It seems that the common theme is that there’s a gap between the security teams’ objectives and the end users’ convenience. Security leaders are tasked with protecting the company’s data. End users are tasked with performing their daily responsibilities i
Women in Cyber Security. Unfortunately, we we do not have ENOUGH women represented in the cybersecurity space. The empathy and human aspect is missing. Today, Eddie Thomason is speaking with
OSINT. Is it just a glorified google search? Unfortunately, we tend to brush off the skillset required to call yourself an OSINT master. It's not just a surface level web search. It requires deep web search and sometime dark web search…Today, Eddie Thomason is speaking with Mishaal Khan, vCISO of Mindsight as he shares his expertise on the topic of OSINT and how you can erase yourself from the internet.We'll unpack his passion towards educating everyone on how to help protect people from threats they aren't aware of. Let's get into it!You'll Learn:Two roles of a (v)CISOPersonal Privacy Infrastructure How to erase yourself from the internetOSINT's role in cyber securityThreat and privacy protection Surface web vs. deep web vs. Dark WebFull Show notes HERE
Experience. Every job requires it before you get a start. Unfortunately, we don't always have the experience required to get the big break into the role that we we're applying for. Today, Eddie Thomason is speaking with Pace Ellsworth, CEO of Nuclius as he shares his experience with breaking into tech and transitioning into cybersecurityWe'll unpack his passion towards assisting an African Nation with digitizing and documenting historical records and opportunities where YOU can help.Learn more about MbuyuLet's get into it!You'll Learn:Breaking into tech without a degreeResources to develop your skillsSniper approach vs Shotgun approachTransitioning from IT to cybersecurityMindset necessary to crush the interview Volunteer opportunities that will allow you to grow your skillset Full show notes HERE
Leadership. It's crucial for every business. Unfortunately, in the cyber security world, it's not an area where most of our time is spent. Today, Eddie Thomason is speaking with Chris Cochran, Co-Founder and CEO of Hacker Valley Media as he shares his thoughts behind building a leading himself and inevitably leading a team. We'll unpack his passion towards cyber security and his unique perspective of developing relationships with his people and helping them excel to the best versions of themselves.Let's get into it! Simone Biles Interview on YouTube You'll Learn:The impact accountability has on your successHow success in one area can lead to more successResources to invest in your leadership skillsTransitioning from Leading yourself to Leading a teamTrusting your team to make the right decisionsDeveloping your vision
Slight change up from your regularly scheduled program...Changes coming. If you have questions, feel free to reach out to Eddie on LinkedIn.Full show notes HERE
Branding. It's a term we've all heard before but it is only meant for companies?Times have changed drastically in the cyber industry over the past few years and it's important to make sure you're positioning yourself for opportunities throughout every stage of your career. Today we're speaking with Kimberly McKnight, Founder and executive Director of Cybersecurity Central as she shares her thoughts behind building establishing a personal brand and growing your network.We'll unpack her passion towards cyber security and her unique perspective of transition into the field from the hospitality industry. Let's get into it! Find Kimberly On YouTubeResource to A cyber Career Master Plan - AmazonYou'll Learn:A transition from Hospitality to CyberHow to establish a personal BrandLinkedIn tips to control your newsfeedEvents/resources to connect with other cyber professionalsTools to network effectivelyFull Show Notes Here:Connect with Eddie Here
Tools. They're always needed to perform our task most efficiently. Unfortunately, in the security world, testing tools isn't the simplest thing to do. What should you look for? How should you determine exactly what you need? Today we're speaking with Ron Eddings, Co-Founder of Hacker Valley Media as he shares his thoughts behind building a The framework that will help you select the best tool for your next security project.We'll unpack his passion towards cyber security and his unique perspective of developing relationships with vendors. Let's get into it! You'll Learn:How to be so good they can't ignore youHow to use the EASY FrameworkMindset towards vetting new toolsWhat Security Professionals prefer for testingSafe tips for sales people wanting to connect with security teamsGated content, why?Full show Notes HEREConnect with Eddie HERE
Build my Own Security team or Hire a MS(S)P? This is a common question most businesses will have to answer at some point of its' life. Unfortunately, there's no easy answer or “blue pill” that solves everyone's problems. What should you look for? How should you determine exactly what you need? Today Eddie Thomason is speaking with Karim Hijazi, CEO of Previalion as he shares his thoughts behind building a security team from scratch and things to look out for when hiring a MS(S)P? We'll unpack his passion towards educating security professionals and the rest of the business on how to be ore secure. You'll quickly connect with Karim's unique ability to break down complex concepts into easily digestible metaphors that you can understand and implement in your own security program. Let's get into it! Listen to Karim's first conversation HEREYou'll Learn:How to build a Security Team from ScratchWhat to Consider when hiring new talentHow to Identify the best talentWhat a MSP or MSSP should provideRed Flags from a MSSPThe impact team dynamic has on the success of the organization Full show notes HERE
