Podcasts about Chief security officer

  • 489PODCASTS
  • 850EPISODES
  • 39mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 26, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Chief security officer

Show all podcasts related to chief security officer

Latest podcast episodes about Chief security officer

The Gate 15 Podcast Channel
The Gate 15 Interview EP 58. Cathy Lanier: Leading NFL Security with Attitude, Effort, Crabs and Beer.

The Gate 15 Podcast Channel

Play Episode Listen Later May 26, 2025 46:07


In this episode of The Gate 15 Interview, Andy Jabbour speaks with Cathy Lanier, Senior Vice President and Chief of Security at the National Football League. Prior to serving in her current role as Senior Vice President and Chief of Security at the National Football League, Lanier held the position of Chief of Police with the Washington, D.C. Metropolitan Police Department (MPD) from 2007 to 2016. From 1990, Cathy rose through the ranks of the MPD to earn various commendable honors including becoming the first female police chief of the nation's capital, the first commanding officer of Homeland Security and Counter-Terrorism for D.C. Police, one of a small number of female chiefs in the nation at the time, and the longest serving chief on the D.C. force. Now, as the Chief of Security for the National Football League, Lanier safeguards the security of all 32 NFL teams and their venues, liaises and collaborates with federal, state and local law enforcement, and ensures security for League events like the Super Bowl. Learn more about Cathy on LinkedIn.“We can do everything right and bad things can still happen” – Cathy Lanier, Senior Vice President and Chief of Security at the National Football League.In the discussion Cathy and Andy cover:Cathy's Background.The 2013 Washington Navy Yard Shooting and Hostile EventsThe importance of exercises, challenging our assumptions, and after-action reports.Her two biggest lessons learnedThe ever-growing mission of securing the NFLCybersecurity, socio-political divisiveness and radicalizationGetting leadership buy-inPrivate-public partnershipThe Human Factor: Getting immersed and getting intelligenceHaving empathy and understanding the other sideDealing with adversityWe play 3 Questions!Lots more!Selected links:NFL Videos:Cathy Lanier explains her role as the NFL's Chief Security Officer. Cathy Lanier, the NFL's Chief Security Officer, describes her transition from protecting the President of the United Sates as the first female police chief in Washington D.C. to providing the same security for the largest sporting event.NFL 360 | THE CHIEF. NFL senior vice president of security Cathy Lanier faces extraordinary crises and challenges on a daily basis, in one of the most high-profile pressure cooker positions in the sports world.MPD Navy Yard After Action ReportGuard Killed In Holocaust Museum Shooting

The CyberWire
Pandas with a purpose. [Research Saturday]

The CyberWire

Play Episode Listen Later May 24, 2025 20:20


This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Pandas with a purpose.

Research Saturday

Play Episode Listen Later May 24, 2025 20:20


This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
Protecting Data and Models: Cybersecurity Insights and Pricing Strategies for AI Solutions with James D. Wilton and Bryant Tow

Business of Tech

Play Episode Listen Later May 17, 2025 33:54


The discussion centers around the intersection of artificial intelligence (AI), cybersecurity, and monetization strategies, emphasizing the dual challenges of protecting data and AI models while also effectively pricing these solutions. Experts Bryant Tow and James D. Wilton explore the urgent risks posed by AI, including threats to company data and the integrity of AI models. They highlight the importance of aligning technical depth with business value, particularly as AI adoption accelerates across industries.Bryant Tow, Chief Security Officer at Leapfrog Services, emphasizes the need for organizations to conduct an AI readiness assessment to understand their specific use cases and the necessary infrastructure. He argues that data classification and retention policies are crucial for effective cybersecurity, as they help organizations determine what data needs protection and how to manage it. Tow also discusses the importance of governance and user training in ensuring that AI tools are used appropriately and securely.James D. Wilton, founder of Monovate, adds that pricing strategies for cybersecurity solutions should reflect the varying levels of protection and the perceived value by different customer segments. He suggests that companies can create premium bundles for advanced features while also considering the architecture of their offerings to justify pricing. Wilton highlights the need for businesses to articulate the value of their services, especially in a landscape where clients may be hesitant to invest due to cost-cutting measures.The conversation also touches on the skills gap in the cybersecurity workforce and the potential for outsourcing as a solution. Both experts agree that effective communication between security leaders and go-to-market teams is essential for conveying the value of cybersecurity solutions to clients. They conclude that organizations must continuously demonstrate the benefits of their services to prevent customer fatigue and ensure ongoing investment in cybersecurity measures. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Software Engineering Daily
Security at Coinbase with Philip Martin

Software Engineering Daily

Play Episode Listen Later May 15, 2025 48:31


Cryptocurrency exchanges face unique security challenges that require specialized threat assessments and planning. Coinbase is a cryptocurrency exchange based in the United States. It was founded in 2012 and has evolved alongside cryptocurrency as a technology. Philip Martin is the Chief Security Officer at Coinbase. Prior to Coinbase, Philip built and led the Incident Response The post Security at Coinbase with Philip Martin appeared first on Software Engineering Daily.

Podcast – Software Engineering Daily
Security at Coinbase with Philip Martin

Podcast – Software Engineering Daily

Play Episode Listen Later May 15, 2025 48:31


Cryptocurrency exchanges face unique security challenges that require specialized threat assessments and planning. Coinbase is a cryptocurrency exchange based in the United States. It was founded in 2012 and has evolved alongside cryptocurrency as a technology. Philip Martin is the Chief Security Officer at Coinbase. Prior to Coinbase, Philip built and led the Incident Response The post Security at Coinbase with Philip Martin appeared first on Software Engineering Daily.

Podcasts – TechSpective
A New Reality for Cybersecurity Collaboration

Podcasts – TechSpective

Play Episode Listen Later May 15, 2025 32:17


In the latest episode of the TechSpective Podcast, Errol Weiss, Chief Security Officer at Health-ISAC, joins me to dive into a timely and thought-provoking conversation on how cybersecurity collaboration is changing—especially when it comes to public and private sector relationships. […] The post A New Reality for Cybersecurity Collaboration appeared first on TechSpective.

The Abstract
Ep 98: Breaking the Silence: Legal Leaders Talk Mental Health

The Abstract

Play Episode Listen Later May 14, 2025 23:47


May is Mental Health Awareness Month, so we've pulled together some of the most vital stories from some of the star legal and business experts we've featured on The Abstract about managing stress, achieving a healthy work/life balance, dealing with tragedies at home, leaving toxic working environments and more. Keep listening and feel inspired to make a positive change in your life and career.Read detailed summary: https://www.spotdraft.com/podcast/episode-98TopicsIntroduction: 0:00 Ryan Nier, General Counsel at Nova Credit on imposter syndrome and feeling like an outsider in the legal community: 0:43 Joe Sullivan, ex-Chief Security Officer at Uber, Facebook, and Cloudflare on managing the stress of a federal indictment: 6:49 Lawtrades Co-Founders Raad Ahmed and Ashish Walia on how to support your business partner during difficult times: 11:36 Dan Haley, General Counsel and Corporate Secretary at Guild, on balancing work and life after a cancer diagnosis: 14:07 Zoe McMahon, Head of Legal Ops at HP, on mindfulness and bringing parts of your private self into the workplace: 16:47 Laura Frederick, CEO of How to Contract on the importance of seeing a therapist: 18:59Connect with us:Tyler Finn - https://www.linkedin.com/in/tylerhfinnSpotDraft - https://www.linkedin.com/company/spotdraftSpotDraft is a leading contract lifecycle management platform that solves your end-to-end contract management issues. Visit https://www.spotdraft.com to learn more.

