POPULARITY
Send us a textJoin Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore:CyberSaint's Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics.Career Insights: Matthew shares his journey, from running startups to advising new ventures, and how he balances multiple roles (CPO, podcast host, advisor, and family man).Leadership & Communication: Why CISOs need to speak the language of business to earn a seat at the boardroom table.Practical Tips: Advice on avoiding burnout, building a mentorship network, and leveraging your personal brand in cybersecurity. Free Cyber Risk Analysis: Visit CyberSaint.io to benchmark your organization's cyber risk against industry peers. Connect with Matthew: Find him on LinkedIn Matthew Alderman or X @Maldermania Listen to Matthew's Podcast: Check out Business Security Weekly at securityweekly.com/BSW.Chapters00:00 Reconnecting and Reflecting on Podcasting Journey02:19 Balancing Multiple Roles and Responsibilities05:44 The Importance of Personal Well-being07:53 Career Goals and Retirement Aspirations10:31 Integrating Consulting and Podcasting11:55 The Value of Mentorship in Professional Growth15:02 Building Trust and Reputation in Networking16:39 Leveraging Podcasting for Career Opportunities18:20 Innovations in Cyber Risk Management23:07 Integrating Risk and Control Data25:30 The Importance of Risk Quantification28:33 Communicating Cyber Risk to the Board30:41 CISO's Role in Business Strategy33:03 Free Cyber Risk Analysis Offering36:20 Customizing Risk Models39:58 Real-Time Risk Monitoring42:24 Targeting Public Companies for Cyber Risk Solutions45:14 Closing Thoughts and Future DirectionsSubscribe for more cybersecurity insights, leadership tips, and industry trends! Drop your thoughts in the comments below—how do you approach cyber risk in your organization?Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
BONUS: AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World with Dr. Eric Cole In this BONUS episode, we explore the evolving landscape of cybersecurity in the age of artificial intelligence. Dr. Eric Cole, a renowned cybersecurity expert and author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, shares critical insights about how AI is transforming security strategies. From the privacy concerns of our always-connected devices to practical tips for protecting your business and personal information, this conversation offers essential knowledge for navigating our increasingly digital world. The Double-Edged Sword of AI in Cybersecurity "We are giving away our IP, our data, and our privacy. The data set is what gives value to AI." The rise of artificial intelligence presents both opportunities and serious risks in the cybersecurity landscape. Dr. Cole emphasizes that while many focus solely on AI's benefits, we often overlook the fact that we're surrendering vast amounts of our sensitive information, intellectual property, and private data to AI providers. This data becomes the foundation of AI's value and capabilities, creating a significant privacy concern that many organizations fail to properly address. As we embrace these new technologies, we must carefully consider what information we're willing to share and what safeguards should be in place. Modern Attack Vectors: The Human Element "Attacks today are mostly social engineering. We end up having to retrain people to not trust their email." Today's cybersecurity threats have evolved beyond traditional technical exploits to focus primarily on social engineering—manipulating people into compromising their own security. Dr. Cole explains that modern attackers increasingly target the human element, requiring organizations to fundamentally retrain employees to approach communications with healthy skepticism. Particularly concerning are mobile threats, as our phones constantly record audio and other personal data. Dr. Cole warns that "free" apps often come with a hidden price: your privacy and security. Understanding these attack vectors is essential for developing effective defense strategies in both personal and professional contexts. Cybersecurity as a Business Enabler "Security is not a barrier, not an obstacle. Cybersecurity is a business enabler." Dr. Cole challenges the common perception that security measures primarily restrict functionality and impede business operations. Instead, he reframes cybersecurity as a critical business enabler that should be integrated into strategic decision-making. Organizations need to make deliberate decisions about the tradeoffs between security and functionality, understanding that proper security measures protect business continuity and reputation. Dr. Cole particularly warns about supply chain attacks, which have become increasingly prevalent, and emphasizes that awareness is the foundation of any effective protection strategy. He recommends centralizing data for easier security management and advises that client devices should minimize storing sensitive data. Mobile Phones: The Ultimate Tracking Device "You don't go anywhere without your cell phone. Your cell phone is