Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading
1
#208 - Insider Threat (with Shawnee Delaney)
45:25
45:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
45:25
This podcast episode of CISO Tradecraft features Shawnee Delaney, an insider threat expert, discussing insider threats in cybersecurity. Delaney, whose background includes espionage, explains how understanding human motivation and vulnerabilities is crucial for identifying and mitigating insider threats. The conversation highlights the importance o…
…
continue reading
In this engaging episode of Life of a CISO, Dr. Eric Cole challenges listeners to rethink their relationship with cybersecurity. Whether you’re a seasoned Chief Information Security Officer (CISO), aspiring to the role, or simply working in cybersecurity, the question is: do you like it, love it, or can’t live without it? Dr. Cole emphasizes that t…
…
continue reading
1
A Profession on Trial: Joe Sullivan’s Exclusive Take on the CISO Role
48:07
48:07
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
48:07
In this exclusive and unfiltered episode of The Professional CISO Show, David Malicoat hosts Joe Sullivan, current CEO of Joe Sullivan Security LLC and the former Chief Security Officer of Uber, for an in-depth conversation you won’t want to miss. Joe reflects on his groundbreaking career, his trial as the first corporate executive prosecuted for h…
…
continue reading
1
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
34:16
34:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:16
In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle’s largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insigh…
…
continue reading
1
S5E55 - A Conversation with Stephan Timler
31:58
31:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:58
Stephan Timler is an Inside Sales Rep - Strategic Accounts (Communications, Media, Technology and Manufacturing) for Splunk. As such, he is responsible for sourcing and advancing opportunities from strategic accounts using multi-channel prospecting, relationship building, analytical skills and discovery skills. We discussed the role and importance …
…
continue reading
1
Once You Show Me Your Diploma, I’ll Explain Why We Don’t Gatekeep
39:47
39:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
39:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Jimmy Benoit, vp, cybersecurity, PBS. In this episode: Starting early on security awareness The limits of gamification Technically quali…
…
continue reading
1
META Versus You: Data, Deepfakes & Dangerous Algorithms
23:09
23:09
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:09
Ever get the feeling you're being watched online? Like every click, every like, every share is feeding some invisible monster? Well, you're not wrong. This podcast explores the dark side of Meta, the company formerly known as Facebook, and how its vast empire impacts your privacy, security, and even your mental health.We'll uncover Meta's data coll…
…
continue reading
1
How to Tackle Tough Interviews and Career Transitions
41:31
41:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:31
Episode summary: In this episode of The New CISO, host Steve Moore welcomes Ryan Shaw, Director of Information Security at Bond Brand Loyalty. Ryan shares his unique journey from working in kitchens and warehousing to becoming a leader in cybersecurity. He reflects on the importance of career change, battling imposter syndrome, and the challenges c…
…
continue reading
1
The GC+CISO Connection: A GC and IT Director Share Their Perspectives on Working Together to Protect the Organization Against Cyber Risk
31:53
31:53
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:53
In this episode of the GC+CISO Connection Show, host Shawn Tuma visits with Erin Stewart, Pinnacle Group Inc.'s General Counsel and Chief of Staff, and Jonathan Merrill, Pinnacle's Sr. Director of Information Technology. Erin and Jonathan share their experience and perspectives on how they work together to address legal, cyber, and information tech…
…
continue reading
Stemcomputers: in Nederland hebben we deze tien jaar lang gebruikt. Tot de hackers kwamen! Op WICCON24 vertelde ik het verhaal van de Nederlandse stemcomputers. Wat hebben we geleerd van dit verhaal? En welke fundamentele problemen kleven aan stemcomputers? In deze aflevering vertel ik daar alles over. YouTube: https://youtu.be/1CcVXB72F7I…
…
continue reading
1
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
34:15
34:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:15
In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle’s largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insigh…
…
continue reading
1
#207 - CISO Burnout (with Raghav Singh)
46:06
46:06
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
46:06
Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Ra…
…