ASIAL Security Insider
Ep 134 - Managing a Converged Security Model

ASIAL Security Insider

Play Episode Listen Later May 9, 2025 37:54


In this episode of the ASIAL Security Insider podcast, we are discussing Converged security, specifically how to successfully develop, deliver, and manage an organisation-wide model for converged security. To help us with our discussion, we are joined by Penny Clarke. Penny is the Managing Director of Convergence Security Consulting and has 34 years of industry experience across a range of sectors, including the Defence Industry, Government, and the Private sector. Penny's roles have included a wide variety of positions, including Chief Security Officer, Chief Information Security Officer, Protective Security Manager, Cyber Security Manager, Business Continuity Manager, Emergency Management, and more.  Penny's experience, training, and qualifications encompass a broad spectrum of skills, including Governance, Risk, and Assurance, Training, Security Incidents and Investigations, Information Security, Cyber Security, Physical Security, Personnel Security, and investigations, to name but a few. In our discussion, we cover:·     Cultural and Operational Differences?·     Lack of Unified Strategy and Leadership·     Technology Integration Challenges·     Regulatory and Compliance Complexities·     Evolving Threat Landscape and Risk ManagementFor more podcasts like this one, visit www.asial.com.au.

The Fearless Mindset
Episode 247 - Trust, Metrics, and Gen Z: A New Era of Leadership Is Here

The Fearless Mindset

Play Episode Listen Later May 8, 2025 30:40


In this episode, Mark Ledlow is joined by Robert Guillot, owner and founder of CenterPoint Security Solutions, talks about his extensive career in security and law enforcement. Rob shares his journey, which includes service in the Border Patrol, the ATF, and his role as a Chief Security Officer in the oil and gas industry. They delve into topics like the complexities of border security, the strategic implementations in oil and gas security, and the support from organizations like ASIS. Rob also discusses his transition from law enforcement to the private sector, his recent ventures, and the camaraderie within the security sector. Tune in for insights into the challenges and experiences faced in different facets of the security field.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Rob Guillot, with a rich background in law enforcement and security. Career Journey: Rob transitioned from federal law enforcement to private sector security, ending up in a key role within an oil and gas company. Values Networking: Importance of networking and organizations like ASIS in career growth. Security Challenges: Discusses the complexities and risks in oil and gas security management. Industry Insights: Highlights the critical role of teamwork and the extensive effort required in the oil and gas industry.QUOTES"The security industry, the true professionals, they want to help people." "Stopping the bleeding means reducing the amount of people coming into the country that we have no idea who they are." "The oil and gas industry is fascinating, and I don't think people appreciate how many smart people it takes to figure out where to drill and extract crude." "The totality of everything going on in oil and gas is pretty overwhelming."Get to know more about Robert Guillot through the link below. https://www.linkedin.com/in/robert-guillot/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

HPE Tech Talk
What's going on at the RSA Conference?

HPE Tech Talk

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

HPE Tech Talk, SMB
What's going on at the RSA Conference?

HPE Tech Talk, SMB

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

The Pomp Podcast
#1540 Jameson Lopp | How To Keep Your Bitcoin Safe

The Pomp Podcast

Play Episode Listen Later Apr 29, 2025 25:57


Jameson Lopp is the Co-Founder & Chief Security Officer of bitcoin security provider Casa. This conversation was recorded at Bitcoin Investor Week in New York. In this conversation we talk about Jameson being swatted, why he removed himself from the internet, steps to keep yourself and your bitcoin safe, projects Casa are building for bitcoin security, and tips to keep you safe while traveling. =======================The future is being built today and the future of currency isn't dollars, euros, pounds, or yen, it's crypto. And Gemini thinks that's a great thing. Because a future where money is decentralized, inclusive, and globally accessible, that's a future that we are anxious to be a part of. Go where dollars won't. With Gemini. =======================Polkadot is a scalable, secure, and decentralized blockchain technology aimed at creating Web3. Created by Gavin Wood, co-founder of Ethereum, Polkadot empowers users to build decentralized applications with ease. Backed by industry leaders, making it a preferred choice for big names, Polkadot stands out as a leading choice for investors seeking a reliable, future-proof solution in the growing world of Web3 technology. Learn more at https://polkadot.com/.=======================Pomp writes a daily letter to over 265,000+ investors about business, technology, and finance. He breaks down complex topics into easy-to-understand language while sharing opinions on various aspects of each industry. You can subscribe at https://pomp.substack.com/=======================View 10k+ open startup jobs:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dreamstartupjob.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Enroll in my Crypto Academy: https://www.thecryptoacademy.io/

The Mentors Radio Show
422. From Pregnant Runaway at 14 to D.C. Police Chief at 39, Cathy Lanier’s Remarkable Story of Resilience

The Mentors Radio Show

Play Episode Listen Later Apr 26, 2025 40:33


In this episode of THE MENTORS RADIO, Host Dan Hesse talks with Cathy Lanier, whose amazing story continues to inspire. At age 14, Lanier got pregnant, ran away from home, dropped out of high school. But by age 39, this single mother became Washington D.C.'s Chief of Police, earned two master's degrees, and now serves as Senior Vice President and Chief Security Officer for the National Football League (NFL). In her role with the NFL, Lanier coordinates the efforts of the League offices—that is, all 32 clubs!—and federal, state and local law entities to ensure the security of the NFL's venues, fans, players, staff and infrastructure. Cathy served as Chief of Police in Washington, D.C. from 2007 to 2016, where she was not only the first female police chief but also the longest serving chief, serving under three mayors. Her innovative strategies were credited with reducing violent crime in Washington, D.C. by 21 percent from 2007 to 2015 while the city's population grew by 15 percent. LISTEN TO the radio broadcast live on iHeart Radio, or to “THE MENTORS RADIO” podcast any time, anywhere, on any podcast platform – subscribe here and don't miss an episode! SHOW NOTES: CATHY LANIER: BIO: BIO: CATHY LANIER, Senior Vice President and Chief of Security, National Football League NEWS & CLIPS with Cathy Lanier Women in Football: Cathy Lanier, NFL Chief Security Officer Cathy Lanier, Washington, DC Police Chief https://www.youtube.com/watch?v=QE0J8c91rWQ A Conversation with NPS Alumna, Ms. Cathy Lanier Other various News clips involving Cathy Lanier Keynote Speaker, Ms. Cathy Lanier, Senior Vice President of NFL Security, Fall 2018, Naval Postgraduate School Graduation Ceremony NFL calls on Congress to address growing drone threats at games Cathy Lanier Changes Policing in D.C. and Maybe Nation

ITSPmagazine | Technology. Cybersecurity. Society
Why CISOs Should Still Say Yes to the Role—Even Now | A RSAC Conference 2025 Conversation with Tim Brown | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 24, 2025 22:07


In this Chats on the Road to RSAC 2025, , Sean Martin and Marco Ciappelli connect with Tim Brown, Chief Information Security Officer at SolarWinds, to unpack the critical issues facing CISOs today—and why the role remains worth pursuing.Brown is participating in multiple sessions at RSAC Conference 2025, including the CISO Bootcamp and Cyber Leaders Forum. Both are closed-door conversations designed to surface real concerns in a confidential, supportive setting. These aren't theoretical discussions—they're rooted in hard-earned experience. Brown, who has faced high-profile scrutiny and legal fallout from a past incident at SolarWinds, brings a uniquely personal perspective to these sessions.He points out that fear and hesitation are keeping many deputy CISOs from stepping up into the top role. His message to them: don't be afraid of the position. Despite the weight of responsibility, the role offers real influence, the ability to shape enterprise architecture, and the opportunity to drive meaningful business decisions. Brown emphasizes the importance of community support and collective growth, noting that the cybersecurity industry—still relatively young—is maturing and finding its footing when it comes to accountability and resilience.Beyond leadership development, mental health and stress management are key themes in the Cyber Leaders Forum. Brown acknowledges the toll the job can take, even sharing that his own health suffered despite thinking he was managing stress well. This honest reflection opens the door for deeper conversations about personal well-being in high-pressure roles.He's also appearing at the Cloud Security Alliance Summit with Chris Hoff, Chief Security Officer at LastPass, where they'll discuss incident response and field questions from the audience. On Wednesday, Brown joins a breakfast session with Tactic and Hyperwise, guiding attendees through a crisis simulation based on lessons from the Sunburst attack. His focus? Helping others avoid being unprepared in a moment of chaos.From insider threat modeling to supply chain transparency and the challenges of monitoring runtime behavior, Brown is clear-eyed about where CISOs need to focus next.This episode isn't just a preview of conference sessions—it's a call to future security leaders to lean in, not back.___________Guest: Tim Brown, CISO, Solarwinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesRSAC Session: CLF Ask Me Anything Session with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MHRSAC Session: CISO Boot Camp Exclusive Fireside Chat with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXhCSA Summit at RSAC 2025: Fireside Chat with Tim Brown and Chris Hoff: https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247bLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The Gate 15 Podcast Channel
Weekly Security Sprint EP 107. Hacktivism, Nation-states, and political violence