never more than a foot from you it's with you wherever you go... which means if somebody wants to track and monitor you they can." We often worry about theoretical tracking technologies while overlooking the sophisticated tracking device we voluntarily carry everywhere—our mobile phones. Dr. Cole points out the irony that people who would never accept being "chipped" for tracking purposes willingly keep their phones within arm's reach at all times. These devices record our locations, conversations, messages, and activities, creating a comprehensive digital trail of our lives. With access to someone's phone, anyone can trace their movements for months and access an alarming amount of personal information. This risk is compounded when we back up this data to cloud services, effectively giving third parties access to our most sensitive information. Understanding these vulnerabilities is the first step toward more mindful mobile security practices. Business Opportunities in the Security Space "We have too much information, too much data. How can we use that data effectively?" The cybersecurity landscape presents significant business opportunities, particularly in making sense of the overwhelming amount of security data organizations collect. Dr. Cole identifies data correlation and effective data utilization as key investment areas. Modern security systems generate vast quantities of logs and alerts, but transforming this raw information into actionable intelligence remains a challenge. Companies that can develop solutions to effectively analyze, correlate, and extract meaningful insights from security data will find substantial opportunities in the market, helping organizations strengthen their security posture while managing the complexity of modern threats. Essential Training for Security-Conscious Developers "Go for secure coding courses. This helps us understand how software can be exploited." For software developers looking to build more secure applications, Dr. Cole recommends focusing on penetration testing skills and secure coding practices. Understanding how software can be exploited from an attacker's perspective provides invaluable insights for designing more robust systems. By learning the methodologies and techniques used by malicious actors, developers can anticipate potential vulnerabilities and incorporate appropriate safeguards from the beginning of the development process. This proactive approach to security helps create applications that are inherently more resistant to attacks rather than requiring extensive security patches and updates after deployment. About Dr. Eric Cole Dr. Eric Cole is the author of "Cyber Crisis, Protecting Your Business from Real Threats in the Virtual World." He is a renowned cybersecurity expert with over 20 years of experience helping organizations identify vulnerabilities and build robust defense solutions against advanced threats. He has trained over 65,000 professionals worldwide through his best-selling cybersecurity courses and is dedicated to making cyberspace a safe place for all. You can link with Dr. Eric Cole on LinkedIn, or visit his company's website Secure-Anchor.com.
The following article of the Tech industry is: “Cybersecurity 2025: 5 Critical Trends Reshaping Business Security” by Santiago Fuentes, Co-Founder and CEO, Delta Protect.
At ThreatLocker Zero Trust World 2025 in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled The Grand Delusion. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.Challenging the Status QuoCunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn't be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.Zero Trust as a Strategy, Not Just a TermThe session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.Actionable Steps for Small BusinessesCunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.The Future of Zero TrustLooking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today's digital world.Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.Guest
In this episode of The Daily Windup podcast, we have a former cybersecurity expert who emphasizes the importance of developing a security plan for businesses, regardless of size or industry. He explains that such a plan is a living document that should grow and evolve as a company expands. They discuss various certifications and plans, including ISO 9,000, CMMC, and ISMS, that a company can consider depending on its needs. The conversation also delves into the administrative processes that are the backbone of a security plan. This episode serves as a valuable resource for business owners who are starting to think about their security plan and want to understand how to develop it as their business grows. Listen now and learn more!
This episode explores the Dell Technology Advantage, emphasizing secure infrastructure, Managed Detection and Response (MDR) services, and robust data protection solutions like PowerProtect Cyber Recovery. Together, they discuss how these innovations empower businesses to reduce threats, enhance incident response, and ensure cyber resilience.
