CISO สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a CISO. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue with Zscaler's expert team of CISO security practitioners. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces security frict ...
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
 
Loading …
show series
 
We've all suffered through horrible meetings that felt like a total waste of time. As a security leader, you'll be convening your fair share of meetings with your staff. Don't be "that boss" who can't run an effective meeting. This episode shows ways you can ensure your meetings are both efficient and effective, result in actionable tasking, and ke…
 
About Chris Morales: We’re here this week with an AI and threat modeling guru, Chris Morales! He’s Netenrich’s FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company’s security solutions and processes. Chris has 20-something years of information security experience, having …
 
In our fifth episode of "CISO Platform Security Show", our host and Founder of CISO Platform Bikash Barai spoke with Igors Konovalovs, Director Global Solution Specialist, Mandiant, on Reference Architecture For Intelligence-Led BAS And Control Validation: Gaps in testing and validation What is BAS (Combining Intelligence with BAS) Reference Archit…
 
Every organization must be able to respond to an attack quickly. Join this podcast to learn key steps to implement in an incident response plan without breaking the bank. Sam approaches this issue by simplifying incident response into the 3 ‘P’s. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://secur…
 
You don’t want anything to happen, but you also want security to somehow to calculate ROI. Maybe the ROI could be calculated from actual sales that security allowed to actually happen. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is…
 
Jerich Beason is a cyber security hobbyist turned professional who holds Bachelors and Masters degrees in Cyber Security. He has served in progressive roles at some of the most respected companies within the cyber security industry including Lockheed Martin, RSA and Deloitte where he was a trusted advisor to executives within the federal government…
 
On today’s episode we are joined by Benjamin Edelen, former CISO of the City of Boulder. Leading with people first strategy, he aims to serve and protect the community and discusses his transition in and out of the CISO role. Starting from Scratch 5 years ago, Edelen was chosen to be the first CISO of the City of Boulder. With no security programmi…
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Mathew Newfield, CISO at Unisys Unisys delivers secure digital solutions to businesses and governments. Unisys is built on over 145 years of game-changing innovation. Along the way, Unisys made the world a better place by bringing technological innovation to busi…
 
In our fourth episode of "CISO Platform Security Show", our host and Founder of CISO Platform Bikash Barai spoke with Anthony Ng, VP Systems Engineering, APAC; Agnidipta Sarkar CISO Biocon; Rejo Thomas CISO, Exide Life Insurance; Prasenjit Das CISO TCS; Sudarshan Singh CISO, Capgemini & A V S Prabhakar Chief Risk & Compliant Officer Zeta, on How To…
 
In our 31 July 2021 Episode 42, Risky Business, we covered the basics of risk and risk assessment. This part 2 episode gets into the practical application of risk management using the FAIR model, or Factor Analysis of Information Risk. We explain key risk terminology and walk through examples of how to express risk using this model, as well as crea…
 
This week we chat with the guy who served as the first CISO for the state of Michigan, Dan Lohrmann in May 2002. Today he serves as Chief Security Officer at Security Mentor, Inc. He has advised senior leaders at the White House, National Governors™ Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security…
 
All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them. Join this podcast to learn how to bring company groups together and form your own DEFCON-type event in-house or in partnership with other organizations. To…
 
All links and images for this episode can be found on CISO Series It’s imperative we speak to him. We want to make sure they landed safely. And if he has some available time, maybe we can show him our slide deck. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Vent…
 
AJ Yawn joins us for this episode of the CISO Dojo Podcast. AJ Yawn is a seasoned cloud security professional that possesses over a decade of senior information security experience with extensive experience managing a wide range of cybersecurity compliance assessments (SOC 2, ISO 27001, HIPAA, etc.) for a variety of SaaS, IaaS, and PaaS providers. …
 
Have you ever faced a crisis? How well did you do? You should always want to improve your skills in case another happens. On the 20th anniversary of 9/11, G. Mark Hardy shares some of his experiences as the on-scene commander for the military first responders at the World Trade Center, and expands that into a set of skills and attributes that you c…
 
