POPULARITY
Send us a textCybersecurity consulting - does it really exist? The answer is "yes" and Wavestone can prove it.Wavestone is a leading consulting firm specializing in digital and data strategy, IT and cybersecurity solutions, and services optimization.In this episode, Senior Manager Florian Drouin shares about the firm's collaborative culture, exciting projects, and career opportunities in the firm's cybersecurity practice.See jobs at Wavestone below.Connect with WavestoneSee jobs at WavestoneLearn more about WavestoneAdditional ResourcesUnlock top consulting jobs on the Management Consulted Job BoardPartner LinksMore info on Palm Tree careersConnect With Management Consulted Follow Management Consulted on LinkedIn, Instagram, and TikTok for the latest updates and industry insights. Schedule a free 15min consultation with a member of the Management Consulted team. Join an upcoming live event - case interviews demos, expert panels, and more. Email our team (team@managementconsulted.com) with any questions or feedback.
Welcome back to The Cyber Revolution Podcast! This week, host Adam Hewitt, CEO of Cyber Revolution, is joined by Dr. James Stanger, the Chief Technology Evangelist at CompTIA. With over 25 years of experience, James is a renowned cybersecurity expert, educator, and consultant who has worked with government and corporate leaders worldwide. In this episode, James shares his unique journey into cybersecurity, from being an English literature PhD student to becoming a global authority in cybersecurity education. He explains why curiosity is the most important skill in cybersecurity and how CompTIA certifications (like Security+) help bridge the skills gap for aspiring professionals. Chapters: 00:00 - Introduction and Guest Introduction 02:30 - Dr. James Stranger's Cybersecurity Journey 05:45 - The Importance of Curiosity in Cybersecurity 08:15 - From Academia to Cybersecurity Consulting 11:30 - The Evolution of Cybersecurity Education 14:00 - CompTIA's Role and Impact in the Industry 17:00 - The Dynamic Nature of Cybersecurity 20:15 - Transferable Skills for Cybersecurity Careers 23:30 - Entry-Level Roles and Career Pathways 26:00 - CompTIA Security+ Certification Overview 28:30 - Addressing the Cybersecurity Skills Gap 30:00 - Study Tips and Final Advice What You'll Learn in This Episode: James Stanger's Cybersecurity Journey: • How a curiosity for tech turned into a global cybersecurity career • The transition from academia to IT security consulting • His work with government agencies and Fortune 500 companies Breaking into Cybersecurity: • Why ANYONE can start a cybersecurity career (even without an IT background) • The biggest cybersecurity myths that stop people from getting started • How to leverage transferable skills from non-technical backgrounds • The best entry-level cybersecurity roles to aim for Certifications & Skills for Success: • Why CompTIA Security+ is the gold standard for cybersecurity beginners • The essential knowledge areas: Networking, IT fundamentals, Security, and Coding • How to prepare for and pass your cybersecurity certification exams The Global Cybersecurity Crisis: • Why Australia needs 85,000 cybersecurity professionals by 2030 • The real reason companies struggle to hire cybersecurity talent • How industry and government are addressing the skills shortage Resources: CompTIA Security+ Certification – https://www.comptia.org/certifications/security CompTIA Labs & Training – https://www.comptia.org/training Follow Dr. James Stanger on LinkedIn – https://www.linkedin.com/in/jamesstanger Connect with Adam: Website: https://cyberrevolution.com.au Follow us on Facebook: https://www.facebook.com/cyberrevolutionaus Subscribe to our YouTube channel: https://www.youtube.com/@cyberrevolutionaus Follow us on Instagram: https://www.instagram.com/cybrevolution_aus/
The following article of the Tech industry is: “Does Age Affect Technology Adoption?” by Juan Carlos Carrillo Herrera, Director de Cybersecurity Consulting Services (CCS), OneSec.
Last week, we uncovered some of Dan's biggest insights on leadership and tech, but there's even more to come! Catch Dan's wisdom on cybersecurity, his unique approach to startups, and the interesting“double irony” he discovered looking back on his career. Dan Haagman, the CEO and founder of Chaleit, a leading name in global Cybersecurity Consulting. Dan is also recognised as a Top Cybersecurity Voice on LinkedIn, with nearly 30 years of experience at major firms such as The London Stock Exchange, and as a co-founder of NotSoSecure and 7Safe. PART 2 of Episode 34 is OFFICIALLY ON AIR!
Dan Haagman, the CEO and founder of Chaleit, a leading name in global Cybersecurity Consulting. Dan is also recognized as a Top Cybersecurity Voice on LinkedIn, with nearly 30 years of experience at major firms such as The London Stock Exchange, and as a co-founder of NotSoSecure and 7Safe. PART 1 of Episode 34 is OFFICIALLY ON AIR!