Please enjoy this encore episode with VP of Information Security at Barracuda Dave Farrow, and how he shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore episode with VP of Information Security at Barracuda Dave Farrow, and how he shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Why do cybercriminals ramp up their attacks during the festive season? In this episode of Diritto al Digitale, Giulio Coraggio of the global law firm DLA Piper, dives into the growing risks of ransomware and phishing during Christmas—a time when businesses are most vulnerable. Learn why hackers target this crucial period, how an attack can cripple operations during peak revenue weeks, and discover essential strategies to stay prepared. Tune in to uncover how legal and technical preparedness can protect your business from holiday cyber chaos!Send us a text
In this episode, host Raghu Nandakumara sits down with Neil Thacker, CISO EMEA at Netskope. Neil joined the show to discuss the evolving role of the CISO, as well as the challenges and opportunities they face in the context of new technologies. --------“A good friend of mine is a CIO for a very large organization and he shared a great story. Obviously, during the pandemic, everyone was working remotely and they set up this whole Zero Trust principle and policy set to better secure their remote workers. It was interesting, he said, when everyone started coming back into the office, we realized we had better security when everyone was remote because of the changes that we made. So, we wanted to apply those same principles to our internal network and then we realized, can we just get rid of our internal network, our corporate network?”--------Time Stamps (03:14) The role of the CISO and its evolution(07:59) Challenges and opportunities in the CISO role(21:49) Importance of context in security operations(31:54) Simplifying compliance and driving innovation(45:23) Advice for Aspiring CISOs --------SponsorAssume breach, minimize impact, increase resilience ROI, and save millions in downtime costs — with Illumio, the Zero Trust Segmentation company. Learn more at illumio.com.--------LinksConnect with Neil on LinkedInIllumio World Tour
Politically Entertaining with Evolving Randomness (PEER) by EllusionEmpire
Send us a textUnlock the secrets to securing your startup in our latest episode with Kevin Barona, founder and CEO of Cycore Secure. Gain invaluable insights as Kevin shares his entrepreneurial journey and the motivations that drive him beyond mere financial success. Discover why creating genuine value is a magnet for business success and how early and mid-stage companies can navigate the complexities of cybersecurity compliance to land large contracts.As we navigate through the current landscape shaped by COVID-19, Kevin emphasizes the heightened necessity for robust cybersecurity measures, regardless of company size. Learn how small businesses and large organizations alike are grappling with the challenges posed by remote work and the escalating importance of protecting sensitive information. Understand why achieving certifications like SOC 2 and ISO 27001 is critical for establishing trust with potential customers and overcoming the hurdles to 100% cybersecurity compliance.Dive deeper into the human element of cybersecurity, where even the most secure networks can be undermined by human errors. Kevin sheds light on the importance of fostering a cyber-safe culture, effective governance, and thorough documentation. Moreover, we explore the dynamic nature of security systems, including the dual role of AI and the importance of both cloud and local backups for data preservation. This episode is a must-listen for any business leader aiming to stay ahead in an increasingly digital world.Follow Kevin at ...https://www.cycoresecure.io/Linkedinhttps://www.linkedin.com/in/kbarona/Twitterhttps://x.com/kevbaronaIf you want to be a guest on my podcast, join PodMatch by clicking on the provided linkhttps://www.joinpodmatch.com/politically-high-techSupport the showFollow your host atYouTube and Rumble for video contenthttps://www.youtube.com/channel/UCUxk1oJBVw-IAZTqChH70aghttps://rumble.com/c/c-4236474Facebook to receive updateshttps://www.facebook.com/EliasEllusion/Twitter (yes, I refuse to call it X)https://x.com/politicallyht
Former FBI ASAC Steve Hooper joined Mike to discuss the security questions surrounding the second assassination attempt on Donald Trump.
In today's episode, we'll hear from Craig Jeffery about payment security assessments—what they are, who conducts them, and why they are crucial for your business. Listen in to learn more.
Welcome to another insightful episode of the Inner Edison Podcast! In this week's episode, Ed sits down with serial entrepreneur Colin Sanburg to discuss the critical importance of securing both personal and business information in today's digital age.
Steve Hooper joins Mike to share his insights on the USSS Director Kim Cheatle resignation.
