POPULARITY
Join G Mark Hardy at THOTCON in Chicago for an insightful podcast episode on building a successful cybersecurity career. Featuring guest Ryan Gooler, they discuss the non-linear paths to success, the value of mentorship, financial planning, and the importance of continuous learning and adapting. Learn how to navigate career transitions, embrace risks, and find joy in teaching and learning from others in the cybersecurity community. Transcripts: https://docs.google.com/document/d/1nsd61mkIWbmIL1qube0-cdqINsDujAVH Chapters 00:00 Welcome to THOTCON: Meeting Amazing People 00:26 Introducing Ryan Gooler: A Journey into Cybersecurity 04:09 The Value of Mentorship in Cybersecurity 06:22 Career Management and Setting Goals 09:33 Financial Planning for Cybersecurity Professionals 16:40 Automating Finances and Smart Spending 21:25 Financial Sophistication and Mutual Funds 22:07 Automating Life Tasks 22:41 The Concept of a Finishing Stamp 24:17 Leadership and Delegation in the Navy 26:06 Building and Maintaining Culture 27:21 Surviving Toxic Environments 29:55 Taking Risks and Finding Joy 34:34 Advice for Cybersecurity Careers 39:01 The Importance of Teaching and Learning 40:29 Conclusion and Farewell
Leaving the military comes with challenges-redefining your purpose, finding a meaningful career, and stepping into an unfamiliar civilian world where your experience isn't always understood. But what if your military skills could be the key to success in one of the fastest-growing and most mission-driven industries today? The cybersecurity field is facing a massive talent shortage, and veterans have exactly what it takes to fill the gap. Tactical decision-making, problem-solving under pressure, and a mission-first mindset-these are the same skills that make an effective cyber professional. In this episode, we sit down with Ricoh Danielson, an Army veteran and cybersecurity expert, to break down how veterans can transition into cyber careers, whether they have a technical background or not. We dive into the real-world pathways available, including training programs, certifications, and networking strategies that get veterans in the door. Ricoh shares his own journey from the battlefield to cybersecurity, how he built a successful career in the industry, and why veterans are uniquely suited to excel in this space. If you're looking for a career that offers both purpose and opportunity, cybersecurity might just be your next mission. Listen in as we map out the steps to make it happen. Timestamps 03:15 - Recognizing transferable military skills suitable for cybersecurity 12:40 - Training programs and certifications tailored for veterans 25:10 - Navigating the cybersecurity job market as a veteran 37:55 - Success stories: Veterans thriving in cybersecurity roles 48:20 - Resources and support systems for veterans entering tech fieldsLinks & ResourcesVeteran Suicide & Crisis Line: Dial 988, then press 1TranscriptView the transcript for this episode.
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Julie Chatman. Julie is a distinguished cybersecurity executive with nearly two decades of experience in cybersecurity strategy, risk management, and AI governance. She began her career in the U.S. Navy, serving on active duty as a Hospital Corpsman specializing in Medical Laboratory Science & Technology. Her transition into cybersecurity began at the FBI, where strong mentorship shaped her approach to leadership, problem solving, and talent development. She currently serves as the Deputy Chief Information Security Officer for Finance at the Virginia Information Technologies Agency (VITA), where she is focused on driving risk reduction across state agencies. The role is part of a strategic engagement through her company, ResilientTech Advisors. Julie leads CyberPath Coaching, where she draws on her experience as an active CISO to mentor cybersecurity professionals, accelerate their growth, and prepare them for executive roles. She works with individuals breaking into the field, mid-career professionals, aspiring CISOs, and cybersecurity entrepreneurs. [May 19, 2025] 00:00 - Intro 00:53 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:03 - Julie Chatman Intro 03:14 - A Hungry Brain 04:25 - We Are Mushroomed 05:54 - Being an Enabler 10:13 - Speak Their Language 13:33 - Assigning Responsibility 16:05 - A Tool, Not a Replacement 20:35 - Career Challenges 22:40 - Strategic Empathy 23:46 - Setting Boundaries 24:15 - Narrative Control 25:38 - Staying Positive 29:39 - The Target is the Same 32:09 - Book Recommendations - World War Z - Max Brooks 33:20 - Mentors - MB Kinder - Martha Williams 35:14 - Find Julie Chatman Online - Website: cyberpathcoaching.net - LinkedIn: linkedin.com/in/julie-chatman-mba-infosec 35:54 Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025] 00:00 - Intro 00:17 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors - Ed Skoudis - Brigadier General Brian D. Vile - Shawn Turskey 29:55 - Lollipop Moments - TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations - Cybersecurity Canon - Rick Howard - Kingpin - Kevin Poulsen - Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Professional certifications have become a defining feature of the cybersecurity industry, promising enhanced career prospects, higher salaries, and professional credibility. But do they truly deliver on these promises, or are there hidden drawbacks to pursuing them? This presentation takes a deep dive into the dual-edged nature of certifications like CISSP, CISM, CEH, and CompTIA Security+, analyzing their benefits and potential limitations. Drawing on data-driven research, industry insights, and real-world case studies, we explore how certifications influence hiring trends, professional growth, and skills development in cybersecurity. Attendees will gain a balanced perspective on the role of certifications, uncovering whether they are a gateway to career success or an overrated credential. Whether you are an aspiring professional or a seasoned practitioner, this session equips you with the knowledge to decide if certifications are the key to unlocking your cybersecurity potential—or if other paths may hold the answers. About the speaker: Hisham Zahid is a seasoned cybersecurity professional and researcher with over 15 years of combined technical and leadership experience. Currently serving under the CISO as a Security Compliance Manager at a FinTech startup, he has held roles spanning engineering, risk management, audit, and compliance. This breadth of experience gives him unique insight into the complex security challenges organizations face and the strategies needed to overcome them.Hisham holds an MBA and an MS, as well as industry-leading certifications including CISSP, CCSP, CISM, and CDPSE. He is also an active member of the National Society of Leadership and Success (NSLS) and the Open Web Application Security Project (OWASP), reflecting his commitment to professional development and community engagement. As the co-author of The Phantom CISO, Hisham remains dedicated to advancing cybersecurity knowledge, strengthening security awareness, and guiding organizations through an ever-evolving threat landscape.David Haddad is a technology enthusiast and optimist committed to making technology and data more secure and resilient.David serves as an Assistant Director in EY's Technology Risk Management practice, focusing on helping EY member firms comply with internal and external security, data, and regulatory requirements. In this role, David supports firms in enhancing technology governance and oversight through technical reviews, consultations, and assessments. Additionally, David contributes to global AI governance, risk, and control initiatives, ensuring AI products and services align with the firm's strategic technology risk management processes.David is in the fourth year of doctoral studies at Purdue University, specializing in AI and information security. David's experience includes various technology and cybersecurity roles at the Federal Reserve Bank of Chicago and other organizations. David also served as an adjunct instructor and lecturer, teaching undergraduate courses at Purdue University Northwest.A strong advocate for continuous learning, David actively pursues professional growth in cybersecurity and IT through academic degrees, certifications, and speaking engagements worldwide. He holds an MBA with a concentration in Management Information Systems from Purdue University and multiple industry-recognized certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Data Privacy Solutions Engineer (CDPSE), and Certified Information Systems Auditor (CISA).His research interests include AI security and risk management, information management security controls, emerging technologies, cybersecurity compliance, and data protection.
