CyberCast

Follow CyberCast
Share on
Copy link to clipboard

Host Angela Rizzo sits down with other cybersecurity experts to discuss the latest trends, developments, and challenges that are shaping the cyber landscape. Tune into CyberCast to hear the stories and conversations that are changing the way we think about the industry.

esentire

  • Dec 1, 2020 LATEST EPISODE
  • monthly NEW EPISODES
  • 18m AVG DURATION
  • 20 EPISODES


Search for episodes from CyberCast with a specific topic:

Latest episodes from CyberCast

Season 3 - Episode 18: Safely Disposing of the Needle in the Haystack: Managing the Cybersecurity Risks of Healthcare IoT

Play Episode Listen Later Dec 1, 2020 28:12


In today’s healthcare world, it’s not just about finding the needle in the haystack. It’s knowing how to safely dispose of the needle once you have found it. As healthcare organizations rely on a fully digitized and interconnected treatment ecosystem, facilities struggle to protect patient security and privacy and to prevent facility-wide cybersecurity disruptions. Join cybersecurity author Mark Sangster and healthcare cybersecurity expert Richard Staynings as they explore how hospitals can protect their patients and ensure continuous operations. Learn more about healthcare cybersecurity with this Solution Brief.

Season 3 - Episode 17: Cybersecurity Claims in 2020: Going Beyond Making Your Business Whole

Play Episode Listen Later Oct 20, 2020 26:36


Ransomware and business email compromise is a billion-dollar a year cybercrime industry that can put any organization at risk. Fake invoices, compromised credentials and exfiltrated data can cost your organization millions. In today’s climate, a strong cybersecurity strategy has to include a strong cybersecurity insurance policy.    Join eSentire’s Vice President and Industry Security Strategist Mark Sangster and Catherine Lyle, Head of Claims at Coalition, Inc., as they discuss shifts in the cybersecurity insurance industry, coverage trends and what happens when you make a claim. 

Season 3 - Episode 16: The Devil Is in the Details: Client-Attorney Privilege in Cybersecurity Breach Litigation

Play Episode Listen Later Sep 23, 2020 21:24


In May 2020, in the midst of a class-action suit against Capital One, the banking conglomerate was ordered to produce the cybersecurity incident response report at the heart of a 2018 cybersecurity breach that exposed over 100 million confidential financial records. This ruling created a tectonic shift in the way companies position their legal representatives to protect potentially damning information from discovery during the legal process.   Listen in as eSentire’s Mark Sangster and legal expert Justin Daniels, of Peachtree Living Labs, examine determining factors in the ruling and how companies should approach cybersecurity and legal best practices going forward.

Season 3 - Episode 15: Managing Industry 4.0 Cybersecurity Risks

Play Episode Listen Later Aug 20, 2020 47:59


Benefit from Industry 4.0 initiatives without falling victim to debilitating cyberattacks with these insights for manufacturers that include: How digital transformation and new intelligent solutions have caused the threat surface to increase substantially How to avoid common mistakes, enable effective cybersecurity governance, understand operational security considerations, manage supply chain risk and outsource risk management

Season 3 - Episode 14 - Part 3: An Examination of the MITRE Modern ATT&CK Framework: Principle and Applications

Play Episode Listen Later Jan 22, 2020 22:45


As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.

Season 3 - Episode 14 - Part 2: An Examination of the MITRE Modern ATT&CK Framework: Principle and Applications

Play Episode Listen Later Jan 22, 2020 27:32


As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.

Season 3 - Episode 14 - Part 1: An Examination of the MITRE Modern ATT&CK Framework: Principles and Applications

Play Episode Listen Later Jan 22, 2020 25:06


As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.

Season 3 - Episode 13: Threat Hunting in the Cloud

Play Episode Listen Later Nov 27, 2019 20:03


Listen and learn about the best practices for securing a cloud environment (AWS/Azure) and methods that can be employed to conduct threat hunting exercises against collected data, as discussed by Kurtis Armour and Jacob Gant, senior security strategists at eSentire. They also delve into how investigative details and context can be gained by the correlation of endpoint and cloud events. 

Season 3 - Episode 12: Humans and the Machine - Why Security Operations Still Matters

Play Episode Listen Later Nov 7, 2019 11:55


eSentire's U.K. Threat Intelligence Spotlight highlighted a 140% yearly increase in cybersecurity incidents experienced by U.K. businesses. Cybersecurity threats continue to increase as adversaries develop sophisticated targeting techniques. Many of these threats are preventable by traditional security technologies and platforms to flag unusual behaviour. However, the most advanced threats are often those that lurk undersurface – and that’s where a skilled security operation comes in.