Steve Hooper joins Mike to discuss the United States Secret Service Director Dr. Cheatle's testimony about the security failures at the Pennsylvania Trump rally.
Steve Hooper joins Mike to discuss the security failures at the Trump rally.
My special guest is an author, attorney, former Chicago prosecutor, and career Federal Bureau of Investigation special agent who authored Stop the Killing: How to End the Mass Shooting Crisis and How to Talk About Guns With Anyone. She is a founding member of the Bureau Consortium, bringing the best skills together in violence prevention, and runs her own security consulting firm, Schweit Consulting LLC. She provides analysis to print, radio, network, and streaming services on issues related to mass shootings, active shooters, threat assessments, school and business security, law enforcement matters, critical incidents, crisis communications, and other security-related matters. And she is also the host of the Stop the Killing Podcast. https://www.katherineschweit.com/http://www.yourlotandparcel.org
Steve Hooper joins Mike to talk about the security threats from the southern border crisis.
Send Everyday AI and Jordan a text messageIf you think you know scammers, just wait. ↳ Voice cloning will fool the best of us. ↳ Deepfakes are getting sophisticated. ↳ Once-scammy emails now sound real. How can AI help? In a lot of ways. Yuri Dvoinos, Chief Innovation Officer at Aura, joins us to discuss AI's role in scam detection and prevention. Newsletter: Sign up for our free daily newsletterMore on this Episode: Episode pageJoin the discussion: Ask Jordan and Yuri questions on AI and scam detectionRelated Episodes: Ep 182: AI Efficiencies in Cyber – A Double-Edged SwordEp 202: The Holy Grail of AI Mass Adoption – GovernanceUpcoming Episodes: Check out the upcoming Everyday AI Livestream lineupWebsite: YourEverydayAI.comEmail The Show: info@youreverydayai.comConnect with Jordan on LinkedInTopics Covered in This Episode:1. Sophistication of AI in Scams2. Countermeasures to Combat AI Scams3. Deepfakes and Their Increasing PrevalenceTimestamps:01:20 Daily AI news04:45 About Yuri and Aura07:32 Growing impact of impersonation and trust hacking.12:35 Consumer app with state-of-the-art protection.13:48 New technology scans emails to protect users.19:36 Need for awareness of sophisticated multi-platform scams.20:33 Be cautious of potential multichannel scams26:44 Scams are getting sophisticated, AI may worsen.30:05 Different organizations need varying levels of security.31:25 Deepfakes raise concerns about truth and trust.34:47 It's hard to detect scam communication online.Keywords:AI Scams, Jordan Wilson, Yuri Dvoinos, Deepfakes, AI Technology, Verification System, Online Interactions, Cyberattacks, Business Security, Scam Detection, Communication Channel Verification, Language Models, AI impersonation, Small Business Scams, Scammer Automation, Aura, Message Protection Technology, Call Analysis, Email Scanning, Voice Synthesizer Technology, Multichannel Scams, 2FA, Cybersecurity Training, Digital Trust, Cybersecurity, Sophisticated Corporate Scams, OpenAI, NVIDIA, Aura Cybersecurity Company, Online Safety. Get more out of ChatGPT by learning our PPP method in this live, interactive and free training! Sign up now: https://youreverydayai.com/ppp-registration/
Welcome to the future of business security, productivity, & user experience with Identity Access Management (IAM). Dive into the insightful conversation between Kelsey & Mariah, an IAM Analyst, as they explore the critical role IAM plays in today's digital landscape. Discover how IAM components like authentication, authorization, & more enhance operations & mitigate risks. Gain valuable advice on strengthening IAM initiatives to align with your business goals.
