Podcasts about chief analyst

  • 155PODCASTS
  • 305EPISODES
  • 36mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jan 16, 2023LATEST

POPULARITY

20152016201720182019202020212022


Best podcasts about chief analyst

Latest podcast episodes about chief analyst

CSO Perspectives (public)
Andy Greenberg Interview: Tracers in the Dark.

CSO Perspectives (public)

Play Episode Listen Later Jan 16, 2023 37:41


Rick Howard, N2K's CSO and the CyberWire's Chief Analyst, and Senior Fellow, interviews Andy Greenberg, Senior Writer at WIRED, regarding his new book, “Tracers in the Dark.”

The CyberWire
Andy Greenberg Interview: Tracers in the Dark. [CSO Perspectives]

The CyberWire

Play Episode Listen Later Jan 16, 2023 37:41


Rick Howard, N2K's CSO and the CyberWire's Chief Analyst, and Senior Fellow, interviews Andy Greenberg, Senior Writer at WIRED, regarding his new book, “Tracers in the Dark.”

Wintrust Business Lunch
Wintrust Business Lunch 1/5/23: Interest rate forecast, CES preview, Door County Candle Company

Wintrust Business Lunch

Play Episode Listen Later Jan 5, 2023


Segment 1: Greg McBride, Senior Vice President and Chief Analyst, Bankrate, chats with guest host Wendy Snyder about what we can expect from interest rates in 2023. Segment 2: Joan E. Solsman, Senior Reporter, CNET, gives Wendy a peek into some hot items at the Consumer Electronics Show. Segment 3: Phillip Shaw, Certified Financial Planner, Goldstone Financial Group, tells […]

SecureConnection Podcast: IT Security/Security Experts for MSP’s

In case you missed it, back in December Julian sat down with Jay McBain, Chief Analyst with Canalys to discuss the tectonic shift that has begun in the IT industry. With talk of a recession on the horizon in 2023, how will this affect IT Service Providers? Will technology pull us through like it did in 2008? Jay tells us, opportunities are abound in 2023 and he looks forward to many success stories in the coming year! Join us in Phoenix February 16 & 17 to learn how you can get ahead of the shift and drive business success in 2023 and beyond! Reserve your spot today as space is limited! For the original post on E-Channel News and summary from Julian visit Here

The CyberWire
Software supply chain management: Lessons learned from SolarWinds. [CyberWire-X]

The CyberWire

Play Episode Listen Later Jan 3, 2023 43:29 Very Popular


Between the emergence of sophisticated nation-state actors, the rise of ransomware-as-a-service, the increasing attack surface remote work presents, and much more, organizations today contend with more complex risk than ever. A “Secure-by-Design” approach can secure software environments, development processes and products. That approach includes increasing training for employees, adopting zero trust, leveraging Red Teams, and creating a unique triple-build software development process. SolarWinds calls its version of this process the "Next-Generation Build System," and offers it as a model for secure software development that will make supply chain attacks more difficult. On this episode of CyberWire-X, host Rick Howard, N2K's CSO, and CyberWire's Chief Analyst and Senior Fellow, discusses software supply chain lessons learned from the SolarWinds attack of 2020 with Hash Table members Rick Doten, the CISO for Healthcare Enterprises and Centene, Steve Winterfeld, Akamai's Advisory CISO, and Dawn Cappelli, Director of OT-CERT at Dragos, and in the second half of the show, Rick speaks with our episode sponsor, SolarWinds, CISO Tim Brown.

The CyberWire
Strategies to get the most out of your toolsets. [CyberWire-X]

The CyberWire

Play Episode Listen Later Dec 18, 2022 39:18 Very Popular


With a recession looming, many business leaders are looking for ways to cut spending wherever possible. And while tool bloat affects many security teams, it can be a challenging problem to tackle for a couple of reasons. First, there's the fear that security will be lost if a tool is removed. Second, there's the daunting task of unraveling complex systems. And finally, there's the perennial talent shortage. Like all challenges in security, they're made even worse by the fact that there's not enough people able to tackle them.  During this CyberWire-X episode, host Rick Howard, the CyberWire's CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Ted Wagner, the CSO of SAP National Security Services, and host Dave Bittner speaks with sponsor ExtraHop Senior Technical Marketing Manager Jamie Moles. They discuss solutions to help business and security leaders to not just address these challenges, but to get more out of their tooling as they do. They discuss strategies for how to determine which tools you actually need and which you can get rid of, as well as the step-change benefits that can be realized when you consolidate, automate, and integrate your security solutions.  

Wintrust Business Lunch
Wintrust Business Lunch 12/15/22: Stocks drop, quiet quitting, Shawn Michelle's Homemade Ice Cream

Wintrust Business Lunch

Play Episode Listen Later Dec 15, 2022


Segment 1: Greg McBride, Senior Vice President and Chief Analyst, Bankrate, chats with John about the winners and losers after the Fed announced they were raising interest rates again. Segment 2: Lisa Eadicicco, Senior Editor, CNET, joins John to talk about a variety of tech stories including Meta announcing new features for Instagram users, the chaos […]

The CyberWire
Commercial threat intelligence proves invaluable for the public sector. [CyberWire-X]

The CyberWire

Play Episode Listen Later Dec 11, 2022 32:38


Historically, the U.S. government has relied almost solely on its own intelligence analysis to inform strategic decisions. This has been especially true surrounding geopolitical events and nation-level cybersecurity situations. However, the explosion of assets being connected to the internet, along with the fact that most critical infrastructure is owned by private sector organizations, means that commercially developed cyber threat intelligence is being generated at a faster pace than ever before. In the Russia/Ukraine conflict, we saw how commercially generated satellite intelligence played a critical role in alerting the public and ensuring our allies were ready for an invasion. At LookingGlass, we believe commercial threat intelligence can provide similar anticipatory insight – and that it can be shared more easily and quickly than intelligence generated solely by the U.S. government. Ultimately, the public and private sectors need to work together to protect the interests of the American people. Currently, both private industry and academia are targeted by foreign adversaries, just as are government agencies. This means that commercial entities also have access to adversary tactics, techniques, and procedures (TTPs) and indicators of compromise, and they have that access from a different perspective, which is valuable intelligence for the government. On this episode of CyberWire-X, host Rick Howard, the CyberWire's CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Wayne Moore, CISO at Simply Business, and host Dave Bittner speaks with Bryan Ware, CEO at episode sponsor LookingGlass Cyber Solutions. They'll discuss why the U.S. government needs commercial cyber threat intelligence now more than ever before and how both the public and private sectors will benefit from closer, trusted cyber partnerships. 