Welcome back to The Cyber Revolution Podcast! This week, host Adam Hewitt, CEO of Cyber Revolution, is joined by Dr. James Stanger, the Chief Technology Evangelist at CompTIA. With over 25 years of experience, James is a renowned cybersecurity expert, educator, and consultant who has worked with government and corporate leaders worldwide. In this episode, James shares his unique journey into cybersecurity, from being an English literature PhD student to becoming a global authority in cybersecurity education. He explains why curiosity is the most important skill in cybersecurity and how CompTIA certifications (like Security+) help bridge the skills gap for aspiring professionals. Chapters: 00:00 - Introduction and Guest Introduction 02:30 - Dr. James Stranger's Cybersecurity Journey 05:45 - The Importance of Curiosity in Cybersecurity 08:15 - From Academia to Cybersecurity Consulting 11:30 - The Evolution of Cybersecurity Education 14:00 - CompTIA's Role and Impact in the Industry 17:00 - The Dynamic Nature of Cybersecurity 20:15 - Transferable Skills for Cybersecurity Careers 23:30 - Entry-Level Roles and Career Pathways 26:00 - CompTIA Security+ Certification Overview 28:30 - Addressing the Cybersecurity Skills Gap 30:00 - Study Tips and Final Advice What You'll Learn in This Episode: James Stanger's Cybersecurity Journey: • How a curiosity for tech turned into a global cybersecurity career • The transition from academia to IT security consulting • His work with government agencies and Fortune 500 companies Breaking into Cybersecurity: • Why ANYONE can start a cybersecurity career (even without an IT background) • The biggest cybersecurity myths that stop people from getting started • How to leverage transferable skills from non-technical backgrounds • The best entry-level cybersecurity roles to aim for Certifications & Skills for Success: • Why CompTIA Security+ is the gold standard for cybersecurity beginners • The essential knowledge areas: Networking, IT fundamentals, Security, and Coding • How to prepare for and pass your cybersecurity certification exams The Global Cybersecurity Crisis: • Why Australia needs 85,000 cybersecurity professionals by 2030 • The real reason companies struggle to hire cybersecurity talent • How industry and government are addressing the skills shortage Resources: CompTIA Security+ Certification – https://www.comptia.org/certifications/security CompTIA Labs & Training – https://www.comptia.org/training Follow Dr. James Stanger on LinkedIn – https://www.linkedin.com/in/jamesstanger Connect with Adam: Website: https://cyberrevolution.com.au Follow us on Facebook: https://www.facebook.com/cyberrevolutionaus Subscribe to our YouTube channel: https://www.youtube.com/@cyberrevolutionaus Follow us on Instagram: https://www.instagram.com/cybrevolution_aus/
Samantha Ramos, a Cybersecurity Operations Manager, shares her inspiring journey from criminology to cybersecurity, emphasizing the significance of governance, risk, and compliance (GRC) as a career entry point. Learn about her role in establishing cybersecurity programs, her passion for community-building through Tampa Bay Techies, and practical advice on networking and leadership in tech. Perfect for aspiring cybersecurity professionals! Guest Connect LinkedIn: https://www.linkedin.com/in/samanthartampa/ Website: https://samiramos.com/ Tampa Bay Techies: https://tampabaytechies.com/ Stats on Stats Resources Merch: https://www.statsonstats.io/shop LinkTree: https://linktr.ee/statsonstatspodcast Stats on Stats Partners & Affiliates IntelliCON 2025 Website: https://www.intelliguards.com/intellic0n-speakers Register: https://www.eventbrite.com/e/intellic0n-2025-tickets-1002600072807 Use Discount Code for 20% off Tickets: STATSONSTATS Path AI Website: https://yourpath.ai Discount Code: Join our Discord community for access! Antisyphon Training Website: https://www.antisyphontraining.com MAD20 Training Website: https://mad20.io Discount Code: STATSONSTATS15 Ellington Cyber Academy: https://kenneth-ellington.mykajabi.com Discount Code: STATSONSTATS Kevtech Academy Website: https://www.kevtechitsupport.com Dream Chaser's Coffee Website: https://dreamchaserscoffee.com Discount code: STATSONSTATS Podcasts We Like DEM Tech Folks Website: https://linktr.ee/developeverymind YouTube: https://www.youtube.com/@demtechfolks IntrusionsInDepth Website: https://www.intrusionsindepth.com YouTube: https://www.youtube.com/@IntrusionsInDepth ----------------------------------------------------- Episode was shot and edited at BlueBox Studio Tampa https://blueboxdigital.com/bluebox-studio/
This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur celebrate the holidays with heartfelt reflections alongside their standard cybersecurity insights. Hector shares a touching story about family, gratitude, and his journey to providing new opportunities for others. The duo answers listener questions on topics like DDoS attacks, Windows migrations, and breaking into the cybersecurity field, offering practical advice for newcomers and seasoned professionals alike. Send HATF your questions at questions@hackerandthefed.com.
