CISO công khai
[search 0]
Thêm

Download the App!

show episodes
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
C
CISO Tradecraft®

1
CISO Tradecraft®

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
Hàng tuần
 
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
The Cybersecurity Collaborative is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.securityweekly.com/csc.
 
C
CISO Talk

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Hàng ngày
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Mat Newfield, CSIO Unisys, as they engage with leading security leaders and experts about the latest cybersecurity topics. Produced by Techstrong Group.
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Quick strike and wrap up audio-only episodes drop Mondays and Fridays; Throwback Thursday episodes are rep ...
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
 
The Australian CISO is a podcast not just for aspiring and current Chief Information Security Officers; it's a podcast for anyone interested in Cyber Security. Hear from CISOs how they landed their first job, what questions to be prepared for during a CISO interview, lessons learnt while doing the CISO role, how they network, how they succeed etc. Use the email address theaustralianciso@gmail.com to make comments, pose questions or even ask to be on The Australian CISO podcast. The main pres ...
 
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us! Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
 
C
CISO's Secrets

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Hàng tháng
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
S
Smarter CISOs

1
Smarter CISOs

Smarter CISOs

Unsubscribe
Unsubscribe
Hàng tháng+
 
Smarter CISOs — the cybersecurity podcast designed to help you manage smarter, reduce your organization’s cyber risk, and learn best practices from cyber experts. "Smarter CISOs" is made possible by Aware Force. Aware Force engages employees in cybersecurity with newsletters and multimedia content, all branded and customized for your organization. Employees stay alert to cyber threats, protecting their families and keeping your organization safer throughout the year. Aware Force can dramatic ...
 
T
The CISO Diaries

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
Hàng tháng+
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
 
Loading …
show series
 
The role of CISO is one filled with challenges and decisions. Frequently, a CISO is faced with having to decide in compromise with Operations, in favor of Operations. This can be a very difficult and risky choice to make - but the ideal of having both get 100% of what they want, or need is not realistic. How to do this? In this session, we discuss …
 
Dan Glass, vice president and CISO with NTT DATA (previously CISO at American Airlines), joins CISO talk co-hosts Jennifer (JJ) Minella and Mitch Ashley to talk about what really grinds his gears lately. Glass discusses the latest LastPass breach disclosure, what security vendors need to do to keep pace with IT, pursuing zero-trust in small-to-medi…
 
All links and images for this episode can be found on CISO Series. What happens to your team after the layoffs? Your overextended team now realizes they're going to have to pick up the slack for those who left. How do you shift responsibilities in such a situation? Does anything fall away? Because you can't still operate at the same level. How do y…
 
NBA breach, Hinatabot botnet DDoS threat, Fortinet vuln exploited, Samsung zero days, ChatGPT cybersecurity potential, are cybersecurity jobs recession proof, and today's list - mistakes working from home. https://securityaffairs.com/143693/data-breach/nba-data-breach.html https://www.bleepingcomputer.com/news/security/new-hinatabot-botnet-could-la…
 
Have you ever wanted to get a legal perspective on cybersecurity? On this episode of CISO Tradecraft, Evan Wolff stops by to discuss terms such as legal disclaimers, negligence, due care, and others. He also provides important insights on how to structure your cyber policies, respond to regulators/auditors, and partner with general council. Please …
 
In this episode, Richard tries out his new microphone and provides his viewpoint on the ongoing breaches that are occurring in Australia. He discusses the transition from ‘name and shame’ (which occurred in the past) to the present day support for organisations and security teams that have incurred a security breach. Richard also discusses a cyber …
 
In this episode of Life of a CISO, Dr. Eric Cole reminds you to take a quarterly check of your yearly goals and make the sacrifices needed to achieve them. Are you willing to go the extra mile? Are you willing to put in the effort required to make a name in this life as a World-Class CISO?Bởi Dr. Eric Cole
 
Zscaler CISO-Americas Benjamin Corll and Brad Moldenhauer join host Sean Cordero to discuss the hottest cybersecurity topics at Miami's recent Global CISO Exchange. Sean delves into their experience to uncover what security executives are discussing today. What problem has CISOs brainstorming in their hallway conversations? Where do industry leader…
 
Microsoft 365 was launched in 2011 in hopes of revolutionizing cloud-powered productivity platforms. Since then, Microsoft 365 has grown to the point where it is now one of the largest cloud-powered productivity platforms on the market, competing with the likes of Google and more. To give organizations a clear picture of their Microsoft 365 options…
 
In this episode of The New CISO, Steve is joined by guest Laura Louthan, Founder & vCISO at Angel Cybersecurity. Originally from Britain, Laura moved to Los Angeles to explore new opportunities before transitioning into IT. Eventually starting her own business, Laura shares her self-sufficient approach to cyber security. Listen to the episode to le…
 