Business. Most of us want to own one. Many of us have no idea how to keep it secure.Unfortunately, cyber security is typically an afterthought when it comes to new ventures. Understanding. Taking the time to fully understand the business and their specific needs from a people perspective is the most effective way to determine the best next steps as a new CISO.Today we're speaking with Keyaan J. Williams, Managing director at Class LLC as he shares his wisdom from dozens of conversations with CISOs to extract the best practices of taking over a new security team.We'll unpack his mindset towards working with the most successful CISOs the industry has to offer. You'll be challenged by Keyaan's different perspectives and mindset towards his approach towards Cyber Security.Let's get into it! You'll Learn:A car accident that changed Keyaan's lifeHow to approach Cyber through peopleHow Cyber security effects the business Understanding individual ambitions to communicate effectively Three questions to ask your people before making changes Process vs. Practice Sources from Keyaan:Leadership Conference/retreat mentioned on the show.Masterclass for Business Security ProfessionalsFull Show Notes Here
Success. It's something that we all chase but few of us actually achieve. Unfortunately, only 8% of people achieve their Goals according to Forbes. And each of those successful people either developed this one powerful skill to help navigate towards success. Communication. Learning how to communicate your value in a the terms of the person you are conversing with will catapult you towards achieving your own goals. Today we're speaking with Nick Espinosa, Chief Security Fanatic at Security Fanatics as he shares his wisdom from dozens of conversations with CISOs to extract the one trait that will set them apart.We'll unpack his mindset towards working with the most successful CISOs the industry has to offer. You'll quickly connect with Nick's humor and passion towards simplifying cyber security.Let's get into it! You'll Learn:Understanding Risk over Cyber Security Systems How to calculate risk Why Communication is the #1 trait of an effective CISOBooks to develop your communication skills Nerd to English translation Speaking tech to non-techy people Connect with Eddie ThomasonFull Show note HERE
Networking. We all hear know we need to do it but what are some of the best practices?Unfortunately, most people only network when they need something..A new job, started a new business, etc…In reality, networking works best when you've built a network BEFORE you need it. Today we're speaking with Devin Price, Security Analyst at NowSecure as he shares his best tips for networking properly.We'll unpack his mindset towards connecting with security professionals genuinely to establish quality relationships.You'll quickly connect with Devin's passion to help other break into Cyber with the skillsets they currently have. Let's get into it! You'll Learn:Devin's journey into Cyber SecurityHow to Network with relationships in mindHow to learn about leader you want to connect with BEFORE connectingHow to utilize LinkedIn to increase your chances of breaking into CyberTips on how NOT to sell to Security leaders How adding value increases trust with your networkFull show notes HereFind Devin's Blog Here
Zero Trust. What is it? Why is everyone else talking about it?Unfortunately, most employees believe that Zero trust means that they're completely restricted and connect have access to do their jobs.Where it's actually quite opposite. Today we're speaking with Nat Shere, Security Consultant at Crafted Compliance as he shares his thoughts behind Zero Trust. We'll unpack his mindset towards enabling employees to embrace zero trust and see the benefits of working for an organization that has policies in place. You'll quickly connect with Nat's passion towards educating and the masses about proper security policies.Let's get into it! - Eddie Thomason Full Shote Notes HereCheck out Nat's Blog Here
Offensive Security. It's typically frowned upon in the Cyber Security community…Unfortunately, “Hack Back” can lead to some serious consequences if the proper safeguards aren't in place. How do you gather the right intelligence? Is it time to hack those who are hacking us? Today we're speaking with Karim Hijazi, CEO of Previalion as he shares his thoughts behind offensive security. We'll unpack his passion towards evolving into the sea urchin or the porcupine in toady's modern Cyber Security landscape. You'll quickly connect with Karim's unique ability to break down complex concepts into easily digestible metaphors that you can understand and implement in your own security program. Let's get into it! You'll Learn:Offensive Security vs. Defensive securityHow to evolve into a PorcupineHow to source intelligence Boundaries to be aware of when thinking offensivelyShould we hack the hackers?How to pro-actively managing risk to steer away hackers Full Show Notes HereConnect with Karim hereListen to Karim's Podcast, Introverted Iconoclast Here
Privacy. It's a buzz word across every industry right now. Unfortunately, our data and information may not be as private as we may all think. What does the cloud do with your information? Are businesses focused more on productivity or keeping your data private? Today we're speaking with Alexandre Blanc, Security Advisor for VARS Corporation as he talks about his hesitations with trusting the cloud for your individual privacy.We'll unpack his mindset towards Cloud security vs privacy and dive deep into the difference between the two. You'll quickly feel the energy Alexandre brings to the conversation. He's passionate about encouraging us all to THINK about our privacy and take the necessary steps to keep our person info private.You'll Learn:The difference between Privacy and SecurityHow Businesses see YOUR dataThings to question about the cloudBig business agenda vs public perceptionWho is accountable for breachesFull show notes HereConnect with Alexandre Here