Welcome to Hacker Summer Camp Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.Sean Martin: “Welcome to a new episode coming to you from Hacker Summer Camp. We're here in Las Vegas for Black Hat USA 2024, and I'm thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”Simplifying Cybersecurity with Level Blue Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.Theresa Lanowitz: “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.Key Insights from the Level Blue Futures Report Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.Collaboration Among CIO, CTO, and CISO Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.Theresa Lanowitz: “The CIO, the CISO, and the CTO must be equal partners. If they're not, achieving cyber resilience becomes very difficult.”The Pandemic's Impact on Cybersecurity Reflecting on the pandemic's effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.Proactive vs. Reactive Budgets Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.Theresa Lanowitz: “If you can align cybersecurity initiatives with business goals, you're going to be proactive rather than reactive.”The Role of Trusted Third-Party Advisors Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.Sean Martin: “By working with a trusted partner, you're not giving up your creative ideas but rather ensuring they play out effectively and securely.”The Human Element in Cybersecurity As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.Sean Martin: “It always comes back to the people, doesn't it?”Conclusion The episode wraps up with Sean expressing gratitude for Theresa's insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber]On LinkedIn | https://www.linkedin.com/in/theresalanowitz/ResourcesLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Welcome to Hacker Summer Camp Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.Sean Martin: “Welcome to a new episode coming to you from Hacker Summer Camp. We're here in Las Vegas for Black Hat USA 2024, and I'm thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”Simplifying Cybersecurity with Level Blue Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.Theresa Lanowitz: “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.Key Insights from the Level Blue Futures Report Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.Collaboration Among CIO, CTO, and CISO Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.Theresa Lanowitz: “The CIO, the CISO, and the CTO must be equal partners. If they're not, achieving cyber resilience becomes very difficult.”The Pandemic's Impact on Cybersecurity Reflecting on the pandemic's effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.Proactive vs. Reactive Budgets Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.Theresa Lanowitz: “If you can align cybersecurity initiatives with business goals, you're going to be proactive rather than reactive.”The Role of Trusted Third-Party Advisors Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.Sean Martin: “By working with a trusted partner, you're not giving up your creative ideas but rather ensuring they play out effectively and securely.”The Human Element in Cybersecurity As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.Sean Martin: “It always comes back to the people, doesn't it?”Conclusion The episode wraps up with Sean expressing gratitude for Theresa's insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber]On LinkedIn | https://www.linkedin.com/in/theresalanowitz/ResourcesLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Prepare to arm yourself with knowledge as cybersecurity expert Josh Hankins joins us on Side Hustle City to discuss the insidious rise of cyber threats. We're not just talking about obscure viruses; we're tackling the real danger lurking behind your screen—data breaches that could expose your most private information. Josh, with his wealth of experience, doesn't just paint a picture of ruin; he equips us with the tools to fight back, emphasizing the need for solid backup strategies, smart password habits, and the wisdom of using VPNs in public spaces. Tune in to transform from a potential victim to a well-guarded netizen.When artificial intelligence becomes your co-worker, it's important to know its quirks and qualities. That's why we're taking a journey through the AI landscape, sharing personal experiences that highlight why critical evaluation of AI outputs is crucial. But technology isn't just about the code; it's about the people behind it. We examine the essential role of communication in the tech world, especially when it comes to translating the complex language of technology into actionable business strategies. If you've ever felt lost in the digital woods, this episode acts as your compass, guiding you through the maze of tech speak and AI oddities.Ending on a high note, our conversation with Josh Hankins delves into the most pressing cybersecurity threats of our time and the defense strategies you can deploy. Discover how to outsmart phishing scams and why industries like banking and healthcare are hot targets for cybercriminals. From crafting strong passphrases to setting unusual financial alerts, we share tips that you can put into practice today. And for businesses seeking to shield their operations, Josh offers a glimpse into the world of cybersecurity consulting. It's not just a discussion; it's a masterclass in protecting your digital domain.As you're inspired to embark on your side hustle journey after listening to this episode, you might wonder where to start or how to make your vision a reality. With a team of experienced marketing professionals and a track record of helping clients achieve their dreams, we are ready to assist you in reaching your goals. To find out more, visit www.reversedout.com.Support the showSubscribe to Side Hustle City and join our Community on Facebook
On this episode of The Cybersecurity Defenders Podcast, we discuss some of the cybersecurity threats to electric vehicles with Mike Pedrick, VP of Cybersecurity Consulting at Nuspire.Mike is currently serving as the Vice President of Cybersecurity Consulting at Nuspire. In his role over the past two years, Mike has focused on providing advisory services to mid-market clients in the areas of cybersecurity, governance, risk, and compliance with data security and privacy standards. His specialization lies in implementing mature cybersecurity programs tailored for small and medium-sized businesses. Mike is also actively involved with ISACA, where he currently serves as the Certification Coordinator for the Denver Chapter Board, managing certification-related activities.Before joining Nuspire, Mike held positions such as Vice President of Consulting at Stealth - ISS Group Inc. and Director of Security Consulting at Synoptek. In these roles, he provided leadership and advisory services in the cybersecurity domain. With over a decade of self-employment as a Security, Compliance, and Risk Management Consultant, Mike has served as a trusted advisor to SMB/Midmarket organizations, offering guidance in cybersecurity, compliance, and risk management.