The Gate 15 Podcast Channel

Play Episode Listen Later Apr 16, 2025 29:04


In this week's Security Sprint Andy and Hunter talk about the following topics:Warm Open:• How Healthcare Facilities Can Be Truly Disaster-Resilient. Healthcare Facilities Today spoke with Jon Crosson, director of health sector resilience at Health-ISAC, on what makes a solid resiliency program for healthcare facilities, the importance of real-time information sharing and how healthcare facility managers can use partnerships to improve response and recovery efforts. • Healthcare cybersecurity needs a total overhaul, by Errol Weiss, Chief Security Officer, Health-ISAC• Addressing Risks from Chris Krebs and Government Censorshipo Fact Sheet: President Donald J. Trump Addresses Risks from Chris Krebs and Government Censorshipo Trump Revenge Tour Targets Cyber Leaders, Electionso Gate 15: Cybersecurity & Infrastructure Security: Time to Make This Happen, December 15, 2017 Following the House of Representatives, the US Senate needs to approve the re-designation of DHS's National Protection and Programs Directorate (NPPD) to become the Cybersecurity and Infrastructure Security Agency (CISA); The President should nominate, and the Senate should confirm, Christopher Krebs as Under Secretary for NPPD and then as the first Director of National Cybersecurity and Infrastructure Security.Main Topics: Hacktivism & Nation-State Influence• CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide• IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities• Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024• The rising tide: A 2024 retrospective of hacktivismPolitical Violence, Executive Protection• ‘Save the white race': Teen who gunned down his parents was plotting a ‘political revolution' that included ‘getting rid of' President Trump, police say• Pennsylvania Man Charged with Making Threats to Assault and Murder President Donald J. Trump, Other U.S. Officials, and Immigration and Customs Enforcement Agents & ‘Going to assassinate him myself': Man ‘buying 1 gun a month since the election' threatened to kill Trump in multiple YouTube comments under name ‘Mr Satan,' FBI says• Suspect in custody after overnight arson at Pennsylvania Gov. Josh Shapiro's residenceo Was Cody Balmer 'Upset' With Gov Josh Shapiro Over Property Seizure? o Harrisburg man to be charged with attempted murder of Gov. Josh Shapiro for setting fire to official residenceo Suspect in arson at Pennsylvania Gov. Josh Shapiro's residence planned to beat him, documents sayo Suspected arsonist Cody Balmer accused of firebombing Gov. Shapiro's home shared disturbing photos onlineo Cody Balmer's Social Media Reveals Anti-Joe Biden Posts• Protect Democracy: How does Gen Z really feel about democracy? 11% believe that it political violence is sometimes necessary to achieve progress.• Arrest made at UnitedHealthcare headquarters after reports of an intruder Quick Hits:• Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit• 8 April 2025 NCSC, FBI, DCSA bulletin – Online Targeting of Current & Former U.S. Government Employees. • FAA Drone Detection Testing. The FAA will conduct drone-detection testing in Cape May, New Jersey, between April 14-25. • Top homeland security lawmaker calls for cautious cuts to CISA• CISA cuts: ‘Open season' for US? • Senator puts hold on Trump's nominee for CISA director, citing telco security ‘cover up' • OCC Notifies Congress of Incident Involving Email Systemo Treasury bureau notifies Congress that email hack was a ‘major' cybersecurity incidento Hackers lurked in Treasury OCC's systems since June 2023 breach• US Cyber Command: Posture Statement of Lieutenant General William J. Hartman

State of Process Automation
213 - Führung in unsicheren Zeiten: Wie militärische Führungsprinzipien einem Chief Security Officer helfen, im Konzern wirksam zu führen | Christoph Moser

State of Process Automation

Play Episode Listen Later Apr 12, 2025 28:37


In dieser Episode spreche ich mit Christoph Moser, Group Chief Security Officer, A1 Telekom Austria.Wir sprechen über folgende Themen:Was Führungskräfte von militärischer Führung lernen können – und warum das auch in der Privatwirtschaft funktioniertWarum gute Führung mit einem klaren „Warum“ beginnt – und wie du das als Führungskraft selbst erarbeiten kannstWie du mit Auftragstaktik dein Team befähigst, Verantwortung zu übernehmen, ohne dabei die Kontrolle zu verlierenErhalte jede Woche aktuelle Strategien in dein E-Mail Postfach: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.stateofprocessautomation.com/Podcast-Moderator: Christoph PacherLinkedInInterviewgast: Christoph Moser, Group Chief Security Officer, A1 Telekom AustriaLinkedIn

Pro AV Today
Managing Trusted Devices on the Energy Grid with Intertrust

Pro AV Today

Play Episode Listen Later Apr 10, 2025 24:26


As energy systems become more decentralized, the complexity of managing trusted devices and other components connected to the grid continues to grow. According to the U.S. Department of Energy's Distributed Energy Resource Interconnection Roadmap (January 2025), utilities across the country are experiencing increased interconnection requests for distributed energy resources (DERs), such as solar, battery storage, and EV charging systems. This shift brings a mounting challenge: securing and authenticating an expanding web of edge devices without compromising system integrity.How do we ensure trust across a sprawling, multi-vendor energy infrastructure that is increasingly targeted by cyber threats?In this episode of Pro AV Today, host Ben Thomas welcomes Julian Durand, the Chief Security Officer & SVP of Product Management, and Ali Hodjat, the VP of Product Marketing at Intertrust. They discuss how energy providers can manage and secure trusted devices across complex grid networks. The conversation focuses on the intersection of cybersecurity, device authentication, and the evolving expectations of both energy providers and consumers.Key Takeaways from the Episode:Zero trust architecture is essential to securing distributed energy networks, which are increasingly vulnerable due to the proliferation of unvetted, third-party hardware.Endpoint protection is lagging in many operational technology (OT) environments, with legacy protocols and air-gapped systems often failing to meet modern cybersecurity expectations.A universal trust model, such as the Trusted Energy Interoperability Alliance (TEIA), is being developed to help align OEMs, utilities, and consumers around a common framework for device certification and data governance.Julian Durand is a cybersecurity and product management executive with over two decades of experience launching and scaling technologies across mobile, IoT, SaaS, and PaaS platforms. He has led global teams at Nokia, Qualcomm, and Intertrust, where he spearheaded innovations in eSIM, embedded security, telematics, and decentralized trust systems—holding ten patents with several more pending. Durand is CISSP-ISSAP certified, has held multiple P&L leadership roles, and is a recognized thought leader and frequent speaker on cybersecurity and product strategy.Ali Hodjat is a senior product marketing leader with over 17 years of experience driving go-to-market strategies, product positioning, and sales enablement across broadcast, streaming, and media technology sectors. In addition to leading initiatives at companies like Intertrust, Telestream, and Verimatrix, he has deep expertise in content protection, DRM, and video security technologies, including forensic watermarking and authentication systems. Hodjat combines strong technical knowledge in media cybersecurity with proven leadership in cross-functional collaboration, competitive analysis, and strategic content development to deliver measurable business impact.

Secure Ventures with Kyle McNulty
Ex Palo Alto Networks CSO Rick Howard on Cybersecurity from First Principles

Secure Ventures with Kyle McNulty

Play Episode Listen Later Apr 8, 2025 45:44


Recorded live at Blu Ventures' Cyber Venture Forum! I got the chance to speak with Rick Howard, previously Chief Security Officer at Palo Alto Networks from 2013 to 2019. Rick has a wealth of cybersecurity industry experience, and he wrote a book called Cybersecurity First Principles and maintains the cybersecurity book hall of fame, called the Cybersecurity Canon. In this episode we discussed his perspective on the fundamental themes of cybersecurity with a lens to how entrepreneurs and investors can leverage these ideas.Cybersecurity Canon WebsiteCybersecurity First Principles on AmazonSponsored by VulnCheck!

