดาห์+
 
The Virtual CISO Moment with Greg Schaffer dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no catchy music, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Quick strike and wrap up audio-only episodes drop Mondays and Fridays; ...
 
T
The CISO's Gambit

1
The CISO's Gambit

Zscaler, Inc.

Unsubscribe
Unsubscribe
รายเดือน
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
 
T
The Virtual CISO Podcast

1
The Virtual CISO Podcast

Pivot Point Security

Unsubscribe
Unsubscribe
รายเดือน+
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, welcome to the show.Our moderator, John Verry, chat ...
 
T
The CISO Diaries

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
รายเดือน+
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
 
C
CISO Talk

1
CISO Talk

The CyberHub Podcast

Unsubscribe
Unsubscribe
รายเดือน+
 
One of the most challenging positions within an org is the Chief Information Security Officer. In this podcast CISO and Host James Azar interviews his peers in the CISO role on how the role has developed, how the cybersecurity pracyitioners handle the various challenges and leadership qualities. In this podcast you will hear about the latest best practices, solving complex challenges and building a secure enterprise. Tune in for new episodes. This podcast is part of the CyberHub Podcast Medi ...
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us! Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
 
C
CISO's Secrets

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
รายเดือน
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
S
Smarter CISOs

1
Smarter CISOs

Smarter CISOs

Unsubscribe
Unsubscribe
รายเดือน+
 
Smarter CISOs — the cybersecurity podcast designed to help you manage smarter, reduce your organization’s cyber risk, and learn best practices from cyber experts. "Smarter CISOs" is made possible by Aware Force. Aware Force engages employees in cybersecurity with newsletters and multimedia content, all branded and customized for your organization. Employees stay alert to cyber threats, protecting their families and keeping your organization safer throughout the year. Aware Force can dramatic ...
 
Loading …
show series
 
Critical flaws in Emergency Alert System and in some Cisco SOHO routers, new IoT threat, CISA adds Zimbra vulnerability to its Known Exploited Vulnerabilities Catalog, and what you need to do to land a six-figure cybersecurity job. https://www.threatshub.org/blog/warning-critical-flaws-found-in-us-emergency-alert-system/ https://www.theregister.com…
 
A CISO’s Guide to Pentesting References https://en.wikipedia.org/wiki/Penetration_test https://partner-security.withgoogle.com/docs/pentest_guidelines#assessment-methodology https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies https://www.pcisecuritystandards.org/documents…
 
Leadership is not about title or position. It is about influence. Leaders are not born; they are made. What are the fundamental traits of Leadership? Here are some qualities that I feel are important for Leadership in the 21st Century.โดย Jaime C.
 
CISOs, security leaders and their teams must consume a large amount of information from many sources to remain effective. How does the CISO organize unstructured information? How does the CISO brainstorm? How does the CISO collaborate? Mind Mapping is a very effective tool to generate ideas quickly and was also used to create the CISO COMPASS book!…
 
All links and images for this episode can be found on CISO Series We explore the world of dishonesty in cybersecurity. Practitioners know that marketers will stretch the truth, but how far are we willing to let that go? Isn't this industry built on trust? Can cybersecurity continue to thrive if we can't trust each other? This week’s episode is host…
 
Most recognize the value preservation in cybersecurity. But forward thinking professionals also see the value creation in having a secure information posture. Cybersecurity is the foundation of preserving sensitive data and providing peace of mind but does it create value for the organization and if so, how do we measure that value? Tracking the re…
 
In this episode of The New CISO, Steve is joined again by Dr. Adrian Mayers, VP and CISO at Premera Blue Cross, to dig deeper into his knowledge of insider threat management and intelligence. As an experienced CISO, Dr. Adrian understands the difficulties of a cyber security career. With this in mind, he shares the day-to-day obstacles of the profe…
 
Daniel DeCloss is Founder and CEO of PlexTrac and has over 15 years of experience in Cybersecurity. Dan started his career in the Department of Defense then moved to private sector consulting where he worked at companies like Veracode as a Principal Consultant in Penetration Testing. He also served as a Principal Security Engineer for the Mayo Clin…
 