In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.Embracing Technology for Business SuccessThe theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.Navigating the Complexities of Application EnvironmentsAs organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.Addressing Concerns of API-Driven AttacksThe conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.Empowering Organizations with Comprehensive Security SolutionsWith the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.Driving Operational Efficiency and FocusIn a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.Securing Applications AnywhereAs applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.ConclusionThe engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.Thank you for joining us in this exploration of cybersecurity and business resilience.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Nanhi Singh, Chief Customer Officer and GM Application Security at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/nanhi-singh-aa51371On Twitter | https://twitter.com/NanhiSingh14ResourcesLearn more and catch more stories from Imperva at https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.Embracing Technology for Business SuccessThe theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.Navigating the Complexities of Application EnvironmentsAs organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.Addressing Concerns of API-Driven AttacksThe conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.Empowering Organizations with Comprehensive Security SolutionsWith the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.Driving Operational Efficiency and FocusIn a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.Securing Applications AnywhereAs applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.ConclusionThe engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.Thank you for joining us in this exploration of cybersecurity and business resilience.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Nanhi Singh, Chief Customer Officer and GM Application Security at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/nanhi-singh-aa51371On Twitter | https://twitter.com/NanhiSingh14ResourcesLearn more and catch more stories from Imperva at https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this episode of the Ready Yet podcast, we are talking about security, both cyber and physical, with guest Frankie Pannell, a former special agent for the Secret Service and now an executive in cybersecurity for a major tech company as well as a speaker and founder of a security consulting firm. Pannell discusses his transition from government security to the tech industry, emphasizes the crucial role of cybersecurity for businesses big and small, and highlights the importance of community and proactive measures in mitigating threats. The conversation also covers the impact of technology, the potential of AI, and the importance of understanding real threats versus the perceived ones. Through a blend of personal anecdotes and professional insights, Pannell offers a comprehensive look at how businesses and individuals can navigate the complexities of security in today's world.https://www.linkedin.com/in/r-frank-pannell-894400274 frank@frankpannell.compannellfrankie@gmail.com Register for the May 16, 2024 Lead Gen Masterclass here: https://conqueryourbusiness.com/lead-gen-masterclass/ BE IN CHARGE >> TAKE ACTION >> GET RESULTSConquer Your BusinessJoin us on FacebookLinkedInInstagram
Whether or not you're familiar with shadow IT, know this: it's everywhere. Our guest this week, Charlie Livingstone, shines a light on the growing problem of shadow IT and how Wagestream are managing the risks it poses. Sit down with Roo and Charlie, as they unpack what shadow IT actually is, the growing challenges associated with it, and what we can do to safeguard ourselves and our organizations.
Join John and Jack as they delve into the topic of business fraud within small companies, focusing on home service industries. Discover how to identify and prevent fraud in this insightful podcast episode. Learn from John's firsthand encounters with external and internal fraud attempts, such as a shocking incident involving attempted blackmail via Google reviews. Jack also shares his experiences, including subcontractor misconduct and service theft. Gain valuable insights and practical strategies to protect your business from fraud. Tune in to the top HVAC, plumbing, and electrical growth podcast for essential tips on safeguarding your small business against potential threats.Episode Hosts:John Wilson: @WilsonCompaniesJack Carr: @thehvacjack Special thanks to our sponsor: Service Scalers: Looking to scale your home service business? Service Scalers is a digital marketing agency that drives success in PPC and LSA. Discover more growth strategies by visiting Service Scalers.Check out Owned and Operated Weekly Insights: a newsletter where John discusses topics ranging from recruiting and marketing to the growth of your home service business. Subscribe to the newsletter here.Contact us:Youtube: @OwnedandOperatedPodcastX: @ownedoperatedcowww.ownedandoperated.cominfo@ownedandoperated.com