HFS PODCASTS
The First HFS Horizons Report: Cloud Native Services

HFS PODCASTS

Play Episode Listen Later Dec 5, 2022 65:24


HFS revealed its first HFS Horizons Report on Cloud Native Services. And also took a look at the Horizons Reports methodology and timeline, and cover other frequently asked questions. In addition, we also looked at the 2023 HFS research agenda. Hosting this webinar was Phil Fersht, HFS CEO and Chief Analyst. Phil was joined by President Saurabh Gupta, Chief Research Officer Elena Christopher, and Executive Research Leader Tom Reuner, author of the Cloud Native Services Horizons Report.

The Loadstar Podcast
'Not the mother of all peak seasons'

The Loadstar Podcast

Play Episode Listen Later Dec 1, 2022 70:38


In part 1 we examine what one express executive calls the ‘modest’ 2022 peak season. We look at companies such as Shopify and TikTok which are now investing heavily in their supply chains. We discuss integrator price hikes, US logistics challenges and the looming threat of labour strikes. And finally, we ask what Covid protests and lockdowns in China mean for global logistics, and whether a post-Covid ‘normalisation’ of supply chains will see a welcome return to more emphasis on human rights and procurement diversification. Part Two is a deep dive with Xeneta’s Peter Sand into ocean shipping markets and how to manage contract renegotiations with carriers. Guests Greg Hewitt, CEO, DHL Express US Emma Cosgrove, Senior Reporter covering logistics at Insider Brian Bourke, Global Chief Commercial Officer, SEKO Logistics Peter Sand, Chief Analyst, Xeneta Episode in more detail: Part 1 The supply chain in mainstream media and stock markets (2.25) New market entrants – Shopify to TikTok (6.20) DHL Express exclusive (11.39) 2022: The modest peak season (15.19) Pricing: DHL vs FedEx vs UPS (22.13) DHL invests (24.50) Labour costs and last mile bankruptcies (27.19) Protests in China (31.03) Forwarding in Q4 – SEKO Logistics (35.20) The threat of labour strikes (38.54) Risk and opportunity in 2023 (40.40) Human rights and a more diversified supply chain (46.05) Part 2 – Ocean shipping rates focus (49.20) Blanks ahead (51.40) Renegotiating long-term (53.45) Forwarder plight (58.10) Declining demand (1.00.50) Surging deliveries (1.04.28) Shipper advice (1.07.50) Created, editing and produced by Mike King Mike can be contacted at mikeking121@gmail.com www.theloadstar.com

Capitol Report
Episode 162: Economic Impacts of China's Lockdowns; Dead CCP Leader's Horrific Legacy

Capitol Report

Play Episode Listen Later Nov 30, 2022 16:35


Chinese Police have begun countering the anti-lockdown protests. What do Chinese lockdowns mean for the world? Chief Analyst at BuyAlerts.com, David Hochman joins us to discuss.The death of China's former dictator carries a horrific legacy. What might mean for the people of China and beyond? The executive director of the Falun Dafa Information Center Levi Browde weighs in.

CSO Perspectives (public)
Pt 2 – Supply chains around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Nov 21, 2022 21:52


Rick Howard, the CyberWire's CSO and Chief Analyst, is joined by Hash Table member Amanda Fennell, the Relativity CIO and CSO, to discuss strategies and tactics to reduce digital supply chain risk. For a complete reading list and even more information, check out Rick's more detailed essay on the topic.

The CyberWire
CSO Perspectives Bonus: Veterans Day special.

The CyberWire

Play Episode Listen Later Nov 11, 2022 17:34


Rick Howard (The Cyberwire's Chief Analyst, CSO, and Senior Fellow), and the cast of the entire Cyberwire team, honor our U.S. veterans on this special day.

Charles Stanley Radio
Ep. 16: Your pension questions answered

Charles Stanley Radio

Play Episode Listen Later Nov 7, 2022 18:07


Am I contributing enough to my pension? What do I need to know about my pension statement? Should I reduce my pension contributions to save cash? Is now a good time to consolidate my pensions? Will the state pension exist when I retire? Last week was Pensions Awareness week, therefore to answer these question and to highlight the importance of pension saving, Erica Whyte sat down with Rob Morgan, Chief Analyst and Lisa Caplan, Foundation Financial Planning Director, to answer your pensions questions. Episode Links: Pension Contribution Calculator - Calculate if you will have enough for the retirement you want: https://bit.ly/3SbmSLb Investment involves risk

CSO Perspectives (public)
Pt 2 – Students of the game: What are the Hash Table's go-to information sources for 2022?