In this episode of North Coast Careers, host Matt Myers explores Cybersecurity Awareness Month with expert guest Bill Monreal, Founder and CEO of Monreal IT. The discussion covers critical cybersecurity threats facing individuals and organizations today, including phishing attacks and ransomware, along with practical solutions like multi-factor authentication and security awareness training. Bill shares insights from his two decades of experience in the field and discusses the growing demand for cybersecurity professionals, noting a significant workforce shortage since COVID-19. The episode also delves into cybersecurity career opportunities, focusing on roles like Security Operations Center (SOC) analysts, and provides guidance for those interested in entering the field.
Ad:
In this episode of Journeys to Leadership, Agnes Scott College president Leocadia Zak interviews Penny Rogers Collins, a trailblazing IT executive and advocate for women in STEAM. Penny reflects on her unlikely path from a single mother struggling to make ends meet to becoming a highly respected leader in technology. Her story is one of resilience, determination, and the power of learning. She shares how she found her footing in tech, one library visit at a time, driven by a commitment to self-improvement and an unyielding belief in her potential.Throughout the episode, Penny emphasizes the importance of mentorship and community. She discusses her passion for supporting women and girls in STEAM and how she has dedicated her career to lifting others, including creating a program for single mothers to pursue careers in cybersecurity. Her candid reflections offer invaluable lessons in leadership, perseverance, and the power of continuous learning. Tune in for a compelling conversation that shows how perseverance through adversity can create extraordinary success.
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=audio&utm_campaign=podcastPaige Hanson from SecureLabs discusses identity theft management and her extensive experience as a security communicator. With nearly 20 years in consumer and digital safety, Paige shares insights on pursuing a cybersecurity career and offers guidance for those interested in non-traditional security roles. Join us to learn about the current IT job market, key certifications and strategies for entering the industry. Discover how Paige transitioned from tech interests to a leading role in cybersecurity education, and explore job opportunities beyond traditional paths.View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast00:00 Intro to today's episode00:34 Free cybersecurity salary guide01:28 Welcome Paige Hanson01:46 Paige's background and career journey03:23 Early interests in technology05:02 Career at Norton LifeLock06:52 Educating law enforcement on identity theft10:15 Cybersecurity career opportunities beyond traditional roles12:10 Identity theft risk management certification17:23 Communicating cybersecurity concepts effectively22:02 Recognizing and adapting to audience feedback22:41 Effective communication strategies23:42 Advice for seniors and law enforcement25:35 Challenges and solutions in cybersecurity education26:41 Career opportunities and getting started35:40 Building a strong support system39:33 Starting and growing SecureLabs40:55 Wrap up and final thoughtsAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Go to my sponsor https://snhu.edu/itdad and see what the current average annual salary for a Cybersecurity is and learn how you can get startedFirst Interview: https://youtu.be/Kbjj9alXUa4In this episode, we dive deep into the world of cybersecurity, exploring the key skills, certifications, and strategies you need to succeed in one of the fastest-growing fields in tech. Whether you're starting out or looking to advance your career, you'll gain valuable insights and actionable tips to help you break into the industry and stay ahead in this ever-evolving space.We'll cover everything from essential cybersecurity skills to choosing the right certifications and navigating the job market. If you're ready to level up your tech career, don't miss this episode! Be sure to like, subscribe, and share with anyone who might find this helpful.✅ Subscribe to our weekly newsletter for insider tips and practical advice on launching your tech career, straight from industry experts! https://thebeardeditdad.ck.page/55f710292b===========================Subscribe and Listen to The I.T. Career Podcast HERE:
In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security and training. Ed also dives into his book, See Yourself in Cybersecurity Careers Beyond Hacking, which highlights the many career paths available in the cybersecurity industry beyond hands-on keyboard roles. He discusses the cybersecurity talent shortage, particularly how it affects underrepresented groups, and the need for organizations to rethink how they hire and retain talent.Takeaways:There are many ways to start a career in cybersecurity, even from non-technical backgrounds.Security is an integral part of software quality can help developers and organizations create more secure, reliable applications.The book, See Yourself in Cybersecurity Careers Beyond Hacking, focuses on educating the next generation of cybersecurity professionals and promoting diversity in the field.The cybersecurity talent shortage is not about the lack of skilled individuals, but about outdated hiring practices and insufficient investment in talent development.
Jason Shockey is chief information security officer at New Jersey-based Cenlar FSB, the leading mortgage loan subservicing company in the U.S. In this In this episode, he joins host Steve Morgan, editor-in-chief at Cybercrime Magazine, to discuss the cybersecurity talent shortage and career opportunities in our field. This episode is brought to you by our partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market-leading cybersecurity and enterprise software companies. Learn more about Evolution Equity at https://evolutionequity.com.