continue reading
1
Live Insights from N TX ISSA CSC 12: From Identity Assurance to Borderless Security
19:35
19:35
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
19:35
In this special episode recorded live from the North Texas ISSA CSC 12 Conference, host David Malicoat dives deep into the future of cybersecurity with industry trailblazers. Tune in to hear from Ryan Rowcliff of Hyper, Julio Casablanca of WWT, and Ryan Heinrich of ID.me as they share invaluable insights on identity assurance, decentralized securit…
…
continue reading
In this new episode of Life of a CISO, Dr. Eric Cole dives into the critical importance of finding alignment in your career as a CISO—seeing it as not just a job but as a true mission. Through insightful reflections, he emphasizes the mental shifts needed to thrive in cybersecurity leadership by letting go of unnecessary thoughts and focusing on pu…
…
continue reading
1
Zero-Day Exploits on the Rise: A Deep Dive into the NSA's Top Vulnerabilities of 2023
14:13
14:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
14:13
Join us as we explore the latest cybersecurity advisory from the NSA and its international partners, revealing the most exploited vulnerabilities of 2023. We break down complex technical jargon into understandable concepts, highlighting real-world examples like the Microsoft Outlook vulnerability that allows attackers to take over your system just …
…
continue reading
1
Europe eyes digital sovereignty despite pessimistic cybersecurity outlook
35:55
35:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:55
In a room of 50 CISOs, if only one said we're winning the war against cyber threats, what does it tell us? Tony Fergusson, CISO in Residence at Zscaler, and Casper Klynge, newly appointed Vice President and Head of EMEA Government Partnerships at Zscaler, unpack the quandary facing Europe and other regions where bold ambitions to adopt security and…
…
continue reading
1
Identity Security Training: How important is it? - Eric Belardo - CSP #200
30:32
30:32
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:32
Let’s talk about what CISOs look for when hiring identity and access management team members. What training and experience is most attractive for the business and team. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostories…
…
continue reading
1
Identity Security Training: How important is it? - Eric Belardo - CSP #200
30:31
30:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:31
Let’s talk about what CISOs look for when hiring identity and access management team members. What training and experience is most attractive for the business and team. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostories…
…
continue reading
1
S6E54 - A Conversation with Ryan Gallagher
29:51
29:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:51
Ryan Gallagher is Attorney at and Co-Owner of Ritter Gallagher. Ritter Gallagher advises organizations across virtually all industries on data privacy and cybersecurity compliance, planning and response, working closely with corporate in-house privacy professionals and information security teams to meet regulatory obligations and develop policies a…
…
continue reading
1
Wait, We Can Prioritize Data Privacy Before an Incident? (LIVE at Stanford University)
45:44
45:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
45:44
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Amy-Steagall-Hess, CISO, Stanford University. Joining us is Michael Tran Duff, CISO, data privacy officer, Harvard University. In this episode: Turning a mirror on zero trust Is AI coming for our…
…
continue reading
1
OWASP Top 10 for LLMs: Unveiling the Hidden Dangers of AI
27:41
27:41
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:41
Large Language Models (LLMs) are revolutionizing the world, powering everything from chatbots to content creation. But as with any new technology, there are security risks lurking beneath the surface. Join us as we explore the OWASP Top 10 for LLMs, a guide that exposes the most critical vulnerabilities in these powerful AI systems.We'll break down…
…
continue reading
1
#206 - Ira Winkler CruiseCon Founder
46:06
46:06
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
46:06
Setting Sail with Cybersecurity: Exclusive Insights from Ira Winkler on CruiseCon 2025 🛳️ Join us for an exciting episode of CISO Tradecraft as G Mark Hardy sits down with renowned cybersecurity expert Ira Winkler! Discover the groundbreaking CruiseCon 2025, the first at-sea cybersecurity conference, featuring top-tier speakers and unrivaled networ…
…
continue reading
1
From AI Challenges to CISO Advocacy: Insights from the N TX ISSA CSC 12 Conference
44:47
44:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:47