CSO Perspectives (public)

Play Episode Listen Later Nov 7, 2022 35:27


Rick Howard, the CyberWire's CSO and Chief Analyst, chats with Steve Winterfeld, the Akamai Advisory CISO, and Errol Weiss, the Health-ISAC CSO, about recommended sources of infosec content that they found valuable in 2021. Links to content mentioned in the show: Documentaries “Kill Chain: The Cyber War on America's Elections,” by Harri Hursti, Published by HBO, 26 March 2020.  “The Perfect Weapon.” by David Sanger, Published by HBO, 16 October 2020. Podcasts “Darknet Diaries – True Stories from the Dark Side of the Internet,” by Darknetdiaries.com, 25 January 2022. “The Lazarus Heist,” BBC, 2021. Books “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Published by Doubleday, 7 May 2019. “This Is How They Tell Me the World Ends the Cyberweapons Arms Race,” by Nicole Perlroth, Published by Bloomsbury Publishing 9 February 2021.  Author Interviews “A Conversation with Nicole Perlroth, Author of ‘This Is How They Tell Me the World Ends,'” American Writers Museum, YouTube, 2 March 2021. “Andy Greenberg - Sandworm: Lessons from the Cyberwar,” by CS3STHLM, YouTube, 25 October 2021.  “Bonus: Cybersecurity Canon Hall of Fame Interview with Andy Greenberg,” By Rick Howard, The CyberWire, 12 July 12 2021. ‌“‘Sandworm' Author Andy Greenberg,” by David Bittner, The CyberWire, 11 November 2019.  ‌Video Content “LockPickingLawyer.” YouTube, 2022. “RSA Conference.” YouTube, 2022. Twitter Subject Matter Experts Phil Venables (@philvenables) Bonus - Gate 15 / Andy Jabbour (@Gate_15_Analyst) Errol Weiss (@errolw65) Rick Howard (@raceBannon99) News and Topic Summaries “Daily Briefing.” The CyberWire, 2022. “SmartBrief.” SmartBrief, 2018. For a complete reading list and even more information, check out Rick's more detailed essay on the topic.

Mind the Gap: Making Education Work Across the Globe
An Objective Approach to Curriculum with Becky Allen, Mind the Gap, Ep. 49 (S3E5)

Mind the Gap: Making Education Work Across the Globe

Play Episode Listen Later Nov 2, 2022 46:28


Special guest Becky Allen joins hosts Tom Sherrington and Emma Turner to discuss teaching, learning, and constructs of instruction from an academic perspective. The conversation begins by exploring the large questions of education that Becky has a unique perspective on as an academic and in her role at Teacher Tapp. Becky specializes in the complexities and evidence-based understanding of large issues like curriculum, teacher training, parent communication, teacher feedback, student psychology, and more. Visit edCircuit.com to watch this episode. In the second part of the episode, the trio discusses breaking down the assumptions of education and the roots of disagreements on curriculum. The data behind this discussion primarily comes from Becky's experience with Teacher Tapp, and her strong resolve to rectify misconceptions goes hand in hand with her everyday work with surveying teachers. Participants: Becky Allen is a Co-founder and Chief Analyst of Teacher Tapp. In addition to her entrepreneurship, she is a professor of education at Brighton University and an author of several books, including The Teacher Gap and The Next Big Thing in School Improvement. Follow Becky @profbeckyallen Tom Sherrington has worked in schools as a teacher and leader for 30 years and is now a consultant specializing in teacher development and curriculum & assessment planning. His books include Teaching WalkThrus, Rosenshine's Principles in Action, and The Learning Rainforest Fieldbook. He regularly contributes to conferences and CPD sessions locally and nationally and is busy working in schools and colleges across the UK and around the world. Follow Tom @teacherhead Emma Turner joined Discovery Schools Academy Trust as the Research and CPD lead after 20 years in primary teaching. She is the founder of ‘NewEd – Joyful CPD for early-career teachers', a not-for-profit approach to CPD to encourage positivity amongst the profession and help to retain teachers in post. Turner is the author of Be More Toddler: A Leadership Education From Our Little Learners, Let's Talk About Flex: Flipping the flexible working narrative for education, Follow Emma @emma_turner75 --- Send in a voice message: https://anchor.fm/mindthegap-edu/message

Rod Arquette Show
Rod Arquette Show: What Biden's Low Poll Numbers Mean for Upcoming Election

Rod Arquette Show

Play Episode Listen Later Nov 2, 2022 103:56


Rod Arquette Show Daily Rundown – Tuesday, November 1, 20224:20 pm: Dr. Ron Faucheux, Chief Analyst at Certus Insights joins the show for a conversation about what Joe Biden's poll numbers might mean for the upcoming election4:38 pm: Jenet Jacob Erickson, a Senior Fellow at the Institute for Family Studies, joins the program to discuss the results of a study showing teen tech habits are shaped by the family6:05 pm: Corinne Johnson of Utah Parents United joins the program to discuss the upcoming elections for school boards across the state, as well as the group's new voter guide for parents

The Loadstar Podcast
US Cargo Wars: East Coast vs West Coast

The Loadstar Podcast

Play Episode Listen Later Oct 19, 2022 63:58


If you think East Coast versus West Coast is all about rappers, think again. In Part 2 of this episode the Loadstar examines cargo shifts in the US this year from a global perspective and from a port operator’s viewpoint. Host Mike King speaks to Peter Sand, chief analyst at Xeneta, and Stephen A. Edwards, CEO and executive director of Virginia Port Authority. Part 1 of this episode also asks if the slowdown in e-commerce is overstated and examines the limited achievements and many failings of IATA’s hosting of its World Cargo Symposium in London. We also preview COP 27 and ask where next for the EC’s liner consortia competition rule exemptions. Guests Mirja Nissen, Director, eCommerce Solutions, International Bonded Couriers, Inc. Stephen A. Edwards, CEO and Executive Director, Virginia Port Authority Alex Lennane, Publisher, The Loadstar Peter Sand, Chief Analyst, Xeneta Nick Savvides, News Editor, The Loadstar Also featuring: Olivier Casanova, deputy CFO, CMA CGM Group and former CEO, CMA CGM Air Cargo Vassilios Demetriades, Shipping Deputy Minister to the President, Republic of Cyprus Episode in more detail Part 1 – news update IATA’s London fail (2.25) CMA CGM’s air reveal (6.50) Air freight rates (10.58) E-commerce now and in future (12.13) ‘Parcelisation’ (21.55) EU liner regulation update (22.39) COP27 preview (26.18) Part 2 US Cargo Wars: East Coast vs West Coast (27.44) Virginia Port Authority CEO on cargo wins and investments (30.15) Xeneta numbers on West coast cargo transition eastwards (33.47) Congestion bites (36.17) Hinterland bottlenecks (45.49) Fixing US infrastructure (49.47) Demand outlook (54.41) Transatlantic trade bonus (56.54) Long-term cargo wins? (58.40) Credits: created, produced and hosted by Mike King Website: www.theloadstar.com

