CISO offentlig
[search 0]
Mer

Download the App!

show episodes
 
T
The New CISO

1
The New CISO

Steve Moore

Unsubscribe
Unsubscribe
En gång i månaden
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
C
CISO Tradecraft

1
CISO Tradecraft

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
Varje vecka
 
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
The Cybersecurity Collaborative is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.securityweekly.com/csc.
 
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
 
C
CISO Insights

1
CISO Insights

Jaime C.

Unsubscribe
Unsubscribe
En gång i månaden
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
 
The Virtual CISO Moment with Greg Schaffer dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Quick strike and wrap up audio-only episodes drop Mondays and Fridays; Throwback Thursd ...
 
C
CISO's Secrets

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
En gång i månaden
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
 
C
CISO Talk

1
CISO Talk

The CyberHub Podcast

Unsubscribe
Unsubscribe
En gång i månaden+
 
One of the most challenging positions within an org is the Chief Information Security Officer. In this podcast CISO and Host James Azar interviews his peers in the CISO role on how the role has developed, how the cybersecurity pracyitioners handle the various challenges and leadership qualities. In this podcast you will hear about the latest best practices, solving complex challenges and building a secure enterprise. Tune in for new episodes. This podcast is part of the CyberHub Podcast Medi ...
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us! Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
 
S
Smarter CISOs

1
Smarter CISOs

Smarter CISOs

Unsubscribe
Unsubscribe
En gång i månaden+
 
Smarter CISOs — the cybersecurity podcast designed to help you manage smarter, reduce your organization’s cyber risk, and learn best practices from cyber experts. "Smarter CISOs" is made possible by Aware Force. Aware Force engages employees in cybersecurity with newsletters and multimedia content, all branded and customized for your organization. Employees stay alert to cyber threats, protecting their families and keeping your organization safer throughout the year. Aware Force can dramatic ...
 
T
The CISO Diaries

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
En gång i månaden+
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
 
Loading …
show series
 
Building Cloud Native Applications can bring about many operational and security problems. Today, we sat down with an expert in this field to talk about building cloud native applications, and deploying applications that are secure in the cloud. This episode features Fausto Lendeborg, Co-Founder & CCO, from Secberus, who provides answers and explan…
 
Gartner says, “Organizations who recognize the value of a security leader but can’t afford a traditional CISO should consider virtual options. “With a current total cash compensation ranging from $208K to $337K, hiring a chief information security officer (CISO) may not be in the budget for small or midsize organizations, especially those that aren…
 
Cheri Hotman of the Hotman Group (https://hotmangroup.com) is a CPA, has her MBA, and is a CISSP - a combination rare in information security. She discusses her experiences and lessons learned managing a business providing quality virtual CISO services to a variety of clients, including navigating "the land of 1000 piranhas"! --- Send in a voice me…
 
All links and images for this episode can be found on CISO Series. That headline is not a joke. An actual job listing on LinkedIn requested just that. We're all hoping this was an error. Regardless, the community response to it was truly overwhelming, speaking much to the frustration of green and junior cybersecurity job seekers who are truly looki…
 
Are You Ready To Win Your First CISO role? Apply these techniques into your resume and interview process so both recruiters and hiring managers will offer you the job. This show focuses on: Highlighting the Different Types of CISO Roles Showing how to progress from a Senior Director Role into a Fortune 100 CISO Resume Tricks and Tips that get you n…
 
In this episode of The New CISO, Steve is joined by Demetrios “Laz” Lazarikos, three-time CISO and Co-founder of Blue Lava Security. A naturally curious child, Laz became interested in technology early, prompting his life-long love of learning. Today, he shares how different lessons from childhood and the airforce led to his fulfilling CISO career.…
 
Atento is a global provider of customer relationship management (CRM) and business-process outsourcing (BPO) services, including customer care, sales, collections, back office and technical support. Atento is the largest provider in Latin America, and among the top five providers globally, based on revenues. CISO's Secrets Podcast is powered by MIN…
 
Cyber Monday, FCC bans Chinese equipment, Twitter breach cover up, WhatsApp data leak, and BMC firmware flaws - plus thoughts about how the interconnected world got something wrong for me. https://news.yahoo.com/fbi-warning-shoppers-online-holiday-172655986.html https://securityaffairs.co/wordpress/138998/breaking-news/fcc-bans-import-chinese-equip…
 
Cybersecurity as part of business strategy, free resources from CISA, dysfunctional security team isn't good, AirAsia ransomware affects 5 million, and more predictions for 2023, this time from Deloitte - plus are we heading for a cybersecurity compensation bubble burst? https://www.forbes.com/sites/forbestechcouncil/2022/11/21/why-cybersecurity-sh…
 
From August 9, 2022 - CISO and vCISO Monica Rowe joins us to discuss cybersecurity in financial services; the benefits of sharing information through ISACs, presentations, and other means; and how to provide a sense of calm to the cybersecurity storm. --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/messageSupport this podcast: ht…
 
