CISO öffentlich
[search 0]
Mehr
Download the App!
show episodes
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Wöchentlich
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
SC Media, and our sponsor Spirion, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
Artwork
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
SC Media, and our sponsor Spirion, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
Artwork

1
CISO Tradecraft®

CISO Tradecraft®

Unsubscribe
Unsubscribe
Wöchentlich
 
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because we want to help you take your Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
  continue reading
 
Artwork
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Monatlich
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Artwork
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
  continue reading
 
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Monatlich+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
  continue reading
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Monatlich
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Artwork

1
Ciso - Il Podcat

Emanuele Cisotti

Unsubscribe
Unsubscribe
Monatlich
 
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
Monatlich
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
In the latest episode of "Life of a CISO," Dr. Eric Cole takes listeners on a motivational journey, blending his personal transformation with his professional narrative. He begins by recapping the three-part series of his career, detailing his early life, his tenure at the CIA, and his government work. In this episode, he focuses on his post-govern…
  continue reading
 
In this exclusive episode of the Professional CISO Podcast, the script is flipped as David Malicoat, our usual host, becomes the guest. With his mentor, Robert Pace, taking over the hosting duties, David opens up about his recent experience interviewing for a CISO position at a Fortune 500 company. From the initial approach to making it to the fina…
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is Steve Zalewski, co-host, Defense in Depth. Recorded live at BSidesSF. In this episode: Are companies taking the air out of the open source balloon? What’…
  continue reading
 
This episode of CISO Tradecraft features a conversation between host G. Mark Hardy and Chris Rothe, co-founder of Red Canary, focusing on cloud security, managed detection and response (MDR) services, and the evolution of cybersecurity practices. They discuss the genesis of Red Canary, the significance of their company name, and the distinctions be…
  continue reading
 
Als er iets is waar security mensen zoals ik goed in zijn, dan is het wel klagen (en heel hard lachen). Immers, het alternatief is veelal veel huilen en dat wil niemand. Erger jij je wel eens aan de clickbait-statistieken op LinkedIN? De oneindige stroom aan sales mensen en recruiters in je DMs, waarvan sommigen niet eens je naam goed schrijven (of…
  continue reading
 
In this episode of The New CISO, host Steve is joined by guest Sándor Incze, CISO at CM.com. Today, Sándor shares his untraditional path to a dual career in the Infosec and law enforcement industries. Through diligence, initiative, and automation, Sándor has been able to balance both of his life’s passions. Listen to the episode to learn more about…
  continue reading
 
Sam Glynn is the founder of Code In Motion, an independent consultancy firm that provides IT security advice and independent assurance to help SMEs prove they are taking reasonable steps to manage IT and cyber security risk. He ensures my clients are on the fast-track to align or certify to ISO27001. He is also the founder of MySecurityGuide.com, a…
  continue reading
 
🧠 In this episode of CISO Insiders, we welcome Dennis Tomlin, Chief Information Security Officer at Multnomah County. Dennis Tomlin, discusses in detail key challenges while sharing key security strategies on his career in cybersecurity for 20 years. This special episode will tackle the following topics: ⭐ Turning a culture of “no” to a culture of …
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
In this episode of "Life of a CISO," Dr. Eric Cole continues sharing his journey into the cybersecurity field. He reflects on his decision to major in computer science, which led him to work with the CIA, where his interest in cybersecurity deepened. This episode emphasizes the importance of growth and transformation, using a lobster's need to shed…
  continue reading
 
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
  continue reading
 
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
  continue reading
 
Andrew Wilder helps businesses, boards, and startups understand and address Cybersecurity Risk. He has broad range of Cybersecurity, Risk Management, Audit, Merger & Acquisition, Organizational Design, and International experience cultivated over more than two decades across several industries. He is a retained Chief Security Officer, an adjunct pr…
  continue reading
 
This episode of CISO Tradecraft, hosted by G Mark Hardy, features special guest Debbie Gordon. The discussion focuses on the critical role of Security Operations Centers (SOCs) in an organization's cybersecurity efforts, emphasizing the importance of personnel, skill development, and maintaining a high-performing team. It covers the essential aspec…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, listeners are treated to a personal journey through Dr. Cole's path to becoming a Chief Information Security Officer (CISO). From his humble beginnings on Long Island to his pivotal decision to major in computer science over architecture, Dr. Cole shares valuable insights and lessons lea…
  continue reading
 
Challenges and Opportunities in Small and Midsized Business Information Security - a special episode, recorded at BSides Nashville May 11, 2024. --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message
  continue reading
 
Deze talk is oorspronkelijk gegeven als key note op het event van het Digital Trust Center. Het is bedoelt voor het MKB om hen te laten zien waar hun daadwerkelijke risico's zich bevinden en waar zij zich dus op zouden moeten richten. Daarnaast benoem ik risico's die angst zaaien kunnen worden genoemd, omdat ze geen echte risico's zijn of niet real…
  continue reading
 
As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting esse…
  continue reading
 
As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting esse…
  continue reading
 
Darren Ritch has been in the IT Industry for 34 years, with AT&T about 20 and work in the CSO office. He also volunteers as a CISO for the past several years for a non profit and have helped them with HIPAA compliance, and recently earned the Certified Business Coach designation from Mindvalley. --- Send in a voice message: https://podcasters.spoti…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Martin Mazor, vp and CISO, onsemi. In this episode: Has the shine worn off the cybersecurity promise of MFA? Why ar…
  continue reading
 