Mike Pedrick is the VP, Cybersecurity Consulting for Nuspire. He believes that all businesses are at risk - hackers, crackers, nation states and bad actors - but small- and medium-sized businesses have to defend themselves against the same threats as the major corporations with fewer resources at their disposal. Who helps small business leaders navigate the murky waters of risk management, governance, compliance, privacy, and guerilla marketing campaigns? He does. Join us for an engaging conversation focused on SMB information security risk. --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message
Send us a Text Message.Speaker: Margareta Petrovic, Global Managing Partner, Risk & Cybersecurity Consulting & Service Integration, Tata Consultancy Services (TCS)Margareta and Julian engaged in a detailed discussion about the intersection of AI and cybersecurity in 2024. They explored the challenges posed by the evolving technical and business landscape, emphasizing the need for innovative solutions to address these complexities.Additionally, they highlighted the role of regulations and compliance in shaping cybersecurity strategies, acknowledging the impact of AI on both positive advancements and potential threats from bad actors. The conversation underscored the ongoing race between cybersecurity professionals and bad actors in leveraging AI for their respective purposes.They also discussed the evolving nature of cybersecurity, emphasizing the need for serious defense methods and risk quantification. They stressed the need for constant vigilance and investment in cybersecurity, as well as the emerging trend of investing in platforms that can assess an organization's cybersecurity posture and compliance gaps.A recent blog from Tata Consultancy Services revealed the top five trends that will shape global enterprise in 2024:GenerativeAICreates Security Opportunities and Pronounces ThreatsSpotlight on Cyber with Increased Focus at the Top, Emphasizing Pressure on CISO RoleA More Regulated, “Sovereign Cloud” Becomes Standard in Global BusinessExpanded Digital Ecosystems Leave Room for Attack, Altering Vendor StrategyWhile Talent Gaps Continue to Widen, New Hiring Strategies Can Prevail
In episode four of the Logically Speaking podcast, our host Steve sits down with Chris Novak, Managing Director of Cybersecurity Consulting at Verizon Business. The two delve into the most significant cybersecurity threats facing organizations today and share a glimpse into the future. Listen as Chris offers his predictions for the evolution of the cyber landscape over the next five years and hear an in-depth discussion on the proliferation of ransomware and its impact on businesses. At the conclusion of the conversation, Chris highlights the top three actions organizations must take to prevent a cyber incident. Episode highlights:Insights into the most significant cybersecurity threatsFuture predictions for the evolving cyber landscapeThe impact and proliferation of ransomwareThe top three actions to prevent a cyber incidentWatch this episode on YouTube, with additional insights from our guests!https://youtube.com/@logicallymssp
Yonatan Hoorizadeh: Purpose of Life, GOD vs. AI, Choosing A Rabbi, Shabbat Test RTH PODCAST #2 https://youtu.be/FSgNj1idCH8 Born in Iran, Yonatan Hoorizadeh Immigrated to the USA at the age of 12, and grew up as a secular Jew in the Persian community in Los Angeles California. Throughout his successful career building his Cybersecurity firm, Yonatan has done work for major corporations such Walt Disney, CHASE, and AT&T. This analytical mind of an engineer came in very handy when the time came to answer the hard questions he's always had about the Purpose of Life. The trouble wasn't find a Rabbi, rather finding a Rabbi that will tell him a "completely truthful answer" to satiate his yearning soul. This all changed when he was introduced to Rabbi Yaron Reuven. Watch and learn how Yonatan decided to change his life, choose a wife, and even run his growing business after getting the clarity he's always needed. This story will both inspire and educate you, and even give you some secret about the best way to invest your money. Enjoy it and make sure to share. To Learn More About Yonatan Hoorizadeh's Cybersecurity Consulting services you can visit him at https://purpleshieldsecurity.com/blog/ or connect with him via LinkedIn https://www.linkedin.com/in/yonatanhoorizadeh/
Yonatan Hoorizadeh: Purpose of Life, GOD vs. AI, Choosing A Rabbi, Shabbat Test RTH PODCAST #2 https://youtu.be/FSgNj1idCH8 Born in Iran, Yonatan Hoorizadeh Immigrated to the USA at the age of 12, and grew up as a secular Jew in the Persian community in Los Angeles California. Throughout his successful career building his Cybersecurity firm, Yonatan has done work for major corporations such Walt Disney, CHASE, and AT&T. This analytical mind of an engineer came in very handy when the time came to answer the hard questions he's always had about the Purpose of Life. The trouble wasn't find a Rabbi, rather finding a Rabbi that will tell him a "completely truthful answer" to satiate his yearning soul. This all changed when he was introduced to Rabbi Yaron Reuven. Watch and learn how Yonatan decided to change his life, choose a wife, and even run his growing business after getting the clarity he's always needed. This story will both inspire and educate you, and even give you some secret about the best way to invest your money. Enjoy it and make sure to share. To Learn More About Yonatan Hoorizadeh's Cybersecurity Consulting services you can visit him at https://purpleshieldsecurity.com/blog/ or connect with him via LinkedIn https://www.linkedin.com/in/yonatanhoorizadeh/
