CISO 공개
[search 0]
Download the App!
show episodes
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
주마다
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Artwork

1
CISO Tradecraft®

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
주마다
 
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
  continue reading
 
SC Media, and our sponsor Arctic Wolf, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
SC Media, and our sponsor Arctic Wolf, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Artwork
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
매달+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
  continue reading
 
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
매달
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
  continue reading
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Ciso - Il Podcat

Emanuele Cisotti

Unsubscribe
Unsubscribe
매달
 
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
매달
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus is on the foundational principles of cybersecurity. Dr. Cole emphasizes the importance of having a clear vision for one's career and life, urging listeners to avoid feeling stuck or numb by maintaining clarity on their goals. He highlights the common tendency to overlook basic …
  continue reading
 
Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intell…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Matt Radolec, senior director, incident response and cloud operations, Varonis. In this episode: Why is retaining cyber talent so ha…
  continue reading
 
This episode of CISO Tradecraft features a comprehensive discussion between host G Mark Hardy and guest Rafeeq Rehman, centered around the evolving role of CISOs, the impact of Generative AI, and strategies for effective cybersecurity leadership. Rafeeq shares insights on the CISO Mind Map, a tool for understanding the breadth of responsibilities i…
  continue reading
 
In this episode of The New CISO, Steve is joined by guest Ash Hunt, Global CISO at Apex Group Ltd. Today, Steve and Ash dive into the action of M&A (mergers and acquisitions) and how to conduct it well. As a CISO at one of the world’s largest administrators, Ash shares his valuable insight on loss, risk, and revenue generation in a constantly chang…
  continue reading
 
Troy Bowman is an Information Security Analyst for Costco Wholesale, specializing in application security. He is also a Navy veteran and has some excellent advice on those looking to enter cyber from military service. He also relays one of the most unique way I have heard to decompress with stress! --- Send in a voice message: https://podcasters.sp…
  continue reading
 
Fear, Uncertainty and Doubt: mensen bang maken voor niet-realistische risico's is schadelijk. Hierdoor zullen mensen ons minder snel serieus nemen als er echt iets aan de hand is. Baad het niet, dan schaad het niet; gaat hierbij zeker niet op. Het schaadt namelijk wel degelijk. Om wat voor soort risico's gaat het dan? De random USB stickjes op park…
  continue reading
 
Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intell…
  continue reading
 
In this episode of "Life of a CSO," Dr. Eric Cole emphasizes the critical importance of understanding both business and cybersecurity for aspiring or current Chief Information Security Officers. Dr. Cole underscores that effective CISOs must possess a deep understanding of business operations, financial management, and cybersecurity principles. He …
  continue reading
 
The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either conti…
  continue reading
 
The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either conti…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Joshua Brown, vp and global CISO, H&R Block. In this episode: Why is retaining cyber talent so hard? How can organi…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy welcomes Alex Dorr to discuss Reality-Based Leadership and its impact on reducing workplace drama and enhancing productivity. Alex shares his journey from professional basketball to becoming an evangelist of reality-based leadership, revealing how this approach helped him personally and professi…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, he explores the intricacies of the Chief Information Security Officer role, focusing on the prevalent "CISO paradox." This paradox highlights the disparity between the authority granted to business unit heads and the responsibility shouldered by CISOs for cybersecurity. Dr. Cole elucidat…
  continue reading
 
Evan Francen is the CEO of FRSecure and SecurityStudio. His mantra of focusing on the mission is inspiring, and his mission is to, simply put, fix problems. He is the founder of the CISSP Mentor Program and the Certified vCISO (CvCISO) training. Additionally, he authored The Information Security Industry is Broken (June 2018). The industry may be b…
  continue reading
 
Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability …
  continue reading
 
Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability …
  continue reading
 
Darius Davis is a cybersecurity professional with over 15 years of information technology experience. He's worked in a wide-range of areas from tech support, system administration, to networking and security engineering. In this episode, he provides four excellent points of wisdom for those looking to enter and advance in their cybersecurity career…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our guest, Alex Green, CISO, Delta Dental. In this episode: Is it true that employees cause as many significant cybersecurity …
  continue reading
 
This episode of CISO Tradecraft dives deep into the New York Department of Financial Services Cybersecurity Regulation, known as Part 500. Hosted by G Mark Hardy, the podcast outlines the significance of this regulation for financial services companies and beyond. Hardy emphasizes that Part 500 serves as a high-level framework applicable not just i…
  continue reading
 
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Zenobia Godschalk, Senior Vice President of Hedera Hashgraph, as they discuss distributed ledger technology and its effects on privacy compliance. Join us as we discuss the following: The erosion of Privacy Online Distributed Ledger Technology (…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus is on preparing oneself to become a Chief Information Security Officer, especially for those who lack experience. Dr. Cole emphasizes the importance of adopting the mindset and behavior of a CISO from an early stage in one's career. Drawing parallels to the concept of social en…
  continue reading
 
