Podcasts about chief security advocate

  • 6PODCASTS
  • 7EPISODES
  • 39mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 30, 2022LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about chief security advocate

Latest podcast episodes about chief security advocate

Agent of Influence
Episode 042 - Deception Technology, Identity Detection and Response, Cloud Security, and More - Carolyn Crandall

Agent of Influence

Play Episode Listen Later Mar 30, 2022 36:00


Deception Technology, Identity Detection and Response, Cloud Security, and MoreIn this episode of Agent of Influence, Nabil is joined by Carolyn Crandall, Chief Security Advocate and CMO at Attivo Networks, which was recently acquired by SentinelOne. They discuss hardware vs. software instability, deception technology, identity detection and response, credential management, cloud security and adoption, endpoint security, and how to make cybersecurity careers more accessible. 

IT Visionaries
How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network's Carolyn Crandall

IT Visionaries

Play Episode Listen Later Oct 21, 2021 42:43


Threats are not new to business. Whenever there has been a plentiful economic prize, there have also been pirates. In the swashbuckling days, the captain and the crew were charged with protecting the merchandise on board. The difference today is the sheer volume of cyber attacks inbound to companies. Carolyn Crandall, the Chief Security Advocate and CMO at Attivo Networks, describes the attack as an enormous wave.Main TakeawaysA Security Threat Tsunami: Cyber attacks are like giant perpetual waves. Businesses are constantly inundated with these threats. The first steps toward fighting back are recognizing the power of one's adversaries, understanding how the company is being attacked, knowing where the company's vulnerabilities are, and then devising a plan to combat the attacks.Strategy over Monitoring: Businesses tend to want to monitor their systems and that's generally a good thing. Part of the method of attackers, however, is to overwhelm with data. Instead of only monitoring, companies have to decipher attacker techniques and then strategize on how to defend accordingly.Automate, Automate!: People can only do so much by themselves to defend against constant cyber attacks. Automation can be an answer to these attacks. Humans can't protect against the deluge of attacks by themselves and must lean on A.I. and machine learning to help combat these nefarious attacks. When companies begin to deploy an A.I. defense strategy, the designed algorithms can begin to decipher what is normal activity on network servers and what is not.Data Cloak and Disrupt: Misusing credentials is a great way for attackers to gain access to resources. It is possible to have an automated system, such as Attivo, that can bait rogue elements, gain their trust, and then deny their access while hiding vital data.IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

The CyberHub Podcast
Tech Corner with Carolyn Crandall, Chief Security Advocate at Attivo Networks

The CyberHub Podcast

Play Episode Listen Later May 14, 2021 47:37 Transcription Available


Topic: Securing Active Directory Carolyn Crandall, Chief Security Advocate Carolyn Crandall joins the show this week to talk about how Active directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that's taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that create greater challenges for practitioners. Carolyn shares best practices and tips Guest Bio: Carolyn Crandall is the Chief Security Advocate at Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks. She has worked in high-tech for over 30 years and has been recognized as a top 100 women in cybersecurity, a guest on Fox News, and profiled in the Mercury News. She is an active speaker on security innovation at CISO forums, industry events, and technology education webinars. Carolyn contributes regularly to Dark Reading and SCMagazine and co-authored the book Deception-Based Threat Detection: Shifting Power to the Defenders.   Connect with Carolyn: https://www.linkedin.com/in/cacrandall/   Tech Corner is supported by these great partners please make sure to check them out: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub  Whistic: www.whistic.com/cyberhub Attivo Networks: www.attivonetworks.com   CISOTalk Webinar Series: Modernizing the Vendor Risk Management with Airbnb and Whistic Webinar on May 25th, 2021 register here: https://zoom.us/webinar/register/WN_Frugj1ehRbOa3v05tTP7Qw   CISOTalk Paisley Shirt Challenge Donate now to support the wounded warrior project and get James to wear an ugly paisley shirt for one or all of his shows: https://tiltify.com/@cisotalk/ciso-talk-paisley-shirt-challenge   “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine **** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast   The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Go Beyond Disruption
"Building a Security Mindset" with Chris Romeo of The Security Journey (North Carolina, USA) GBD2

