Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
The Cybersecurity Collaborative is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.securityweekly.com/csc.
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a CISO. Cybersecurity Futurist. Speaker. Author. Mentor. For more than two decades, Jaime C. has served as a Trusted Advisor to Fortune Global 500 organizations on the future of technology and cybersecurity and how it will impact our lives. CSO Magazine called him “a man who’s barreling down a road that most people are still trying to merge onto” regarding his visionary leadership in cyberse ...
The Virtual CISO Moment with Greg Schaffer dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no catchy music, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Quick strike and wrap up audio-only episodes drop Mondays and Fridays; ...
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, welcome to the show.Our moderator, John Verry, chat ...
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
Podcast by Chad Hayden
The official EC-Council CISO Forum podcast.
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
One of the most challenging positions within an org is the Chief Information Security Officer. In this podcast CISO and Host James Azar interviews his peers in the CISO role on how the role has developed, how the cybersecurity pracyitioners handle the various challenges and leadership qualities. In this podcast you will hear about the latest best practices, solving complex challenges and building a secure enterprise. Tune in for new episodes. This podcast is part of the CyberHub Podcast Medi ...
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
S
Security Unlocked: CISO Series with Bret Arsenault


Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us! Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
T
The CISO Platform Security Show In Association With FireCompass


CISO Platform is the world's first online community solely dedicated to information senior security executives (CISO/CIO/CSO/CTO/Directors etc). The vision of the platform is to enable the senior security executives to share, learn, and network with other peers.
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
Smarter CISOs — the cybersecurity podcast designed to help you manage smarter, reduce your organization’s cyber risk, and learn best practices from cyber experts. "Smarter CISOs" is made possible by Aware Force. Aware Force engages employees in cybersecurity with newsletters and multimedia content, all branded and customized for your organization. Employees stay alert to cyber threats, protecting their families and keeping your organization safer throughout the year. Aware Force can dramatic ...
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, August 8, 2022
12:39
12:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
12:39
Critical flaws in Emergency Alert System and in some Cisco SOHO routers, new IoT threat, CISA adds Zimbra vulnerability to its Known Exploited Vulnerabilities Catalog, and what you need to do to land a six-figure cybersecurity job. https://www.threatshub.org/blog/warning-critical-flaws-found-in-us-emergency-alert-system/ https://www.theregister.com…
C
CISO Tradecraft


1
#90 - A CISO’s Guide to Pentesting
16:00
16:00
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
16:00
A CISO’s Guide to Pentesting References https://en.wikipedia.org/wiki/Penetration_test https://partner-security.withgoogle.com/docs/pentest_guidelines#assessment-methodology https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies https://www.pcisecuritystandards.org/documents…
Leadership is not about title or position. It is about influence. Leaders are not born; they are made. What are the fundamental traits of Leadership? Here are some qualities that I feel are important for Leadership in the 21st Century.โดย Jaime C.
C
CISO Stories Podcast


1
CSP #81 - Using MindMaps to Strengthen Cybersecurity - Michael Wilcox
30:09
30:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
30:09
CISOs, security leaders and their teams must consume a large amount of information from many sources to remain effective. How does the CISO organize unstructured information? How does the CISO brainstorm? How does the CISO collaborate? Mind Mapping is a very effective tool to generate ideas quickly and was also used to create the CISO COMPASS book!…
C
CISO Series Podcast


1
When Does an Exaggeration Become a Lie?
38:32
38:32
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
38:32
All links and images for this episode can be found on CISO Series We explore the world of dishonesty in cybersecurity. Practitioners know that marketers will stretch the truth, but how far are we willing to let that go? Isn't this industry built on trust? Can cybersecurity continue to thrive if we can't trust each other? This week’s episode is host…
T
The Virtual CISO Podcast


1
How to Measure the Value of Information Security
30:13
30:13
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
30:13
Most recognize the value preservation in cybersecurity. But forward thinking professionals also see the value creation in having a secure information posture. Cybersecurity is the foundation of preserving sensitive data and providing peace of mind but does it create value for the organization and if so, how do we measure that value? Tracking the re…
T
The New CISO


1
Train the Way You Fight, Fight the Way You Train with Dr. Adrian Mayers
43:20
43:20
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
43:20
In this episode of The New CISO, Steve is joined again by Dr. Adrian Mayers, VP and CISO at Premera Blue Cross, to dig deeper into his knowledge of insider threat management and intelligence. As an experienced CISO, Dr. Adrian understands the difficulties of a cyber security career. With this in mind, he shares the day-to-day obstacles of the profe…
T
The CISO Diaries