Are you a Small or Medium Business (SMB) or a Large Business grappling with infosec challenges? Dane moved from a large, well-funded organization to a smaller organization which accelerated global business growth during his tenure! Join us as we discuss these differences and how to adapt to the different environments. To view the article from the C…
 
Robin Wilde is the Director of Business Solutions for TeamHealth. She is passionate about project management and cyber security, particularly Identity Management, as well as promoting women in cyber. She holds a variety of certifications, including the CISSP, CRISC, PMP, ACP, CSP, and Prosci, demonstrating her vast skillset and experience. She intr…
 
All links and images for this episode can be found on CISO Series. CISOs and other security leaders have a lot of stress. But so do other C-level employees. Why does a CISO's stress seem that much more powerful? Is it that their job is still in constant development, or is the "C" in their name just in title, but not authority? This week’s episode i…
 
MS zero day (and a term I should have known), banning cyber ransom payments, FI IT staff greatest cybersecurity risk, cybersecurity is the C-Suite responsibility, and five "starter" certs. https://www.bleepingcomputer.com/news/security/new-attacks-use-windows-security-bypass-zero-day-to-drop-malware/amp/ https://theconversation.com/australia-is-con…
 
Would you like to hear a master class on what Technology professionals need to know about startups? On this episode Bob Cousins stops by to share his knowledge and experience on working in technology companies, dealing with founders, and partnering with venture capitalists. Listen and learn more about: What should a technology professional know abo…
 
From November 13. 2019 - Information security policies direct the governance of the information security program. What are elements of effective policies, and what mistakes do SMBs often make with their information security policy program? --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/messageSupport this podcast: https://anchor…
 
CISA claims elections secure, US network hacked, 42,000 imposter domains used by attackers, iOS 16 security features, CheckPoint predictions, and the security posture of Twitter. https://www.infosecurity-magazine.com/news/cisa-midterm-uncompromised-by/ https://cybersecuritynews.com/u-s-federal-network-hacked/ https://thehackernews.com/2022/11/chine…
 
From August 2, 2022 - Steve Mallard has over 20 years in Information Technology; is a Master Teacher in Information Technology/Infrastructure Management and Information Systems Manager at Tennessee College of Applied Technology - Shelbyville; is a private consultant for government organizations, higher-ed, and private corporations, a technical writ…
 
Lin Clark, the Carolina Cyber Center's SOC Director, discusses how the SOC benefits both the students in the Carolina Cyber Center program and the western North Carolina small business community. Recorded at RETR3AT Cyber Conference Montreat College September 23, 2022. Audio only. --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/m…
 
Digital Business Risk Management helps companies track and disrupt the most advanced bad actors. Team Crymu specializes in Digital Business Risk Management & Attack Surface Management, giving clients insight and help relating to cyber threats. This episode features David Monnier, Chief Evangelist and Team Cymru Fellow, from Team Cymru, who provides…
 
Information Security is often seen as a cost center and drain on the revenue of a company. It may be seen as necessary to protect the company, but the value is not always understood by leadership and peers to the CISO. Taken from personal experience, in this talk, we will explore some suggestions on how CISOs can bring and show value to their compa…
 
I've started a limited YouTube series on lessons I've learned from being a successful consulting business owner. It's not all sunshine and roses, and I've made a lot of mistakes, but I've learned from them. Here are the first two episodes - Consulting: Introduction and Consulting: Risk Assessment. If you find these interesting and useful, please su…
 
All links and images for this episode can be found on CISO Series. "The biggest threat to national security is that many of the most vital systems on the planet CURRENTLY run on outdated and insecure software," said Robert Slaughter of Defense Unicorns on LinkedIn. That's at the core of the third-party security issue. This week’s episode is hosted …
 
An interview with Amit Basu (Chief Information Officer & Chief Information Security Officer of International Seaways), sharing his insights into the current state of cybersecurity, giving advice to junior professionals and making suggestions for Aphinia (https://www.aphinia - a community of 1,500+ CISOs in North America).…
 
KmsdBot, email server extortion, Fed requirements and ITAM, CMMC advice, ways data can be exposed, and a primer on pen testing - plus thoughts on when pen tests aren't exactly pen tests (and the SMB loses out). https://thehackernews.com/2022/11/new-kmsdbot-malware-hijacking-systems.html https://www.infosecurity-magazine.com/news/mass-email-extortio…
 
Special Thanks to our podcast sponsor, Cymulate. On this episode, Dave Klein stops by to discuss the 3 Digital Challenges that organizations face: Cyber threats evolve on a daily basis and this constant threat to our environment appears to be only accelerating The level of vulnerabilities today is 30x what it was 10 years ago. We have more IT infra…
 
