Isaca Podcast pubblico
[search 0]
Altro
Scarica l'app!
show episodes
 
Artwork

1
ISACA Podcast

ISACA Podcast

Unsubscribe
Unsubscribe
Ogni mese+
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello and Josephine Olok

Unsubscribe
Unsubscribe
Ogni mese+
 
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
  continue reading
 
Loading …
show series
 
Show notes ISACA Kampala Chapter conference registration https://eainfosec.org/ ISACA Website https://www.isaca.org/ Which ISACA Certificate is right for you? https://www.isaca.org/resources/infographics/which-isaca-certification-is-right-for-you https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/right-for-you-chart-ju…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad and Megan recap Blackhat. They also discuss a zero-click exploit involving a Windows TCP IP flaw and backdoor Bitsloth exploits. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About …
  continue reading
 
In this week's episode we bring on Maurice the ISACA Kampala Chapter President, who shares the benefits of the chapter. Show notes ISACA Kampala Chapter conference registration https://eainfosec.org/ ISACA Website https://www.isaca.org/ Which ISACA Certificate is right for you? https://www.isaca.org/resources/infographics/which-isaca-certification-…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad and Oscar are joined by a new host, FRSecure's Megan Larkins! Together, they discuss the recent CrowdStrike outage and its illustration of the importance of understanding your application inventory and dependencies—and the need for proper application allow listing and conditional access policies to pr…
  continue reading
 
Solomon is a cybersecurity platform engineer with years in cybersecurity, In this episode, he breaks down what it means to be in cybersecurity and working in different countries among others. Solomon Ruzima LinkedIn https://www.linkedin.com/in/solomon-ruzima Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and …
  continue reading
 
Many people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe. In this ISACA podcast episode, Camelot Secure Director of Solutions Engineering Zachary Folks discusses not only his view of how ChatGPT can be considered an evolution of the encyclopedia, but importantly how it is aiding cybersecurity profe…
  continue reading
 
In this week's episode, we review some of the cybersecurity news that stood out. Show notes Euro 2024 Attack https://www.darkreading.com/cloud-security/euro-2024-becomes-latest-sporting-event-to-attract-cyberattacks Operation DISTANTHILL https://www.group-ib.com/media-center/press-releases/operation-distanthill/ U.S Election attack https://www.proo…
  continue reading
 
In this week's episode, we look at Josephine's book. Her book is a collection of multiple poems. Please like, Subscribe and leave a comment 30 years this March https://www.amazon.co.uk/Years-This-March-Josephine-Olok-ebook/dp/B09J5H5XK7 Timestamps Intro 00:00 Tell us about yourself 01:12 What inspired the book 03:29 Don't see myself as a Writer 04:…
  continue reading
 
Show notes In this week's episode, we complete the conversation we had last week with Julius Cyber talents https://cybertalents.com/ Africa digital forensics challenge CTF unodc https://www.unodc.org/westandcentralafrica/en/westandcentralafrica/stories/2022/ctf-competition-2023.html Hack the box CTF https://www.hackthebox.com/ Oxygen forensics CTF …
  continue reading
 
On this week's episode, we bring an incredible digital forensics expert. Show notes Julius Wakooli LinkedIn https://www.linkedin.com/in/julius-wakooli-94737472/ Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin…
  continue reading
 
In this episode of the Unsecurity Podcast, the guys sit down with Michael Kennedy of Ostra to discuss burnout and share their personal experiences and strategies for preventing and managing work-related stress. Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-d…
  continue reading
 
In this week's episode we go through some attacks that have happened this month plus patch tuesday. Show notes Ticket Masters attacked by snowflake https://www.bbc.com/news/articles/cw99ql0239wo.amp https://www.abc.net.au/news/2024-05-30/ticketmaster-data-breach-how-to-check-if-you-have-been-hacked/103912494 https://www.bleepingcomputer.com/news/se…
  continue reading
 