Motherboard malware that survives OS reinstall, mobile apps leaking Twitter API keys, TVA EDR not OK, Defender defends against ransomware better, ransomware big brands migrating to more smaller bands, and Ukraine shutters major Russian bot network. https://www.pcmag.com/news/malware-that-can-survive-os-reinstalls-found-on-asus-gigabyte-motherboards…
 
On this week's Throwback Thursday from April 12, 2022, Chris Bedel, President and CEO of Bedel Security (bedelsecurity.com) talks about how the virtual CISO fits in to, compliments, and enhances financial institutions' information security program and posture. He also touches on history and future of the virtual CISO. If you're a virtual CISO for f…
 
Steve Mallard has over 20 years in Information Technology; is a Master Teacher in Information Technology/Infrastructure Management and Information Systems Manager at Tennessee College of Applied Technology - Shelbyville; is a private consultant for government organizations, higher-ed, and private corporations, a technical writer, and a public speak…
 
More Pegasus, Chrome extension steals emails and creds, increase of critical infrastructure attacks, Robin Banks PhaaS, more Log4Shell, and top security news websites. https://www.reuters.com/technology/exclusive-eu-found-evidence-employee-phones-compromised-with-spyware-letter-2022-07-27/ https://www.bleepingcomputer.com/news/security/cyberspies-u…
 
I've been a fan of Sean Heritage for years when I first discovered his blog, "Connecting the Dots." Today I have the privilege to listen to his thoughts on cybersecurity careers in both the military and the "real world," how to prioritize your life, what careers goals you should (and should NOT) aim for, and the importance of great leadership. Book…
 
Arrests in nuclear plant attack, RaaS providers adjust business plans, new cybersecurity House legislation passes with significant bipartisan support, how to make risk assessments better, PrestaShop critical vulns exploited, new CMMC AB draft assessment guide, why it's a good idea to establish a solid relationship with a recruiter (e.g. it may redu…
 
On his week's Throwback Thursday from April 5, 2022, Bob Quandt, owner of Bullseye Compliance (https://bullseyecompliance.com) joins VCM for a conversation that ranges from issues and trends in SMB security, entrepreneurship and making a difference, fitness and stress management, application of military experience to infosec, and more! --- This epi…
 
Get up to speed on the art and science of training models, big data sets, and limitations and possibilities for AI in cybersecurity and beyond. Zscaler Vice President of AI and Machine Learning Howie Xu has been a pioneer in applying AI and ML to cybersecurity since the late 1990s. In this episode, he is joined by VP and CISO AMS - Brad Moldenhauer…
 
In this special Wednesday episode, from the CU Intersect Conference in Houston Texas July 19, 2022, vCISO Services, LLC Principal Greg Schaffer discusses how credit unions and other small and midsized businesses can optimize their vCISO to maximize their information security posture. --- This episode is sponsored by · Anchor: The easiest way to mak…
 
I learned a lesson from that CIO that I will never forget. We need to help others in their journey, because we were all once beginners too! I have always helped give back to others since then, because I want to help them in their journey just like someone helped me.โดย Jaime C.
 
A Lawyer can be the CISOs best friend and advocate for cybersecurity investments. Are you frustrated with a lawyers answer of, “it depends?” Lawyers have a different thought process than many CISOs when apply the law. Join this session from a notable cybersecurity lawyer as to the differences in language and how to best take advantage of the legal …
 
Anthony Scarola is an IT Governance, Risk, and Compliance (GRC) expert; has many years in cybersecurity; is a U.S. Army veteran; holds the CISSP; and is a virtual CISO. And he's writing a security book! Listen to his wisdom as it pertains to risk management and learn one mistake may make when discussing risk with the c suite and board of directors.…
 
All links and images for this episode can be found on CISO Series What can you do when your data keeps passing through different third party applications? Your data is being accessed and manipulated by more people, more applications, and more security policies that may not be aligned with your security policies. It seems once it leaves your environ…
 
What exactly is a Software Development Life Cycle, and how does NIST’s Secure Software Development Framework impact that cycle and your organization? Of note, the SSDF will definitely impact you if your software is used by the US Government and will likely impact you even if it isn’t. There are a few choice practices that can help make sense of the…
 