Ransomware gangs breached the networks of at least 860 critical infrastructure organizations last year, multiple threat actors exploited a critical three-year-old security flaw in Progress Telerik to break into an unnamed federal entity in the U.S., two us citizens charged for hacking into DEA portal in 2022, Chinese influence operations are growin…
 
From October 25, 2023 - Albert Whale, Founder and CEO of IT Security Solutions, Inc and the developer of ITS Safe which provides real-time continuous protection at machine speed. He has over 30 years of experience with reducing the risk for business owners, minimizing their liabilities and overall risk. He has extensive experience in the techniques…
 
Cybersecurity is becoming a #1 business risk for many organizations. For CISOs to effectively manage this risk, proper strategy, adequate resourcing, and leadership support are all essential, but not enough. CISOs need a trusted partner on the supplier side, a product CISO, known within industry as a Chief Product Security Officer, who understands …
 
Carlota Sage is the Founder and Community CISO for Pocket CISO, thrives in that squishy area where business and technology meet human nature, and builds the relationships that get security, technology, business processes and people working together better, and has a background that includes information architecture, enterprise infrastructure, infor…
 
All links and images for this episode can be found on CISO Series. Future cybersecurity talent is frustrated. The industry demand for cybersecurity professionals is huge, but the openings for green cyber people eager to get into the field are few. They want professional training, and they want the hiring companies to provide the training. Problem i…
 
Silicon Valley Bank fallout, AI risks to business, AI generated YouTube risks, how to master cyber threat intel skills, and eight websites to check if an email address was compromised. https://www.nbcnews.com/business/business-news/treasury-says-will-back-silicon-valley-bank-deposits-rcna74570 https://nypost.com/2023/03/13/hsbc-will-buy-uk-subsidia…
 
Have you ever wondered how to negotiate your best CISO compensation package? On this episode, we invite Michael Piacente from Hitch Partners to discuss important parts of the compensation packages. Examples include but are not limited to: - Base Salary, Bonuses (Annual, Relocation, & Hiring) Reserve Stock Units Annual Leave Title (VP or SVP) Direct…
 
CISOs need to keep their knowledge up to date, swap views with others and to network! Attending conferences are a great way of doing this. In this week's Podcast, Richard details a Conference he attended in Melbourne Australia; 6 Degrees Media's "Security. The future of Tech, Innovation & Work" Conference. Part 1 covers a number of the presentation…
 
https://www.tsa.gov/news/press/releases/2023/03/07/tsa-issues-new-cybersecurity-requirements-airport-and-aircraft https://www.bleepingcomputer.com/news/security/sonicwall-devices-infected-by-malware-that-survives-firmware-upgrades/ https://thehackernews.com/2023/03/lastpass-hack-engineers-failure-to.html https://www.theregister.com/2023/03/08/acer_…
 
From October 19. 2022 - Jon Sternstein is the Founder and Principal of Stern Security, a cyber security company headquartered in Raleigh, NC. He is co-author of the Cisco Press course titled “Security Penetration Testing (The Art of Hacking) LiveLessons”, holds many security certifications including: GIAC Penetration Tester and Certified Informatio…
 
Now more than ever, the significant demand for cybersecurity professionals serves as an opportunity to align with your organization’s DE&I priorities. Building a diverse and inclusive workforce is achievable and begins with intentional leadership. Learn from a cybersecurity leader’s successful track record and how to stand by your organization’s gr…
 
Dave Sobel is the host of the Business of Tech podcast (https://www.businessof.tech/), a leading IT services focused news and analysis podcast and YouTube show, and owner of MSP Radio. He is regarded as a leading expert in the delivery of technology services, with broad experience in both technology and business. He owned and operated an IT Solutio…
 
They might be leaders in the cybersecurity industry and top of the ladder within their organization, but CISOs still need advice! And when they do, they often turn to trusted advisors to help them with strategy, product, network and vulnerability decisions. So, who are these CISO advisors? How did they achieve their 'CISO whisperer' status, and wha…
 
All links and images for this episode can be found on CISO Series. I don't need another vendor to find my problems. Finding my problems has not been the issue. That's the easy part. Fixing them with the staff I have is definitely "the problem." Vulnerability management must include ways to remediate, quickly. This week’s episode is hosted by me, Da…
 
https://www.washingtonpost.com/technology/2023/03/05/ai-voice-scam/ https://securityaffairs.com/143051/data-breach/credential-stuffing-chick-fil-a.html https://www.bitdefender.com/blog/hotforsecurity/recent-cybersecurity-study-reveals-top-us-states-to-suffer-data-breaches/ https://www.sfgate.com/tech/article/oakland-ransomware-attackers-may-leak-da…
 
One of the most difficult things to do as a manager or leader is to take an ethical stance on something you believe in. Sometimes ethical stances are clear and you know you are doing what’s right. Others are blurry, messy, and really weigh on your mind. So we thought we would take this episode to talk about various ethical models, tricky ethical sc…
 