Why phishing emails have typos, repeat ransomware demands, SMS used in banking attack, CISOs making job changes, Twitter CISO and CPO resign, plus some thoughts on the Twitter infosec exodus. https://securityboulevard.com/2022/11/why-do-phishing-emails-have-such-obvious-typos/ https://www.insurancejournal.com/news/national/2022/11/09/694534.htm htt…
 
In this continuation of the previous episode, Dr. Eric Cole sheds light on how to measure security with realistic metrics. Some areas to consider while applying for the CISO position would be: Why is it unfortunate for a CISO to work under the CIO? How can it limit their reach? Why should CISOs branch out after working for the CIO?…
 
From July 26, 2022 - Anthony Scarola is an IT Governance, Risk, and Compliance (GRC) expert; has many years in cybersecurity; is a U.S. Army veteran; holds the CISSP; and is a virtual CISO. And he's writing a security book! Listen to his wisdom as it pertains to risk management and learn one mistake many may make when discussing risk with the c sui…
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Thomas Tschersich, Chief Security Officer at Deutsche Telekom AG Deutsche Telekom is a German telecommunications company that is headquartered in Bonn and is the largest telecommunications provider in Europe by revenue. Deutsche Telekom was formed in 1995 and is …
 
Rob Bowker, Sales Director at EasyDMARC, explains the risks of email spoofing, the benefits of implementing DMARC in addition to DKIM and SPF, and how EasyDMARC helps to manage DMARC. Recorded at RETR3AT Cyber Conference Montreat College September 23, 2022. --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/messageSupport this podca…
 
The Security Operations Center is often the first line of engagement for security incidents. It’s essential that SOC teams are planned, practiced, and prepared to act. One of the best ways to do that? Cyber Defense Exercises. Join us as we discuss how these work and the value to the program. Visit https://securityweekly.com/csp for all the latest e…
 
Jake Williams is a cybersecurity manager and aspiring CISO, currently pursuing his MBA. He is also well-versed in CMMC, and we dive into some elements of this somewhat confusing standard/requirement. --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/messageSupport this podcast: https://anchor.fm/virtual-ciso-moment/support…
 
All links and images for this episode can be found on CISO Series Security leaders will often ask challenging or potentially gotcha questions as barometers to see if you can handle a specific job. They're looking not necessarily for a specific answer, but rather a kind of answer and they're also looking to make sure you don't answer the question a …
 
National Guard to assist with election cyber security, supply chain stops train, predictions for 2023, MFA fatigue explored, and CEO sanctioned in breach, plus thoughts on the C-Suite and Board of Directors responsibility. https://www.politico.com/news/2022/11/04/nationa-guard-midterm-election-cybersecurity-00065236 https://www.securityweek.com/cyb…
 
Have you ever just met someone that was so interesting that you just sat and gave them your full attention? On this episode of CISO Tradecraft, we have Bill Cheswick come on the show. Bill talks about his 50 years in computing. From working with the pioneers of Unix at Bell Labs, inventing network visualization techniques for the DoD, and creating …
 
2022 cybersecurity threat landscape report, election cybersecurity concerns, arrest in dark web market, five cybersecurity mistakes for businesses, and a primer on threat hunting - plus thoughts on career planning and management. https://www.enisa.europa.eu/news/volatile-geopolitics-shake-the-trends-of-the-2022-cybersecurity-threat-landscape https:…
 
From July 19, 2022 - J.J. Powell of Cyber Defense Group (https://www.cdg.io/) discusses his career journey from police officer to system administrator to CISO and now as leading virtual CISO services. He is also a pivotal component into my decision to leave corporate and become an independent vCISO - listen to find out what was "the straw that brok…
 
In this episode of The New CISO, Steve is joined by Tyler Farrar, the CISO at Exabeam. With malware-free attacks becoming increasingly common, Tyler understands the best ways to bridge the effectiveness gap. With this in mind, he shares his SOC philosophy and the importance of threat detection. Listen to the episode to learn more about the act of p…
 
In this week’s episode of CISO’s Secret, Cyber Security Evangelist Grant Asplund hosts Ann Johnson - Corporate Vice President - Security, Compliance, & Identity @ Microsoft Microsoft Corporation is a multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the …
 
Dan Bradley, CIPP/E, CIPP/US, CIPM, is the Senior Associate General Counsel at Global Payments, Inc. and a former Federal Prosecutor. We discuss privacy regulations both for financial institutions and SMBs, including the importance of frameworks. Recorded at RETR3AT Cyber Conference Montreat College September 23, 2022. --- Send in a voice message: …
 
The average tenure of a CISO is 18 Months to 5 years, depending upon the research. Learn from a CISO who has been employed by the same organization for almost 4 decades! Learn as Jim shares some of his key learnings as he has worked with an organization that has gone through many changes during his tenure, and some ideas to add to your own CISO car…
 
Loading …

Snabbguide

Upphovsrätt 2022 | Sitemap | Integritetspolicy | Användarvillkor
Google login Twitter login Classic login