show episodes
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Ogni settimana
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Ogni settimana+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Ogni settimana+
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
  continue reading
 
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
  continue reading
 
Artwork

1
Cyber Security Café

Beverley Roche

Unsubscribe
Unsubscribe
Ogni mese
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Ogni mese
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Unsubscribe
Unsubscribe
Ogni mese
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
Artwork

1
IT Unplugged

M2 Technology

Unsubscribe
Unsubscribe
Ogni settimana
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
  continue reading
 
Artwork

1
BCG on Compliance

Boston Consulting Group

Unsubscribe
Unsubscribe
Ogni mese
 
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
  continue reading
 
Artwork

1
the CYBER5

Nisos, Inc.

Unsubscribe
Unsubscribe
Ogni mese
 
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
  continue reading
 
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
  continue reading
 
Artwork

1
Cyber Career Talks

Cyber Education Networks

Unsubscribe
Unsubscribe
Ogni mese
 
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
  continue reading
 
Artwork
 
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
  continue reading
 
Artwork

1
No Law Firm Left Behind

Jim Gast, Law Firm Tech & Cyber Consultant

Unsubscribe
Unsubscribe
Ogni mese
 
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
  continue reading
 
Artwork

1
ICT Pulse Podcast

ICT Pulse - tech blog and podcast

Unsubscribe
Unsubscribe
Ogni settimana
 
A deep dive into topical Information and Communication Technology (ICT) issues from a Caribbean perspective, through interviews and group discussions with specialists, experts and people trying to make a difference in the tech space. New episodes are released every Wednesday. Show notes are available at www.ict-pulse.com
  continue reading
 
Artwork

1
Defending Digital Frontiers

Andrei Lyskov & Eli Farhood

Unsubscribe
Unsubscribe
Ogni giorno+
 
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
  continue reading
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Interviews & insights with experienced developer's across all aspects of App Development. Whether you're a veteran developer or just getting started - listen weekly as I go in depth with professionals on topics ranging from Flutter, Cyber Security, Freelancing, Android, iOS & much much more!
  continue reading
 
Sit back and relax, enjoy the humor, learn something valuable and discover the creativity of many really amazing supply chain leaders. The goal of the show is to share the secret sauce to business success, which is a successful supply chain. Real Life Supply Chain Challenges & Solutions - New Tech Solutions - Great Supply Chain Connections - Life Lessons WWW.SupplyChainSecretSauce.COM• Subscription Based Supply Chain Consulting
  continue reading
 
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
  continue reading
 
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
  continue reading
 
Loading …
show series
 
Can we ever truly trust the technology that runs our lives? Think about it: every time we use a phone, share a photo, or shop online, we’re putting a lot of trust in these digital systems. But how safe are they? In this episode of the Cyber Consulting Room podcast, host Gordon Draper continues his conversation with Helen Patton, a distinguished cyb…
  continue reading
 
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Hi there, welcome to The Techtual Talk! I'm your host Henri and today we have a very special guest joining us - Aria, also known as "AD" on Twitter where she shares invaluable insights about being a Cybersecurity Consultan…
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Send us a text Unlock the secrets to safeguarding your organization's most sensitive data and enhance your cybersecurity acumen. Join us on the CISSP Cyber Training Podcast as I, Sean Gerber, break down the critical importance of managing secrets within popular collaboration tools like Slack, Jira, and Confluence. Discover practical methods such as…
  continue reading
 
We have an exciting and crucial topic: the Cyber Resilience Act. With us are two guests who are experts in their fields: Guillaume Crinon, Director of IoT Business Strategy at Keyfactor, and Romain Tesniere, Business Development Manager at Avnet Silica. Guillaume and Romain bring a wealth of knowledge and experience in IoT security and business str…
  continue reading
 
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
  continue reading
 
Dive into a comprehensive analysis of the recent CrowdStrike incident that caused widespread disruptions and billions in damages. In this episode of IT Unplugged, hosts Brandon and Mike break down the technical aspects of what went wrong, explore why remote fixes were impossible, and discuss the broader implications for cybersecurity and software d…
  continue reading
 
