POPULARITY
Former CIO of HUD, Gloria Parker and Deputy CIO of HUD, Kevin Cooke, sit down with Cyber Chat’s Host, Sean Kelley to talk about how vendors to the government should position their offerings and their companies.
Former CIO of HUD, Gloria Parker and Deputy CIO of HUD, Kevin Cooke, sit down with Cyber Chat’s Host, Sean Kelley to talk about how vendors to the government should position their offerings and their companies.
On this edition of Cyber Chat, Host Sean Kelley sits down with Congressman Mike Rogers to discuss the rollout of 5G Technologies, the implications of the technology and what that means for cyber security.
Soraya Correa has been a leader in the federal government for over 30 years. Since January 2015, Correa has used her experience and expertise to radically improve how the Department of Homeland Security purchases services and products - enabling DHS ability to adapt to the needs and challenges the agency faces daily. On this edition of CyberChat, host Sean Kelley discussed with Correa her role as DHS’s chief procurement officer and how she is changing the opinion of contracting officers and what that all means for cybersecurity.
Venice Goodwine’s cybersecurity career has spanned over 33 years, starting in the Defense Department as an active duty member and then as a civilian. While Goodwine aspired to be a chief information officer early in her career, she developed skills more suited to chief information security officer. On this edition of Cyber Chat, host Sean Kelley sits down with Goodwine to discuss her role as Department of Agriculture’s CISO.
Jothi Dugar wants to change cybersecurity. But not by creating a new technology, framework or methodology. The Chief Information Security Officer at the National Institute of Health’s Center for Information Technology wants to change the look of those who work in cybersecurity. On this edition of Cyber Chat, Host Sean Kelley discusses Dugar’s plans to remake the cyber workforce.
On this edition of Cyber Chat, host Sean Kelley sat down with Todd Gustafson, President of HP Federal and Tommy Gardner, CTO of HP Federal to discuss the evolution and future of cybersecurity.
On this edition of Cyber Chat, host Sean Kelley sat down with the General Services Administration's William Zielinski, Assistant Commissioner, Information Technology Category and Lawrence Hale, Director, IT Security, Information Technology Category, to discuss the acquisition process and vehicles for the cybersecurity supply chain.
Chris Sheridan joins Cyber Chat to discuss his new role as Chief, Service Delivery and Operations at USDA-Farm Production and Conservation Business Center and what that means for cybersecurity.
Executives from the Department of Veterans Affairs' Office of Information and Technology joined Sean Kelley on Cyber Chat to talk about how the department's modernization effort through DevOps and agile methodologies can lead to better cybersecurity practices.
Charles Sun, government executive and IPv6 expert appeared on Cyber Chat with host Sean Kelley to discuss infrastructure, IPv4 and the need for quicker adoption of IPv6.
In this edition of Cyber Chat with Sean Kelley, Sean sits down with Dr. Suzanne Schwartz, associate director for Science & Strategic Partnerships at the Center for Devices and Radiological Health, and Christopher Butera, deputy director for Cyber Threat Detection and Analysis at the National Cybersecurity and Communications Integration Center.
Cyber Chat’s Host Sean Kelley sat down with Dr. Neal Evans, the chief officer for the Office of Connected Care in the Veterans Health Administration at the Veterans Affairs Department.
For this month’s show, Cyber Chat’s host Sean Kelley sat down with a reflective Scott Blackburn. Blackburn served in many capacities while at the Veterans Affairs Department.
On this episode of CyberChat, host Sean Kelley, former chief information security officer at the Environmental Protection Agency, is joined by Dr. Paul Tibbits, deputy chief information officer for the Veterans Affairs Department and program executive officer for the Financial Management Business Transformation (FMBT,) for a discussion about FMBT’s present and future functionality.
On this episode of CyberChat, host Sean Kelley, former EPA CISO and Veterans Affairs Department deputy chief information officer, discussed the enabling of the mission through cybersecurity.