In this week's episode, we go deep into the world of building professional networks that will enable you for a better way to approach people for work and other matters. The Little Black Book of Connections https://www.amazon.com/Little-Black-Book-Connections-Relationships/dp/1885167660 Elijah Kitaka’s tweet about his elevator pitch to Richard Byaru…
  continue reading
 
In this week's episode we welcome Greogory, A man with 3 decades of cybersecurity on his belt. Show notes Gregory’s AI note taking application(Actascribe) https://www.actascribe.ai/ Actascribe usage video https://www.youtube.com/watch?v=Z4qihB7_9ys Gregory Richardson LinkedIn https://www.linkedin.com/in/gregorypkrichardson/ Like and Follow our Link…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad, and Oscar discuss the CISSP Mentorship Program with Brian Kelley now that this year's course has officially wrapped up, and touch on challenges and roadblocks for security professionals in the job market. 00:00 Intro 01:56 Ransomware and Security Best Practices 06:32 CISSP Mentorship Program and Lear…
  continue reading
 
On this episode we bring on a man who has tested work in both the African continent and North America. Show notes Verizon Data Breach Report 2024 https://www.verizon.com/business/en-gb/resources/2023-data-breach-investigations-report-dbir.pdf Solar Winds Attack https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-…
  continue reading
 
Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the world of cybersecurity standardization. In this episode, titled "Becoming a License Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead at the UK Cyber Security Council, an…
  continue reading
 
In this week's episode we bring on a man of many skills. who transitioned from system administration to a cybersecurity professsional. UNAA website https://unaaonline.org/ Denis’s LinkedIn https://www.linkedin.com/in/denis-bazalirwa-12347836/ Denis’s X https://x.com/theictweb Denis’s company website https://theictweb.com/ Denis’s Dj website https:/…
  continue reading
 
In this week's episode, we talk about the cybersecurity that stood out in the month of April 2024 with our new co-host Angella Nabbanja. Show notes Patch Tuesday https://www.crowdstrike.com/blog/patch-tuesday-analysis-april-2024/ Godfather banking Trojan https://www.darkreading.com/endpoint-security/godfather-banking-trojan-spawns-1k-samples-57-cou…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad, Oscar, and Pinky discuss recent news stories about IP and central manager flaws, as well as a vulnerability enrichment project by CISA. They also share an interesting incident response story involving internal domains and proxy auto-configuration files. Please send any questions, comments, or feedbac…
  continue reading
 
How can you manage your daily expenses to ensure some money is reserved at the end of the day, This week's book review dives into this. The latte factor https://www.amazon.com/Latte-Factor-Dont-Have-Rich/dp/1982120231 Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/the…
  continue reading
 
Thank you for being part of this journey and as we celebrate the 25th Episode, we bring on a guest who we have been eagerly planning to have and we finally filmed with her last week. T Shaped employee https://www.forbes.com/sites/lisabodell/2020/08/28/futurethink-forecasts-t-shaped-teams-are-the-future-of-work/?sh=5f0683b5fded Becoming by Michelle …
  continue reading
 
In this week's episode Erin takes us through cyber insurance and what we are seeing in this new landscape. Book recommendation https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/ Documentary recommendation https://www.imdb.com/title/tt27662275/ Erin Heiser's LinkedIn https://www.linkedin.com/in/erin-heiser-971b2860/ Erin Heiser's X https:/…
  continue reading
 
Welcome to Episode 3 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the essential aspects of applying for and assessing candidates in the cybersecurity field. In this episode, titled "How to Apply," Ameet is joined by distinguished guests Ethan Duffell, representing the UK…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad interviews guest Ryan Cloutier as part of our Meet the Mentors series. They discuss the importance of the CISSP Mentor Program and the value of different perspectives in teaching. They also discuss the release of an exploit code for the Palo Alto Networks Zero Day vulnerability and the ethics of publi…
  continue reading
 