https://convocourses.net video version here: https://youtube.com/live/vRYMrtzf5ms
I've started a limited YouTube series on lessons I've learned from being a successful consulting business owner. It's not all sunshine and roses, and I've made a lot of mistakes, but I've learned from them. Here are the first two episodes - Consulting: Introduction and Consulting: Risk Assessment. If you find these interesting and useful, please subscribe to the vCISO Services, LLC YouTube channel (link below) to be notified when future episodes drop (episodes drop roughly weekly, and episode three will drop the week of November 14th). https://youtube.com/@vciso --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/message Support this podcast: https://anchor.fm/virtual-ciso-moment/support
Es ist ein ‘Katz und Maus Spiel': Hacker werden immer besser und es gibt immer mehr Hacking-Angriffe - die Cybersecurity muss also Schritt halten. Damit Firmen nicht nur Schritt halten sondern sich auch für die Zukunft sicher aufstellen, gibt es z.B. die Experten der msg security advisors. Heute haben wir gleich zwei Experten - ein sehr sympathisches Duo: Fee Fuchsreiter & Bastian Grabowski - bei uns zu Gast, die euch spannende Einblicke in die Arbeit eines Cybersecurity Consultants geben. Fee als IT-Consultant und Bastian als Lead IT-Consultant bringen so einige Erfahrung und gute Laune mit. Der ITCS Pizzatime Podcast ist Teil des **ITCS und ITCS Online**! – Tech Konferenz, IT Jobmesse & Festival – schnapp dir dein **kostenloses Ticket** hier: [https://www.it-cs.io/](https://www.it-cs.io/) Fee Fuchsreiter bei LinkedIn: [Fee Fuchsreiter | LinkedIn](https://www.linkedin.com/in/fee-fuchsreiter-823744163/) Bastian Grabowski bei LinkedIn: [Bastian Grabowski, M.Sc | LinkedIn](https://www.linkedin.com/in/bastian-grabowski-m-sc-01b62a158/) msg auf Instagram: [@msg.karriere](https://www.instagram.com/msg.karriere/) Offene Stellen bei msg security advisors: [karriere.msg.group](https://karriere.msg.group/stellensuche?resetfilters=1&stellen___IndustryCode_id%5bvalue%5d%5b%5d=0016&stellen___IndustryCode_id%5bjoin%5d%5b%5d=AND&stellen___IndustryCode_id%5bgrouped_to_previous%5d%5b%5d=0) Mehr zu msg security advisors: [https://karriere.msg.group/branchen/security-advisors](https://karriere.msg.group/branchen/security-advisors)
In this episode of The Gate 15 Interview, Andy Jabbour welcomes back Scott Algeier to discuss the work he's doing with IT-ISAC and the Elections Industry Special Interest Group to help ensure, safe, secure, and reliable elections. Scott Algeier, who was on the Gate 15 interview earlier this year, is the Founder, President and CEO of Conrad, Inc. Cybersecurity Consulting. “Scott C. Algeier works at the intersection of cybersecurity policy and operations. He is the Founder, President and CEO of cybersecurity consulting firm Conrad, Inc., Executive Director of the Information Technology – Information Sharing and Analysis Center (IT-ISAC). Conrad, Inc. provides strategic policy and business consulting services to businesses and not for profit organizations focused on cyber security and critical infrastructure protection (CIP). Scott engages senior level policy makers in industry and government, domestically and internationally, on behalf of his clients. This includes direct engagement in the development of the nation's most significant domestic cybersecurity and CIP policies and operational plans.” From his LinkedIn bio. To learn more about Conrad, Inc, visit the Conrad website and connect on Twitter and you can follow and learn more about Scott on LinkedIn. In the discussion we address: What the IT-ISAC and the Elections Industry Special Interest Group (EI-SIG) are doing to help ensure safe, secure, and reliable elections. Who is involved in the SIG. The SIG's mission, including Learning from Coordinated Sharing, Planning for Major Attacks or Incidents, and Enhancing Cybersecurity Protections. The EI-SIG's industry framework for a coordinated vulnerability disclosure program. Scott returns to play three (more!) questions. A few references mentioned in or relevant to our discussion include: Conrad website: https://www.conradinc.biz The IT-ISAC You Tube Channel with the Advancements TV segment IT-ISAC: https://www.youtube.com/itisac IT-ISAC: https://www.it-isac.org Elections Industry Special Interest Group (SIG): https://www.it-isac.org/ei-sig The Gate 15 Interview: Scott Algeier on information sharing, critical infrastructure, cybersecurity & more! https://gate15.global/the-gate-15-interview-scott-algeier-on-information-sharing-critical-infrastructure-cybersecurity-more/ IT-ISAC Partners with Elections Infrastructure Sector Coordinating Council to Launch Threat Information-Sharing Group, 08 Aug 2018: https://130760d6-684a-52ca-5172-0ea1f4aeebc3.filesusr.com/ugd/b8fa6c_765f03ef0e584e7ca6819b41b7d16847.pdf FireWall Chats Episode 10, Pt. 1 - EI-SIG Members Eric Coomer, Sam Derheimer, and Brian Hancock: https://www.youtube.com/watch?v=Vqk-EiT5qZA&t=303s FireWall Chats Episode 10, Pt. 2 - EI-SIG Members Keir Holeman, Ed Smith, and Chris Wlaschin: https://www.youtube.com/watch?v=QpSZTX8cEWY IT-ISAC EI-SIG Two Years Of Progress White Paper, August 2020 (PDF): https://130760d6-684a-52ca-5172-0ea1f4aeebc3.filesusr.com/ugd/b8fa6c_1633ac012a1148eca2bf9dbaf3c965e9.pdf If anyone has any questions on some of the work being doing by the FBI, CISA and others to help secure elections, or about some of the recent open source reporting regarding threats, please contact our team and we can provide a number of links.
