VCISO nyilvános
[search 0]
Több
Download the App!
show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Heti+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
  continue reading
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Unsubscribe
Unsubscribe
Havi
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
Blak Cyber

George McPherson

Unsubscribe
Unsubscribe
Havi
 
"Securing Our Place In The Industry"​ The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry. Support this podcast: https://podcasters.spotify.com/pod/show/blakcyber/support
  continue reading
 
20-year FBI Special Agent provides cyber-related insight and education for individuals and businesses. This podcast includes discussions on historical FBI cyber and counterintelligence cases and discusses current cybercrime issues.
  continue reading
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
  continue reading
 
Loading …
show series
 
SUMMARY In this episode of the CvCISO Podcast, hosts Evan, Jordon, and Meg engage in a lively discussion about overcoming objections in vCISO consulting, the importance of framing security in business terms, and leveraging data to support their recommendations. They also touch on personal challenges and the role of emotional intelligence in navigat…
  continue reading
 
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
  continue reading
 
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
  continue reading
 
Send us a text Ready to elevate your cybersecurity acumen and conquer the CISSP exam? Tune in to our latest episode, where we unravel the intricacies of a significant ransomware attack that exploited a supply chain vulnerability, impacting 60 US credit unions via the Citrix bleed vulnerability. This real-world scenario stresses the necessity of sec…
  continue reading
 
Summary In this episode, the hosts engage in a lively discussion about various statements related to cybersecurity, exploring whether they are truths or myths. They delve into the costs associated with cybersecurity, the role of VCISOs, the importance of communication in cybersecurity, and the relevance of the CVCISO course. The conversation emphas…
  continue reading
 
Breaking into Cybersecurity: The Role of AI in Strengthening Cybersecurity / Bryan Kissinger Bryan C. Kissinger, PhD, serves as the Senior Vice President of Security Solutions and Chief Information Security Officer at Trace3. With over 25 years of experience, he excels in maturing IT risk and information security programs and implementing emerging …
  continue reading
 
Send us a text Can cheaply made smart devices compromise your security? Uncover the hidden risks of AI and hardware hacking as we explore the vulnerabilities in these devices that make them prime targets for cybercriminals. Learn how secure coding practices and proper device isolation can serve as critical defenses, and consider the implications of…
  continue reading
 
Returning to the podcast, host James sat down with Tim Fitzpatrick from Rialto Marketing. Topics include defining your processes, establishing your onboarding, and identifying your competitive advantage in the markets you serve. About Tim Fitzpatrick Tim is the President of Rialto Marketing, a company that provides marketing consulting, advisory, a…
  continue reading
 
In the latest episode of Life of a CISO, Dr. Eric Cole emphasizes the importance of continually evolving cybersecurity practices and re-examining fundamental principles. Unlike static industries like accounting or legal, cybersecurity is in constant flux, requiring companies to stay vigilant and adaptive. Dr. Cole draws parallels between cybersecur…
  continue reading
 
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
  continue reading
 
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
  continue reading
 
Send us a text Unlock the secrets to enhancing your organization's security posture by mastering the art of security audits. Tune in to discover how security audits play a pivotal role in both the CISSP exam and real-world scenarios. Through personal anecdotes and expert insights, we explore how conducting effective audits with departments like fin…
  continue reading
 
In the final episode of this three-part series on cyber trends, Dr. Eric Cole dives deep into how key cybersecurity principles can apply beyond the digital world, extending to personal growth, relationships, and business success. He emphasizes the importance of clarity—whether it’s knowing where you're headed in your cybersecurity career or in life…
  continue reading
 
Send us a text Unlock the secrets to mastering access control models essential for conquering the CISSP exam and advancing your cybersecurity expertise. Imagine having a comprehensive understanding of how discretionary, mandatory, role-based, risk-based, rule-based, attribute-based, and hybrid models function in various scenarios. This episode feat…
  continue reading
 
Christopher Barber - Cheaper Than a Geek https://www.linkedin.com/in/christopherjbarber/ Host Karl had a great chat with Christopher Barber from Cheaper Than a Geek in Maryland. Topics include networking for client attraction, and using Chambers of Commerce to spread a wide net that brings in new clients for decades. Chris got involved in his local…
  continue reading
 