This episode includes quite the pair – Greg Hatch, CEO, and Dan Ward, CTO, of a new cybersecurity startup focused on Continuous Security Improvement™ (CSI). As serious as cybersecurity is for everyone and businesses, Greg still finds time to keep a sense of humor and have a positive impact on others. Dan is more than the technical brains behind Sae…
 
Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the cybersecurity program for implementing these strategies in advance. Join this podcast to understand how teams benefit from relationships with communication and public r…
 
All links and images for this episode can be found on CISO Series I know your friends say they use excellent passwords, but they don't take the time and care we put into choosing the right combination of letters, numbers, and special characters that's unique to your personality. Once your friends and the dark web have a chance to see them, they'll …
 
Traditional risk models focus on calculating loss frequency and magnitude, but don't go far enough in terms of modeling the most important assets in our organization, known as "crown jewels." This episode of CISO Tradecraft is a fascinating interview with the CEO and founder of a startup focusing on crown jewel analysis -- Roselle Safran. We'll loo…
 
On today’s episode we are joined by Jerich Beason, senior vice president and CISO at Epiq. He delves into advice on networking, knowing which job is right for you, and how to build trust as a CISO. Advice to Younger Self Beason says he would have spent more time on relationships. While he had relationships, he wishes he had done more to maintain th…
 
In our Third episode of "CISO Platform Security Show", our host and Founder of CISO Platform Bikash Barai spoke with Dan Lohrmann, CSO and Chief Strategist at Security Mentor Inc and a well known author and cybersecurity professional, on how to effectively run a cyber crisis drill with the US Government and tabletops for enterprise board members. W…
 
Les Correia, Global Head of Application Security at The Estée Lauder Companies – Powerful Intriguing Force! This week we welcome the worldly Les Correia, who is the Global Head of Application Security at The Estée Lauder Companies Inc. In a previous life he held Senior/Advisory roles providing thought leadership at AT&T, Lucent, INS (now BT Profess…
 
What's the strangest thing you've encountered with a new hire? In this episode we talk about the time an evil twin with no experience managed to get an IT position and how scammers with no experience are landing multiple work from home tech jobs just to collect a paycheck until they get terminated. The rabbit hole goes even deeper with fake sites b…
 
The Zscaler CISO team is joined by their esteemed colleague, Sahir Hidayatullah, to investigate the capability known in the cybersecurity industry as Active Defense. The Zscaler CISO team has been actively engaged with customers on various threat prevention and detection strategies for SecOps maturity. The problem in this area today is apparent: al…
 
Rachel, CEO of SocialProof Security, delves into the inner-workings of social engineering exploits where she leverages her background in neuroscience and behavioral psychology to exploit the unpatchable vulnerability that is human nature. This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!…
 
All links and images for this episode can be found on CISO Series We've heard the question "How secure are we?" many times, and we know what it really means. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Kevin Morrison, CISO, Alaska Air. Th…
 
Containers are a lightweight technology that allows applications to deploy to a number of different host Operating Systems without having to make any modifications at all to the code. As a result, we're been seeing a big increase in the use of Docker, Kubernetes, and other tools deployed by enterprises. In this episode, we'll cover the fundamentals…
 
This week captures the one and only, James Azar, CISO – CISSP, Host of CISO Talk Podcast and CyberHub Podcast. Hopped up on his daily espressos he brings passion, energy and opinions to share about his journey into cybersecurity and views on leadership. As much as he challenges all of us, not just on cybersecurity, but on geopolitical issues, he is…
 
It seems CISOs are typically lamenting that the security budgets are insufficient. While this can represent a significant problem in achieving information security goals, what happens when you get the funding you asked for and asked to spend it in less time than expected? Join this session for an investment lesson learned you won’t want to miss! To…
 
All links and images for this episode can be found on CISO Series What questions should we be asking of a consultant's referrals to see if they're really worth the money they're trying to overcharge us? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Ira Winkler (@irawinkler), CISO,…
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Steve Zalewski, CISO at Levi Strauss & Co. Levi Strauss & Co. is an American clothing company known worldwide for its Levi's brand of denim jeans. It was founded in May 1853 when German immigrant Levi Strauss moved from Buttenheim, Bavaria, to San Francisco, Cali…
 