Richea Perry is a seasoned GRC and Cybersecurity Professional with an unwavering passion for securing today's digital environments. Throughout his journey, he has been at the forefront of shaping resilient network infrastructures, robust Governance, Risk Management, and Compliance strategies that are not just benchmarks, but catalysts for business …
  continue reading
 
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
  continue reading
 
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
  continue reading
 
Stanley Charles is the Founder of the Charles Technology Group and Senior Manager, Information Security and Compliance at Pixel United. I realized early in the discussion that we have similar career paths, from aircraft maintenance in the United States Air Force, to an early career in networking as a network engineer, to eventually land in the info…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Shawn Bowen, svp and CISO, World Kinect Corporation. In this episode: Is it true that CISOs feel their jobs are har…
  continue reading
 
In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain …
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus shifts from technical skills to mindset, highlighting the essential role of mindset in cybersecurity success. Dr. Cole emphasizes the importance of recognizing and challenging limiting beliefs, particularly in the context of transitioning from a security engineering background …
  continue reading
 
In this episode of The New CISO, host Steve is joined again by guest Ron Banks, CISO at Toyota Financial Services. In part two of his interview series, Ron shares his career advice for new cyber leaders. Listen to the episode to learn more about Ron’s take on China’s strategies, the importance of being inquisitive, and why we must be calm under cha…
  continue reading
 
Nick Mullen is the Founder and Principal Consultant at Sanguine Security Solutions and is also a Cybersecurity Program Mentor at Kennesaw State University. He is a technology leader dedicated to enabling teams and facilitating achievement, and his expertise is in program/project management, information security, IT governance, and compliance in the…
  continue reading
 
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
  continue reading
 
Robert Hill is a visionary leader with over three decades of expertise in the cybersecurity industry. As the founder and CEO of Cyturus Technologies, Inc, a leading Compliance and Risk Management solution provider, Robert has played an instrumental role in shaping the landscape of cybersecurity and helping organizations, navigate the complex challe…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Nadav Lotan, product management team leader, Cisco. In this episode: How can security teams do their jobs without seeming like an im…
  continue reading
 
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
  continue reading
 
Darin Hurd, EVP and CISO at Guaranteed Rate, explains the value of zero trust security in the financial sector. Lenders cannot control the federal funds interest rate or the state of the economy, which can change rapidly. However, they must respond and adapt to these variables and others while ensuring their infrastructure remains secure. Darin exp…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy delves into the critical subject of vulnerability management for cybersecurity leaders. The discussion begins with defining the scope and importance of vulnerability management, referencing Park Foreman's comprehensive approach beyond mere patching, to include identification, classification, pri…
  continue reading
 
In this episode of "Life of a CISO" with Dr. Eric Cole, he discusses the crucial role of mindset over technical skills in cybersecurity success. Dr. Cole emphasizes believing in one's worthiness for advancement and financial success. He also highlights the reality of cyber warfare, labeling it as World War Three due to the pervasive nature of cyber…
  continue reading
 
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
  continue reading
 
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
  continue reading
 
Nick Oles is an author, cybersecurity professional, and veteran. We cover many topics including his book How to Catch a Phish (available at https://lnkd.in/e35B8YHz) and career paths, including this preview where he reviews his beginnings in IT in college. I often say that working at a university is a great place to get foundational IT experience, …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest, Jamil Farshchi, evp and CISO, Equifax. In this episode: Data leaks are hard enough to deal with when caused by threat actors, but how bad is a…
  continue reading
 
This episode of CISO Tradecraft, hosted by G Mark Hardy, delves into the concept, significance, and implementation of tabletop exercises in improving organizational security posture. Tabletop exercises are described as invaluable, informal training sessions that simulate hypothetical situations allowing teams to discuss and plan responses, thereby …
  continue reading
 
In this episode of "Life of a CISO," Dr. Eric Cole, the host and cybersecurity expert, delves into the crucial transition from a tactical mindset to a strategic one as professionals ascend to the role of Chief Information Security Officer. Dr. Cole emphasizes the need to shift from being detail-oriented and tactical, as typical of a security engine…
  continue reading
 
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
  continue reading
 
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
  continue reading
 
Jonathan Mandell calls Chicago home and has worked across various tech roles, from Enterprise AE to Business Development. He was part of the founding team of Tiz, which later became Provi, a SaaS company reshaping the alcohol industry. He has worked in third party risk management (TPRM) for the past 5 years, and recently founded Teepee, a cybersecu…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our sponsored guest, Yoav Nathaniel, co-founder and CEO, Silk Security. In this episode: Why does it seem like securing APIs i…
  continue reading
 
Loading …

빠른 참조 가이드