If getting hacked by a Euro-crime gang when trying to buy his first car on Ebay before starting a crime-fighting career sounds like a superhero origin story -- it's because it is one. Tyler is an absolute legend for many reasons, the least of which being he recently met Mike Tyson.
When discussing the industrial sector's threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization's networks, connected infrastructure or data storage centers.However, taking a look at Nuspire's latest Threat Landscape Report reiterates the need for manufacturers to keep their defenses up even when working with documents, files or websites that would appear to have limited interest from hackers and no connection points to outside parties.Nuspire reported a 28 percent increase in malware attacks – or about 52,000 detections a day during the second quarter of 2022. While many are being detected and blocked before being seen by the user, some are getting through by disguising themselves as add-ons or support tools for Microsoft Office documents. Once the user clicks for additional information within these software programs, which contain embedded on-line connections in providing legitimate support and downloadable tools, the malware is downloaded, providing a gateway to any and all of that user's network, cloud, system and software connections.During this same period, the company reported a 100 percent increase in botnet activity – reaching a rate of nearly 20,000 attacks per day. This form of malware attaches itself to web pages and emails. Once it is unintentionally downloaded via the targeted user clicking on a link or agreeing to download a false asset, the bug can log keystrokes in stealing login and other personal information that often feeds into ransomware attacks.Joining us to discuss these ongoing threats is Mike Pedrick, VP of Cybersecurity Consulting for Nuspire – a leading managed security services provider.To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Scott Algeier, Founder, President and CEO, Conrad, Inc. Cybersecurity Consulting. “Scott C. Algeier works at the intersection of cybersecurity policy and operations. He is the Founder, President and CEO of cybersecurity consulting firm Conrad, Inc., Executive Director of the Information Technology – Information Sharing and Analysis Center (IT-ISAC). Conrad, Inc. provides strategic policy and business consulting services to businesses and not for profit organizations focused on cyber security and critical infrastructure protection (CIP). Scott engages senior level policy makers in industry and government, domestically and internationally, on behalf of his clients. This includes direct engagement in the development of the nation's most significant domestic cybersecurity and CIP policies and operational plans.” To learn more about Conrad, Inc, visit the Conrad website and connect on Twitter and you can follow and learn more about Scott on LinkedIn. “building partnerships is in large part being able to find common ground” In the discussion we address: Scott's work at Conrad, Inc. Cybersecurity Consulting and his work with IT-ISAC and other information sharing communities. Working with critical infrastructure Building communities of trust The state of private-public partnerships The war in Ukraine and the enduring Russian cyber threat Making cybersecurity a kitchen table issue And a lot more! A few references mentioned in or relevant to our discussion include: Conrad website: https://www.conradinc.biz Some of Conrad's clients: https://www.conradinc.biz/clients Advancements, A Series Hosted By Ted Danson, featuring IT-ISAC: https://advancementstv.com IT-ISAC: https://www.it-isac.org CyberShare - The small broadband provider ISAC: https://www.ntca.org/member-services/cybershare CompTIA ISAO: https://connect.comptia.org/membership/comptia-isao The Gate 15 Interview: Elections Security 2020, with the FBI and the Elections Infrastructure ISAC (26 Oct 2020): https://gate15.global/the-gate-15-interview-elections-security-2020-with-the-fbi-and-the-elections-infrastructure-isac/ On the importance of having a “partner mindset,” Scott says, “at the end of the day, we can do more good by collaboration than by fighting (over business)“- Scott Algeier, Founder, President and CEO, Conrad, Inc. Cybersecurity Consulting
The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks.But today's guest emphasizes that beyond just insurance to cover the costs of these intrusions, the manufacturing sector needs to implement more proactive strategies that encompass prevention and recovery.I'm pleased to welcome Allen Jenkins, VP of Cybersecurity Consulting at InterVision to this episode of Security Breach. InterVision is a leading provider of services focused on enterprise network security. For more information on the work InterVision does, you can go to www.intervision.comTo download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
There Are No Borders In The Digital Wars With Peter Cavrell and Chuck Mackey of Fortress Security Risk Management and Richard Levick of LEVICK: Peter Cavrell, Vice President of Business Development & Marketing and Chuck Mackey, Director, Cybersecurity Consulting at Fortress Security Risk Management, join host Richard Levick of LEVICK to discuss existing cyber threats and how they will only grow with the likely forthcoming Russian cyber warfare. Expect more insider threats, supply chain risks and attacks on the small and middle market firms. They discuss how to insulate and protect your assets, including 6-Steps to Cyber Safety and an accompanying infographic.