1
Dan DeCloss, Founder, President and CEO at PlexTrac; Perpetual Asker of Questions
48:01
48:01
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
48:01
Daniel DeCloss is Founder and CEO of PlexTrac and has over 15 years of experience in Cybersecurity. Dan started his career in the Department of Defense then moved to private sector consulting where he worked at companies like Veracode as a Principal Consultant in Penetration Testing. He also served as a Principal Security Engineer for the Mayo Clin…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, August 5, 2022
12:20
12:20
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
12:20
Motherboard malware that survives OS reinstall, mobile apps leaking Twitter API keys, TVA EDR not OK, Defender defends against ransomware better, ransomware big brands migrating to more smaller bands, and Ukraine shutters major Russian bot network. https://www.pcmag.com/news/malware-that-can-survive-os-reinstalls-found-on-asus-gigabyte-motherboards…
T
The Virtual CISO Moment


1
Throwback Thursday for Thursday, August 4, 2022 - A Conversation with Chris Bedel
21:16
21:16
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
21:16
On this week's Throwback Thursday from April 12, 2022, Chris Bedel, President and CEO of Bedel Security (bedelsecurity.com) talks about how the virtual CISO fits in to, compliments, and enhances financial institutions' information security program and posture. He also touches on history and future of the virtual CISO. If you're a virtual CISO for f…
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E32 - A Conversation with Steve Mallard
26:22
26:22
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:22
Steve Mallard has over 20 years in Information Technology; is a Master Teacher in Information Technology/Infrastructure Management and Information Systems Manager at Tennessee College of Applied Technology - Shelbyville; is a private consultant for government organizations, higher-ed, and private corporations, a technical writer, and a public speak…
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, August 1, 2022
14:39
14:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
14:39
More Pegasus, Chrome extension steals emails and creds, increase of critical infrastructure attacks, Robin Banks PhaaS, more Log4Shell, and top security news websites. https://www.reuters.com/technology/exclusive-eu-found-evidence-employee-phones-compromised-with-spyware-letter-2022-07-27/ https://www.bleepingcomputer.com/news/security/cyberspies-u…
C
CISO Tradecraft


1
#89 - Connecting the Dots (with Sean Heritage)
46:13
46:13
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
46:13
I've been a fan of Sean Heritage for years when I first discovered his blog, "Connecting the Dots." Today I have the privilege to listen to his thoughts on cybersecurity careers in both the military and the "real world," how to prioritize your life, what careers goals you should (and should NOT) aim for, and the importance of great leadership. Book…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, July 29, 2022
17:21
17:21
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
17:21
Arrests in nuclear plant attack, RaaS providers adjust business plans, new cybersecurity House legislation passes with significant bipartisan support, how to make risk assessments better, PrestaShop critical vulns exploited, new CMMC AB draft assessment guide, why it's a good idea to establish a solid relationship with a recruiter (e.g. it may redu…
T
The Virtual CISO Moment


1
Throwback Thursday for July 28, 2022 - A Conversation with Bob Quandt
20:05
20:05
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
20:05
On his week's Throwback Thursday from April 5, 2022, Bob Quandt, owner of Bullseye Compliance (https://bullseyecompliance.com) joins VCM for a conversation that ranges from issues and trends in SMB security, entrepreneurship and making a difference, fitness and stress management, application of military experience to infosec, and more! --- This epi…
T
The CISO's Gambit


1
The power of prediction: Harnessing AI and ML for cybersecurity
39:15
39:15
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:15
Get up to speed on the art and science of training models, big data sets, and limitations and possibilities for AI in cybersecurity and beyond. Zscaler Vice President of AI and Machine Learning Howie Xu has been a pioneer in applying AI and ML to cybersecurity since the late 1990s. In this episode, he is joined by VP and CISO AMS - Brad Moldenhauer…
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E31 - Optimizing Your vCISO
28:10
28:10
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:10
In this special Wednesday episode, from the CU Intersect Conference in Houston Texas July 19, 2022, vCISO Services, LLC Principal Greg Schaffer discusses how credit unions and other small and midsized businesses can optimize their vCISO to maximize their information security posture. --- This episode is sponsored by · Anchor: The easiest way to mak…
I learned a lesson from that CIO that I will never forget. We need to help others in their journey, because we were all once beginners too! I have always helped give back to others since then, because I want to help them in their journey just like someone helped me.โดย Jaime C.
C
CISO Stories Podcast