The CyberWire
Cyber confidence: Knowing what you have and where it is. [CyberWire-X]

The CyberWire

Play Episode Listen Later Oct 16, 2022 29:34 Very Popular


Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time. If the first rule of cyber is to “know what you have,” how can cyber professionals get a comprehensive, current picture of their assets? How can they feel confident that they understand which assets may be more vulnerable and prioritize defenses accordingly? In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table member Jaclyn Miller, the Head of InfoSec & IT at DispatchHealth. In the second half of the episode, Cody Pierce, Chief Product Officer at episode sponsor LookingGlass Cyber Solutions, talks with Dave Bittner. Listen to the discussions about answering the foundational cyber questions (What do I have? Is it protected?), why context is critical, and how an adversarial perspective helps you be a better defender.

Football Outsiders Fantasy Podcast
NFL Week 6 Preview | Bills at Chiefs: Preview of AFC Championship? | Schatz & Tanier

Football Outsiders Fantasy Podcast

Play Episode Listen Later Oct 13, 2022 58:20


Welcome to the Schatz & Tanier show for NFL Week 6! Aaron and Mike are joined by Seth Keysor, Chief Analyst at The Athletic KC, to go in-depth on the Sunday afternoon matchup between the Buffalo Bills and the Kansas City Chiefs.The guys will then follow up with a preview of the most important games going into NFL Week 6, including Jaguars at Colts, Patriots at Browns, Ravens at Giants, Cowboys at Eagles, and Broncos at Chargers. Stop by every Thursday throughout the 2022 NFL season to preview weekly matchups, talk prop bets, and more with Aaron and Mike!Football Outsiders is covering more than ever before with expanded NFL coverage and updates.Be sure to get more out of Football Outsiders with a FO+ subscription! Be sure to tune in live throughout the NFL preseason at 1 p.m. EST on YouTube to join the conversation! Subscribe to the podcast by looking for the "Football Outsiders Podcast Network" on your favorite podcast app. Football Outsiders is streaming LIVE every Thursday at 1 p.m. EDT. If you miss the live stream, you can watch or listen to every show on YouTube or listen to the podcast version. Be sure to subscribe to the podcast by looking for the "Football Outsiders Podcast Network" on your favorite podcast app.

The CyberWire
Pentest reporting and the remediation cycle: Why aren't we making progress? [CyberWire-X]

The CyberWire

Play Episode Listen Later Oct 9, 2022 36:24 Very Popular


The age-old battle between offensive and defensive security practitioners is most often played out in the penetration testing cycle. Pentesters ask, “Is it our fault if they don't fix things?” While defenders drown in a sea of unprioritized findings and legacy issues wondering where to even start. But the real battle shouldn't be between the teams; it should be against the real adversaries. So why do pentesters routinely come back and find the same things they reported a year ago? Do the defenders just not care or does the onus fall on the report? Everyone really wants the same thing: better security. To get there, the primary communication tool between consultant and client, offensive and defensive teams — the pentest report — must be consumable and actionable and tailored to the audience who receives it. In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table members Amanda Fennell, the CIO and CSO of Relativity, and William MacMillan, the SVP of Security Product and Program Management at Salesforce. In the second half of the episode, Dan DeCloss, the Founder and CEO of episode sponsor PlexTrac, joins Dave Bittner discuss the politics around pentest reporting and how better reports can support real progress.

The CyberWire
The OSINT revolution: How cyber and physical security teams are leveraging open source intelligence. [CyberWire-X]

The CyberWire

Play Episode Listen Later Oct 2, 2022 28:21 Very Popular


On this episode of CyberWire-X, we dive into the essential role of open-source intelligence in identifying cyber and physical threats and reducing risk across your organization. The CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table members Dr. Georgianna Shea, CCTI and TCIL Chief Technologist at the Foundation for Defense of Democracies, and Bob Turner, Field CISO – Education at Fortinet. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor risk intelligence firm Flashpoint's Chief Intelligence Officer Tom Hofmann. They explore the foundational importance of open source intelligence, which includes social media platforms and geospatial data and insights. Plus, they explore real-life examples of how organizations, from governments to commercial enterprises, are leveraging open source intelligence and technology every day to protect their people, places, assets, and critical infrastructure.

Total Car Score
S3E58: Is VinFast the new version of the Hyundai Motor Group?

Total Car Score

Play Episode Listen Later Sep 29, 2022 22:34


In this episode we talk to Ed Kim, President and Chief Analyst at AutoPacific, who just came back from the VinGroup Elite Tour III and shares his thoughts about the new Vietnamese automaker and how it compares to what the Hyundai Motor Group did decades  ago. 