On today's podcast, Kyle McNulty of Secure Ventures talks about interviewing the people behind the most up-and-coming cybersecurity startups. We discuss the best advice he's received on the show, how to get your own podcast off the ground and his own security startup, ConsultPlace. – Join the monthly challenge: https://www.infosecinstitute.com/challenge – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro 2:40 - Getting into cybersecurity6:00 - McNulty's education and career9:50 - Getting into consulting and startups14:08 - Secure Ventures podcast17:45 - Best insight from a podcast guest20:13 - Startup stories 22:10 - Startups during COVID23:42 - Advice for startups25:22 - How to begin a podcast 33:25 - Tips for cybersecurity newcomers35:04 - Upcoming podcasts36:15 - ConsultPlace work 38:00 - Find more about McNulty38:42 - Outro
Our feature guest on this special episode is Mike Pedrick, VP of Cybersecurity Consulting for Nuspire. Mike has been a longtime pillar of the security community in Colorado. He sat down with Frank Victory for this interview.
CyberMarket.com is a marketplace where CyberSecurity Consultancies and clients can find each other. There is a growing trend where CyberSecurity Consultants recognize the gap between what they are worth to a consultancy as being sold out for a daily rate compared to what they get paid. There are a number of consultants who are leaving consultancies to start the next generation of independent / boutique consultancies but they don't have a sales pipeline and sales staff like their old consultancies do. CyberMarket.com is a place to help facilitate the sales pipeline for cybersecurity consultancies of various sizes. Segment Resources: https://www.cybermarket.com There is a blog at https://www.cybermarket.com/homes/blog where an article to help people to start up their own cybersecurity consultancy can be found. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw703
CyberMarket.com is a marketplace where CyberSecurity Consultancies and clients can find each other. There is a growing trend where CyberSecurity Consultants recognize the gap between what they are worth to a consultancy as being sold out for a daily rate compared to what they get paid. There are a number of consultants who are leaving consultancies to start the next generation of independent / boutique consultancies but they don't have a sales pipeline and sales staff like their old consultancies do. CyberMarket.com is a place to help facilitate the sales pipeline for cybersecurity consultancies of various sizes. Segment Resources: https://www.cybermarket.com There is a blog at https://www.cybermarket.com/homes/blog where an article to help people to start up their own cybersecurity consultancy can be found. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw703
This week, we kick off the show with an interview featuring Jeff Tinsley, CEO of RealMe, to talk about The Online Safety and Security as it Pertains to Dating Apps and Online Marketplaces! Next up, we welcome Gordon Draper, Founder and CEO of CyberMarket.com, to talk about the Democratisation and Globalisation of CyberSecurity Consulting! In the Security News, Trust no one, its all about the information, so many Windows vulnerabilities and exploits, so. many., Saudi Aramco data for sale, Sequoia, a perfectly named Linux vulnerability, is Microsoft a national security threat?, Pegasus and clickless exploits for iOS, homoglyph domain takedowns, when DNS configuration goes wrong and a backdoor in your backdoor! Show Notes: https://securityweekly.com/psw703 Segment Resources: https://www.cybermarket.com There is a blog at https://www.cybermarket.com/homes/blog where an article to help people to start up their own cybersecurity consultancy can be found. Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we kick off the show with an interview featuring Jeff Tinsley, CEO of RealMe, to talk about The Online Safety and Security as it Pertains to Dating Apps and Online Marketplaces! Next up, we welcome Gordon Draper, Founder and CEO of CyberMarket.com, to talk about the Democratisation and Globalisation of CyberSecurity Consulting! In the Security News, Trust no one, its all about the information, so many Windows vulnerabilities and exploits, so. many., Saudi Aramco data for sale, Sequoia, a perfectly named Linux vulnerability, is Microsoft a national security threat?, Pegasus and clickless exploits for iOS, homoglyph domain takedowns, when DNS configuration goes wrong and a backdoor in your backdoor! Show Notes: https://securityweekly.com/psw703 Segment Resources: https://www.cybermarket.com There is a blog at https://www.cybermarket.com/homes/blog where an article to help people to start up their own cybersecurity consultancy can be found. Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
The Future of IT Security with Peter Adams and Arvind Hariharan E31 On this episode of the The Future of Work: Water Cooler Conversations we interview IT and Security experts, Peter Adams of Sol Minion development and Arvind Hariharan of CMIT Solutions of Tempe/North Chandler. Peter and Arvind explain why it is so important for […]
The Future of IT Security with Peter Adams and Arvind Hariharan E31 On this episode of the The Future of Work: Water Cooler Conversations we interview IT and Security experts, Peter Adams of Sol Minion development and Arvind Hariharan of CMIT Solutions of Tempe/North Chandler. Peter and Arvind explain why it is so important for […] The post The Future of IT Security with Peter Adams and Arvind Hariharan E31 appeared first on Business RadioX ®.