Season 3 - Episode 11: Protecting sensitive data in an increasingly borderless world

Play Episode Listen Later Oct 9, 2019 20:40


Cybersecurity risk is unavoidable, but a sensitive data breach does not have to be. In this podcast we dissect the mindset and motivations of hackers, discuss the likelihood of a breach event, and explore ways business can protect their sensitive data from unauthorized exposure.

Season 2 - Episode 10: The Robot Revolution will not be Televised

Play Episode Listen Later Mar 14, 2019 12:31


Artificial Intelligence and Machine Learning are popular topics among cybersecurity leaders. In theory, the technology can be a companion to human intelligence.  But in practice, the details surrounding its success stories and challenges are cloudy. In this episode, we’ll explore a highly successful use case that demonstrates how Machine Learning can solve real problems in cybersecurity, and how common pitfalls can be avoided.

Season 2 - Episode 9: Best Cybersecurity Practices for UK Businesses

Play Episode Listen Later Mar 13, 2019 11:09


In 2018, EU GDPR regulations changed the face of data privacy and dominated the cybersecurity conversation in Europe. But cybersecurity professionals working with UK organizations can’t afford to confuse the GDPR’s privacy regulations with security regulation. In this podcast, we’ll explore trends how businesses balance the need for data protection regulations and evolving cybersecurity technology.

Season 2 - Episode 8: Cybersecurity and the Board: Demonstrating Reasonable Care

Play Episode Listen Later Mar 13, 2019 12:38


In the aftermath of a breach, you’ll need to demonstrate to your board and other key stakeholders that you put reasonable care into identifying and mitigating risks to your organization. That means going above and beyond compliance.  In this episode, we’ll discuss the steps you can take right now to ensure you’re prepared to demonstrate reasonable care after a breach.    

Season 2 - Episode 7: An MSSP in MDR's Clothing

Play Episode Listen Later Mar 13, 2019 9:46


Many Managed Security Service Providers (MSSP) are attempting to deliver Managed Detection and Response (MDR) services. Few are equipped to do so. In this episode, we’ll discuss the distinctions between an MSSP and a pure play MDR provider, and how organizations can benefit from a true MDR approach.

Season 2 - Episode 6: Luring the Phish, Bypassing the Host

Play Episode Listen Later Feb 21, 2019 14:13


Endpoints are popular targets for sophisticated threat actors, many of whom know they can bypass traditional antivirus solutions. So how can organizations with limited resources modernize their endpoint defense? In this episode, we’ll explore how organizations can secure their endpoints with next generation antivirus and human expertise.

Episode 5: Next Generation Threat Visibility

Play Episode Listen Later Dec 14, 2018 11:20


Join host Angela Rizzo as she speaks with eSentire Director of Product Marketing, Wes Hutcherson, about a next generation solution for threat visibility and hunting. Traditional SIEM platforms are no longer providing security teams with the visibility they need to keep up with modern threats. Wes describes how eSentire’s esLOG+ is revolutionizing logging platforms by enabling full spectrum threat detection and response.

Episode 4: The Global Threat Landscape

Play Episode Listen Later Dec 6, 2018 10:36


Join host Angela Rizzo as she speaks with eSentire’s Vice President of Strategy, Alex Jinivizian, about the challenges facing modern security teams. Increasing IT complexity is leaving a wider netof targets for threat actors, creating more challenges for security officers and their teams. Alex describes how an end-to-end MDR solution can provide a more predictive approach to securingyour IT infrastructure against cyberattacks.

Episode 3: Financial Cyber Crash

Play Episode Listen Later Dec 5, 2018 11:01


Join host Angela Rizzo as she speaks with eSentire President & COO J. Paul Hayes about an asset management firm in trouble. The average cost of a breach within the financial industry is $18.3 million dollars. So when one financial firm discovered a breach, they had to act fast. J. Paul describes how that firm was able to respond quickly and save millions in losses. It’s the rare financial cyberattack story that has a happy ending.

Episode 2: The Healthcare Scare

Play Episode Listen Later Dec 5, 2018 7:18


Join host Angela Rizzo as she speaks with eSentire founder Eldon Sprickeroff about a healthcare facility facing a cyberattack. Healthcare facilities are a prime target for bad actors due to the sensitive information they store. Eldon describes how one healthcare facility confronted a potentially devastating cyberattack, and found a solution that pulled them back from the brink of disaster.

Episode 1: The Evolution of Managed Detection and Response

Play Episode Listen Later Dec 5, 2018 13:01


Join host Angela Rizzo as she speaks with eSentire Vice President of Strategic Marketing Mark Sangster about an evolving Managed Detection and Response solution. The threat landscape is continuously expanding, forcing information security teams to adapt their solutions to new threats. Mark describes how eSentire has developed an evolving MDR solution that leverages artificial intelligence and human expertise to stay one step ahead of threat actors.

Claim CyberCast

In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

Claim Cancel