The CyberWire
Rick Howard: Give people resources. [CSO] [Career Notes]

The CyberWire

Play Episode Listen Later Apr 6, 2025 8:39


Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Rick Howard: Give people resources. [CSO]

Career Notes

Play Episode Listen Later Apr 6, 2025 8:39


Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Amelia's Weekly Fish Fry
New Insight and Awareness into IoT Security with Cyber Trust Mark

Amelia's Weekly Fish Fry

Play Episode Listen Later Mar 21, 2025 17:38


IoT security is the name of the game this week! My podcast guest is Sharon Hagi, Chief Security Officer of Silicon Labs. Sharon and I chat about the new cybersecurity labeling program called Cyber Trust Mark - the details of this program and the motivation behind its development. We also discuss the Connectivity Standards Alliance's Product Security Working Group and how it eases the challenges of complying with global product security requirements. Finally, we also explore benefits of silicon-rooted trust models and secure manufacturing in this arena and how Silicon Labs is furthering security in IoT devices. 

She Said Privacy/He Said Security
Inside Cybersecurity: How Hackers Think and How To Stop Them

She Said Privacy/He Said Security

Play Episode Listen Later Mar 20, 2025 34:34


David Kennedy is the Founder and CEO of TrustedSec and Co-founder at Binary Defense. He is considered an industry leader in cybersecurity. As the former Chief Security Officer of Diebold, David has led global cybersecurity teams, testified before Congress, and continues to shape cybersecurity policy. He co-authored the Penetration Testing Execution Standard and is renowned in offensive security. A Marine with intelligence experience, he prioritizes family, fitness, and co-hosts the Hacking Your Health Podcast. He built a DeLorean time machine inspired by Back to the Future. David's life mission is to help others and to make the world a safer place in cybersecurity, which drives him every single day. In this episode… Cybersecurity threats are evolving at an alarming rate, and businesses face an uphill battle in protecting their data and systems. Ransomware attacks, supply chain vulnerabilities, and sophisticated social engineering tactics put organizations at constant risk. At the same time, companies face mounting pressure to protect customer data amid the growing influence of AI-driven misinformation, concerns surrounding platforms like TikTok, and other evolving cyber threats. How can businesses defend themselves proactively? Building a strong cybersecurity program requires leadership, governance, and proactive risk management, not just technology. Many organizations struggle with detecting breaches in real time, making rapid threat detection and response essential. TrustedSec and Binary Defense are helping companies address these challenges by providing expert-led security consulting, penetration testing, and real-time threat monitoring. As cyber threats become more advanced, collaboration between security and privacy teams is essential to building a comprehensive defense strategy. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with David Kennedy, Founder and CEO of TrustedSec and Co-founder at Binary Defense, about evolving cybersecurity threats and how businesses can improve their security posture. David talks about the intersection of cybersecurity and privacy, the role of governance in building cybersecurity resilience and protecting data, how AI is shaping cyber threats, and the implications of cyber warfare. He also shares his experience testifying before Congress, explaining why lawmakers struggle to grasp cybersecurity issues. David provides advice on how companies can improve their threat detection and response capabilities and why social media presents a growing risk.

The CyberWire
PHP flaw sparks global attack wave.

The CyberWire

Play Episode Listen Later Mar 10, 2025 36:31


PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI and Secret Service confirm crypto-heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyberattack. Switzerland updates reporting requirements for critical infrastructure operators.  Our guest is Errol Weiss, Chief Security Officer at the Health-ISAC, who warns “the cavalry isn't coming—why the private sector must take the lead in critical infrastructure cybersecurity.” A termination kill switch leads to potential jail time.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we have Errol Weiss, Chief Security Officer at the Health-ISAC, sharing his take “the cavalry isn't coming—why the private sector must take the lead in critical infrastructure cybersecurity.” Selected Reading Mass Exploitation of Critical PHP Vulnerability Begins (SecurityWeek) Undocumented commands found in Bluetooth chip used by a billion devices (Bleeping Computer) White House cyber director's office set for more power under Trump, experts say (The Record) Ransomware gang encrypted network from a webcam to bypass EDR (Bleeping Computer) Texas border city declares state of emergency after cyberattack on government systems (The Record) Feds Link $150M Cyberheist to 2022 LastPass Hacks (Krebs on Security) Home appliance company Presto says cyberattack causing delivery delays (The Record) Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure (Infosecurity Magazine) Developer sabotaged ex-employer IT systems with kill switch (The Register)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Coin Stories
Jameson Lopp: Bitcoin Address "Poisoning" Schemes, Hacks, Threats & How to Protect Your Money

Coin Stories

Play Episode Listen Later Mar 5, 2025 42:41


In this episode with Casa co-founder and CSO of Casa we discuss: Bitcoin address "poisoning" aimed at stealing your assets! Recent hacks, scams and threats in crypto ecosystem How did ByBit exchange get hacked for $1.4 billion? How to protect yourself with Casa: https://www.casa.io/natalie  Kidnapping and ransom concerns Making your identity more private online Sign up for our free security webinar on 3/6/25: https://us06web.zoom.us/webinar/register/WN_Kp2bk2OeT4ubn8YYswXM9A#/registration   ---- Guest Bio: Jameson Lopp is co-founder and Chief Security Officer of Casa, a platform that helps users secure their Bitcoin and other digital assets using multiple keys. Prior to joining Casa, the cypherpunk, software engineer, writer, and Bitcoin security expert was at BitGo. Jameson first became involved in Bitcoin around 2012. Follow Jameson on X at https://x.com/lopp  ---- Coin Stories is powered by Genius Group (NYSE American $GNS). Genius is a Bitcoin-first business delivering AI-powered education and acceleration solutions for the future of work. Learn more and enter for a chance to win a whale pass to Bitcoin 2025 in Las Vegas: https://www.geniusgroup.ai/coinstories ---- Natalie's Promotional Links:  Secure your Bitcoin with collaborative custody and set up your inheritance plan with Casa: https://www.casa.io/natalie  For easy, low-cost, instant Bitcoin payments, I use Speed Lightning Wallet. Get 5000 sats when you download using this link and promo code COINSTORIES10: https://www.speed.app/sweepstakes-promocode/ River is where I DCA weekly and buy Bitcoin with the lowest fees in the industry: https://partner.river.com/natalie  Safely self-custody your Bitcoin with Coinkite and the ColdCard Wallet. Get 5% off: https://store.coinkite.com/promo/COINSTORIES Master your Bitcoin self-custody with 1-on-1 help and gain peace of mind with the help of The Bitcoin Way: https://www.thebitcoinway.com/natalie Bitcoin 2025 is heading to Las Vegas May 27-29th! Join me for my 4th Annual Women of Bitcoin Brunch! Get 10% off Early Bird passes using the code HODL: https://tickets.b.tc/affiliate/hodl/event/bitcoin-2025   Protect yourself from SIM Swaps that can hack your accounts and steal your Bitcoin. Join America's most secure mobile service, trusted by CEOs, VIPs and top corporations: https://www.efani.com/natalie  Connect with Bitcoiners and Bitcoin merchants wherever you live and travel on the Orange Pill App: https://signup.theorangepillapp.com/opa/natbrunell Your Bitcoin oasis awaits at Camp Nakamoto: A retreat for Bitcoiners, by Bitcoiners. Code HODL for discounted passes: https://massadoptionbtc.ticketspice.com/camp-nakamoto ---- This podcast is for educational purposes and should not be construed as official investment advice. ---- VALUE FOR VALUE — SUPPORT NATALIE'S SHOWS Strike ID https://strike.me/coinstoriesnat/ Cash App $CoinStories   #money #Bitcoin #investing   

Business of Tech
AI's Role in Cybersecurity: Insider Threats, Phishing Scams, and Deepfake Risks with Bryant G. Tow