Rogers outage cause, 54 million Twitter accounts' information for sale for $3K, ransomware update, Entrust breached, an startups without a CISO are at a disadvantage - plus statistics, and why you need to both understand their context and source, using a well-known example of an information security "statistic" in the last article. https://twitter.…
 
This episode of CISO Tradecraft, Andy Ellis from Orca Security stops by to talk about three really hard problems that CISOs have struggled with for decades. How do we build a phishing program that works? How do we build a 3rd party risk management program that isn't a paper exercise? How do we actually get good at patch management? Stick around for…
 
Ransomware infections and payments decline, CISO urges patching Windows 11 patch bug, more Chrome fixes, stress in cybersecurity, possibly regulating BGP, and commentary on the CU Intersect conference. https://www.darkreading.com/threat-intelligence/ransomware-attempts-flag-as-payments-also-decline https://threatpost.com/cisa-urges-patch-11-bug/180…
 
On this Throwback Thursday episode from March 29, 2022 - Email remains the most common vector for criminals to exploit. Chuck Sirois discusses how PhishFacts (https://phishfacts.com) can help SMBs identify misconfigured email configurations that criminals may leverage.--- This episode is sponsored by · Anchor: The easiest way to make a podcast. htt…
 
Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today. T…
 
J.J. Powell of Cyber Defense Group (https://www.cdg.io/) discusses his career journey from police officer to system administrator to CISO and now as leading virtual CISO services. He is also a pivotal component into my decision to leave corporate and become an independent vCISO - listen to find out what was "the straw that broke the camel's back" f…
 
All links and images for this episode can be found on CISO Series If they can find flaws, security professionals are quick to label it as bad security behavior. But often, what is marked as "bad" may have problems, but when looked at from a reducing risk perspective it's actually a very good security behavior. This week’s episode is hosted by me, D…
 
Today, information is worth more than riches. The new currency is data. With this being true, the state of cybersecurity within the upper branches of the government was shockingly under-prepared. In this episode, I speak with Mark Montgomery, the former Executive Director of the Cyber Solarium Commission, about the report the commission published i…
 
Shodan special offer, banks need to implement best practices, five key things from smal org CISOs, Netwrix Auditor bug, and on the road challenges. https://www.shodan.io/ https://fintechmagazine.com/banking/banks-need-best-practices-to-fight-rising-cyberattacks https://thehackernews.com/2022/07/5-key-things-we-learned-from-cisos-of.html https://the…
 
On this episode of CISO Tradecraft, Bryce Kunz from Stage 2 Security stops by to discuss how offensive cyber operations are evolving. Come and learn how attackers are bypassing MFA and EDR solutions to target your cloud environment. You can also hear what Bryce recommends to beat the bear that is Ransomware. References:Link How Attackers Bypass MFA…
 
Phishing campaign bypasses MFA, healthcare debt collection agency ransomware breach 1.9 million records, Log4Shell endemic, criminal hackers targeting Indian students, Florida Atlantic University received grant, and my cybersecurity path, including learning Python? https://threatpost.com/large-scale-hishing-bypasses-mfa/180212/ https://www.theregis…
 
In this episode of The New CISO, Steve is joined by Dr. Adrian Mayers, VP and CISO at Premera Blue Cross, to discuss what to consider when interviewing for CISO positions and how to trust your tech in the security field. Since fifth grade, Dr. Adrian Mayers has had a passion for computers. Now a CISO, he shares the role computers play in a security…
 
On this week's Throwback Thursday from 3/22/2022 - The Certified Information Systems Security Professional, or CISSP, is considered by some to be the pinnacle of information security professional certifications, on par with the CPA. But why is that, and what differentiates it from other certifications? And why is it important for virtual CISOs to h…
 
The Solarwinds breach raised the visibility of Software supply chain risks, as many organizations employ third party software with potential access to sensitive information. Join the CISO of Solarwinds as he discusses what happened during the attack, the lessons learned, the mitigations employed after the attack, and excellent, transparent actions …
 
Johanan (Jo) Dixon talks about life in the Marine Corps, as an MMA amateur fighter, and as a Title boxing instructor, and how these helped prepare him for his journey to cybersecurity and his current role with Halcyon (https://www.halcyon.ai/). And he's starting up a new podcast! --- This episode is sponsored by · Anchor: The easiest way to make a …
 