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
  continue reading
 
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
  continue reading
 
Send us a text Unlock the secrets of cybersecurity in our latest episode where we promise to transform your understanding of access control mechanisms. We kick things off by dissecting the discretionary access controls (DAC) and the power dynamics behind resource ownership. Discover why assigning ownership is crucial to sidestep security pitfalls a…
  continue reading
 
Mitigating Insider Threats in SMBs: Strategies for Success This video addresses the significant security concern of insider threats in small and medium-sized businesses (SMBs). It explores how such threats, often arising from individuals with authorized access who misuse their privileges, can result in data breaches, financial losses, and reputatio…
  continue reading
 
Hosts James and Amy sit down this week to discuss difficult situations where the customer will not take your prosposal or recommendation 1.) MSP Question of the week: What happens if you customer won't take your recommendation? --- 2.) Notes On The News Safety around AI: https://edition.cnn.com/2024/09/29/tech/newsom-california-ai-safety-bill/index…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole continues the conversation on key trends that every Chief Information Security Officer (CISO) should be aware of. Building off the last episode where he discussed AI regulations, zero trust, and cyber numbness, Dr. Cole shifts focus to critical topics like metrics, communication, leadership, cloud se…
  continue reading
 
Send us a text Unlock the secrets of the OSI and TCP/IP models with Sean Gerber as your guide on the CISSP Cyber Training Podcast. Ever wondered how the presentation layer manages to format and translate data seamlessly for the application layer? Or how the network layer deftly routes packets across networks? Prepare to gain a comprehensive underst…
  continue reading
 
In this episode, Jordon, Meg, and Evan discuss the credibility of the CvCISO certification with special guest Lyle Melnychuk. They explore the value of the certification, the importance of community support, and the real-world application of the training. The conversation delves into the distinction between credibility and recognition, emphasizing …
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
  continue reading
 
In this episode of the CvCISO Podcast, hosts Evan, Meg, and Jordon engage in a candid discussion about mental health, the role of a Virtual Chief Information Security Officer (vCISO), and the critical distinction between compliance and risk management in information security. They explore the importance of understanding security risks, the misconce…
  continue reading
 
Send us a text Unlock the secrets of cybersecurity mastery with Sean Gerber as we embark on a journey through Domain 4 of the CISSP exam. Ever wondered how AI could transform the chaotic world of Security Operations Centers (SOCs)? Discover the potential of artificial intelligence to streamline alert management and enhance detection efficiency, a m…
  continue reading
 
In this compelling episode of Breakfast Bytes, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise servers. With insights from a newly recognized expert in the field, this episode promises to challenge conventional wisdom and offer fresh perspectives…
  continue reading
 
Hosts James and Amy discuss pricing and the question around discounts for certain clients. 1.) MSP Question of the week: Should you discount your price to win the deal? " The bitterness of poor quality lingers long after the sweetness of a cheap price is forgotten." - Benjamin Franklin – --- 2.) Notes On The News The UK's Information Commissioner's…
  continue reading
 
In this new episode of Life of a CISO, Dr. Eric Cole dives into one of the biggest challenges faced by Chief Information Security Officers (CISOs): staying up to date with the rapidly changing trends in cybersecurity. With new technologies, products, and vendors emerging from conferences like RSA, it's crucial for CISOs to stay focused on key areas…
  continue reading
 
Send us a text Crack the code of security architecture and engineering with this episode of the CISSP Cyber Training Podcast! Ever wondered how different security models apply to real-world scenarios? We'll give you the insights and knowledge you need to discuss these models confidently with senior leaders and implement robust security controls. We…
  continue reading
 
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
  continue reading
 
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
  continue reading
 
Send us a text What if your organization's security posture could withstand any cyber threat? This episode of the CISSP Cyber Training Podcast promises to equip you with actionable insights from CISSP Domain 3, emphasizing the critical principle of failing securely. We tackle the intricacies of separation of duties, zero trust, and the benefits of …
  continue reading
 
In this episode, the Evan, Meg, and Jordon engage in a deep conversation about the importance of communication, trust, and authenticity in both personal and professional relationships. They explore how understanding one's audience and being aware of the impact of words can enhance interactions. The discussion emphasizes the need for vulnerability, …
  continue reading
 