Do you have what it takes to be a digital nomad? We revisit a 2022 conversation we had with the following intrepid travellers: Juleen Gentles, who is from Jamaica, but spoke with us from Ghana; Marsiya Issah who is from Ghana, but had been living in Barbados; and Andres Phillips, who is from Barbados, but had recently ended a 10-month stint in Colo…
  continue reading
 
In this episode of The TechTual Talk , You need HelpDesk to get into CyberSecurity? Are there really entry level jobs in cyber security or do you need to work your way up first? Henri & Destini discuss a Microsoft study from 2022 highlighting productivity issues linked to excessive meetings and the potential of AI tools for transcribing and managin…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad and Megan recap Blackhat. They also discuss a zero-click exploit involving a Windows TCP IP flaw and backdoor Bitsloth exploits. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About …
  continue reading
 
Send us a text What if AI could be your company's best asset—and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’ll also navig…
  continue reading
 
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/land…
  continue reading
 
I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster stora…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Send us a text Unlock the secrets to mastering the CISSP exam and bolster your cybersecurity prowess with Sean Gerber in this action-packed episode of the CISSP Cyber Training Podcast! Ever wondered which assessment type is crucial for ensuring ISO 27001 compliance? Discover why internal audits are the gold standard. We'll also cover the key consid…
  continue reading
 
Today on IT Unplugged, we're sharing game-changing insights for anyone navigating the complex world of nonprofit technology. I had the privilege of speaking with Abby, Executive Director of Jackie Nitschke Center, about how forward-thinking nonprofits are using IT to amplify their impact. Here's what you'll learn: · Innovative approaches to IT on a…
  continue reading
 
In our rapidly changing world, the classroom is critical in preparing upcoming generations for the life and work environment they will face in the future. Academic, former Minister for Education and international Consultant, Dr Gale Rigobert, shares her thoughts on, among other things: * the education system in the English-speaking Caribbean and ho…
  continue reading
 
Send us a text Ever wondered how to ensure your organization's cybersecurity measures meet international standards? Join us for an action-packed episode as we unpack Domain 6.5 of the CISSP exam, exploring crucial assessments, tests, and audit strategies every cybersecurity professional should master. Learn the importance of choosing a consistent f…
  continue reading
 
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Welcome back to another captivating episode of The TechTual Talk*! Today, we're thrilled to have a special guest, Gregory Richardson, Blackberry's Vice President Global Advisory CISO , who brings a wealth of knowledge and …
  continue reading
 
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Send us a text Can quantum computing break your encryption overnight? Discover the profound impact of this emerging technology on cybersecurity as we decode the recently introduced FIPS 203, 204, and 205 standards. Join me, Sean Gerber, on this week's electrifying episode of the CISSP Cyber Training Podcast to understand how the US government is pr…
  continue reading
 
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
  continue reading
 
Join us for an insightful episode of IT Unplugged as we sit down with Stephen, M2 Technology's newest IT consultant. With a passion for technology that started at age eight, Stephen shares his journey from fixing computers for snacks to becoming a seasoned IT professional. In this episode, we explore: Stephen's unique path into IT, starting with a …
  continue reading
 
In our August 2024 Community Chat, and with members of the Caribbean tech community, Nima Anvar, Hotelier and Chief Executive Officer of conversational AI platform GuestChat in Grenada, and Max Larson Henry, Network Engineer and Founder of the tech company, Transversal, which is based in the United States and Haiti, the panel discusses: * Community…
  continue reading
 
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Welcome to another episode of The TechTual Talk! I'm your host, HD, joined by my co-host Destini. Today, we delve into the tech world's pressing issues and intriguing developments. First up, we'll discuss the massive layof…
  continue reading
 
Send us a text What would you do if your social security number was compromised in a massive data breach affecting billions? In our latest episode of the CISSP Cyber Training Podcast, we unpack the alarming reality of a recent breach that exposed the personal records of 3 billion people. We provide critical advice on how to protect yourself using t…
  continue reading
 
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
  continue reading
 
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
Send us a text How would a massive data breach at a major corporation like Boeing affect the global cybersecurity landscape? Join us on this episode of the CISSP Cyber Training Podcast, where we dissect this alarming 50GB ransomware attack and its profound implications on the industry. Additionally, we unpack the serious data compromise in Maine du…
  continue reading
 
Loading …

Guida rapida