Twins Talk it Up Podcast
Twins Talk it Up Episode 116: Channel Partner Power Couple

Twins Talk it Up Podcast

Play Episode Listen Later Sep 27, 2022 46:50


We had an incredible time at the Taylor BigBIG Conference in Ft. Lauderdale, Florida, and we were fortunate to have an amazing conversation with a power couple within the technology channel partner ecosystem. They are influential leaders who have found a way to have success professionally and personally. This is a special episode with our friends Jay McBain and Michelle Ragusa-McBain. Jay McBain is an accomplished speaker, author and serves as the Chief Analyst of Channels, Partnerships & Ecosystems for Canalys. Michelle is also a speaker and serves as Cisco's Global Lead & Channel Evangelist for MSPs. She heads up the Provider Elevate Team to drive strategy and execution for community, programs, engagement and acceleration.Jay and Michelle compliment each other's strengths and support each other's individuality. They support each other's goals as if they were their own. They strive for what they coin “work-life integration”, instead of ‘work-life balance. Jay also noted that with their relationship, it is a “1 + 1 = 3”. Additional takeaways from our conversation with them include:-Logistics and clarity of communication-Work hard and play hard, and their love of travel-What keeps them inspired-Marriage can excel regardless of where you are along the Introvert-Ambivert-Extrovert Spectrum-Organizational culture matters, support for women & diversityTo learn more about Jay and Michelle as well as where they will be speaking, find them on LinkedIn, visit jaymcbain.com/ and about.me/michelleragusa--- more ---If you are looking to learn the art of audience engagement while listening for methods to conquer speaking anxiety, deliver persuasive presentations, and close more deals, then this is the podcast for you.Twins Talk it Up is a podcast where identical twin brothers Danny Suk Brown and David Suk Brown discuss leadership communication strategies to support professionals who believe in the power of their own authentic voice. Together, we will explore tips and tools to increase both your influence and value. Along the way, let's crush some goals, deliver winning sales pitches, and enjoy some laughs.Danny Suk Brown and David Suk Brown train on speaking and presentation skills. They also share from their keynote entitled, “Identically Opposite: the Pursuit of Identity”.Support and Follow us:YouTube: youtube.com/channel/UCL18KYXdzVdzEwMH8uwLf6gInstagram: @twinstalkitupInstagram: @dsbleadershipgroupTwitter: @dsbleadershipLinkedIn: linkedin.com/company/twins-talk-it-up/LinkedIn: linkedin.com/company/dsbleadershipgroup/Facebook: facebook.com/TwinsTalkitUpFacebook: facebook.com/dsbleadership/Website: dsbleadershipgroup.com/TwinsTalkitUp

CSO Perspectives (public)
Introducing the cyberspace sand table series: The DNC compromise.

CSO Perspectives (public)

Play Episode Listen Later Sep 19, 2022 30:10


The 2016 DNC hack: We can use cyber sand tables to enhance our cybersecurity first principle defenses since the concept, in various forms, have been used by military commanders, coaches, and athletes since the world was young. The show puts the DNC hack on the cyber sand table to see what might have been done differently with host Rick Howard, the CyberWire's CSO and Chief Analyst. For a complete reading list and even more information, check out Rick's more detailed essay on the topic.

The Loadstar Podcast
The Deep Dive: We Need To Talk About Peak Season

The Loadstar Podcast

Play Episode Listen Later Sep 15, 2022 21:08


In this Deep Dive Loadstar Podcast, Mike King and guests explain the traditional container shipping peak season and its role in the ebb and flow of global trade. They also examine how the last two years of Covid-driven supply chain disruption have impacted box trade seasonality. And they consider whether parts of that transformation will be permanent, or whether a return to normality is now underway in the shape of a 2022 peak season that has faltered in the face of economic headwinds. Guests: Lars Jensen, CEO, Vespucci Maritime John McCown, Founder, Blue Alpha Capital Kathy Liu, Director, Global Sales & Marketing, Dimerco Express Group Jason Haith, Manager, OEC Group Stephanie Loomis, Vice President for Procurement, CargoTrans Peter Sand, Chief Analyst, Xeneta Bruce Chan, Director & Senior Analyst, Global Logistics & Future Mobility Equity Research, Stifel Josh Brazil, VP for Supply Chain Insights, Project44 Credits: Created, produced and hosted by Mike King Mike can be contacted at: mikeking121@gmail.com

The CyberWire
A CSO's 9/11 Story: CSO Perspectives Bonus.

The CyberWire

Play Episode Listen Later Sep 11, 2022 28:33


From the 20th anniversary of 9/11 in 2021, Rick Howard, the CyberWire's CSO, Chief Analyst, and Senior Fellow, recounts his experience from inside the Pentagon running the communications systems for the Army Operations Center. CyberWire Pro subscribers also get exclusive access to Rick's original 2001 essay with notes from the day of the attack. If you would like to check that out, you can subscribe today.

The Loadstar Podcast
F1 boss tackles air cargo; peak forwarder profits; port congestion vs slowing demand

The Loadstar Podcast

Play Episode Listen Later Sep 5, 2022 82:38


In part one, Mike King and his guests from around the world of freight, shipping and logistics explore if the US peak season is already over, why forwarder profits peaked in the second quarter and how port congestion is set to continue and could act as a break on freight rate declines. In part two, Mike speaks in depth to Paul Stoddart, the former Formula 1 team owner and chairman of fast-growing freighter operator European Cargo. They cover the global economy, why the cost-of-living crisis will curtail bellyhold capacity, the challenges of air cargo for a newcomer, and why regulators and politics are threatening to sink UK aviation. Guests Paul Stoddart, Chairman of European Cargo Stephanie Loomis, Vice President for Procurement, CargoTrans Peter Sand, Chief Analyst at Xeneta Bruce Chan, Director & Senior Analyst, Global Logistics & Future Mobility Equity Research, Stifel Josh Brazil, VP for Supply Chain Insights, Project44 Episode in more detail: Part one Ocean and air freight rates update (3.39) Trans-Atlantic trade soars (5.00) Forwarder returns peak (7.49) Predictions from Stifel (11.48) M&A outlook (15.49) US bottlenecks (20.47) Has the peak season been and gone? (25.16) Xeneta: Where is the box freight rate floor? (34.42) The impact of port congestion (37.35) Part two – Interview with Paul Stoddart, Chairman of European Cargo Formula 1 – a teething ground for air cargo (48.53) European Cargo – story so far (52.48) Belly returns and the air cargo outlook (56.30) Still room for expansion? (1.00.45) Preighters vs freighters (1.02.28) War in Ukraine and air ops (1.05.57) Sweet home Bournemouth (1.11.19) Brexit and the failures of regulators (1.14.39) Credits: Created, produced and hosted by Mike King Mike can be contacted at: mikeking121@gmail.com