Diane M. Janosek, PhD, JD, is the former training director/commandant at the National Security Agency's National Cryptologic University, and most recently deputy director of NSA Compliance. Today, she is the CEO at Janos LLC and award-winning cybersecurity leader, author, and sought-after speaker. In this episode, she joins host Paul John Spaulding to discuss cybersecurity careers, how to get started, and more. This episode is brought to you by Cybersecurity Ventures, page one for the global cyber economy, and a trusted source for cybersecurity facts, figures, and statistics. To learn more, visit https://cybersecurityventures.com
Join host G Mark Hardy in this episode of CISO Tradecraft as he welcomes Olivia Rose, an experienced CISO and founder of the Rose CISO Group. Olivia discusses her journey in cybersecurity from her start in marketing to becoming a VCISO. They delve into key topics including the transition from CISO to VCISO, strategies for managing time and stress, the importance of understanding board dynamics, and practical advice on mentoring new entrants in the cybersecurity field. Olivia also shares her insights on maintaining business alignment, handling insurance as a contractor, and building a personal brand in the cybersecurity community. Olivia Rose: https://www.linkedin.com/in/oliviarosecybersecurity/ Transcripts: https://docs.google.com/document/d/1S42BepIh1QQHVWsdhhgx6x99U188q5eL Chapters 00:00 Introduction and Guest Welcome 01:14 Olivia Rose's Career Journey 06:42 Challenges in Cybersecurity Careers 15:47 Communicating with the Board 22:57 Navigating Compliance and Legal Challenges 24:10 Building Strategic Relationships 25:46 Aligning Security with Business Goals 35:05 The Importance of Reputation and Branding
Protect Your Business with GravityZone Cybersecurity Solutions! bitdefender.f9tmep.net/BeardedITAre you currently working in a helpdesk role and dreaming of transitioning into the exciting world of cybersecurity? You're not alone! In this video, we dive deep into the practical steps and strategies you need to successfully make the jump from helpdesk to cybersecurity. Whether you're a seasoned helpdesk professional or just starting out, this guide will help you navigate the often confusing path to a career in cybersecurity. Learn about the key skills you need to develop, certifications that can give you a competitive edge, and how to market your existing experience to land that cybersecurity job you've been aiming for.We'll cover real-life advice, actionable tips, and share stories from professionals who've successfully made the transition. From understanding the cybersecurity landscape to building a personal learning plan, this video will equip you with everything you need to move forward in your tech career. Don't let your current role limit your future—take control of your career journey today and start your transition to cybersecurity with confidence!Micah VanFossen:LinkedIn: https://www.linkedin.com/in/micah-vanfossen/Blog: https://purplevan.substack.com/
TryHackMe is Hands-On cyber security training through real-world scenarios. https://bit.ly/3wVE16PThinking of making the switch from your regular tech job to the exciting field of cybersecurity? We'll cover everything you need to know about refining your resume and acing your interview to land a cybersecurity position. Join us for expert tips and essential insights to help you navigate your career path in the exciting field of cybersecurity.✅ Subscribe to our weekly newsletter for insider tips and practical advice on launching your tech career, straight from industry experts! https://thebeardeditdad.ck.page/55f710292bSupport the Show.
✅Check out Precision AI™ by Palo Alto Networks and the latest Cybersecurity advancements from Palo Alto Networks: https://bit.ly/precision-aiLearn how the largest cybersecurity company, Palo Alto Networks, is utilizing AI technology to enhance its security solutions and protect against cyber threats. Discover the power of Precision AI in cybersecurity!✅Check out Precision AI™ by Palo Alto Networks and the latest advancements from Palo Alto Networks: https://www.paloaltonetworks.com/precision-ai-security?utm_campprecisiongn=precision-ai&utm_medium=social-organic-gtm&utm_source=influencer-global-x-port&utm_content=precision-aiSupport the Show.
Are you considering a career in cybersecurity? We uncover the critical Mistakes people make getting into cybersecurity that can slow down or even derail your journey into this dynamic field.Whether you're completely new to the field or looking to transition from another industry, this video is your first step towards a successful cybersecurity career. We provide actionable advice and expert knowledge to help you navigate the complexities of starting in cybersecurity.Mike Miller:Youtube: @mikemillercyber LinkedIn: https://www.linkedin.com/in/mikesportfolio/Website: https://www.breakincyber.com/Support the Show.