Episode 3 of The Australian CISO continues on from the previous episode that described a surprise "Red Team-Blue Team" penetration test. This episode walks through the "attack" and highlights the low cost, highly effective controls that every organisation could benefit from. This episode is a must if you want to strengthen your environment.…
 
https://www.wsj.com/articles/biden-national-cyber-strategy-seeks-to-hold-software-firms-liable-for-insecurity-67c592d6 https://www.reuters.com/technology/white-house-gives-agencies-30-days-impose-federal-device-tiktok-ban-2023-02-27/ https://krebsonsecurity.com/2023/02/hackers-claim-they-breached-t-mobile-more-than-100-times-in-2022/ https://arstec…
 
From October 19, 2022 - Keith Maune, Founder & COO at Acumen Technology, discusses his IT and cybersecurity path, from doing consulting work for companies needing website design and programming services, working after school and full-time during the summers, pursuing a BS and MBA while working full-time as co-owner and CIO of Advanced Network Solut…
 
Caroline McCaffery is a lawyer who started a data privacy and cybersecurity technology company called ClearOPS to provide technology to virtual CISOs. B2B2B It is a customer relationship management tool + work automation for managing security programs, such as vendor management, gap analysis, security posture and security questionnaire response. Sh…
 
ISO 27001:2022 is the first update to the global "gold standard" for provable cybersecurity in ten years. Notable changes from the 2013 version will likely significantly impact most organizations' Information Security Management Systems (ISMS). In this episode, your host John Verry sits down with Ryan Mackie and Danny Manimbo from Schellman & Co. t…
 
As risk practitioners CISOs make risk vs reward decisions on a daily and sometimes hour by hour basis. As a profession we must understand our organizations risk tolerance and appetite as well as our own. Regulations are lagging indicators. SOX was established as a direct response to unethical behavior. Unfortunately, regulations in cybersecurity an…
 
Dennis Davoren is a vCISO, PhD Candidate, and Green Belt Six Sigma. He also is a veteran, having been an Air Force Instructor and Command Pilot along with being a Commander. He is an experienced leader with a demonstrated successful history of working in the Military, Marketing & Advertising industry, and Cyber Security/IT field. Skilled in Intelli…
 
All links and images for this episode can be found on CISO Series. It's pretty darn easy to just utter the words "we're 100% secure." Pulling that off seems universally impossible, but some organizations are adamant about certain types of safety so they aim for 100%. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Serie…
 
https://www.smh.com.au/national/fake-russian-diplomats-revealed-as-heart-of-hive-spy-ring-in-australia-20230223-p5cmxz.html https://www.businessinsider.com/hackers-ransomware-getting-laid-off-amid-better-cybersecurity-report-2023-2 https://www.abc.net.au/news/2023-02-27/national-cyber-office-to-be-established-in-wake-of-optus-hack/102026156 https:/…
 
Our systems generate fantastic amounts of information, but do we have a complete understanding of how we collect, analyze, manage, store, and retrieve possibly petabytes a day? Gal Shpantzer has been doing InfoSec for over 20 years and has managed some huge data engineering projects, and offers a lot of actionable insights in this CISO Tradecraft e…
 
This episode delves into the world of the surprise penetration test. Is it a good approach or is it better to let everyone know that you are about to conduct a penetration test? i.e. if no-one knows about it, then the "attack" will be handled as it should. That is unexpected and using all the people, processes and technology that one would expect w…
 
https://www.csoonline.com/article/3688988/5-top-threats-from-2022-most-likely-to-strike-in-2023.html https://www.bitdefender.com/blog/labs/weaponizing-pocs-a-targeted-attack-using-cve-2022-47966/ https://www.foxnews.com/politics/us-military-email-server-left-exposed-two-weeks-allowing-internal-emails-leak https://thehackernews.com/2023/02/apple-war…
 
In this episode of The New CISO, Steve is joined by guest Rupa Parameswaran. At the time Rupa joined the show, she was Head of Security at Amplitude. Now, she’s transitioned to a new role as VP of Security & IT at Handshake. Growing up, Rupa was initially given a choice: to marry or become a doctor or engineer. With the support of her family, Rupa …
 
Host Mitch Ashley is joined by Jennifer Leggio (Netography) and Mike Rothman (Techstrong Research) to discuss the best ways CISOs can keep key stakeholders properly informed about threats, risk and security programs and why proactive communication is an essential part of high-performing teams and the foundation of a solid security strategy.…
 
Join Mitch Ashley, Jennifer Minell (Viszan Security), Anthony Johnson (Delve Risk) and Allison Miller (Reddit) at RSAC 2022. The role of the CISO has not only changed, it is evolving by the day and will be completely different moving forward. We will discuss this shift as well as how we keep the lights on while getting rid of our corporate networks…
 
Loading …

Hướng dẫn sử dụng nhanh