The CyberWire
New CISO responsibilities: supply chain. [CSO Perspectives]

The CyberWire

Play Episode Listen Later Sep 5, 2022 24:43


Rick Howard, the Cyberwire's CSO and Chief Analyst, is joined by Hash Table members Ann Johnson, Microsoft's Corporate VP on Security, Compliance, & Identity, and Ted Wagner, the SAP National Security Services CISO, t0 discuss supply chain as a new CISO responsibility.

The CyberWire
Securing multi-cloud identity with orchestration. [CyberWire-X]

The CyberWire

Play Episode Listen Later Sep 1, 2022 31:37 Very Popular


While multi-cloud brings significant benefits, it also poses serious security risks. And identity is the reason. Each cloud platform, such as Azure, Google, and AWS, uses proprietary identity systems, and the lack of interoperability makes it unruly to manage. These disparate systems can't talk to each other resulting in a fragmented environment full of identity silos — the perfect way for an attacker to get in and cause destruction. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten, the CISO for Healthcare Enterprises and Centene. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Strata Identity's CEO and Co-founder Eric Olden. Both sets of discussions center around the challenges to identity management caused by the rapid shift to multi-cloud. 

CSO Perspectives (public)
Adversary playbooks around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Aug 22, 2022 31:34


Adversary playbooks as a cybersecurity first principle strategy. They told us the adversary has an asymmetric advantage; that cyber defense has to be right every time while the offense only has to get it right once. Rick proves that proactive defense and adversary playbooks can flip that dynamic on its head. With the world of cyber defense and threat intelligence upside down, Rick and the Hash Table discuss the history of shifting the offense/defense balance, the three components of a proactive defense, and the evolution of adversary playbooks and the intrusion kill chain. with Rick Howard, the CyberWire's CSO and Chief Analyst, joined by Ryan Olson, the Palo Alto Networks VP on Threat Intelligence (Unit 42). They discuss the history and next steps for the adversary playbook concept. Cybersecurity professional development and continued education. You will learn about: adversary playbooks and proactive defense, flipping the offense/defense balance, the 3 components of a proactive defense, ISACs and ISAOs CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more adversary playbooks and cybersecurity first principles resources, check the topic essay.

The Quantum Pod
Bob Sorensen and Quantum Computing's Tie to HPC - Episode 10

The Quantum Pod

Play Episode Listen Later Aug 19, 2022 42:31


Quantum computing is an incredibly complex industry, how can someone possibly attempt to understand where the current state is and where it's heading? Using data! That's exactly what Bob Sorensen does as Chief Analyst for Quantum Computing at Hyperion Research. In his analysis he views quantum computing through the lens of high performance computing, drawing parallels and illuminating differences. The survey of 415 decision makers Bob mentioned: https://www.dwavesys.com/media/an1helvq/hyperion_report_v2.pdf Hyperion's research predicting the growth of the quantum computing industry: https://www.prnewswire.com/news-releases/new-study-estimates-more-than-20-percent-annual-growth-of-global-quantum-computing-marketplace-through-2024-301475790.html Zapata's own enterprise decision maker survey: https://www.zapatacomputing.com/enterprise-survey/ HPC Wire's piece on Nvidia, HPC, and quantum with Tim Hirzel: https://www.hpcwire.com/2022/07/28/zapatas-orquestra-targets-the-hybrid-quantum-classical-challenge/ Intro/Outro music: Oblivious by Nihilore (https://www.nihilore.com/synthwave) Nihilore license: https://creativecommons.org/licenses/by/4.0/legalcode Follow us on Twitter: https://twitter.com/zapatacomputing Follow us on LinkedIn: https://www.linkedin.com/company/zapata-computing The Quantum Pod is produced by Zapata Computing Host: Ethan Hansen Guest: Bob Sorensen Editing and commentary: Ethan Hansen Special thanks to: Mick Emmett, Katherine Londergan, and Liz St. Pierre --- Send in a voice message: https://anchor.fm/thequantumpod/message

The CyberWire
Red teamer's perspective on demotivating attackers. [CyberWire-X]

The CyberWire

Play Episode Listen Later Aug 14, 2022 26:24 Very Popular


Cybercriminals are motivated by one simple incentive - money. Their favorite tools are bots to leverage sophistication, scalability, and ease of use. The effect is the creation of the underground bot ecosystem. This community allows threat actors to work together and continually improve their tactics. They sell bypasses for rule-based anti-bot solutions to other less technical fraudsters. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Etay Maor. Cato Networks' Senior Director Security Strategy. They discuss this reality that has put defenders at a serious disadvantage and the mitigation steps to consider for future attacks.. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Kasada's founder Sam Crowther talking about what he saw first-hand as a red teamer at a major Australian bank and what inspired him to reimagine bot mitigation with the founding principle of undermining the attacker's ROI.