Promotions. It's something we all strive for within the companies we serve.Unfortunately, they sometimes require us to step outside our own comfort zones where we found ourselves feeling overwhelmed or unworthy of our new role.Does my team believe I can lead them? Does it look like I know what I'm doing? Do they like me? Today we're speaking with Rafael Nunez, Senior Solutions Architect at Sirius, a CDW Company, as he shares stories of his transition from Military in to cyber security. We'll unpack his mindset towards leading security teams, useful tips to empower your people with that they need, and much more. You'll quickly feel the Energy Rafael brings to the conversation. He's passionate about empowering people to perform to the best of their ability, not just in their cybersecurity roles but in all aspects of their life. Let's get into it! You'll Learn:Military transition into CyberSecurityHow to prepare your mind to lead othersHow humility will help you lead your team betterWhy taking care of your people is the best investment you can make How to hype your team operate in their strengths How to take control of what you CAN control Full Show Notes HereConnect with Rafael Here Subscribe to Rafael's YouTube Here
Breaking into cyber. It's one of the top searched questions on the internet.Unfortunately, there's not exact clear path that some HAS to follow in order to penetrate into the industry…(see what I did there?)It may be difficult, but at the end of the day, it's worth it. Today we're speaking with William Dodgen, Cyber Security Manager at DataLocker who shares his origin story and perspective on what is required to break into your first cyber security role. We'll unpack his mindset towards how to break into security, useful tips to earn your first role in Cyber and much more. You'll find that William is passionate about protecting data and dedicated to putting in the extra hours to ensure that information is secure. Let's get into it!You'll Learn:Things you need to know to get into CyberHow to break things in order to fix themWhy to make yourself available to company end usersImportant certifications that would be beneficial What's important to protect? Avoid chasing rabbits Insight into daily activities as a Cyber Professional Full Show notes Here Connect with William Here
End user engagement in security practices. It's what EVERY security teams wants.Unfortunately, when we typically approach our end users with security protocol and company phishing attacks, we are usually met with more rebellion. It could also lead to more security risk. That's the last thing we want - more vulnerabilities that we cannot control.Today we're speaking with Endre Walls. Endre is the CISO for Customers Bank - an organization that embraces security throughout and believes that every employee is responsible for the security of the company. We'll unpack his mindset towards how to think about security, useful tips to encourage your end users to play their part, and much more. You'll find that Endre has a unique sense of humor and a genuine passion to continue to innovate when it comes to technology instead of merely iterating what has already been done. - Let's get into it! You'll Learn:The intersection between Technology and CultureWhat Pop-Tarts teaches us about innovationHow to create a security culture within your organizationThings to consider with vendor partnerships How to earn the ear of the CEOHow to get your end users involved in Security responsibilityFull Show Notes hereConnect with Endre here Learn more about Endre directly on his website Here.
Secure Information. It's something we all want.Unfortunately, as end users, we are often times frustrated with the restrictions enforced by our security teams. It makes work more cumbersome.It could also lead to a decrease in productivity. That's one of the worst things in the world - when we can't do or jobs efficiently due to permissions that aren't available to us.Today we're speaking with Archie Jackson. Archie has been in the Cyber Security industry for over 2 decades and he's happy to share his insights in establishing/maintaining a productive career in the industry.We'll unpack his mindset towards how to think about security, useful tips to encourage your end users to play their part, and much more. You'll find that Archie has a genuine heart to help the entire security industry to level up - Let's get into it!What You'll learn:Tips for how to get started in Cyber SecurityMindset for teaching your team HOW to think instead of WHATWhy it's important to take care of the people (your team and your end users)Archie's predictions for future security challenges Tips for unifying security teams and the people they serve.Full Show notes and more about Archie here.Connect with Archie here.
To be fully transparent - I didn't know a THING about the cyber security industry.Unfortunately, as people, we are sometimes afraid to admit that we don't know something because we're scared that others may question our competence or our ability to help them.So why did I create the Simply Secure Podcast? I wanted to learn.Today I'm taking the time to share the origin story of why I started the show in the first place. We'll unpack some of the mindset behind the show and spend time sharing the vision for the show.You'll Learn:How I landed in the Cyber Security industry in a Vendor role Mindset towards building a strong LinkedIn networkInitial vision for the showHow Archie Jackson influenced the vision for the showWhat to expect on future episodes Connect with Eddie hereLinkedIn Post referenced in the show hereFull show notes here
Wondering what you should expect when you listen to the Simply Secure Podcast? Well, this quick trailer should give you an idea!Full Episode will Launch April 27th!Connect with Eddie on LinkedIn Here.Subscribe to the Show on Spotify HereSubscribe to the Show on Apple Podcast HereJoin the #SSPTribe Here