Mark Ledlow sits down with security industry expert Adam Corn to delve into the world of intelligence, security, and business. From their experiences in government intelligence agencies to the private sector, Adam shares valuable insights on handling adversity, staying calm in chaotic situations, and the importance of effective communication in security programs. As they discuss the current global landscape and potential threats, Adam provides practical advice for businesses to navigate uncertainty and enhance their safety and security measures.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSMaintaining equanimity and stoic mindset in times of stress is crucial for security professionals to effectively handle adversity and uncertainty.Effective communication and internal training programs are essential for making employees feel safe and secure in the workplace.The proliferation of misinformation and constant inundation of information via technology can contribute to heightened anxiety and uncertainty, necessitating a strategic approach to security and communication.Building robust security programs, including insider threat detection and geofencing, helps mitigate risks and protect companies from potential threats.Businesses must prioritize long-term security strategies and invest in training and relationships with law enforcement agencies to effectively navigate evolving security challenges.QUOTES"Your network is your net worth, especially in the security industry.""In times of uncertainty, maintaining equanimity is key for security professionals to effectively protect and reassure employees.""Words are important in the security industry; alarmist language can erode credibility.""An effective security program not only protects, but also makes employees feel safe and secure.""Building relationships with law enforcement agencies and investing in long-term security strategies are essential for businesses to navigate evolving security challenges."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
WANT THE FULL EPISODE? Check out Ep.124 I Jeff Lanza I Deciding to Protect Your Business from Cybercrime: An FBI Agent's Insights to Keep Your Business Safe. Download it directly using this link.Jeff Lanza joins Sanger and Shawn to discuss the most common cases of business cybercrime and offer tips to keep your business safe. KEY TOPICSThe most effective ways to protect your business against cybercrime.Educating employees and testing their cybersecurity awareness skills.Security measures to have in place in your business.How emotional decision-making increases susceptibility to scams. CONNECT WITH USwww.decidedlypodcast.com Join us on Instagram: @decidedlypodcastJoin us on FacebookShawn's Instagram: @shawn_d_smithSanger's Instagram: @sangersmith GRAB YOUR COPY OF SANGER'S BOOKA Life Rich with Significance: Transforming Your Wealth to Meaningful Impact MAKING A FINANCIAL DECISION?At Decidedly Wealth Management, we focus on decision-making as the foundational element of success, in our effort to empower families to purposefully apply their wealth to fulfill their values and build a thriving legacy. LEARN MORE: www.decidedlywealth.com SUBSCRIBE TO THE DECIDEDLY NEWSLETTER CONNECT WITH JEFF LANZAwww.thelanzagroup.com Cybercrime: How to Stay Safe From Online Fraud and Identity Theft Pistols to Press: Lessons on Communication from an FBI Agent and Spokesman Jeff Lanza was an FBI Special Agent for over 20 years, during which he investigated cybercrime, organized crime, human trafficking, and terrorism. Jeff has lectured at Harvard and Princeton Universities and written two critically acclaimed books. He often appears on national television news programs where he talks about the growing threat of cybercrime in today's everyday life.
Jeff Lanza joins Sanger and Shawn to discuss the most common cases of business cybercrime and offer tips to keep your business safe. KEY TOPICSThe most effective ways to protect your business against cybercrime.Educating employees and testing their cybersecurity awareness skills.Security measures to have in place in your business.How emotional decision-making increases susceptibility to scams. CONNECT WITH USwww.decidedlypodcast.com Join us on Instagram: @decidedlypodcastJoin us on FacebookShawn's Instagram: @shawn_d_smithSanger's Instagram: @sangersmith GRAB YOUR COPY OF SANGER'S BOOKA Life Rich with Significance: Transforming Your Wealth to Meaningful Impact MAKING A FINANCIAL DECISION?At Decidedly Wealth Management, we focus on decision-making as the foundational element of success, in our effort to empower families to purposefully apply their wealth to fulfill their values and build a thriving legacy. LEARN MORE: www.decidedlywealth.com SUBSCRIBE TO THE DECIDEDLY NEWSLETTER CONNECT WITH JEFF LANZAwww.thelanzagroup.com Cybercrime: How to Stay Safe From Online Fraud and Identity Theft Pistols to Press: Lessons on Communication from an FBI Agent and Spokesman Jeff Lanza was an FBI Special Agent for over 20 years, during which he investigated cybercrime, organized crime, human trafficking, and terrorism. Jeff has lectured at Harvard and Princeton Universities and written two critically acclaimed books. He often appears on national television news programs where he talks about the growing threat of cybercrime in today's everyday life.
Former FBI ASAC and current Professor Steve Hooper joins Mike to talk about the UNLV campus shooting.