The CyberWire
Cybersecurity is a team sport. [CyberWire-X]

The CyberWire

Play Episode Listen Later Aug 9, 2022 33:14 Very Popular


In order to run a successful SOC, security leaders rely on tools with different strengths to create layers of defense. This has led to a highly siloed industry with over 2,000 vendors, each with their own specific function and who very seldom work together. To gain an advantage on attackers, we need to start seeing cybersecurity as a team sport–united for a shared mission. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by two Hash Table members, Ted Wagner, CISO at SAP National Security Services, and Jenn Reed, CISO at Aviatrix. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor ExtraHop's Senior Product Marketing Manager, Chase Snyder, and CrowdStrike's Head of Product Marketing, Janani Nagarajan .They discuss why and how vendors should work together to enable better integrated security for their customers. They'll answer questions like “what is XDR?” and “how do I get my vendors to work together?”. 

Rod Arquette Show
Rod Arquette Show: What is the Dems Biggest Problem? It's Joe Biden

Rod Arquette Show

Play Episode Listen Later Aug 8, 2022 106:26


Rod Arquette Show Daily Rundown – Friday, August 5, 20224:20 pm: Brian Riedl, Senior Fellow at the Manhattan Institute joins the show for a conversation about how Democrats in Congress have both subsidized and taxed business in separate bills4:38 pm: PF Whalen of the Blue State Conservative joins the show for a conversation about his piece outlining the issues Republicans must make a priority if they hope to win in November6:05 pm: Brent Tanner, Executive Vice President of the Utah Cattlemen's Association, joins the show to discuss the state of the ranching industry in Utah given the drought and soaring operating costs6:20 pm: Sarah Westwood, an Investigative Reporter for the Washington Examiner, joins Rod to discuss whether states that have legalized the use of marijuana are experiencing rising crime6:38 pm: We'll listen back to Rod's conversations this week with Benji Backer of the American Conservative Coalition on the debate over the current heat wave in America – is it climate change or just the weather?6:50 pm: We'll air an encore of Rod's conversation with Dr. Ron Faucheux, Chief Analyst of Certus Insights, on how Democrats can solve their biggest problem – Joe Biden

CSO Perspectives (public)
Orchestrating the security stack around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Aug 8, 2022 20:44


Orchestrating the security stack is a cybersecurity first principle strategy. Our security stack has grown unwieldy. The complexity breeds vulnerability. Orchestration may be our only hope. Rick reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools. The Hash Table identifies data governance and policy strategy as a crucial first step. They also talk about the first principles of speaking with the C-suite, as well as the darkside of automation and orchestration. With Rick Howard, the CyberWire's CSO and Chief Analyst, joined by Bob Turner, the Fortinet Field CISO for Education, and Kevin Magee, the CSO for Microsoft Canada, discuss orchestration as a first principle strategy. Cybersecurity professional development and continued education. You will learn about: SOAR/SIEM and SASE for large scale orchestration, data governance, the three components of a good SASE platform, data materiality and gap analyses, the dark side of automation CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more orchestration and cybersecurity first principles resources, check the topic essay.

The Ryan Gorman Show
Hour 2 - School Safety, Economic Update, Court Rulings on Alex Jones and Kevin Spacey & Trending Stories

The Ryan Gorman Show

Play Episode Listen Later Aug 8, 2022 29:24


In the 8a hour, Ryan and Aaron discuss school safety and school start times and court decisions on Alex Jones and Kevin Spacey. Plus, Chief Analyst for Bankrate Greg McBride on new economic data and trending stories involving a local shark rescue, a lemonade stand scam, and a school logo fail.

Rod Arquette Show
Rod Arquette Show: A Tribute to Vin Scully

Rod Arquette Show

Play Episode Listen Later Aug 4, 2022 105:14


Rod Arquette Show Daily Rundown – Wednesday, August 3, 20224:20 pm: Political strategist Matt Mackowiak joins the show to give us his impressions of the primary elections in Arizona, Kansas, Washington, Missouri, Michigan and Wisconsin yesterday4:38 pm: Utah Speaker of the House Brad Wilson joins the show to discuss what more can be done legislatively to save the Great Salt Lake6:05 pm: Former Utah Speaker of the House Greg Hughes joins Rod for their weekly conversation about the wacky world of politics6:38 pm: Dr. Ron Faucheux, Chief Analyst at Certus Insights joins the program for a conversation about piece in the Washington Examiner on how Democrats can solve what he calls their “Joe Biden problem”

CSO Perspectives (public)
Enterprise backups around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Jul 25, 2022 23:07


Enterprise backups as a cybersecurity first principle strategy. This session covers the riveting topic of enterprise backup schemes to improve resilience. Rick discusses the value of data backups, workflow models, recent ransomware trends, and platforms for each use case. The Hash Table provides tangible enterprise backup strategies that encompass centralized, decentralized, and DevSecOps techniques, business continuity and disaster recovery plans, and engaging the Executive team in crisis scenarios and recovery training. In data backups, nothing is easy, but Rick breaks it down to first principles and makes it understandable. With Rick Howard, the CyberWire's CSO and Chief Analyst, joined by Jerry Archer, the Sallie Mae CSO, and Jaclyn Miller, the CISO for NTT, discuss enterprise backups as a first principle strategy. Cybersecurity professional development and continued education. You will learn about: backup tools and platforms, workflow responsibilities and models, disaster recovery and business continuity plans, backups as a tool to improve resilience CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more enterprise backups and cybersecurity first principles resources, check the topic essay.

The CyberWire
The great overcorrection: shifting left probably left you vulnerable. Here's how you can make it right. [CyberWire-X]

The CyberWire

Play Episode Listen Later Jul 24, 2022 26:58 Very Popular


Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for modern agile workflows. But in their drive to build security testing into development as early as possible, many organizations are neglecting application security in later phases and losing sight of the big picture. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, talks with two Hash Table members, Centene's VP and CISO for Healthcare Enterprises, Rick Doten, and Akamai's Advisory CISO, Steve Winterfeld. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Invicti's Chief Product Officer, Sonali Shah. They discuss the challenges and misunderstandings around shifting left, and provide tips on how organizations can implement web application security program without tradeoffs throughout the whole application security lifecycle.