Business of Tech

Play Episode Listen Later Feb 22, 2025 35:35


The episode delves into the impact of artificial intelligence (AI) on cybersecurity, particularly focusing on the rise of AI-driven phishing attacks. Bryant G. Tow, Chief Security Officer at LeapFrog Services, discusses how cybercriminals are leveraging generative AI to create more convincing phishing schemes, which can lead to identity theft. Despite the advancements in attack methods, Tao emphasizes that the fundamental defenses against these threats remain unchanged. He highlights the importance of understanding the evolving landscape of cyber threats and the necessity for organizations to adapt their security measures accordingly. Tow elaborates on the concept of an "arms race" in cybersecurity, where defenders must continuously improve their strategies to keep pace with increasingly sophisticated attacks. He points out that while phishing remains a common entry point for cyber threats, the use of AI is transforming these attacks into more personalized and effective schemes. The conversation shifts to the implications of deepfake technology, which can create realistic impersonations of individuals, further complicating the security landscape. Tao warns that the ability to produce convincing deepfake videos and audio can lead to significant risks for organizations. The discussion also touches on the challenges of insider threats, particularly when employees intentionally disregard security policies. Tao stresses the importance of establishing clear acceptable use policies and implementing a zero-trust framework to mitigate these risks. He notes that most insider threats are accidental, but organizations must be prepared to address malicious actions as well. Effective governance, training, and monitoring are essential components in managing insider threats and ensuring compliance with security protocols. Finally, the episode highlights the evolving role of government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) in addressing cybersecurity challenges. Tow reflects on recent changes in leadership and the potential for new perspectives on cybersecurity governance. He expresses hope that the shift in focus will lead to more accessible resources and support for organizations navigating the complex landscape of cyber threats. The conversation underscores the need for continuous adaptation and vigilance in the face of emerging technologies and evolving attack methods. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

AWS - Conversations with Leaders
Right-sizing security across Amazon businesses with CSO Steve Schmidt

AWS - Conversations with Leaders

Play Episode Listen Later Feb 20, 2025 27:50


Security leadership requires a holistic approach across physical and digital domains — and Amazon's diverse business portfolio presents unique challenges and opportunities in both realms. In this interview with Steve Schmidt, Amazon's Chief Security Officer, we'll explore how Amazon implements security across AWS, amazon.com, Whole Foods, Prime Video, Kuiper and more. Join the conversation as Clarke Rodgers, Director of AWS Enterprise Strategy asks Steve about how Amazon standardizes security across businesses, leverages generative AI to improve application security, and enables comprehensive threat intelligence through tools like MadPot. Listen now to learn how modern security leaders can combine physical and information security to combat evolving threats from both cyberattacks and human espionage.

Danger Close with Jack Carr
Terrorists, Defectors, Assassins: 22 Years in the CIA

Danger Close with Jack Carr

Play Episode Listen Later Feb 19, 2025 114:40


Mike Howard is a former CIA clandestine services operative with over two decades of experience in counterterrorism, operating extensively in Asia and Africa. After leaving the Agency, he spent 16 years as the Chief Security Officer for Microsoft. Now, he shares his insights on leadership, security, and strategy through his RONIN LEADERSHIP podcast and blog. He is also the author of multiple books, including THE ART OF RONIN LEADERSHIP and the novels FULL CIRCLEand BLOOD PROMISE. His latest thriller, OMEGA DECEPTION, is available now.FOLLOW MIKEInstagram:  @mikehowardX: @roninauthorYouTube: https://www.youtube.com/@MikehowardLeadershipPodcast LinkedIn: @Ronin-Leadership-Thoughts Website: www.mikehowardauthor.comFOLLOW JACKInstagram - @JackCarrUSA X - @JackCarrUSAFacebook - @JackCarr YouTube - @JackCarrUSASPONSORSCRY HAVOC – A Tom Reece Thriller https://www.officialjackcarr.com/books/cry-havoc/Bravo Company Manufacturing Mk15 Timepiece - MOD3:https://bravocompanyusa.com/bcm-mk15-timepiece-mod-3/ and on Instagram @BravoCompanyUSATHE SIGs of Jack Carr, From True Believer: M17/M18, P365, P320, P320X-CarryVisit https://www.sigsauer.com/ and on Instagram @sigsauerinc STACCATO HD: https://staccato2011.com/hdand on Instagram @staccato2011Jack Carr Gear: Explore the gear here https://jackcarr.co/gear 

Easy Prey
CISOs: The Ultimate Stress Test With Jill Knesek

Easy Prey

Play Episode Listen Later Feb 12, 2025 45:12


The CISO role is constantly changing. With all the shifts in cybersecurity, it's crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed at multiple levels and handle burnout amongst many other responsibilities. Today's guest is Jill Knesek. Jill is the Chief Information Security Officer for Blackline, a company that does financial SaaS solutions. It's based out of the Los Angeles area. She's been there almost three years now as the CISO, running the information security team. She previously served as Chief Security Officer for BT Global Services. She has more than 15 years' experience directing security programs, including service as a special agent for the FBI assigned to the Cyber Crime Squad in Los Angeles Field Office, where she was involved in several high-profile cases, including Kevin Mitnick.  In this episode, we cover the CISO role evolving from low visibility to a C-level position, managing multi-cloud infrastructures and aligning with other teams and the ongoing cybersecurity skills gap and burnout. Jill also talks about incident response and crisis management and collaboration within the cybersecurity community to fill the blind spots and strengthen the defenses. Show Notes: [01:23] She's now the Chief Information Security Officer for Blackline, a company that does financial SaaS solutions. [02:00] She was also an FBI special agent for 3 and 1/2 years working cybercrime. She was super excited, because this was her lifelong dream. [03:35] She loved the FBI, but she knew she could do more for the industry on the private side. [04:21] Jill talks about how the CISO role has evolved. It's now a C-level position. [06:26] Some of the boards were very interested in what was going on with security. There has to be a balance with funding and proving your success. [07:39] Now complexity is an issue.  [09:03] The cloud adds so many connecting services.  [11:45] CISOs are getting more responsibility and need more qualified people in their teams. There's a gap with not enough people coming into the cybersecurity industry. [12:30] How the idea of stress and working nights and weekends can deter some graduates from the cybersecurity industry. [15:15] Boards and executive committees expect the CISO to be right in the middle of things. They want real-time updates and to know what everyone is working on right now. [17:47] The importance of keeping a calm level-headed view when something goes wrong. [21:41] We learn about the flow of straightening out curves or incidents. Learn during the small incidents and practice the process. [23:57] The importance of not scolding the team for being too quick to react. It's better to have a false alarm than to ignore a serious problem. [25:10] Jill does a one-to-one with everyone on her team each quarter. She tries to Mentor them with some of the things that she's learned. [30:29] We hear about a couple of incidents where ransomware got into the environment.  [35:01] When someone else reported that something weird was going on in the network. [38:27] To help with the talent gap, we need to start introducing cybersecurity at the high school level. [42:15] It's important for CISOs to be connected with other groups and events. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jill Knesek at Blackline Jill Knesek on LinkedIn

The CyberWire
DOGE-eat-DOGE world.