It's time to move beyond simple passwords and simple secrets. In this bonus episode of the podcast, Tatianna Harris talks with John Swanson, Director of Security Strategy at GitHub, about a business' weak link; insufficient security. "Humans are humans, and they'll reuse passwords. MFA is the most dramatic thing any business can do to remain resilient against compromise."Listening to this episode, you'll learn:Why any 2FA is better than no 2FA.How to implement two-factor or multi-factor authentication in your business.What options to consider when evaluating your security needs.The potential negative ramifications to your business without having today's most basic security measures in place.Reach out to John Swanson: https://www.linkedin.com/in/swannysec/Connect with Tatianna Harris: https://www.linkedin.com/in/tatiannaharris/
Insights into the CISO Mindmap Mastering Vulnerabilities: Elevating Business Security with a Priority Focused ApproachThis is a video about Mastering Vulnerabilities: Elevating Business Security with a Priority-Focused ApproachDive deep into vulnerability classification, and learn why a Priority Focused Approach is a game-changer for business cybersecurity in the digital era.Why a Priority-Focused Approach to Vulnerability Classification Matters for Modern BusinessesSubscribe newsletters https://open.substack.com/pub/cpfcoaching/p/mastering-vulnerabilities-elevating-883?r=2fc1l&utm_campaign=post&utm_medium=webFor cybersecurity leadership development or business cybersecurity advisory/coaching, visit HTTP://cpf-coaching.com
Welcome to The Scaling Edge, where we unravel the intriguing world of identity management, unlocking its transformative potential for today's digital landscape! Join our host, Michael Brooks, in an enlightening conversation with Eric, an authority in the realm of identity management.In this compelling episode, we uncover the paramount strategies that not only bolster your business's security but also streamline cloud operations. Eric takes us on a journey through the intricacies of identity management and showcases the fundamental role it plays in the success of modern businesses.✅ Explore why modernizing your identity management systems is no longer an option but a necessity in today's competitive business landscape.✅ Dive into the revolutionary concept of identity orchestration and how it simplifies the daunting process of transitioning your business to the cloud.✅ Bid farewell to the era of vulnerable passwords, and welcome the dawn of advanced biometric authentication methods that promise to reshape the security landscape!This episode promises to be a treasure trove of insights and practical solutions. Join us to stay ahead of the curve in the dynamic world of entrepreneurship, technology, and innovation.
In this episode, Mark Ledlow engages in a deep and insightful conversation with Tim Wenzel, an expert in the security industry and a driving force behind the Kindness Games movement. The discussion spans various topics, including leadership, emotional intelligence, adapting to changing economic landscapes, and the power of kindness in fostering positive workplace environments.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSStay agile in uncertain times: Embrace change and adapt quickly to the evolving business landscape.Understand the value of assets: Prioritize security based on the asset's short-term and long-term value.Focus on uncertainty, not just risk: Identify what uncertainties may affect your business and proactively manage them.Budget cuts can create opportunities: Consider using consultants and vendor services to fill gaps when budgets are reduced.The Kindness Games can be transformative: Engaging in a culture of kindness and empathy can have a profound impact on personal and professional growth.QUOTES"Time allows things to calm down, and time is your best friend." - Mark Ledlow"We really can't allow past mistakes to haunt us and allow us to not move forward." - Tim Wenzel"We all want to be better. We all want to be the best. We all want to be well thought of. Let's help each other get there." - Tim Wenzel"Change is always happening, and companies are going to be increasingly agile." - Tim Wenzel"Money is just a byproduct of impacting people's lives." - Mark LedlowGet to know more about Tim:LinkedIn: https://www.linkedin.com/in/relevant-perception/Website: https://www.owninglifestories.com/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Guest: Rich Davis, Head of Security & Networking Solutions, EMEA at Netskope [@Netskope]On LinkedIn | https://uk.linkedin.com/in/richarddavis1Host: Chloé MessdaghiOn ITSPmagazine
Guest: Ian Hill, Director of Information & Cyber Security at UppOn LinkedIn | https://linkedin.com/in/ian-hill-95123897Host: Chloé MessdaghiOn ITSPmagazine
Guest: Paul Watts, Distinguished Analyst at Information Security Forum [@securityforum]On Twitter | https://twitter.com/paulwattsUKOn LinkedIn | https://www.linkedin.com/in/paulewattsHost: Chloé MessdaghiOn ITSPmagazine
Guest: Kevin JohnsonOn Twitter | https://twitter.com/secureideasOn LinkedIn | https://www.linkedin.com/in/kevinjohnson/On Mastodon | https://infosec.exchange/@secureideas________________________________Host: Alyssa MillerOn ITSPmagazine
On episode 27 of the Go Sokal Podcast, hosts Katy Welch and Chris Mulally sit down with Technology Coordinator Malcolm Stewart to talk about the role of information technology in modern society, including preventing data breaches, setting up secure passwords, and how employees can avoid scams like spoofing, phishing, and other cyber attacks.