Not sure which cybersecurity career path to pursue? Watch this video to learn about the different options and find the right one for you! Whether you're interested in ethical hacking, network security, or risk assessment, there's a rewarding career waiting for you in the world of cybersecurity.Check out Daniel Lowrie's YouTube Channel: https://www.youtube.com/@daniellowrieSupport the show
Podcast: Critical Assets PodcastEpisode: Energizing Cybersecurity Careers: Workforce Development in OT/ICSPub date: 2024-03-03Join us for a discussion on Energizing Cybersecurity Careers: Workforce Development in the OT/ICS Community. Guests Cynthia Hsu and Erin Owens dive into the cybersecurity challenges facing Industrial Control Systems and Operational Technology asset owners. Through open conversations, we explore everything from skill gaps and career pathways to diversity, continuous learning, and the impact of new technologies. This session aims to provide insights into developing a skilled, diverse cybersecurity workforce – starting from the ground up – with a focus on practical strategies for professionals, educators, and anyone interested in the future of ICS/OT security.Show links:Cynthia Hsu LinkedIn profile https://www.linkedin.com/in/cynthiahsu33/Erin Owens LinkedIn profile https://www.linkedin.com/in/erinowens/DOE CESER Cybersecurity Training for the Utility Workforce, free 3-day ICS Cybersecurity training for electric and ONG utility staff. Next training event: Buffalo, NY, April 23-25, Register at: Eventleaf | Event Registration Software and Mobile Event Apps DOE CESER CyberStrikeTM professional cybersecurity training for operational technology environments: https://inl.gov/cyberstrike/· LIGHTS OUT – focus on Ukraine attacks· NEMESIS – focus on nation-state TTPs· STORMCLOUD – focus on renewable energy DOE CESER CyberForce® workforce development program for college students focused on building a pipeline of cyber professional candidates in operational technology cybersecurity: https://cyberforce.energy.gov/ Sandia National LaboratoryTracer FIRE (Forensic Incident Response Exercise): https://github.com/sandialabs/Tracer-FIRECenter for Cyber Defenders: https://www.sandia.gov/careers/career-possibilities/students-and-postdocs/internships-co-ops/institute-programs/titans-technical-internships-to-advance-national-security/titans-cyber/ Cyber Defense Center https://www.cyberdefensecenter.org/The podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Critical Assets PodcastEpisode: Energizing Cybersecurity Careers: Workforce Development in OT/ICSPub date: 2024-03-03Join us for a discussion on Energizing Cybersecurity Careers: Workforce Development in the OT/ICS Community. Guests Cynthia Hsu and Erin Owens dive into the cybersecurity challenges facing Industrial Control Systems and Operational Technology asset owners. Through open conversations, we explore everything from skill gaps and career pathways to diversity, continuous learning, and the impact of new technologies. This session aims to provide insights into developing a skilled, diverse cybersecurity workforce – starting from the ground up – with a focus on practical strategies for professionals, educators, and anyone interested in the future of ICS/OT security.Show links:Cynthia Hsu LinkedIn profile https://www.linkedin.com/in/cynthiahsu33/Erin Owens LinkedIn profile https://www.linkedin.com/in/erinowens/DOE CESER Cybersecurity Training for the Utility Workforce, free 3-day ICS Cybersecurity training for electric and ONG utility staff. Next training event: Buffalo, NY, April 23-25, Register at: Eventleaf | Event Registration Software and Mobile Event Apps DOE CESER CyberStrikeTM professional cybersecurity training for operational technology environments: https://inl.gov/cyberstrike/· LIGHTS OUT – focus on Ukraine attacks· NEMESIS – focus on nation-state TTPs· STORMCLOUD – focus on renewable energy DOE CESER CyberForce® workforce development program for college students focused on building a pipeline of cyber professional candidates in operational technology cybersecurity: https://cyberforce.energy.gov/ Sandia National LaboratoryTracer FIRE (Forensic Incident Response Exercise): https://github.com/sandialabs/Tracer-FIRECenter for Cyber Defenders: https://www.sandia.gov/careers/career-possibilities/students-and-postdocs/internships-co-ops/institute-programs/titans-technical-internships-to-advance-national-security/titans-cyber/ Cyber Defense Center https://www.cyberdefensecenter.org/The podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Thomas Marr shares his cybersecurity career journey from the military and his best advice for getting started in your cybersecurity career.Help support this channel by signing up for more training. Please note that I earn a small affiliate commission if you sign up through these links for the training. Learn ChatGPT for Ethical Hackinghttps://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt Get a Huge Discount on Full Cybersecurity Traininghttps://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVtLearn the Basics of Cybersecurityhttps://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt Learn Digital Forensicshttps://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVtLearn Red Team Skillshttps://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt Learn Bug Bounty Huntinghttps://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt Learn Secure Coding Skillshttps://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt Learn GRC Skillshttps://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt Learn Cybersecurity Project Management Skillshttps://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVtLearn Linux for Security Professionalshttps://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVtLearn IoT Cybersecurityhttps://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVtBuild Your DevOps Skillshttps://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. https://www.stationx.net/cyberlife #cybersecurity #cybersecuritycareer #veteran #military #technology Support this podcast at — https://redcircle.com/cyber-life/donations
Welcome to another gripping episode of The TechTual Talk, and I'm your host Henri! Today's installment, titled "Navigating Entry-Level Cybersecurity Careers as a New Grad," features an insightful discussion with the impressive M'kya Gonzalez. Join us as M'kya, a recent cybersecurity and digital forensics graduate, shares her enlightening journey from Gary, Indiana, to the bustling tech scene of Dallas, Texas. We'll unravel her poignant story of perseverance through personal loss, her strategic moves into the tech world, and her dedication to growth that secured her a coveted entry-level position with a handsome $90,000 salary.Dive deep into the practical strategies and tips for students and new grads—in M'kya's own words, she urges you to challenge yourself with ten new things and grab every opportunity in 2024. We'll touch upon the realities of securing internships, the power of networking, and the pinnacles of breaking into the cybersecurity industry through certifications and boot camps.Henri and M'kya open up about both the light-hearted sides of living in Addison and their favorite movies, and the serious bits of workplace dynamics and hybrid work benefits. We even sneak a peek into incidental insights like M'kya's calming Monday morning routines that kickstart her productive week.Whether it's preparing an incident report or discussing the technical and non-technical aspects of cyber threats, our conversation unveils the essential tools of the trade and the significance of having both an academic degree and hands-on certifications. Stay tuned for an episode that promises not just tech talk, but also deep dives into the nitty-gritty essentials for anyone chasing a career in tech. Remember to grab your favorite cup of tea, hit subscribe, and let's get TechTual!Support the showIf you enjoyed the show don't forget to leave us a 5 star review, to help with the algorithm :) Email: henridavis@thetechtualtalk.com➡️ Need coaching help then go here (ask about our financing)⬇️https://techualconsulting.com/offerings➡️ Want to land your first IT Job? Then check out the IT course from Course careers use my link and code Techtual50 to get $50 off your course ⬇️https://account.coursecareers.com/ref/50932/➡️ Need help getting into Cybersecurity for a low price then check out Josh Madakor's Cybersecurity course at Leveld Careers and use my code TechTual10 to get 10%off your course. ⬇️https://www.leveldcareers.com/a/2147530874/RuqjrBGjIf you want a high paying role in the cloud then click here⬇️https://Levelupintech.com/techStop data brokers from exposing your information with Aura!Click the link below to try out Aura's FREE 14 day trial and see if your personal information has been compromised
Today we're continuing the four-part series highlighting the Cybersecurity and Infrastructure Security Agency. This episode focuses on the National Initiative for Cybersecurity Careers and Studies, commonly referred to as NICCS. Antonio Scurlock is the Deputy Chief Learning Officer and oversees the online platform. Visit NICCS: https://niccs.cisa.gov/ Hosted on Acast. See acast.com/privacy for more information.