GRSA/Compass Group is a global provider of food services and support operating in over 50 countries. How does CISO Adriano Lima, ensure his company remains secure while serving companies, schools, hospitals, oil platforms, and customers in remote locations around the world? Discover his secrets for success as he shares his experiences with Zscaler …
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predom…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus is on bridging the gap between the role of a Chief Information Security Officer (CISO) and the expectations of both executives and security professionals. Dr. Cole emphasizes the need to understand the fundamental responsibilities of a CISO, which extend far beyond technical se…
  continue reading
 
Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and …
  continue reading
 
Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and …
  continue reading
 
Curt Vincent is cyber security maverick and entrepreneur. Founder and leader of the 400 person Morgan Stanley Cyber Security Division for 15 years, Senior Vice President and COO for both the Global Networking and Applications Operations Command Center at Bank of America, VP of a Dev/Ops team at Goldman Sachs and a founder of 5 startup companies. Cu…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our guest, TC Niedzialkowski, CISO, Nextdoor. In this episode: Has the line between work and personal devices blurred? Why are we seeing signs that that …
  continue reading
 
In this joint episode of the Security Break podcast and CISO Tradecraft podcast, hosts from both platforms come together to discuss a variety of current cybersecurity topics. They delve into the challenge of filtering relevant information in the cybersecurity sphere, elaborate on different interpretations of the same news based on the reader's back…
  continue reading
 
In this episode of The New CISO, host Steve is joined again by guest Ash Hunt, Global CISO at Apex Group Ltd. Today, Ash shares how he transitioned from his career as a jazz musician into the vastly different world of cyber security. He also reveals his tips as a leader and a decision-maker. Listen to the episode to learn more about Ash’s unique pr…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, listeners are reminded that it's never too late to reset, regroup, and work on personal growth. Dr. Cole emphasizes the importance of continuous improvement, especially for those aspiring to become Chief Information Security Officers (CISOs) or currently holding the position. He shares i…
  continue reading
 
This week’s guest is Allen Rountree, Deputy CISO of IBM Public Cloud. David talks to Allen about Leadership in cybersecurity, being fluent in the language of risk, and risk specific to cloud computing. Allen and David both served in the Marine Corps and both served in the Marine Corps Security Forces (MCSF), so they have very similar early starts i…
  continue reading
 
The terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. Join us as we discuss why these gaps occur and what nee…
  continue reading
 
The terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. Join us as we discuss why these gaps occur and what nee…
  continue reading
 
Chris Kimpland is a cybersecurity leader with a passion for helping organizations advance their security posture and succeed in today's threat landscape. He has extensive Governance Risk and Compliance experience across multiple frameworks, standards, and regulations such as DFARS, HIPAA, PCI, and NCUA. In this episode we cover a variety of topics …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Aaron Shaha, CISO, CyberMaxx. In this episode: Is technical debt an inevitability in any organization? How do you go about "paying i…
  continue reading
 
In this episode of CISO Tradecraft, host G. Mark Hardy discusses seven critical issues facing the cybersecurity industry, offering a detailed analysis of each problem along with counterarguments. The concerns range from the lack of a unified cybersecurity license, the inefficiency and resource waste caused by auditors, to the need for a federal dat…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, listeners are welcomed into the world of cybersecurity leadership. Dr. Cole emphasizes the importance of recognizing one's strengths and weaknesses, highlighting that no one is perfect, and that's what makes us unique. He delves into the journey from being a security engineer to a Chief …
  continue reading
 
This week’s guest is Mike Pratt, Host and Owner of Digital Fight Club (DFC). Your host, David Malicoat, talks to Mike about how DFC started and how the show made it into the consciousness of the cybersecurity community. David reveals his history with DFC, as well as some back story on how DFC Cyber came together. Finally, Mike and David talk about …
  continue reading
 
John Christly is a cybersecurity evangelist, military veteran, former CIO/CISO/CTO, author, and instructor. Currently the Director of IT Security at Summit 7, he is a passionate IT and cybersecurity professional with decades of experience. He has served in key roles such as CIO, CISO, and CTO, helping organizations of all sizes to build resilient I…
  continue reading
 
For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar …
  continue reading
 
For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is my guest, Thom Langford, CISO, Velonetic. In this episode: Why do lots of businesses pledge to never pay ransomware demands? A…
  continue reading
 
In this episode of CISO Tradecraft, hosts G Mark Hardy and guests Jeff Majka and Andrew Dutton discuss the vital role of competitive threat intelligence in cybersecurity. They explore how Security Bulldog's AI-powered platform helps enterprise cybersecurity teams efficiently remediate vulnerabilities by processing vast quantities of data, thereby s…
  continue reading
 
Joshua Copeland is a seasoned cybersecurity professional and educator with 25 years of experience, with a focus on holistic cloud and on-prem security approaches and specific expertise in building and operating security stacks, SOC operations, and cybersecurity governance, risk, and compliance (GRC) processes. Additionally, he served 20 years in th…
  continue reading
 
Loading …

Kurzanleitung