A special thank you to our sponsor Digital Era Group (https://www.digitaleragroup.com/) 🔊 Episode Summary: In this special episode of The Professional CISO Show, host David Malicoat takes you directly into the energy of the North Texas ISSA CSC 12 Annual Conference. This engaging episode highlights discussions with key cybersecurity leaders who are…
…
continue reading
1
Ransomware Insights: From Simple Extortion to Global Threat
16:47
16:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
16:47
This episode breaks down the evolution of ransomware over the past two years (December 2022 to November 2024), using a trove of cyber insights reports. Listeners will gain a clear understanding of how ransomware has transformed from basic encryption schemes to sophisticated attacks involving data exfiltration, double extortion, and specialized targ…
…
continue reading
1
The Next Frontier of Cybersecurity: Culture, Community, and the CISO’s Role
38:47
38:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:47
In this episode of The Professional CISO Show, David Malicoat interviews Cecil Pineda, Senior VP and CISO at R1, on the future of cybersecurity leadership. Known for his groundbreaking work in healthcare cybersecurity and as a co-founder of CISO XC, Cecil shares his journey from early tech enthusiast to cybersecurity leader, emphasizing the importa…
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
In this episode, I introduce Tech Talk, a new show on NowMedia TV. Dr. Byron Reese, author of The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity and Dr. Pamela Gay, Senior Scientist at Planetary Science Institute joined me on my first episode that aired in October. Get a taste for Tech Talk and catch full episodes very Th…
…
continue reading
1
Luckily, We Haven’t Had to Adapt to Any New Technologies Before AI
40:40
40:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:40
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is our sponsored guest Jadee Hanson, CISO, Vanta. In this episode: Embracing BYOAI The changing government contractor landscape Creating be…
…
continue reading
1
#205 - Wisdom from the 1st Cyber Colonel (JC Vega)
46:28
46:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
46:28
Join G. Mark Hardy on this exciting episode of CISO Tradecraft as he interviews J.C. Vega, the first cyber colonel in the United States Army. Vega shares his invaluable insights on leadership, team building, and success strategies that can transform your cybersecurity career. Plus, learn about CruiseCon 2025, Wee Dram, and how you can take your lea…
…
continue reading
1
Digital Era of Cybersecurity: Key Takeaways from the North Texas ISSA Conference
39:39
39:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
39:39
We would like to thank our sponsor Digital Era Group (www.digitaleragroup.com) Welcome to a special episode of The Professional CISO Show, recorded live at the North Texas ISSA CSC 12th Annual Conference! Join host David Malicoat as he dives into today’s hottest cybersecurity topics with industry veterans, thought leaders, and innovators. Sponsored…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives into a crucial, often-overlooked issue in cybersecurity: the complex, murky legal landscape of the internet. Unlike physical laws that have adapted over centuries to govern behaviors and boundaries within countries, laws governing cyberspace remain scattered, outdated, or even non-existent. Dr.…
…
continue reading
1
Hard Truths and Soft Skills: Randy Potts on What Makes an Exceptional CISO
38:52
38:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:52
Randy Potts joins The Professional CISO Show to discuss his unique career journey, from managing satellite communications in defense contracting to becoming a prominent CISO in the financial services industry. Randy shares insights on the importance of community among CISOs, the evolving responsibilities of the role, and practical leadership lesson…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
S6E52 - A Conversation with Lucas Gates
31:26
31:26
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:26
Lucas Gates is a Managing partner with Triton Infosec's Cyber Security Practice. In this role, he partners with clients to identify risks to modern-day threats through penetration testing, web application vulnerability testing, social engineering and network vulnerability assessments. He has vast experience in all types of technical security testin…
…
continue reading
1
We Need to Hire a Unicorn But We Only Have Budget for a Donkey
35:16
35:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:16
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Jason Shockey, CISO, Cenlar FSB. In this episode: Ground the SOC in communication Training and mentoring talent Nailing a first security…
…
continue reading
1
#204 - Shadows and Zombies in the Data Center
23:53
23:53
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:53