Traditional security questionnaires just aren't cutting it anymore. Tune into this ISACA Podcast episode, Chris McGowan chats with VISO TRUST CEO and Co-founder, Paul Valente as they delve into the evolving landscape of Third-Party Risk Management (TPRM), exposing the limitations of current methods and exploring how emerging AI trends are shaping a…
  continue reading
 
In this week's, we had a great conversation with a seasoned auditor, Mr. Elison shares how he got into the industry of IT Audit. Plus the obstacles he had to overcome. Show notes Elison’s linkedIn https://www.linkedin.com/in/elisontwinomugisha/ Elison’s X https://twitter.com/elisonten Like and Follow our LinkedIn page https://www.linkedin.com/compa…
  continue reading
 
In this week's episode, we review some of the different cybersecurity news that caught our eyes in the month of March. Show notes Sam Bankman fried sentenced to 25 years https://edition.cnn.com/2024/03/28/business/ftx-sam-bankman-fried-sentencing/index.html https://www.forbes.com/profile/sam-bankman-fried/?sh=20434c224449 Patch Tuesday https://www.…
  continue reading
 
In this week's episode, we review a book called Tuesdays with Morrie by Mitch Albom, it's a book which is both has an emotional roller coaster and also has lessons you can pick out for life. Show notes Tuesdays with Morrie book https://www.amazon.com/Tuesdays-Morrie-Greatest-Lesson-Anniversary/dp/076790592X Life is what you make it book https://www…
  continue reading
 
Are you curious about how to maximize the strategic value and impact of your bug bounty program? In this episode, you can learn how Adobe continuously develops and improves its bounty program to engage security researchers and hackers globally and improve its security posture from an adversary perspective. In this ISACA Podcast, Chris McGown, ISACA…
  continue reading
 
In this week's episode, we bring on a guest whose life feels like a movie you would go and watch. Bob Henderson's story of how he got into cybersecurity will keep you on your toes and will also teach you what is valuable in the long run. Show Notes Bob’s post of the newspaper https://www.linkedin.com/pulse/20140916112836-15749340-my-story-from-cop-…
  continue reading
 
Welcome to Episode 2 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the intricacies of cybersecurity standardization. In this episode, titled "Audit and Assurance," Ameet is joined by esteemed guests Leanne Sperry, Project Manager for Standards Development at the UK Cyber …
  continue reading
 
In this week's podcast we bring on a guest who has trained many students for 2 decades at SANS Institute and SANS Technology Institute, his podcast is one love by many for it's brief and actionable items. We bring to you Dr. Johannes Ullrich the Dean of Research at SANS Technology Institute. Show notes Wmf vulnerability wikipedia blog https://en.wi…
  continue reading
 
In this week's podcast we bring on Olivia Rose a CISO, who trains other CISO's and has vast experience in doing so. She does a great a job demystifying how communication is done at a board level. Show notes Olivia’s post on Newbies ”non-technical” https://www.linkedin.com/posts/oliviarosecybersecurity_ah-we-women-in-tech-are-masters-at-downplaying-…
  continue reading
 
Episode 218 of the Unsecurity Podcast is now live! This time, Brad is joined by Ron Woerner for another episode of our "Meet the Mentors" series introducing the 2024 CISSP Mentor Program instructors! Links & information: Find Ron on LinkedIn https://www.linkedin.com/in/ronwoerner/ Please send any questions, comments, or feedback to unsecurity@proto…
  continue reading
 
This week’s podcast we dive into the sector of oil and gas and how cybersecurity is important in this sector, plus not forgetting the implementation of security. With our Guest Charles Ofwono. AI powered security tool https://darktrace.com/ UNOC LinkedIn https://ug.linkedin.com/company/uganda-national-oil-company-limited-unoc?trk=public_profile_top…
  continue reading
 