Hosts Amy Babinchak and James Kernan discuss the struggles of recruiting and what key qualities to look for when recruiting good people. 1.) MSP Question of the Week: When struggling with recruiting, how do you find good people/talent? --- 2.) Notes On The News ConnectWise Expands MSP Platform with Acquisitions of Axcient and SkyKick, Strengthening…
  continue reading
 
Sanjay Chopra is the co-founder and CEO of Cognistx, an AI company known for developing innovative products like SQUARE and DQE, used across various industries. With over 30 years of experience in AI and business strategy, Sanjay has led several successful technology ventures. He serves on the Pittsburgh board of the Federal Reserve Bank of Clevela…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole dives into the significant differences between security engineers and chief information security officers, a distinction many fail to recognize. He explains that merging these two roles into the same career track is one of the core issues plaguing the cybersecurity industry today. Security engineers …
  continue reading
 
Send us a text Ever wondered about the real difference between a data leak and a data breach? Join me, Sean Gerber, on the latest episode of the CISSP Cyber Training Podcast as we unpack the nuances between these two critical cybersecurity concepts. Learn how data leaks often result from human mistakes like weak passwords, while data breaches invol…
  continue reading
 
The Role and Impact of Fractional Security Officers in Small Businesses In this episode, cybersecurity experts William McBurrow and Christophe Foulon delve into the world of fractional Chief Security Officers (CSOs). They explore the unique challenges faced by small businesses in building security risk management programs and how fractional securit…
  continue reading
 
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
  continue reading
 
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
  continue reading
 
Send us a text Ever wondered how a TI-84 calculator can be transformed into a powerful tool for ChatGPT? Join me, Sean Gerber, on this thrilling episode of the CISSP Cyber Training Podcast as we uncover this fascinating tale and explore the evolving landscape of data security. We'll dissect the crucial elements of Domain 2.6 of the CISSP exam, from…
  continue reading
 
In Episode 23 of the CvCISO Podcast, hosts Meg, Evan, and Jordon discuss the concept of radical acceptance and its implications for mental health. They explore how radical acceptance can help individuals cope with their realities, the stigma surrounding mental health, and the importance of self-acceptance. The conversation also touches on the diffe…
  continue reading
 
Host James Kernan discussses security offerings, specifically looking at offering vCISO services as part of your cyber security stack. 1.) MSP Question of the Week: Should you offer vCISO services? --- 2.) 5 Minutes with a Smart Person Host James Kernan sits down with Charlene Ignacio, CEO of Fornix Marketing, to discuss being strategic about M&A d…
  continue reading
 
In this episode, we dive into the rapidly evolving mobile security landscape, exploring how the rise in SIM swap attacks and data breaches shapes the market. We discuss the future of secure mobile services, highlighting key trends and challenges consumers must know. We also debunk common misconceptions about mobile security, particularly around SIM…
  continue reading
 
Breaking into Cybersecurity - DFIR Career Advice w/Cathy Ullman Dr. Catherine J. Ullman is a security researcher, speaker, author, and Principal Technology Architect and security at the University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a digital forensics and incident response (DFIR) specialist, …
  continue reading
 
Breaking into Cybersecurity - Solution Architecture w/ Evgeniy Kharam Evgeniy is an author, cybersecurity architect, advisor, podcaster, awarded dad, and outdoor enthusiast with over 25 years of experience, including work for global VAR/MSSP. He offers a unique, panoramic view of the industry. He runs cyber/media consulting services, leveraging his…
  continue reading
 
September is the month that we raise awareness around #suicide. Among the climbing statistics of accidental death or suicide, it is estimated that 22 #veterans #activeduty take their lives @VA health. Keep that in mind that @WHO Estimates that 1 person dies from suicide every 40 seconds. As a hashtag#veteran, @paul cummings has faced his share of m…
  continue reading
 
Greg Schaffer, founder of vCISO Services, LLC and a returning guest on Security Confidential, brings over 35 years of experience in IT and security, with 15 years as a CISO. He hosts the Virtual CISO Moment podcast and is the author of Information Security for Small and Midsized Businesses. 00:58 Our Guest01:59 What’s new with Greg?03:37 Changes in…
  continue reading
 
Loading …

Gyors referencia kézikönyv