Go Beyond Disruption

Play Episode Listen Later May 30, 2018 24:56


"Remember, security is EVERYONE'S problem, regardless of what your role is." GBD2. In light of recent data breach and privacy concerns news, Chris Romeo of Security Journey explores why accounting and finance professionals at all levels should be more mindful and aware of cybersecurity threats affecting our data, as well as our clients' data, and how we can start building a security culture.   OUR GUEST Chris Romeo CEO and co-founder of Security Journey, which specialises in online application security training organised as a security belt program. Before Security Journey, Chris was the Chief Security Advocate at a Fortune 100 company with over 60,000 employees where he built the most massive security training program that has ever constructed, industry-wide. He left to found Security Journey and bring the lessons he learned teaching developers about security to the entire industry. Connect with him on LinkedIn at https://www.linkedin.com/in/securityjourney.   DON'T MISS OUT.  Get the latest show every week, automatically and free, at https://www.aicpa-cima.com/disruption.html. Share it easily with colleagues and friends by using the icons on the media player.    TAKE IT FURTHER. Find related CPD/CPE resources at https://www.aicpastore.com/GoBeyondDisruption and https://www.cgmastore.com/GoBeyonddisruption.   STAY CONNECTED. Follow #GoBeyondDisruption, @AICPANews and @CIMA_News on social."  ©2018 Association of International Certified Professional Accountants (AICPA & CIMA). All rights reserved 

Firewalls Don't Stop Dragons Podcast

Equifax, one of the three major credit bureaus, was hacked - over 143 million U.S. accounts may have been leaked, making them much more vulnerable to identity theft and fraud. In this episode, I help you understand the potential impacts of this breach and give you several important actions you can take to protect yourself, including instituting a credit freeze on your account. Chris Romeo, CEO and Founder of Security Journey will help us understand the severity of this major news story and what we need to do to protect ourselves moving forward! Is there such a thing as a good hacker? We will tackle what it takes to be a hacker - and why you actually might want to become one! Hackers are not all bad guys in hoodies hunched over a laptop. The hacker mentality is much more about a desire to tinker and solve puzzles, just applied to computers - and we need good hackers to help us combat the bad ones. Chris Romeo is CEO and co-founder of Security Journey. His passion is to bring security belt programs to all organizations, large and small. He was the Chief Security Advocate at Cisco Systems for five years, where he guided Cisco’s Security Advocates, empowering engineers to “build security in” to all products at Cisco. He led the creation of Cisco’s internal, end-to-end security belt program launched in 2012. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP. Help me to help you! Visit: https://patreon.com/FirewallsDontStopDragons For Further Insight: Website, www.securityjourney.com Follow on Twitter, @SecurityJourney Facebook, https://www.facebook.com/SecJourney/ Additional Resources: Freeze your credit at all three credit bureaus: Equifax, Experian and TransUnion. Get your free annual credit reports: https://www.ftc.gov/faq/consumer-protection/get-my-free-credit-report

ceo founders hackers cisco equifax experian cisco systems transunion cissp security journey chris romeo chief security advocate
Firewalls Don't Stop Dragons Podcast

Chris Romeo regales us with tales of safe-cracking robots, demonic car washes, possessed Teslas, and hacking of voting machines! Where did this all happen? At the hacker conferences, of course! We’ll help you understand how hackers really think and what they really do every year in Las Vegas at the DEFCON and BlackHat conferences. Chris Romeo is CEO and co-founder of Security Journey. His passion is to bring security belt programs to all organizations, large and small. He was the Chief Security Advocate at Cisco Systems for five years, where he guided Cisco’s Security Advocates, empowering engineers to “build security in” to all products at Cisco. He led the creation of Cisco’s internal, end-to-end security belt program launched in 2012. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP. For Further Insight: Website, www.securityjourney.com Follow on Twitter, @SecurityJourney Facebook, https://www.facebook.com/SecJourney/ Additional Resources: Hackers: Heroes of the Computer Revolution by Steven Levy WITH HOVER… YOUR PRIVACY IS INCLUDED Get 10% off your first domain name order!

Down the Security Rabbithole Podcast
DtSR Episode 204 - On Changing Culture

Down the Security Rabbithole Podcast

Play Episode Listen Later Jul 26, 2016 44:09


This week, Chris Romeo joins Michael, James and I to talk about changing the security posture of an organization by changing culture. This episode talks through tough issues like incentives, measurements and success factors. This episode with Chris is of particular interest for leaders and those who are working hard to change companies at their core, for the long term.   Chris Romeo's bio: Chris Romeo is CEO and co-founder of Security Journey. His passion is to bring application security awareness to all organizations, large and small. He was the Chief Security Advocate at Cisco Systems for five years, where he guided Cisco’s Secure Development Life Cycle program, empowering engineers to "build security in" to all products at Cisco. He led the creation of Cisco’s internal, end-to-end application security awareness program launched in 2012. Chris has twenty years of experience in security, holding positions in application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications, and is a frequent conference speaker at RSA and AppSec.

ceo cisco rsa cisco systems changing culture cissp appsec security journey chris romeo chief security advocate