In this special Halloween episode of CISO Tradecraft, host G Mark Hardy delves into the lurking dangers of Shadow IT and Zombie IT within organizations. Learn about the origins, risks, and impacts of these hidden threats, and discover proactive measures that CISOs can implement to safeguard their IT ecosystems. Strategies discussed include rigorous…
…
continue reading
1
Safe Internet By Default: Spain's Approach to Protecting Children Online
35:51
35:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:51
This episode examines Spain's proactive approach to online child safety. We explore the Spanish Data Protection Agency's (AEPD) innovative framework for age verification and its emphasis on safeguarding children's rights in the digital age. COPAA, KOSA, TDPSAOleh CISO Marketplace
…
continue reading
1
Cybersecurity Crossroads: Charting the Course for the Next Administration
30:28
30:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:28
This episode explores the complex challenges and opportunities facing the U.S. in the realm of cybersecurity. Experts weigh in on a new report outlining a roadmap for the incoming administration, emphasizing the need for a comprehensive national strategy, public-private partnerships, and a robust cyber workforce.…
…
continue reading
1
North Korea's Secret Weapon: IT Workers Infiltrating the US
18:03
18:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
18:03
This podcast explores the alarming trend of North Korean IT workers infiltrating US companies, using their positions to generate revenue, evade sanctions, and potentially engage in cyber espionage. Discover the tactics they employ and how businesses can protect themselves.Oleh CISO Marketplace
…
continue reading
1
EU AI Act: Decoding the Future of AI
13:22
13:22
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
13:22
Explore the EU's groundbreaking law regulating artificial intelligence. We break down the risk-based system, banned practices, and global impact. Join us as we decode the AI Act and its implications for the future of technology.Oleh CISO Marketplace
…
continue reading
1
CISO Realities: Parrish Gunnels Talks Zero Trust & Incident Response
35:24
35:24
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:24
Episode Summary: In this episode of The Professional CISO Show, David Malicoat interviews Parrish Gunnels, Senior Vice President and CISO at Sunflower Bank, about his experiences leading cybersecurity across multiple industries. Parrish shares his thoughts on the evolution of the CISO role, why it’s essential to professionalize it, and how cybersec…
…
continue reading
In the latest episode of Life of a CISO, Dr. Eric Cole emphasizes the importance of continually evolving cybersecurity practices and re-examining fundamental principles. Unlike static industries like accounting or legal, cybersecurity is in constant flux, requiring companies to stay vigilant and adaptive. Dr. Cole draws parallels between cybersecur…
…
continue reading
1
SolarWinds Hack: Fallout and Lessons Learned
26:10
26:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
26:10
This podcast examines the SolarWinds cyber breach, a sophisticated supply chain attack that sent shockwaves through the cybersecurity landscape. It explores the attack's mechanics, how malicious code embedded in SolarWinds' Orion software updates compromised thousands of organizations, including prominent government agencies and Fortune 500 compani…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
…
continue reading
1
S6E51 - A Conversation with Heather Wallander
27:06
27:06
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:06
Are you facing or have you dealt with discrimination or retribution in the workplace? Heather Wallander is the founder of JustiProof. JustiProof is more than just an application – it's a solution for anyone facing discrimination or retaliation, especially those who no idea where or how to fight back. Even if you have never been in a toxic work envi…
…
continue reading
1
Who Knows What Evil Lurks in the Heart of Low Code/No Code? (LIVE in Los Angeles)
41:52
41:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:52
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Sasha Pereira, CISO, WASH. Joining us is Cyrus Tibbs, CISO, PennyMac. This episode was recorded live at ISSA-LA. In this episode: Building the foundation for data minimization No-code needs to be…
…
continue reading
1
#203 - Be SOCcessful with the SOC-CMM
17:11
17:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
17:11
Unlocking SOC Excellence: Master the SOC Capability Maturity Model Join host G Mark Hardy in this compelling episode of CISO Tradecraft as he explores the revolutionary SOC Capability Maturity Model (SOC CMM) authored by Rob van Os. This episode is a must-watch for CISOs, aspiring CISOs, and cybersecurity professionals aiming to optimize their Secu…
…
continue reading