Meet Jay.By day, Jay works in cybersecurity. But by night, and in his free time, he has a variety of interests, side hustles, and income streams.After discovering cybersecurity in college, Jay strategically navigated several promotions to climb the ranks quickly.LOOKING FOR MORE?Show Notes: https://www.howdidyouendupthere.com/podcast-episodes/a-cybersecurity-manager-with-multiple-income-streamsInstagram: @howdidyouenduptherepodContact: howdidyouenduptherepod@gmail.com
Dinis Guarda citiesabc openbusinesscouncil Thought Leadership Interviews
Prior to joining Huawei Colm Murphy was the International Director of BSI Group's Cyber Security and Information Resilience professional services business, responsible for this business units growth beyond the UK and Ireland. Before that he worked with Deloitte and McAfee.Previously, as a Director of Espion, Colm was a founding member of the management team responsible for growing the company to international success. Espion's Cyber security Technology Distribution business unit was acquired by Exertis (a subsidiary of DCC plc.) in November 2015 and its Cybersecurity Consulting business unit was acquired by BSI Group in April 2016.Colm holds a B.A. from Trinity College, Dublin, and a Post Graduate Diploma from Dublin Institute of Technology. He has 20 years experience working in #Cybersecurity, Information Resilience, Privacy, eDiscovery & Digital Forensics and Incident Response in both sales and technical roles. He has led and managed a range of projects across EMEA, APAC and the US. Interview Focus:1. Can you tell us about your Profile and background?2. What are your views on how businesses and governments can cope with digital transformation?3. How do you see the Cyber security industry best practices?4. There is no doubt about the importance of Cyber security, the important is how do you cope with that and prepare? 5. How to protect cities and governments from cyber threats?6. #5G is out there with a lot of challenges and opportunities. How do you see that?7. How do you see the unified or verified security standards in the 5G or telecom industry?8. What kind of challenges the industries are facing when the security standards are missing and the development progress of some security standards, such as 3GPP, NESAS?9. How could we measure cyber security? Both for countries, cities and businesses and What is the meaning of developing the security standards for public and industries?10. Can you tell us about Huawei's progress in cyber security and security verifications? and especially the ERNW Reviews Source Code for Huawei 5G Core Network UDG?11. Can you share some case studies that you highlight as good practices? About Dinis Guarda profilehttps://www.openbusinesscouncil.org/w...https://www.dinisguarda.com/https://www.intelligenthq.com/author/...
A highly acclaimed security expert, published author, and keynote speaker who provides compelling insight into cyber security issues of the day, Tom Patterson provides clarity while delivering a high energy view into security that is of critical importance today. Patterson shares his insights and incredible knowledge on an area a lot of us either don't know about, or is just to confusing to understand. If you have any questions regarding internet security do not miss this compelling interview! Currently CSC's Global GM for Cybersecurity Consulting, Tom has run security services for Deloitte in EMEA, was IBM's Chief eCommerce Strategist and a venture-backed founder/CEO. Tom has worked on security for the launch of a nuclear aircraft carrier and space shuttle as well as for the U.S. Government and plus businesses around the world. The author of Mapping Security, Tom is a frequent guest security expert on TV including CNBC and CNN.Abbie Schiller, the company's founder and CEO, is known as an industry powerhouse, having spent nearly a decade in the business of communicating to and for women. Her background as head of ABC Daytime PR, and as global head of Public Relations for the renowned Kiehl's brand, have primed Abbie for her role as a leader within the parenting niche. Building, growing and expanding brands for women is Abbie's forte, while Helping Parents Raise Good People is her passion. She and her husband have two children, age 2 and 9, who are the inspiration behind the creation of The Mother Company.
Patrick Rettig is the story, an exposé of a man who is absolutely the last stop for a business owner in financial turmoil. This particular time in the life of an entrepreneur is the quintessential heartbreak of dreams and hope. One would think that financial decisions had been made that were incorrect, that alliances had been broken or that the economy had shifted. Moreover the uncomfortable thinking is that the corporation and its founder were simply a bad deal. The word bankruptcy and reorganization are ghostly specters in the night for those people who must embrace failure. There have been successes in the past but now they seem to be only a memory. Money is a threat because it is only represented in bills that are impossible to pay. At this point catastrophic end is real. The thought of losing one's livelihood and quality of life is accurate and eminent. There is a man, however, who is not afraid of insolvency or the demons that walk in that mindset. Rettig is the name that will absolutely turnaround a hopeless situation. But it is not easy. The family has to understand that everybody has a job not just the owner of the company…wife, husband, children, employees. All of them have a job, a responsibility to bring back to life a corporation on life support. Rettig, or Patrick as he is referred to by his clients, is a single soldier pushing back chaos. He adheres to the letter of the law and is excruciatingly honest. His manner and technique is unorthodox, unruly and irreverent. He rebuilds the man at the top, inspiring him to pick up his sword and shield one more time and fight for his life, the most honorable match with destiny. A highly acclaimed security expert, published author, and keynote speaker who provides compelling insight into cyber security issues of the day, Tom Patterson provides clarity while delivering a high energy view into security that is of critical importance today. Patterson shares his insights and incredible knowledge on an area a lot of us either don't know about, or is just to confusing to understand. If you have any questions regarding internet security do not miss this compelling interview! Currently CSC's Global GM for Cybersecurity Consulting, Tom has run security services for Deloitte in EMEA, was IBM's Chief eCommerce Strategist and a venture-backed founder/CEO. Tom has worked on security for the launch of a nuclear aircraft carrier and space shuttle as well as for the U.S. Government and plus businesses around the world. The author of Mapping Security, Tom is a frequent guest security expert on TV including CNBC and CNN.We are the aviation Specialists for the Motion Picture and Television Industry! Choosing a qualified Motion Picture Pilot is never an accident. It is always the result of high intentional sincere effort, intelligent and skillful execution; it represents the wise choice of many alternatives. We are able to provide all phases of a stunt situation, both air and ground, by bringing to a production a professional organization. We are able to save a production time and money because we can supply aircraft, pilots, stunt persons and special effects.