I'm sharing with you a 9-month career success plan for anyone with no experience. This plan will show you how to build a successful career in cybersecurity without any experience.If you're searching for a new career or want to improve your current one, this plan is for you! This 9-month career success plan provides you with the tools you need to start your own cybersecurity career, no matter what your experience or level of expertise. Thanks for watching!David (KnowFatigue) Huynh: https://www.linkedin.com/in/knowfatiguetech/
Get a free Free eJPT and ICCA Voucher with a Fundamentals Annual plan https://itdad.info/ine Jack is an Instructor with *INE* In this video, we'll discuss a roadmap for building a successful career in cybersecurity. Cybersecurity is a rapidly growing field, and it's never been more important to have a strong understanding of the latest threats and defenses.We'll start by looking at the skills and knowledge you need to get started in cybersecurity, including programming languages, networking concepts, and operating system fundamentals. From there, we'll explore the different types of cybersecurity jobs available, from penetration testing and vulnerability assessment to security engineering and management.Jack Reedy:Linkedin: https://www.linkedin.com/in/secitguy/Twitter: https://twitter.com/secitguyThe Code of Entry PodcastThe Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the...Listen on: Apple Podcasts SpotifySupport the show
In this episode of the Redefining CyberSecurity podcast, host Sean Martin along with guests Kirsten Renner and Marco Ciappelli, share their experiences and insights from DEF CON, the annual hacking conference taking place in Las Vegas, Nevada.Kirsten reflects on her nerves and excitement about speaking on the welcome panel at DEF CON, which was interrupted multiple times by alarms. Despite the interruptions, Kirsten highlights the positive reception from the audience and the approachability of well-known figures like Dark Tangent (DT) - (aka Jeff Moss). The conversation emphasizes the importance of engaging with others at conferences like DEF CON and offers tips on how to approach and interact with people.Kirsten also talks about the car hacking village, including the unique experiences like a Tesla being pummeled and hacked for a capture the flag (CTF) prize. The hosts and guest discuss the culture of badges at DEF CON, with the car hacking badges being functional and allowing participants to plug them into their cars.They mention the inclusiveness and welcoming nature of the DEF CON community and the impact of the research and content being presented. Throughout the episode, there is a comical element as Kirsten shares her experiences of speaking on stage during the alarm interruptions and the humorous interactions with the audience. The conversation also touches on Kirsten's son's involvement at DEF CON and the excitement of collecting badges, which are powered and customizable, adding to the overall sense of community and engagement at the conference.This episode offers a glimpse into the excitement, challenges, and camaraderie of attending and speaking at DEF CON, while emphasizing the importance of inclusiveness and the impact of the research being presented. Listen now to get a sense of this year's event - and be sure to follow Kirsten and the rest of the car hacking village crew to learn more about creating a safe and secure connected car ecosystem.About The Car Hacking VillageThe primary goal of the Car Hacking Village is to build a community around discovering weaknesses and exposing vulnerabilities that could significantly impact the safety and security of all drivers and passengers on the road today. Educating security researchers on the functionality of vehicle systems coupled with providing them with the opportunity to gain hands-on experience working side by side with experts in this field is a plus for the attendees. Leveraging the vast amount of experience the security research community brings to the Village may increase the safety and security of vehicles on the road today and for generations to come. Breaches of automotive systems have been in the forefront of the global media for more than a year. Wired and wireless exploitation of vehicle systems has become a critical safety concern for the automotive industry, the National Highway Traffic Safety Administration, Congress, the Department of Homeland Security, and consumers. Car Hacking Village plays an important role for researchers interested in the safety and security of the more than one billion vehicles on the road worldwide. In 2015, over 16.5 million vehicles were sold in the United States. On average, motor vehicles are driven over 15,000 miles annually and consumers spend upwards of 730 hours per year in their cars.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________Guest: Kirsten Renner, Community Volunteer at DEF CON 101On Linkedin | https://www.linkedin.com/in/krenner/On Twitter | https://twitter.com/KrennerOn YouTube | https://www.youtube.com/playlist?list=PLxjvVVSu5Q3-ttIUdxxyCvJiN-TXuJ7j0____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a____________________________ResourcesDEF CON 101 - Welcome to DEF CON Panel: https://forum.defcon.org/node/246130More info about the DEFCON31 Car Hacking Village Badge: https://www.youtube.com/watch?v=yvvOl6LfodQLive from the Car Hacking Village Interview (hack a Tesla Y): https://www.youtube.com/watch?v=2YyyTkMdWikITSP Black Hat 25 & DEF CON 30 Live Streaming Coverage with ITSPmagazine with Car Hacking Village: https://www.youtube.com/watch?v=1jMXUIW9FRESean and Kristen with their Car Hacking Village badge: https://twitter.com/Krenner/status/1028385017037115392?s=20Kristen on DC101 Panel (photo): https://twitter.com/bigrinnyo/status/1689807935096930304?s=20Car Hacking Village website: https://www.carhackingvillage.com/Car Hacking Village Talks | https://www.carhackingvillage.com/talksAt DEF CON: https://forum.defcon.org/node/240928____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