The CyberWire
Cybercriminals shift tactics from disruption to data leaks. [CyberWire-X]

The CyberWire

Play Episode Listen Later Jul 17, 2022 28:41 Very Popular


On this episode of CyberWire-X, we examine double extortion ransomware. The large-scale cyber events of yesterday – Stuxnet, the Ukraine Power Grid Attack – were primarily focused on disruption. Cybercriminals soon shifted to ransomware with disruption still the key focus – and then took things to the next level with Double Extortion Ransomware. When ransomware first started to take off as the attack method of choice around 2015, the hacker playbook was focused on encrypting data, requesting payment and then handing over the encryption keys. Their methods escalated with Double Extortion, stealing data as well as encrypting it - and threatening to leak data if they don't receive payment. We've seen with ransomware groups like Maze that they will follow through with publishing private information if not paid. In the first part of the show, Rick Howard, the CyberWire's CSO, Chief Analyst, and Senior Fellow, talks with Wayne Moore, Simply Business' CISO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Nathan Hunstad, episode sponsor Code42's Deputy CISO. They discuss how classic ransomware protection such as offsite backups are no longer enough. They explain that Double Extortion means that you need to understand what data has been stolen and weigh the cost of paying with the cost of your data going public.

CSO Perspectives (public)
Enterprise encryption around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Jul 11, 2022 22:48


Enterprise encryption is a cybersecurity first principle strategy. Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion. With Rick Howard, the Cyberwire's CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy. Cybersecurity professional development and continued education. You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion. CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more encryption and cybersecurity first principles resources, check the topic essay.

The Partner Channel Podcast
How Your Channel can Thrive in an Economic Downturn

The Partner Channel Podcast

Play Episode Listen Later Jun 29, 2022 17:22


Tune into our latest episode with Larry Walsh, CEO & Chief Analyst at Channelnomics as he speaks with Tori Barlow, VP of Marketing at Allbound, about ways your channel can thrive during an economic downturn.

CSO Perspectives (public)
CxO professional development.

CSO Perspectives (public)

Play Episode Listen Later Jun 27, 2022 27:44


Rick Howard, the CyberWire's CSO and Chief Analyst, is joined by Hash Table members Gary McAlum, former USAA CSO, and Dawn Cappelli, the Rockwell Automation CISO, to discuss CxO professional development.

CSO Perspectives (public)
How to buy security products.

CSO Perspectives (public)

Play Episode Listen Later Jun 20, 2022 23:00


Rick Howard, the Cyberwire's CSO and Chief Analyst, is joined by Hash Table members Helen Patton, CISO for Duo Security's Advisory, and Nikk Gilbert, CISO for the Cherokee Nation Businesses, to discuss how to buy security products.

The CyberWire
Defining the intruder's dilemma. [CyberWire-X]

The CyberWire

Play Episode Listen Later Jun 5, 2022 33:55 Very Popular


For this Cyberwire-X episode, we are talking about the failure of perimeter defense as an architecture where, since the 1990s when it was invented, the plan was to keep everything out. That model never really worked that well since we had to poke holes in the perimeter to allow employees, contractors, and partners to do legitimate business with us. Those same holes could be exploited by the bad guys, too. The question is, what are we doing instead? What is the security architecture, the strategy, and the tactics that we are all using today that is more secure than perimeter defense? In the first part of the show, Rick Howard, the CyberWire's CSO, Chief Analyst, and Senior Fellow, talks with Jerry Archer, the Sallie Mae CSO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Mike Ernst, episode sponsor ExtraHop's Vice President of Sales Engineering, to discuss Software Defined Perimeter and intrusion kill chain prevention strategy.

The CyberWire
The future of security validation – what next? [CyberWire-X]

The CyberWire

Play Episode Listen Later May 3, 2022 28:47 Very Popular


Security executives need visibility into their real cyber risk in real time. But with the flood of vulnerability alerts, how can organizations pinpoint impactful security gaps? To meet this challenge, security teams are shifting to an exploit-centric approach to security validation to expose potential threats from ransomware, leaked credentials, phishing, & more.  On this episode, of CyberWire-X, we explore how automation can help teams make this shift to prioritize remediation based on bottom line business impact. Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, discusses the topic with Rick Doten, CISO, Carolina Complete Health and CyberWire Hash Table member, while Dave Bittner, CyberWire podcast host, engages with Sponsor Pentera's Jay Mar-Tang, Sales Engineering Manager for the Americas, about automated security validation.

The CyberWire
DevSecOps and securing the container. [CyberWire-X]

The CyberWire

Play Episode Listen Later May 1, 2022 31:53


The move to cloud has great potential to improve security, but the required process and cultural changes can be daunting. There are a vast number of critical vulnerabilities that make it to production and demand more effective mitigations. Although “shifting security left” should help, organizations are not able to achieve this quickly enough, and “shifting left” does not account for runtime threats. Organizations must strive to improve the prioritization of vulnerabilities to ensure the most dangerous flaws are fixed early. But even then, some risk will be accepted, and a threat detection and response program is required for full security coverage. On this episode of CyberWire-X, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores how to secure your software development lifecycle, how to use a maturity model like BSIM, where do containers fit in that process, and the Sysdig 2022 Cloud-Native Security and Usage report. Joining Rick on this episode are Tom Quinn, CISO at T. Rowe Price and CyberWire Hash Table member, and from episode sponsor Sysdig is their Director of Thought Leadership, Anna Belak, to discuss their experiences and real world data, as well as practical approaches to managing cloud risk. 

The CyberWire
Living security: the current state of XDR. [CyberWire-X]

The CyberWire

Play Episode Listen Later Apr 3, 2022 30:28 Very Popular


In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.