1
CSP #80 - How to Talk With Your Lawyer - Mark Daryl Rasch
24:15
24:15
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:15
A Lawyer can be the CISOs best friend and advocate for cybersecurity investments. Are you frustrated with a lawyers answer of, “it depends?” Lawyers have a different thought process than many CISOs when apply the law. Join this session from a notable cybersecurity lawyer as to the differences in language and how to best take advantage of the legal …
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E30 - A Conversation with Anthony Scarola
23:25
23:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:25
Anthony Scarola is an IT Governance, Risk, and Compliance (GRC) expert; has many years in cybersecurity; is a U.S. Army veteran; holds the CISSP; and is a virtual CISO. And he's writing a security book! Listen to his wisdom as it pertains to risk management and learn one mistake may make when discussing risk with the c suite and board of directors.…
C
CISO Series Podcast


1
Yuck! Now Everyone Has Touched My Data.
33:47
33:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
33:47
All links and images for this episode can be found on CISO Series What can you do when your data keeps passing through different third party applications? Your data is being accessed and manipulated by more people, more applications, and more security policies that may not be aligned with your security policies. It seems once it leaves your environ…
T
The Virtual CISO Podcast


1
Understanding NIST’s Secure Software Development Framework
45:54
45:54
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
45:54
What exactly is a Software Development Life Cycle, and how does NIST’s Secure Software Development Framework impact that cycle and your organization? Of note, the SSDF will definitely impact you if your software is used by the US Government and will likely impact you even if it isn’t. There are a few choice practices that can help make sense of the…
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, July 25, 2022
10:52
10:52
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
10:52
Rogers outage cause, 54 million Twitter accounts' information for sale for $3K, ransomware update, Entrust breached, an startups without a CISO are at a disadvantage - plus statistics, and why you need to both understand their context and source, using a well-known example of an information security "statistic" in the last article. https://twitter.…
C
CISO Tradecraft


1
#88 - Tackling 3 Really Hard Problems in Cyber (with Andy Ellis)
47:11
47:11
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
47:11
This episode of CISO Tradecraft, Andy Ellis from Orca Security stops by to talk about three really hard problems that CISOs have struggled with for decades. How do we build a phishing program that works? How do we build a 3rd party risk management program that isn't a paper exercise? How do we actually get good at patch management? Stick around for…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, July 22, 2022
11:30
11:30
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
11:30
Ransomware infections and payments decline, CISO urges patching Windows 11 patch bug, more Chrome fixes, stress in cybersecurity, possibly regulating BGP, and commentary on the CU Intersect conference. https://www.darkreading.com/threat-intelligence/ransomware-attempts-flag-as-payments-also-decline https://threatpost.com/cisa-urges-patch-11-bug/180…
T
The Virtual CISO Moment


1
Throwback Thursday for July 21, 2022 - A Conversation with Chuck Sirois
23:58
23:58
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:58
On this Throwback Thursday episode from March 29, 2022 - Email remains the most common vector for criminals to exploit. Chuck Sirois discusses how PhishFacts (https://phishfacts.com) can help SMBs identify misconfigured email configurations that criminals may leverage.--- This episode is sponsored by · Anchor: The easiest way to make a podcast. htt…
C
CISO Stories Podcast


1
CSP #79 - Insider's View of the CISO Search - Joyce Brocaglia
31:35
31:35
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:35
Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today. T…
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E29 - A Conversation with J.J. Powell
25:29
25:29
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:29
J.J. Powell of Cyber Defense Group (https://www.cdg.io/) discusses his career journey from police officer to system administrator to CISO and now as leading virtual CISO services. He is also a pivotal component into my decision to leave corporate and become an independent vCISO - listen to find out what was "the straw that broke the camel's back" f…
C
CISO Series Podcast


1
“Bad” Security Practices That Really Aren’t All that Bad
36:01
36:01
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
36:01
All links and images for this episode can be found on CISO Series If they can find flaws, security professionals are quick to label it as bad security behavior. But often, what is marked as "bad" may have problems, but when looked at from a reducing risk perspective it's actually a very good security behavior. This week’s episode is hosted by me, D…
T
The Virtual CISO Podcast