The CyberWire

Play Episode Listen Later Feb 7, 2025 36:53


Security concerns grow over DOGE's use of AI. The British government demands access to encrypted iCloud accounts. Researchers identify critical vulnerabilities in the DeepSeek iOS app. Microsoft Edge uses AI to block scareware. A phishing campaign targets Facebook users with fake copyright infringement notices. Researchers discover malicious machine learning models on Hugging Face. A major data broker faces yet-another data breach lawsuit. CISA warns of a critical Microsoft Outlook vulnerability under active exploitation. Guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. The UK's cyber weather report says expect light phishing with a chance of ransomware.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today on our Industry Voices segment, guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. For additional details, please visit this resource: The Reality of Resilience, Recovery, and Repeat Cyberattacks (Infographic) Selected Reading Elon Musk's DOGE feeds AI sensitive federal data to target cuts (The Washington Post) Will DOGE Access to CMS Data Lead to HIPAA Breaches? (GovInfo Security) Federal judge tightens DOGE leash over critical Treasury payment system access (The Register) UK reportedly demands secret ‘back door' to Apple users' iCloud accounts (The Record) NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App (NowSecure) Microsoft Edge update adds AI-powered Scareware Blocker (Bleeping Computer) New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials (Cyber Security News) Developers Beware! Malicious ML Models Detected on Hugging Face Platform (Cyber Security News) Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker (The Register) Critical Microsoft Outlook Vulnerability (CVE-2024-21413) Actively Exploited in Attacks - CISA Warns (CISA) UK cyberattack severity to be scored by world-first group  (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Consumer Connection
Unmasking AI's Role in Scams

Consumer Connection

Play Episode Listen Later Feb 4, 2025 30:38


In this episode of Consumer Connection, we explore the use of artificial intelligence in scams and how it's making them more convincing than ever. From AI-generated profiles in romance scams to deepfake technology in phishing and grandparent scams, we discuss what AI is and the latest tools scammers are using to deceive consumers. Host Michelle Escobar is joined by Keith Young, Chief Security Officer at Montgomery County's Office of Enterprise Information Security, who shares how scammers leverage AI and the warning signs to watch for. Tune in for practical advice and resources to stay ahead of scammers.  For additional information and resources, visit OCP's website at www.montgomerycountymd.gov/ocp. Have a question or suggestion for a future episode? Send an email to consumerconnection@montgomerycountymd.gov. 

Unchained
Crypto Kidnappings and Physical Attacks Are on the Rise—Here's How to Stay Safe - Ep. 775

Unchained

Play Episode Listen Later Jan 31, 2025 44:10


The kidnapping of Ledger co-founder David Balland in France sent shockwaves through the crypto community, raising urgent questions about security for high-profile crypto holders. How do you protect yourself when criminals are willing to go beyond digital attacks and resort to violence? In this episode of Unchained, Jameson Lopp, co-founder and Chief Security Officer of Casa, speaks about the growing trend of “wrench attacks”—physical assaults aimed at forcing crypto holders to transfer their assets. Lopp explains how these attacks are evolving, what makes someone a target, and which geographies are seeing the most attacks. Plus, he shares what behaviors put you most at risk, how criminals are getting more organized, and why relying on exchanges for security is not as safe as you think.  If you hold significant crypto wealth, this is an episode you can't afford to miss. Show highlights: 2:02 How a Ledger co-founder was kidnapped and how the situation was resolved 6:46 Who tends to be targeted and which geographies see the most physical attacks 14:15 The riskiest behaviors that are likely to lead to wrench attacks 16:01 How attackers decide who to target  20:37 How the attacks have been accelerating lately  22:16 How the Ledger team ensured the kidnappers couldn't access the ransom money  23:44 Jameson's top tips on how crypto holders can stay safe 29:30 News Recap Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com Thank you to our sponsors! Mantle Polkadot Quai Network Guest  Jameson Lopp, co-founder and Chief Security Officer of Casa Links Previous coverage of Unchained on crypto security: Here's How to Protect Your Crypto and Seed Phrases From Natural Disasters Reuters: Kidnapped co-founder of French crypto firm Ledger had his hand mutilated Learn more about your ad choices. Visit megaphone.fm/adchoices

Unlearn
Proven Strategies to Create Accountability Without Agency with Lee Vorthman

Unlearn

Play Episode Listen Later Dec 18, 2024 31:12


Welcome to the UNLEARN Podcast! Today, we're joined by Lee Vorthman, Vice President of Strategic Security Initiatives at Oracle. Lee leads a global team to protect and strengthen Oracle's operations. He is also a Global CISO Advisory Board Member at HMG Strategy and an Advisory Board Member for Phoenix Security. His career began in the US Navy, and he has since held key roles across defense, technology, cloud, education, and oil & gas industries. Lee's past roles include Chief Security Officer for Oracle's Advertising group, leading Global Security Engineering at Pearson Education, and serving as Chief Technology Officer for Federal Civilian Agencies at NetApp. In this episode, Lee shares insights on leveraging technology for growth, navigating cultural transformations, and building resilient organizations.Key Takeaways:Mastering Security Fundamentals: Lee highlights the importance of staying grounded in foundational security practices while adopting innovative technologies like AI to address evolving challenges.Building Trust and Influence: Discover Lee's techniques for fostering collaboration, psychological safety, and cultural change to drive impactful security initiatives.The Power of Diverse Skills: Learn why developing a broad skill set across disciplines like engineering, finance, and HR is essential for empathetic leadership and effective problem-solving.Additional Insights:Cultural Change in Security: Get ready for a thought-provoking conversation with Lee Vorthman on leadership, innovation, and building resilient organizations!Balancing Speed and Resilience: Insights on how businesses can prioritize innovation while maintaining strong operational fundamentals.The Future of Cybersecurity: Exploring emerging trends like AI and their implications for addressing new and complex threats.Get ready for a thought-provoking conversation with Lee Vorthman on leadership, innovation, and building resilient organizations!Episode Highlights: 00:36 - Episode Introduction"We're always going to have new technologies. But that doesn't negate the fact that you still have to master the fundamentals."01: 03 - Barry introduces Lee Vorthman as a seasoned cybersecurity expert and VP of Strategic Security Initiatives at Oracle.02:27 - Personal Background and Military Influence"I grew up in a military household and started in technology before joining the military."05:33 - Evolution of Security Leadership"Security leadership now touches every aspect of a business, requiring a broad understanding beyond just technology."11:15 - Navigating Accountability vs. Ownership"In the civilian world, I'm accountable for risks I don't always own, which requires building alliances."15:05 - Techniques for Overcoming Resistance"Two techniques I use to convince people: the switcheroo and Jedi mind trick for breaking resistance."22:35...

The Jedburgh Podcast
#148: America's Grey War - Former Boeing Chief Security Officer and President of Hostage US Dave Komendat

The Jedburgh Podcast

Play Episode Listen Later Dec 13, 2024 86:24


National security isn't led solely by government entities and the military. Public-private sector partnerships often drive many of our national security decisions. To dig into the importance of the private sector in defense of America, Fran Racioppi sat down with Dave Komendat; a 36-year Veteran of Boeing; one of the world's largest defense contractors and a critical component of America's economy. Dave retired after serving as The Boeing Company's Chief Security Officer, where he ensured the safety and security of over 170,000 employees and $77 Billion in annual revenue. Dave and Fran discussed how private companies partner with the US government, how security has evolved since 9/11, and how to build a culture of security in our companies and as a nation. They also break down the magnitude of Boeing, its impact on the aviation and defense industries, and the future of aviation security across a multitude of threats. Dave is also the Chairman of Hostage US, a non-profit supporting the families of American hostages and those wrongfully detained, as well as hostages and detainees when they return home. They take a few minutes to unpack hostage diplomacy and how America's adversaries are using unlawful detention as a tool to compete with American power abroad. Watch, listen or read our entire National Security series. Follow the Jedburgh Podcast and the Green Beret Foundation on social media. Watch the full video version from Epigen Technology in Arlington, VA on YouTube as we show why America must continue to lead from the front, no matter the challenge.The opinions presented on the The Jedburgh Podcast and the Jedburgh Media Channel are the opinions of our guests and creator and host Fran Racioppi. They do not necessarily reflect the opinions of the Green Beret Foundation and the Green Beret Foundation assumes no liability for their accuracy; nor does Green Beret Foundation endorse any political candidate or any political party.Highlights:0:00 Introduction2:16 We're in a grey war5:52 The Chief Security Officer7:33 Assessing risk15:12 Public-Private Security Partnership20:24 Starting as an intern24:13 Building a successful team33:05 Leading in a massive organization37:15 Embracing a security culture39:50 The relationship between safety and security46:36 Duty of care50:45 The rise of insider threats55:22 Boeing on 9/1159:15 Airplane cyber-security1:04:23 Next generation of security leadership1:10:34 Hostage US1:20:00 Daily Foundations of SuccessQuotes“I think we're in a grey war.” “The Chief Security Officer at most corporations is a thinker. They're a strategist. They're a risk manager.”“You can't go into a CEO everyday and the sky is falling. You lose your credibility.” “Different leaders have different risk tolerances.” “Be empathetic with people doing jobs that don't get a lot of fanfare.”“The longer I was in a leadership role, the more I valued when people told me ‘that wasn't very good.” “We ran security like a business. We tried to demystify what we did.” “I didn't want to be viewed as a necessary evil. I wanted to be viewed as a necessity.”“The worst thing you can do is deliver a product that's already been compromised to the warfighter.” “If you only call people when you need something, you don't have a relationship.”