All links and images for this episode can be found on CISO Series Getting someone to purchase gift cards is a popular vector for theft. Given that the gift card theft technique is so well known, many online sites have put up additional barriers to purchasing gift cards. Trying to buy them legitimately has become increasingly difficult. This week’s …
 
Don’t wait for an emergency; secure your database correctly right out of the gate. Think of everything outside of your database as the wild west. What can you do to create the most controlled environment possible for all of your most sensitive data? I invited Robert Buda, President of Buda Consulting, Inc, and an expert in database technology, onto…
 
Rogers service interruption, hacking a Honda, the future of certifications, and Monday thoughts. https://www.reuters.com/business/media-telecom/rogers-communications-services-down-thousands-users-downdetector-2022-07-08/ https://blog.cloudflare.com/cloudflares-view-of-the-rogers-communications-outage-in-canada/ https://www.coguard.io/post/canada-ro…
 
This episode features Rafeeq Rehman. He discusses the need for a CISO Mindmap and 6 Focus Areas for 2022-2023: 1. Re-evaluate ransomware defenses, detection and response capabilities, perform a business impact analysis and identify critical processes, applications and data. 2. Reduce/consolidate security tools/technologies and vendors. More tools d…
 
Marriott breach third in four years, CISA alert for Maui ransomware, SMBs not leveraging MFA, free entry-level cybersecurity training, DoD bug bounty program, the illusion of short cuts, and a disturbing LinkedIn site allegedly distributing copyrighted cybersecurity books without author and publisher authorization. https://www.cyberscoop.com/marrio…
 
On this week’s Throwback Thursday from 3/15/22, Ed Carroll joins us to discuss many of the initiatives he's involved with, including Edison Marks to apply AI to help SMBs (https://edisonmarks.com/), the Carolina Cyber Center to help with information security in North Carolina and beyond (https://carolinacybercenter.com/), and an update on the RETR3…
 
As CISOs embark on implementing an Intellectual Property protection effort, they are often met with resistance, being challenged as to the necessity of the effort. Join Michael as he shares his experience in winning the support for his efforts to properly classify and secure the information and systems. To view the article from the CISO COMPASS Boo…
 
William Birchett, President of Logos Systems and creator of the vCISO Network, discusses the virtual CISO space including elements that make a successful vCISO, the biggest threat to SMBs (it's not ransomware!), and his future plans to help the vCISO field through Logos Systems, the vCISO Network, and other endeavors. --- This episode is sponsored …
 
All links and images for this episode can be found on CISO Series Should you monitor your staff? I mean reallymonitor them. Some bosses are installing screen grabbing and click tracking software to monitor employees and by most estimates employees hate it so much that half of them would quit if their supervisors installed monitoring software on the…
 
Ransom returned with gains, cyber risks in space, NIST CSF 2.0 coming, HackerOne employee claims bug bounties for themselves, bug bounty programs offer hope for cyber skills gap, and thoughts on another approach to closing that gap. https://www.dw.com/en/dutch-university-wins-big-after-bitcoin-ransom-returned/a-62337229 https://cybernews.com/editor…
 
On this episode of CISO Tradecraft, we feature Helen Patton. Helen shares many of her career experiences working across JP Morgan, The Ohio State University, and now Cisco. -Is technical acumen needed for CISOs? -Surviving organizational politics (34:45) Helen discusses The Fab 5 Security Outcomes study. Volume 1 Study - Link Volume 2 Study - Link…
 
Microsoft Office 365 Office feature could enable ransomware infection, MedusaLocker alert from CISA, California breach of gun enthusiasts' PII, human error remains the top security issue according to a SANS report, and a tribute to an extraordinary man. https://www.itsecurityguru.org/2022/06/23/microsoft-office-365-feature-could-help-ransomware-att…
 
On this episode of The New CISO, Steve is joined by Kevin DeLange, the VP and CISO of IGT, to discuss how Kevin’s love of problem-solving led him to a career in cyber security. Before joining the information security field, Kevin served in the military and completed a degree in Anthropology. Now a CISO, he reflects on how the skills he developed th…
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login