1
US Gov. Cybersecurity Roadmap: Where it came from and Where is it Going?
58:09
58:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
58:09
Today, information is worth more than riches. The new currency is data. With this being true, the state of cybersecurity within the upper branches of the government was shockingly under-prepared. In this episode, I speak with Mark Montgomery, the former Executive Director of the Cyber Solarium Commission, about the report the commission published i…
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, July 18, 2022
10:57
10:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
10:57
Shodan special offer, banks need to implement best practices, five key things from smal org CISOs, Netwrix Auditor bug, and on the road challenges. https://www.shodan.io/ https://fintechmagazine.com/banking/banks-need-best-practices-to-fight-rising-cyberattacks https://thehackernews.com/2022/07/5-key-things-we-learned-from-cisos-of.html https://the…
C
CISO Tradecraft


1
#87 - From Hunt Team to Hunter (with Bryce Kunz)
43:47
43:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
43:47
On this episode of CISO Tradecraft, Bryce Kunz from Stage 2 Security stops by to discuss how offensive cyber operations are evolving. Come and learn how attackers are bypassing MFA and EDR solutions to target your cloud environment. You can also hear what Bryce recommends to beat the bear that is Ransomware. References:Link How Attackers Bypass MFA…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, July 15, 2022
13:27
13:27
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
13:27
Phishing campaign bypasses MFA, healthcare debt collection agency ransomware breach 1.9 million records, Log4Shell endemic, criminal hackers targeting Indian students, Florida Atlantic University received grant, and my cybersecurity path, including learning Python? https://threatpost.com/large-scale-hishing-bypasses-mfa/180212/ https://www.theregis…
T
The New CISO


1
Trusting Your Tech to Tackle Human Problems with Dr. Adrian Mayers
41:58
41:58
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
41:58
In this episode of The New CISO, Steve is joined by Dr. Adrian Mayers, VP and CISO at Premera Blue Cross, to discuss what to consider when interviewing for CISO positions and how to trust your tech in the security field. Since fifth grade, Dr. Adrian Mayers has had a passion for computers. Now a CISO, he shares the role computers play in a security…
T
The Virtual CISO Moment


1
Throwback Thursday for July 14, 2022 - The CISSP and the Virtual CISO
14:51
14:51
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
14:51
On this week's Throwback Thursday from 3/22/2022 - The Certified Information Systems Security Professional, or CISSP, is considered by some to be the pinnacle of information security professional certifications, on par with the CPA. But why is that, and what differentiates it from other certifications? And why is it important for virtual CISOs to h…
C
CISO Stories Podcast


1
CSP #78 - Solarwinds From the Inside: The Breach and the Aftermath - Tim Brown
29:54
29:54
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
29:54
The Solarwinds breach raised the visibility of Software supply chain risks, as many organizations employ third party software with potential access to sensitive information. Join the CISO of Solarwinds as he discusses what happened during the attack, the lessons learned, the mitigations employed after the attack, and excellent, transparent actions …
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E28 - A Conversation with Johanan (Jo) Dixon
24:30
24:30
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:30
Johanan (Jo) Dixon talks about life in the Marine Corps, as an MMA amateur fighter, and as a Title boxing instructor, and how these helped prepare him for his journey to cybersecurity and his current role with Halcyon (https://www.halcyon.ai/). And he's starting up a new podcast! --- This episode is sponsored by · Anchor: The easiest way to make a …
C
CISO Series Podcast


1
How Many Forms of ID Do I Need to Buy This Gift Card?
31:35
31:35
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:35
All links and images for this episode can be found on CISO Series Getting someone to purchase gift cards is a popular vector for theft. Given that the gift card theft technique is so well known, many online sites have put up additional barriers to purchasing gift cards. Trying to buy them legitimately has become increasingly difficult. This week’s …
T
The Virtual CISO Podcast


1
Confronting the Wild West of Database Security
47:04
47:04
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
47:04
Don’t wait for an emergency; secure your database correctly right out of the gate. Think of everything outside of your database as the wild west. What can you do to create the most controlled environment possible for all of your most sensitive data? I invited Robert Buda, President of Buda Consulting, Inc, and an expert in database technology, onto…
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, July 11, 2022
18:04
18:04
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
18:04
Rogers service interruption, hacking a Honda, the future of certifications, and Monday thoughts. https://www.reuters.com/business/media-telecom/rogers-communications-services-down-thousands-users-downdetector-2022-07-08/ https://blog.cloudflare.com/cloudflares-view-of-the-rogers-communications-outage-in-canada/ https://www.coguard.io/post/canada-ro…
C
CISO Tradecraft