It’s been two years since the liability shift around EMV has pushed retailers and financial institutions towards adopting chip-enabled cards and terminals. That shift is also affecting cybercriminals as it is forcing them to move into different areas of fraud, said Monica Eaton-Cardone, the co-founder and COO of Chargebacks911. On this episode of the Cyber Chat, we talk to Monica about the adoption of EMV technology, how organizations can defend against payment card fraud, and how the fraud landscape is changing and will continue to shift in the future.
On this episode of CyberChat, host Sean Kelley, former EPA CISO and former Veterans Affairs Department deputy CIO, explores the challenges and techniques organizations can utilize during crisis management.
On this episode of CyberChat, host Sean Kelley, former EPA CISO and former Veterans Affairs Department deputy CIO, explores the challenges and techniques organizations can utilize during crisis management.
On this episode of Cyber Chat, host Sean Kelley, former Environmental Protection Agency chief information security officer and former Veterans Affairs Department deputy chief information officer, spoke with Rep. Will Hurd (R-Texas) about initiatives to modernize the federal cybersecurity space.
Threat intelligence covers many different aspects relevant to an organization, including strategic intelligence, operational intelligence, tactical intelligence, digital risk monitoring, and the people and process behind them. Despite being interconnected, they are often viewed individually within organizations, said SurfWatch Labs chief security strategist Adam Meyer. Meyer recently created a mind map to show how those different aspects tie together and should be viewed under one large threat intelligence banner. On this episode of the Cyber Chat, we talk to Adam about the mind map and how it can help organizations better understand threat intelligence. Download the free whitepaper, "Using a Cyber Threat Intelligence Mind Map to Visualize and Improve Your Cybersecurity Program": http://info.surfwatchlabs.com/How-to-Build-CTI-into-Your-Security-Program
In today’s cyber threat environment, many organizations are struggling to determine how to mitigate the array of risks they are facing. But don’t despair, said Andy Jabbour, the co-founder and managing director of Gate 15, there is hope. Andy recently wrote a series of blogs outlining how the Preparedness Cycle, which is often used to prepare for traditional threats, can easily be applied to cyber threats as well. On this episode of the Cyber Chat, we talk to Andy about the preparedness cycle and how organizations can best implement that cycle to reduce their cyber risk. For more on the Preparedness Cycle: https://blog.surfwatchlabs.com/2017/09/06/talking-the-preparedness-cycle-and-reducing-cyber-risk-with-andy-jabbour/
The digital footprints of organizations are expanding. With that expansion comes more avenues of attack for cybercriminals to exploit and more areas of concern for organizations to address. On this episode of the Cyber Chat, SurfWatch Labs chief security strategist Adam Meyer discusses the challenges businesses are currently facing due to their expanding level of presence and how organizations can respond to those new challenges to better manage their cyber risk.
Cyber threat intelligence has become increasingly popular over the past few years, and with that rise comes a variety of questions for organizations around the topic: what types of threat intelligence are available, how can that intelligence can be implemented at different levels of an organization, and most importantly, how can it help to limit the overall cyber risk facing an organization. On this episode of the Cyber Chat, SurfWatch Labs chief security strategist Adam Meyer attempts to answer those questions and shed some light on this growing and evolving field.
Earlier this month, Banner Health announced a data breach affecting 3.7 million individuals. In late June, Banner discovered that intruders may have gained unauthorized access to the computer systems that process payment card data at certain Banner Health food and beverage outlets. Two weeks later Banner discovered that the intruders may have also assessed patient and health insurance records. Now the company is facing several potential class action lawsuits over the incident. On today’s Cyber Chat we talk with Michella Kras, one of the attorneys working on the Banner data breach case filed by Hagens Berman Sobol Shapiro. We discuss the specific case, how data breach lawsuits can motivate organizations to improve security, and what companies can do to limit their potential liability.
In late June, ISACA discovered dozens of banks in Ukraine and Russia being impacted by cyber-attacks utilizing the SWIFT messaging system, adding to the growing list of financial institutions that have been targeted in 2016. Cybercriminals are continuing to find new ways to steal massive amounts of money from these organizations. On today’s Cyber Chat we talk once again with Mark Gazit, CEO of ThetaRay, about how financial sector attacks are evolving and what needs to be done to stay ahead of cybercriminals and combat these attacks.