Eat Sleep Nerd
Creating Characters for Star Trek Adventures (2nd edition) - the Tabletop Star Trek RPG!

Eat Sleep Nerd

Play Episode Listen Later Dec 11, 2024 75:09


We finally sit down to create our characters for Star Trek Adventures (Second Edition), the tabletop roleplaying game that's similar to Dungeons & Dragons. Our gamemaster, Josh, walks us through the character builder tutorial while he explains how the game works. By the end, we've created our entire crew including the Chief Security Officer, Chief Medical Officer, Chief Operations Officer, and more.00:00:00 Introduction00:02:55 What is Star Trek Adventures?00:05:12 Choosing our character roles00:13:40 Creating the Chief Security Officer00:38:50 Walking through the character sheet00:41:55 Creating the First Officer00:49:50 Creating the Chief Medical Officer01:02:30 Creating the Chief Operations Officer

The Freedom Footprint Show: A Bitcoin Podcast
Jameson Lopp on the Future of Bitcoin Security - Bitcoin Infinity Show #136

The Freedom Footprint Show: A Bitcoin Podcast

Play Episode Listen Later Nov 27, 2024 67:08 Transcription Available


Jameson Lopp is the Co-founder & Chief Security Officer of Casa, long-term Bitcoiner, and self-described professional cypherpunk. In this conversation, we discuss critical aspects of Bitcoin security, misconceptions about Bitcoin, and the challenges of bridging the computer science and Austrian economics perspectives.  We also dig into the inner workings and mission of Casa, a key storage company co-founded by Jameson, as well as the use it of cryptography for self-sovereignty. We also cover physical and online security concerns, the role of multisig, and the potential impacts of Bitcoin ossification. Tune in for an insightful discussion on the security dimensions of Bitcoin and the future of decentralized networks. Recorded in-person in Maribor, Slovenia, at the NiceHashX conference!  Connect with Jameson:  https://x.com/lopp https://primal.net/p/npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp Connect with Us: https://www.bitcoininfinityshow.com/ https://bitcoininfinitystore.com https://primal.net/freedom https://primal.net/knut https://primal.net/luke https://twitter.com/BtcInfinityShow https://twitter.com/knutsvanholm https://twitter.com/lukedewolf Thanks to our sponsors - check out their websites for info: BitBox: https://bitbox.swiss/infinity StampSeed: https://www.stampseed.com/shop/21m-titanium-seed-plate.html Bitcoin Adviser: https://content.thebitcoinadviser.com/freedom ShopInBit: https://shopinbit.com/bitcoininfinity - Use code INFINITY for a €5 discount!    The Bitcoin Infinity Show is a Bitcoin podcast hosted by Knut Svanholm and Luke de Wolf.

The CyberWire
Kevin Magee: Focus on the archer. [CSO] [Career Notes]

The CyberWire

Play Episode Listen Later Nov 10, 2024 7:24


Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Kevin Magee: Focus on the archer. [CSO]

Career Notes

Play Episode Listen Later Nov 10, 2024 7:24


Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Ontic Protective Intelligence Podcast
From Reaction to Proaction: Transforming Corporate Security Leadership with Dave Komendat

The Ontic Protective Intelligence Podcast

Play Episode Listen Later Nov 6, 2024 42:24


Join us as we explore the dynamic shift from reactive to proactive corporate security leadership with Dave Komendat, former Vice President and Chief Security Officer for Boeing. In this episode, Dave shares his insights on building trust with business leaders through proactive risk management and the importance of employee safety in shaping company culture. Discover how integrating advanced tools and strategic leadership can transform your organization's approach to security.Tune in to learn:Strategies for proactive risk management and leadership trust-buildingThe role of employee safety and cultural fit in post-COVID workplace dynamicsThe benefits of the International SOS and Ontic partnership for corporate securitySimilar episodes:Aligning Security with Business Goals: Insights from Scott LindahlThe Evolution of Risk Management with Tristan FlanneryThe Future of Talent in Corporate Security with Kathy Lavinder and Rachel Briggs

UNSECURITY: Information Security Podcast
Unsecurity Episode 227: Executive Security Decisions with Vanae Pearson & Randy Kaedar

UNSECURITY: Information Security Podcast

Play Episode Listen Later Nov 6, 2024 42:30


In this episode of the Unsecurity Podcast, FRSecure's CFO, Vanae Pearson, and Illumifin's Chief Security Officer, Randy Kaedar are guests. The group discusses how to prompt key decision makers and executive teams to make the most effective security decisions.Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com.About FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs.These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Fed Time Stories
Navigating Public Corruption: Adam Lee's Journey in the FBI – Part One

Fed Time Stories

Play Episode Listen Later Nov 4, 2024 19:39


In this episode of Fed Time Stories, hosts Dave Brant and John Gill explore a conversation about integrity in federal service through the experiences of Adam Lee, former FBI Special Agent in Charge of the Richmond Division and current Chief Security Officer at Dominion Energy.Adam shares his journey from a California dreamer to an influential figure in law enforcement, recounting how his determination that led him from state college to law school and ultimately to the FBI. Throughout the episode, listeners can dive into fascinating insights of Adam's work on high-profile public corruption cases and the challenges he faced along the way. Adam emphasizes the significance of collaboration and perseverance in complex investigations, while also exploring how ethical conduct underpins public trust.Join us as we uncover Adam's transitions in life that not only shaped his career but also deepened his understanding of integrity in law enforcement. This episode promises to shine a light on the real-world implications of corruption and the dedication required to uphold justice.Fed Time Stories is brought to you by Kaseware, an investigative case management solution. Learn more at www.kaseware.com/fedtimestoriespodcast

Fed Time Stories
The Impact of 9/11 on National Security: Adam Lee's Journey in the FBI – Part Two

Fed Time Stories

Play Episode Listen Later Nov 4, 2024 18:26


In this episode of FedTime Stories, hosts Dave Brant and John Gill continue their conversation with Adam Lee, former FBI Special Agent in Charge of the Richmond Division and current Chief Security Officer at Dominion Energy. Adam shares his personal narrative of September 11, 2001: Adam found himself at a turning point in his career. He vividly recalls the chaos and urgency of that day, where he was called to action as the investigation into the attacks began to unfold. His involvement in the subsequent investigation was crucial, as he worked tirelessly to piece together information and collaborate with various agencies, highlighting the critical need for unity in addressing national security threats. Adam's experience not only tested his resolve but also shaped his understanding of the complexities surrounding the public perception of law enforcement and its impact on recruitment efforts.Join us as we uncover another of Adam's formative experiences that not only shaped his career but also deepened his understanding of integrity in law enforcement. This episode offers a gripping look at the challenges faced by federal agents in the wake of 9/11 and the ongoing commitment to ensuring national security.Fed Time Stories is brought to you by Kaseware, an investigative case management solution. Learn more at www.kaseware.com/fedtimestoriespodcast

Fed Time Stories
Behind the Scenes of High-Profile Interviews: Adam Lee's Journey in the FBI – Part Three