Guest: Fredrik Heiding, Research Fellow at Harvard University [@Harvard]On Linkedin | https://www.linkedin.com/in/fheiding/____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesIn this Chats on the Road to Black Hat USA, hosts Sean and Marco discuss the use of AI in hacking and cybersecurity with guest Frederick Heiding, specifically large language models, such as GPT-3 and GPT-4 (ChatGPT). They explore the concept of using AI to create realistic phishing emails that are difficult to detect, and how cybercriminals can exploit this technology to deceive individuals and organizations. The episode also looks at the ease with which AI can generate content that appears real, making it a powerful tool in the hands of attackers. The trio discuss the potential dangers of AI-powered phishing emails and the need for more sophisticated spam filters that can accurately detect the intent of these emails, providing more granular information and recommended actions for users. Throughout the episode, there is a recognition of AI as a tool that can be used for both good and bad purposes, emphasizing the importance of ethics and the ongoing race between cybercriminals and cybersecurity professionals. The conversation also touches on the positive applications of AI in detecting and preventing phishing attacks, showcasing the efforts of the "good guys" in the cybersecurity world. They discuss the potential for AI to help in blocking phishing emails and providing more granular information and recommended actions for users.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____________________________ResourcesDevising and Detecting Phishing: Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails): https://www.blackhat.com/us-23/briefings/schedule/#devising-and-detecting-phishing-large-language-models-gpt-gpt-vs-smaller-human-models-v-triad-generic-emails-31659For more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Looking to get into Information Technologie? What about a Career in Cyber Security? During this video, we interview Alli who recently entered the I.T. field in pursuit of a career in Cyber Security. We cover interview tips, study best practices and much more... If you have any questions for myself or Alli make sure to leave them in the comments below!Alli's Resources:ObjectivesSecurity+ SY0-501 - https://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-501-exam-objectives.pdfBooksGet Certified Get Ahead - Security+ SY0-501 by Darril Gibson- https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/1939136059/ref=pd_lpo_sbs_14_img_0?_encoding=UTF8&psc=1&refRID=JWGJPHWBG3KF3KKNT4B3Study Guides/NotesGiant Study Guide made by u/kamekeisen on Reddit: https://docs.google.com/document/d/1hXGyKDWdpJLKZWWuu5eVTh-N5simhpSlTTA-Z-dtCj0/editVideosProfessor Messer Security+ Playlist - https://www.youtube.com/playlist?list=PLG49S3nxzAnnVhoAaL4B6aMFDQ8_gdxAyProfessor Messer Security+ Study Group Playlist - https://www.youtube.com/playlist?list=PLG49S3nxzAnkijp3VBQ5CPf19bK-5hmecPractice ExamsA Ton of Practice Exams: https://www.examcompass.com/comptia/security-plus-certification/free-security-plus-practice-testsBug Bounty Hunting ResourcesBooks:Web Hacking 101 - Peter Yaworski https://leanpub.com/web-hacking-101%3EBreaking into Information Security- Andy Gill https://leanpub.com/ltr101-breaking-into-infosecWeb Application Hacker's Handbook - Stuttard https://amzn.to/2YbemDSHacking the Art of Exploitation - Erickson https://amzn.to/2SrY7NAThe Hacker's Playbook 3 - Peter Kim https://amzn.to/2XR09wCVideos: Bug Hunting Methodology v2 - Jason Haddix https://www.youtube.com/watch?v=Qw1nNPiH_Go How to Shot Web - Jason Haddix https://www.youtube.com/watch?v=-FAjxUOKbdIBug Hunting Methodology v3- Jason Haddix https://www.youtube.com/watch?v=Qw1nNPiH_GoHow to Get Started in Bug Bounties - STÖK https://www.youtube.com/watch?v=CU9Iafc-IgsWeb Penetration Testing Zero to Hero - The Cyber Mentor https://www.youtube.com/watch?v=WnN6dbos5u8Places to Practice:Root-me https://www.root-me.org/?lang=enOver the Wire http://overthewire.org/wargames/ (Specifically Natas)Hack the Box [YouTube made me take down the link but you can google them]BWAPP http://www.itsecgames.com/Blogs/Writeups I found helpful:Penetration Testing and Bug Bounty Hunting - https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.htmlHow to get into Bug Bounty Hunting - https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bouSupport the show
Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech [@InformaTechHQ] and General Manager at Black Hat [@BlackHatEvents]On LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________This Episode's SponsorsrunZero | https://itspm.ag/runzervvyhIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesBlack Hat USA 2023 conference's keynote sessions promise engaging and insightful conversations. Steve Wylie, the General Manager, highlighted one of the key discussions that will occur during the event, a fireside chat between Jen Easterly, the director of Cybersecurity and Infrastructure Agency (CISA), and Viktor Zhora, who is responsible for defending Ukraine's digital infrastructure. Easterly, having been appointed in 2021, participated in a Black Hat keynote stage three weeks later, where she effectively discussed her vision for the collaboration of hackers, government, and the private sector. Now, after a couple of years in her role, she's expected to bring in more nuanced perspectives.The discussion will focus on the pressing issues faced by the cybersecurity world, including the war in Ukraine and the country's efforts to defend its digital infrastructure. This fireside chat is set to foster insightful exchanges from two significant figures, each from different governments, giving attendees a unique view into real-world security operations.The Thursday morning keynote will feature Kemba Walden, the Acting National Cyber Director for the Executive Office of the President. Her contributions to major cybersecurity initiatives, such as the implementation of Executive Order 14028, make