Erik Oberholtzer co-founded Tender Greens in 2006 in Culver City, California, a chef driven, organic, fast-casual restaurant concept with 12 locations and counting. A professionally trained chef, Erik manages a growing team of talent along with some exciting new brands. He is the founder of the Tender Greens Sustainable Life Project, a program aimed at assisting at risk youth develop new skills and career intentions through structured culinary training and farm exposure. He is also co-founder of P. Balistreri Salumi Company, the first of their unique chef legacy companies he has helped incubate and bring to market through Tender Greens. Erik did his undergraduate degree in Psychology at Temple University in Pennsylvania and Culinary Arts at Johnson & Wales in Providence, Rhode Island.A highly acclaimed security expert, published author, and keynote speaker who provides compelling insight into cyber security issues of the day, Tom Patterson provides clarity while delivering a high energy view into security that is of critical importance today. Patterson shares his insights and incredible knowledge on an area a lot of us either don't know about, or is just to confusing to understand. If you have any questions regarding internet security do not miss this compelling interview! Currently CSC's Global GM for Cybersecurity Consulting, Tom has run security services for Deloitte in EMEA, was IBM's Chief eCommerce Strategist and a venture-backed founder/CEO. Tom has worked on security for the launch of a nuclear aircraft carrier and space shuttle as well as for the U.S. Government and plus businesses around the world. The author of Mapping Security, Tom is a frequent guest security expert on TV including CNBC and CNN.
On This Episode : Scott Page and Tom PattersonScott Page is a technologist, entrepreneur, musician and songwriter. Page is most recognized as the saxophonist for Pink Floyd, Supertramp and Toto. As an entrepreneur, he formed Walt Tucker Productions an audio video post production company in 1987. In 1992, he Co-founded 7th Level, Inc., a CD-ROM game and educational software company. Later, Page Co-founded New Media Broadcasting Company, a social media and collaborative communications enterprise. Since 2011, he has been the Co-founder and CEO of Direct2Care, an online presence management company for healthcare. Scott Page has received several acknowledgments and awards, primarily for his technology companies' achievements. Named one of “50 Pioneers of Multimedia,” Page has been guest lecturer and panelist at numerous conferences and university symposia.A highly acclaimed security expert, published author, and keynote speaker who provides compelling insight into cyber security issues of the day, Tom Patterson provides clarity while delivering a high energy view into security that is of critical importance today. Patterson shares his insights and incredible knowledge on an area a lot of us either don't know about, or is just too confusing to understand. If you have any questions regarding internet security do not miss this compelling interview! Currently CSC's Global GM for Cybersecurity Consulting, Tom has run security services for Deloitte in EMEA, was IBM's Chief eCommerce Strategist and a venture-backed founder/CEO. Tom has worked on security for the launch of a nuclear aircraft carrier and space shuttle as well as for the U.S. Government and plus businesses around the world. The author of Mapping Security, Tom is a frequent guest security expert on TV including CNBC and CNN.
On This Episode : Tom Patterson, Jeff & Cindy Ullman and Andy AbramsonA highly acclaimed security expert, published author, and keynote speaker who provides compelling insight into cyber security issues of the day, Tom Patterson provides clarity while delivering a high energy view into security that is of critical importance today. Patterson shares his insights and incredible knowledge on an area a lot of us either don't know about, or is just to confusing to understand. If you have any questions regarding internet security do not miss this compelling interview! Currently CSC's Global GM for Cybersecurity Consulting, Tom has run security services for Deloitte in EMEA, was IBM's Chief eCommerce Strategist and a venture-backed founder/CEO. Tom has worked on security for the launch of a nuclear aircraft carrier and space shuttle as well as for the U.S. Government and plus businesses around the world. The author of Mapping Security, Tom is a frequent guest security expert on TV including CNBC and CNN.Let's face it, we all struggle from time to time with our significant other. Now and then we can use a little help! Twoology.com offers free use of the world's largest library of relationship expert videos, DIY Romantipedia Guides, and a host of powerful relationship tools. The company was created by Cindy Ullman and Jeff Ullman, who helped more singles meet, date, and marry than anyone in the 20th Century, are offering their socially responsible Twoology Relationship Fitness System to help couples make their relationship easier, happier, and more intimate. Jeff previously founded Great Expectations, the nationally-franchised video dating service.Andy Abramson is the founder of Comunicano, Inc., a 20+ person asymmetrical communications consultancy, geared to providing clients with Senior Advising, Marketing Communications, Corporate Communications and Marketer-In-Residence services to start-ups, companies in transition and established brands with regard to influencer relations, marketing, advertising, public relations, social media, promotion, events and reputation management in the technology, consumer products and business to business markets. In the last 10 years 27 of his agency's clients have exited, with three IPOs. Some of the acquiring companies include Google, eBay, Yahoo, Nokia, Cisco, IBM, Citrix Online, Computer Associates, Symantec and Logitech.