Fed Time Stories

Play Episode Listen Later Nov 4, 2024 23:45


In the final episode of the Fed Time Stories series featuring Adam Lee, hosts Dave Brant and John Gill delve into another of Adam's career-defining experiences: His intriguing interviews with high-profile political figures. As a former FBI Special Agent in Charge and current Chief Security Officer at Dominion Energy, Adam shares insights into the importance of credibility and respect in national security.He recounts a memorable moment during an interview with a sitting president and reflects on the gravity of the situation and the lessons learned about preparation and adaptability in high-stakes environments. Adam emphasizes how these experiences not only shaped his professional journey but also reinforced his understanding that maintaining composure and integrity is essential when navigating the complex interplay of politics and law enforcement.From leading complex investigations to collaborating with colleagues under pressure, Adam's experiences reveal the challenges and dedication required to serve and protect. Join us as we wrap up this three-part series that underscores the values and resilience that propelled Adam Lee through his distinguished career.Fed Time Stories is brought to you by Kaseware, an investigative case management solution. Learn more at www.kaseware.com/fedtimestoriespodcast

Paul's Security Weekly
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370

Paul's Security Weekly

Play Episode Listen Later Oct 29, 2024 63:37


In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert's Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat landscape, what he's seeing across Okta and our customers and what security leaders need to know about identity threats to stay one step ahead of threat actors today. Segment Resources: https://www.okta.com/oktane/ https://www.okta.com/press-room/press-releases/okta-openid-foundation-tech-firms-tackle-todays-biggest-cybersecurity/ Though 75% of cybersecurity professionals say the threat landscape today is the most challenging they've seen in the last five years, cutbacks on the cybersecurity workforce and widening skills gaps are creating challenges for the industry. It is becoming harder to find people with the right skills to meet growing and evolving needs. Erin Baudo Felter, Vice President, Social Impact & Sustainability at Okta, joins Security Weekly's Mandy Logan to discuss the widening cybersecurity skills gap and the initiatives Okta has in place to help companies develop, recruit and retain talent within the cybersecurity workforce. Segment Resources: https://www.okta.com/oktane/ This segment is sponsored by Oktane, to view all of the CyberRisk TV coverage from Oktane visit https://securityweekly.com/oktane. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-370

Paul's Security Weekly TV
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370

Paul's Security Weekly TV

Play Episode Listen Later Oct 29, 2024 33:10


Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat landscape, what he's seeing across Okta and our customers and what security leaders need to know about identity threats to stay one step ahead of threat actors today. Segment Resources: https://www.okta.com/oktane/ https://www.okta.com/press-room/press-releases/okta-openid-foundation-tech-firms-tackle-todays-biggest-cybersecurity/ Though 75% of cybersecurity professionals say the threat landscape today is the most challenging they've seen in the last five years, cutbacks on the cybersecurity workforce and widening skills gaps are creating challenges for the industry. It is becoming harder to find people with the right skills to meet growing and evolving needs. Erin Baudo Felter, Vice President, Social Impact & Sustainability at Okta, joins Security Weekly's Mandy Logan to discuss the widening cybersecurity skills gap and the initiatives Okta has in place to help companies develop, recruit and retain talent within the cybersecurity workforce. Segment Resources: https://www.okta.com/oktane/ This segment is sponsored by Oktane, to view all of the CyberRisk TV coverage from Oktane visit https://securityweekly.com/oktane. Show Notes: https://securityweekly.com/bsw-370

Code Story
The Haunted House of APIs - The Haunted Web of APIs with Richard Bird

Code Story

Play Episode Listen Later Oct 24, 2024 20:26


The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.The Haunted Web: Navigating API Sprawl and Creepy CrawlersToday's episode is titled The Haunted Web: Navigating API Sprawl and Creepy Crawlers, with Traceable's Chief Security Officer, Richard Bird. As organizations scale and evolve, so does the complexity of their APIs. API sprawl, the uncontrolled expansion of APIs, creates a tangled web where vulnerabilities linger in the shadows. These unseen APIs become “creepy crawlers” of your digital infrastructure, creeping through your systems and posing security risks. Richard will discuss how unmanaged and undocumented APIs contribute to blind spots in security, the risks they create for organizations and the best strategies for securing a sprawling ecosystem.Discussion questions:Can you explain what we mean by "unknown APIs" and the different types, like shadow, rogue, zombie, and undocumented?Why do these APIs often go unnoticed, and how do they become security risks?What makes these APIs such an attractive target for attackers, and can you share an example of how one has been exploited?How can organizations begin to uncover these hidden APIs, and what tools or strategies are effective in doing so?In your experience, what are some common mistakes organizations make that lead to these unknown APIs being created or overlooked?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/rbird/https://richardbird.com/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Thinking Crypto Interviews & News
How Coinbase STOPS Hackers From Stealing Your Crypto! with Philip Martin

Thinking Crypto Interviews & News

Play Episode Listen Later Oct 18, 2024 20:19


I interviewed Philip Martin, Chief Security Officer at Coinbase, at the Ripple Swell conference. Topics:- Coinbase security measures and processes - Tech Against Scams Coalition - Coinbase working with law enforcement to stop Hackers - How blockchain is becoming a frontline defense against illicit finance - Crypto vs. traditional finance in criminal activity - TD Bank's money laundering scandal - FBI Report North Korean scammers targeting crypto etf firms. Show Sponsor - ✅ VeChain is a versatile enterprise-grade L1 smart contract platform https://www.vechain.org/

The Mike Wagner Show
San Francisco author/former Chief of Police Brian Brady is my guest with “Hiding in Plain Sight”!

The Mike Wagner Show

Play Episode Listen Later Oct 16, 2024 48:55


San Francisco author/former Chief of Police Brian Brady talks about his latest release “Hiding in Plain Sight” opening at a school playground where a serial killer shadows a girl he wants to abduct, but when the body is discovered it's a race against time as the SF Homicide is split into two squads before the killer strikes again! Brian served 40+ years in the security field with 4 police departments, 3 private sectors including VP of Security, Chief Security Officer at NBC Universal Media, and Dir. Of Security at SF Museum of Modern Art, and is the author of the SFPD Homicide Inspector Series including “Ohh, What a Tangled Web” plus talks about why TV homicide shows get it wrong, how they stopped a serial killer after his first kill, and the various serial killers including the Zebra Killer, Night Stalker, Zodiac Killer and The L.A. Strangler! Check out the amazing Brian Brady and his latest release on all major platforms including Amazon! #brianbrady #sanfrancisco #chiefofpolice #author #hidinginplainsight #SFhomicide #nbcuniversalmedia #security #SFMOMA #ohhwhaatatangledweb #serialkiller #zebrakiller #zodiackiller #nightstalker #lastrangler #spreaker #iheartradio #spotify #applemusic #youtube #anchorfm #bitchute #rumble #mikewagner #themikewagnershow #mikewagnerbrianbrady #themikewagnershowbrianbrady --- Support this podcast: https://podcasters.spotify.com/pod/show/themikewagnershow/support

The Mike Wagner Show
San Francisco author/former Chief of Police Brian Brady is my guest with “Hiding in Plain Sight”!

The Mike Wagner Show

Play Episode Listen Later Oct 16, 2024 40:28


San Francisco author/former Chief of Police Brian Brady talks about his latest release “Hiding in Plain Sight” opening at a school playground where a serial killer shadows a girl he wants to abduct, but when the body is discovered it's a race against time as the SF Homicide is split into two squads before the killer strikes again! Brian served 40+ years in the security field with 4 police departments, 3 private sectors including VP of Security, Chief Security Officer at NBC Universal Media, and Dir. Of Security at SF Museum of Modern Art, and is the author of the SFPD Homicide Inspector Series including “Ohh, What a Tangled Web” plus talks about why TV homicide shows get it wrong, how they stopped a serial killer after his first kill, and the various serial killers including the Zebra Killer, Night Stalker, Zodiac Killer and The L.A. Strangler! Check out the amazing Brian Brady and his latest release on all major platforms including Amazon! #brianbrady #sanfrancisco #chiefofpolice #author #hidinginplainsight #SFhomicide #nbcuniversalmedia #security #SFMOMA #ohhwhaatatangledweb #serialkiller #zebrakiller #zodiackiller #nightstalker #lastrangler #spreaker #iheartradio #spotify #applemusic #youtube #anchorfm #bitchute #rumble #mikewagner #themikewagnershow #mikewagnerbrianbrady #themikewagnershowbrianbrady --- Support this podcast: https://podcasters.spotify.com/pod/show/themikewagnershow/support