1
#86 - The CISO MindMap (with Rafeeq Rehman)
45:24
45:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
45:24
This episode features Rafeeq Rehman. He discusses the need for a CISO Mindmap and 6 Focus Areas for 2022-2023: 1. Re-evaluate ransomware defenses, detection and response capabilities, perform a business impact analysis and identify critical processes, applications and data. 2. Reduce/consolidate security tools/technologies and vendors. More tools d…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, July 8, 2022
16:47
16:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
16:47
Marriott breach third in four years, CISA alert for Maui ransomware, SMBs not leveraging MFA, free entry-level cybersecurity training, DoD bug bounty program, the illusion of short cuts, and a disturbing LinkedIn site allegedly distributing copyrighted cybersecurity books without author and publisher authorization. https://www.cyberscoop.com/marrio…
T
The Virtual CISO Moment


1
Throwback Thursday for July 7, 2022 - A Conversation with Ed Carroll
19:07
19:07
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:07
On this week’s Throwback Thursday from 3/15/22, Ed Carroll joins us to discuss many of the initiatives he's involved with, including Edison Marks to apply AI to help SMBs (https://edisonmarks.com/), the Carolina Cyber Center to help with information security in North Carolina and beyond (https://carolinacybercenter.com/), and an update on the RETR3…
C
CISO Stories Podcast


1
CSP #77 - Protecting Your Intellectual Property - Michael Boucher
23:16
23:16
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:16
As CISOs embark on implementing an Intellectual Property protection effort, they are often met with resistance, being challenged as to the necessity of the effort. Join Michael as he shares his experience in winning the support for his efforts to properly classify and secure the information and systems. To view the article from the CISO COMPASS Boo…
T
The Virtual CISO Moment


1
The Virtual CISO Moment S4E27 - A Conversation with William Birchett
26:26
26:26
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:26
William Birchett, President of Logos Systems and creator of the vCISO Network, discusses the virtual CISO space including elements that make a successful vCISO, the biggest threat to SMBs (it's not ransomware!), and his future plans to help the vCISO field through Logos Systems, the vCISO Network, and other endeavors. --- This episode is sponsored …
C
CISO Series Podcast


1
Why Does Your Privacy Matter If I’m Paying You?
34:43
34:43
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:43
All links and images for this episode can be found on CISO Series Should you monitor your staff? I mean reallymonitor them. Some bosses are installing screen grabbing and click tracking software to monitor employees and by most estimates employees hate it so much that half of them would quit if their supervisors installed monitoring software on the…
T
The Virtual CISO Moment


1
VCM Quick Strike for Monday, July 4, 2022
14:15
14:15
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
14:15
Ransom returned with gains, cyber risks in space, NIST CSF 2.0 coming, HackerOne employee claims bug bounties for themselves, bug bounty programs offer hope for cyber skills gap, and thoughts on another approach to closing that gap. https://www.dw.com/en/dutch-university-wins-big-after-bitcoin-ransom-returned/a-62337229 https://cybernews.com/editor…
C
CISO Tradecraft


1
#85 - The Fab 5 Security Outcomes Study (with Helen Patton)
44:20
44:20
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
44:20
On this episode of CISO Tradecraft, we feature Helen Patton. Helen shares many of her career experiences working across JP Morgan, The Ohio State University, and now Cisco. -Is technical acumen needed for CISOs? -Surviving organizational politics (34:45) Helen discusses The Fab 5 Security Outcomes study. Volume 1 Study - Link Volume 2 Study - Link…
T
The Virtual CISO Moment


1
The Virtual CISO Moment Wrap Up for Friday, July 1, 2022
12:08
12:08
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
12:08
Microsoft Office 365 Office feature could enable ransomware infection, MedusaLocker alert from CISA, California breach of gun enthusiasts' PII, human error remains the top security issue according to a SANS report, and a tribute to an extraordinary man. https://www.itsecurityguru.org/2022/06/23/microsoft-office-365-feature-could-help-ransomware-att…
T
The New CISO


1
Solving Security Puzzles with Kevin DeLange
37:43
37:43
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
37:43
On this episode of The New CISO, Steve is joined by Kevin DeLange, the VP and CISO of IGT, to discuss how Kevin’s love of problem-solving led him to a career in cyber security. Before joining the information security field, Kevin served in the military and completed a degree in Anthropology. Now a CISO, he reflects on how the skills he developed th…