Episode 217 of the Unsecurity Podcast is now live! This time, Brad is joined by Chris Foulon for the first episode in our "Meet the Mentors" series, introducing our 2024 CISSP Mentor Program instructors! Links & information: Chris's Podcast (Breaking Into Cybersecurity) https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698 …
  continue reading
 
In this week's podcast, we review a book that will flip your world perspective of AI to a different level. Here is the book on Amazon https://www.amazon.com/Worlds-See-Curiosity-Exploration-Discovery-ebook/dp/B0BPQSLVL6 Image-net's website https://www.image-net.org/index.php Dr. Fei-Fei's LinkedIn https://www.linkedin.com/in/fei-fei-li-4541247 Like…
  continue reading
 
Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie Dann, Director of Professional Standards at the UK Cyber Security Council, in a compelling discussion about the standardization of specialisms in cybers…
  continue reading
 
In this week's episode, we look at different security matters that one will need to ponder about this week. Duckduckgo https://www.bleepingcomputer.com/news/security/duckduckgo-browser-gets-end-to-end-encrypted-sync-feature/ WiFi jammers https://www.techspot.com/news/101866-minnesota-burglars-using-wi-fi-jammers-disable-home.html Banking Trojan htt…
  continue reading
 
Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we often make these choices subconsciously, even actions that don’t appear as choices include several microscopic risk-based calculations. These judgments are executed based on some estimate of risk,…
  continue reading
 
In this week's episode, we dive deep into the world of IT Audit with our guest Emily May Mara who has spent close to a decade in this industry. Link to ISACA's website www.isaca.org Follow Emily May Mara’s linkedIn page https://www.linkedin.com/in/emily-may-mara-09147147/ Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberwe…
  continue reading
 
ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century, technology, security, and the workforce have evolved, while certain challenges remain the same. In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he started writing for the Journal, societal s…
  continue reading
 
Episode 216 of the Unsecurity Podcast is now live! This time, Oscar and Brad are joined by FRSecure's Matt Dowd to discuss the difference between vulnerability scanning and penetration testing. Links & information Cisco Critical Vulnerabilities https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-communication-devices/ …
  continue reading
 
In this week's podcast, we dive deep into the 80/20 principles that have changed the landscape of productivity in this day and age. A summarized version of the book through Blinkist https://www.blinkist.com/en/books/the-80-slash-20-principle-en Link to the book on Amazon for hardcopy https://www.amazon.com/80-20-Principle-Secret-Achieving/dp/038549…
  continue reading
 
Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability manageme…
  continue reading
 
Resources shared Dr. Anmol UK certification tool: https://www.ukcybersecuritycouncil.org.uk/careers-and-learning/certification-framework/ NIST https://www.nist.gov/itl/applied-cybersecurity/nice Cyberseek https://www.cyberseek.org/pathway.html Follow Anmol Agarwal linkedin page https://www.linkedin.com/in/anmolsagarwal Follow Anmol Agarwal on X htt…
  continue reading
 
Episode 215 of the Unsecurity Podcast is now live! This time, Brad is joined by FRSecure's Dave Tuckman to discuss an upcoming webinar series about securing home networks with ISACA and select FRSecure staff leading the sessions. Links & information ISACA home network webinar series: Session 1: 2/12 - Household Computer Safety, Using The Internet S…
  continue reading
 
Show notes Have I been pawned added 71 million emails https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-71-million-emails-from-nazapi-stolen-account-list/ https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/ Haveibeenpwned https://haveibeenpwned.com/ 1password https://1password.com/ Setting up 1password …
  continue reading
 
Episode 214 of the Unsecurity Podcast is now live! This time, Brad and Oscar sit down with FRSecure's Mike (Pinky) Thompson for a Breachmas report and some news from around the industry. News links Mandiant's X (Twitter) Account Hacked https://thehackernews.com/2024/01/mandiants-x-account-was-hacked-using.html CISCO Patch https://www.securityweek.c…
  continue reading
 
Loading …

Guida rapida