her an exciting addition to the conference. This order, which aimed to improve the nation's cybersecurity, addressed significant issues like public-private cooperation, sharing of intelligence between agencies, and supply chain security.As the conference unfolds, more technical discussions will also take place. Wylie mentioned the Black Hat briefings which are typically quite technical and provide insights into the current cybersecurity landscape. One notable briefing includes James Kettle's session, "Smashing the State Machine: The True Potential of Web Race Conditions," highlighting an unexpected flaw in web applications. Other sessions cover important topics such as the recent Viacom satellite attack in Ukraine and global DDoS trends, as observed by the FBI.The Black Hat USA 2023 conference offers a diverse range of topics for attendees, from policy-related big-picture conversations to more technical, detail-oriented discussions, plus hands-on activities taking place in the Arsenal. There's also an entrepreneur track, where innovative solutions are pitched to judges and are on display in the business hall.Black Hat USA 2023 aims to provide both overarching perspectives and in-depth analyses to ensure a comprehensive understanding of today's cybersecurity challenges.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____________________________ResourcesBlack Hat USA 2023 Trainings: https://blackhat.com/us-23/training/schedule/index.htmlBlack Hat USA 2023 Briefings: https://blackhat.com/us-23/briefings.htmlFor more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Cybersecurity Careers is a Cybercrime Magazine podcast series brought to you by the George Washington University. In this episode, host Hillarie McClure is joined by Dr. Raymond Chow, Professional Lecturer in Engineering at George Washington University. Together, they discuss how the shortage of 3.4 million workers in cybersecurity is good news for wages. Ranking among the nation's best, the George Washington University is recognized as a National Center of Academic Excellence in Cyber Defense Research by the NSA and the DHS. To learn more about our sponsor, visit https://onlinecybersecurity.seas.gwu.edu/?ace_cam…stseries
Guest: Kevin JohnsonOn Twitter | https://twitter.com/secureideasOn LinkedIn | https://www.linkedin.com/in/kevinjohnson/On Mastodon | https://infosec.exchange/@secureideas________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Gene Fay, CEO at ThreatX [@threatx_inc]On Twitter | https://twitter.com/genefayOn LinkedIn | https://www.linkedin.com/in/genefay/Host: Phillip WylieOn ITSPmagazine
Guest: Jason HaddixOn Twitter | https://twitter.com/JhaddixOn LinkedIn | https://www.linkedin.com/in/jhaddix/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Saman Fatima, Graduate Research Assistant at Georgia State UniversityOn Twitter | https://twitter.com/saman_3014On LinkedIn | https://www.linkedin.com/in/saman-fatima-30/Host: Phillip WylieOn ITSPmagazine
Guest: Liz MillerOn Twitter | https://twitter.com/lizkmillerOn LinkedIn | https://www.linkedin.com/in/lizkmiller/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Kenny Parsons, Senior Regional Engineer at Trace3 [@trace3]On Twitter | https://twitter.com/therealjiruOn LinkedIn | https://www.linkedin.com/in/kenny-parsons/Host: Phillip WylieOn ITSPmagazine
Guest: Nenad Zaric, CEO and Co-founder at Trickest [@trick3st]On Twitter | https://twitter.com/ZaricNenad_On LinkedIn | https://www.linkedin.com/in/nenad-zaric/Host: Phillip WylieOn ITSPmagazine
Guest: Nader Zaveri, Senior Manager at Incident Response & Remediation at Mandiant [@Mandiant]On Twitter | https://twitter.com/NaderZaveriOn LinkedIn | https://www.linkedin.com/in/naderzaveri/Host: Phillip WylieOn ITSPmagazine
GuestsLinda Gray Martin, Vice President at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/linda-gray-martin-223708/On Twitter | https://twitter.com/LindaJaneGrayCecilia Murtagh Marinier, Cybersecurity Advisor - Strategy, Innovation & Scholars at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/On Twitter | https://twitter.com/CMarinier____________________________Host:Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesWe had an amazing conference and are thrilled to close out our Chats On The Road to (from) RSA Conference 2023 with a recap chat with our good friends as they give us the latest and greatest for what took place at this year's event.Be sure to tune in to all of our RSA Conference 2023 USA coverage from San Francisco to hear stories from the keynotes, sessions, speakers, expo hall, community events, and so much more. And, yes, we decided to capture a lot of our coverage on video too, so be sure to check out the RSA Conference 2023 playlist on YouTube as well.____________________________ResourcesLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
Guest: Christian Hyatt, CEO & Co-Founder at risk3sixty [@risk3sixty]On LinkedIn | https://www.linkedin.com/in/christianhyatt/On Twitter | https://twitter.com/risk3sixtyHost: Phillip WylieOn ITSPmagazine
Guest: Adam ShostackOn Twitter | https://twitter.com/done_with_thatOn LinkedIn | https://www.linkedin.com/in/shostack/On Mastodon | infosec.exchange/@adamshostack________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Sheldon Carmichael, Information Security ArchitectOn LinkedIn | https://www.linkedin.com/in/sheldoncarmichael/On Twitter | https://twitter.com/Poppa_ShellHost: Phillip WylieOn ITSPmagazine
Guest: David Pereira, CEO and Founder of SecPro [@SecProInt]On LinkedIn | https://www.linkedin.com/in/davidfpereira/On Twitter | https://twitter.com/davidpereiracibOn YouTube | https://www.youtube.com/@secprointHost: Phillip WylieOn ITSPmagazine
Guest: Chris Roberts, CISO, Boom Supersonic [@boomaero]On Twitter | https://twitter.com/Sidragon1On LinkedIn | https://www.linkedin.com/in/sidragon1/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Michael Farnum, CTO at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/mfarnum/On Twitter | https://twitter.com/m1a1vetHost: Phillip WylieOn ITSPmagazine