Guest: Debbie Reynolds, Founder, Chief Executive Officer, and Chief Data Privacy Officer at Debbie Reynolds Consulting, LLCOn LinkedIn | https://www.linkedin.com/in/debbieareynoldsOn YouTube | https://www.youtube.com/@debbiereynoldsconsultingll8529/aboutHost: Chloé MessdaghiOn ITSPmagazine
Guest: Jason HaddixOn Twitter | https://twitter.com/JhaddixOn LinkedIn | https://www.linkedin.com/in/jhaddix/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Sam Curry, VP, CISO at Zscaler [@zscaler]On Twitter | https://twitter.com/samjcurryOn LinkedIn | https://www.linkedin.com/in/currysam/Host: Chloé MessdaghiOn ITSPmagazine
Guest: Liz MillerOn Twitter | https://twitter.com/lizkmillerOn LinkedIn | https://www.linkedin.com/in/lizkmiller/________________________________Host: Alyssa MillerOn ITSPmagazine
Guests: Tennisha Martin, Executive Director and Chairwoman at BlackGirlsHack [@blackgirlshack]On LinkedIn | https://linkedin.com/in/tennishaRebekah Skeete, Chief Operations Officer, BlackGirlsHack [@girlshackvllg]On LinkedIn | https://linkedin.com/in/rebekah-skeete-01270192_____________________Host: Chloé MessdaghiOn ITSPmagazine
Guest: Don Donzal, Founder, CEO at The Digital Construction CompanyOn Twitter | https://twitter.com/ethicalhackerOn LinkedIn | https://www.linkedin.com/in/ddonzalHost: Chloé MessdaghiOn ITSPmagazine
Guest: Christophe Foulon, Strategic Cybersecurity Leader/Coach at Breaking Into Cybersecurity [@BreakintoCyber]On Twitter | https://twitter.com/chris_foulonOn LinkedIn | https://www.linkedin.com/in/christophefoulon/On YouTube | https://www.youtube.com/c/BreakingIntoCybersecurityHost: Chloé MessdaghiOn ITSPmagazine
Guest: Adam ShostackOn Twitter | https://twitter.com/done_with_thatOn LinkedIn | https://www.linkedin.com/in/shostack/On Mastodon | infosec.exchange/@adamshostack________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Chris Roberts, CISO, Boom Supersonic [@boomaero]On Twitter | https://twitter.com/Sidragon1On LinkedIn | https://www.linkedin.com/in/sidragon1/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: David Pereira, CEO and Founder of SecPro [@SecProInt]On LinkedIn | https://www.linkedin.com/in/davidfpereira/On Twitter | https://twitter.com/davidpereiracibOn YouTube | https://www.youtube.com/@secprointHost: Phillip WylieOn ITSPmagazine
Guest: Dr. Rebecca Wynn, Global Chief Security Strategist & CISO at Click Solutions GroupOn LinkedIn | https://linkedin.com/in/rebeccawynncisspHost: Chloé MessdaghiOn ITSPmagazine