Join CISO Tradecraft for a fascinating discussion on how to build cyber traps for the bad guys that really work. By creating a deceptive environment that "booby-trap" your networks with fake services, enticing resources, and make-believe traffic, we can create a high-fidelity, low-noise intrusion sensor system -- no legitimate user would ever try t…
 
On today’s episode we are joined by Dr. Tim Proffitt, managing director of information security at a Houston based company as well as a professor at several institutions. He discusses his own education as well as his experience educating others and how this impacts his job. Advice to Younger Self Young Tim wasted a lot of time doing unnecessary thi…
 
The CISO Diaries is focused on the human side of CISO leadership. Not one path is alike and that draws the allure of getting to know those that are keeping businesses and people protected. This introduction episode is a kick off to get to know hosts, Leah McLean and Syya Yasotornrat. Guests and audiences will experience authenticity, thoughtful con…
 
This week we have the pleasure of having Mary N. Chaney, someone who's had one heck of a journey through our industry. Mary is a former Federal Bureau of Investigation (FBI) Special Agent where she investigated cybercrime and served as their Information Systems Security Officer. Currently, she practices cyber law for her own firm, specializing in h…
 
For many organizations, large and small, it would be impractical to “skill up” to manage all aspects of cybersecurity. Managed Security Service Providers provide many different services. Join this podcast to learn how to work with the MSSP to ensure that the organization is obtaining the most value. To view the article from the CISO COMPASS Book th…
 
All links and images for this episode can be found on CISO Series You think it's easy carrying around the burden of being so perfect all the time? It's tough to carry that responsibility to tell others what they need to do. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partn…
 
On today’s episode, we bring in Scott Fairbrother to help tackle key questions with Third Party Risk Management: How do you identify which vendors pose the highest risk to your business? How do you see which vendor’s security controls protect against threats? How do you validate their risk profiles by scanning, dark web monitoring or other techniqu…
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Sameer Sait, CISO at Amazon Whole Foods Amazon Whole Foods Market, Inc. is an American multinational supermarket chain headquartered in Austin, Texas, which sells products free from hydrogenated fats and artificial colors, flavors, and preservatives…
 
We need the organization to support the cybersecurity initiatives and thus we try to influence the organization to support these goals for the protection of the organizational assets. If we are failing, is it that the organization did not ‘get it’ or was it our approach? Join this podcast to learn how to achieve that buy-in. To view the article fro…
 
All links and images for this episode can be found on CISO Series We know we've got to say something about this breach, but geez, the details are really sordid and it would just be easier if we could just wrap it up with one giant "oops." You cool with that? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mik…
 
Cyber Threat Intelligence is an important part of an effective CISO arsenal, but many security leaders don’t fully understand how to optimize it for their benefit. In this show, we examine why cyber threat intelligence is vital to fielding an effective defense, discuss the intelligence cycle, examine the four types of threat intelligence, and featu…
 
On today’s episode, Tyler Farrar, CISO for Maxar Technologies, joins us to discuss the ins and outs of threat intelligence. He delves into the importance of not assuming malicious intent and his approach to compliance versus security. Introduction to Tyler Farrar Maxar Technologies is a satellite imagery and satellite manufacturing company. Farrar …
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Patrick Benoit VP Global Cyber Governance Security Officer at CBRE. CBRE is the world’s largest commercial real estate services and investment company, with the #1 global market position in leasing, property sales, outsourcing, property management and valuation. …
 
Kerissa Varma, Group Chief Information Security Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent, discusses the cybersecurity skills shortage and her initiative to recruit brilliant minds from across an array of fields who have skill sets applicable to cybersecurity, but they might not even…
 
In this episode, we take a deep dive into that four-letter word RISK. Risk is measurable uncertainty. As a component of Governance, Risk, and Compliance (GRC), risk management is an important part of a security leader's responsibility. Risk assessment is conducted for a number of reasons, and measuring risk is an important component of effectively …
 
A recent global research report conducted by Cybereason, titled "Ransomware: The True Cost to Business", revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and littl…
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login