POPULARITY
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Julie Chatman. Julie is a distinguished cybersecurity executive with nearly two decades of experience in cybersecurity strategy, risk management, and AI governance. She began her career in the U.S. Navy, serving on active duty as a Hospital Corpsman specializing in Medical Laboratory Science & Technology. Her transition into cybersecurity began at the FBI, where strong mentorship shaped her approach to leadership, problem solving, and talent development. She currently serves as the Deputy Chief Information Security Officer for Finance at the Virginia Information Technologies Agency (VITA), where she is focused on driving risk reduction across state agencies. The role is part of a strategic engagement through her company, ResilientTech Advisors. Julie leads CyberPath Coaching, where she draws on her experience as an active CISO to mentor cybersecurity professionals, accelerate their growth, and prepare them for executive roles. She works with individuals breaking into the field, mid-career professionals, aspiring CISOs, and cybersecurity entrepreneurs. [May 19, 2025] 00:00 - Intro 00:53 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:03 - Julie Chatman Intro 03:14 - A Hungry Brain 04:25 - We Are Mushroomed 05:54 - Being an Enabler 10:13 - Speak Their Language 13:33 - Assigning Responsibility 16:05 - A Tool, Not a Replacement 20:35 - Career Challenges 22:40 - Strategic Empathy 23:46 - Setting Boundaries 24:15 - Narrative Control 25:38 - Staying Positive 29:39 - The Target is the Same 32:09 - Book Recommendations - World War Z - Max Brooks 33:20 - Mentors - MB Kinder - Martha Williams 35:14 - Find Julie Chatman Online - Website: cyberpathcoaching.net - LinkedIn: linkedin.com/in/julie-chatman-mba-infosec 35:54 Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
When John McCoy walked away from a high-paying corporate job, he wasn't chasing freedom—he was answering a calling. In this episode, John shares how his commitment to helping others led him to launch MidSolv, an MSP rooted in community and built on trust. But it wasn't until he caught a ransomware attack in real time that his purpose fully crystallized: protecting clients from the threats they didn't see coming.From mandating a security upgrade for every customer—before they even asked—to shifting his entire client base to fully managed services, John's story is one of bold leadership, cybersecurity-first thinking, and values-driven growth.Whether you're an MSP owner rethinking your tech stack or an IT leader navigating risk and resilience, this episode offers a masterclass in leading with conviction—and securing what matters most.Learn more about Manage My Security.N-able also produces Beyond the Horizon. Hosted by industry veterans, this podcast delves deep into the findings of the annual MSP Horizons Report, providing actionable insights to transform your IT business. Listen & Subscribe Wherever You Get Your Podcasts.'Now that's it: Stories of MSP Success,' dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today. Every episode is packed with the valuable insights, practical strategies, and inspiring anecdotes that lead our guests to the transformative moment when they knew….. Now, that's it.This podcast provides educational information about issues that may be relevant to information technology service providers. Nothing in the podcast should be construed as any recommendation or endorsement by N-able, or as legal or any other advice. The views expressed by guests are their own and their appearance on the podcast does not imply an endorsement of them or any entity they represent. Views and opinions expressed by N-able employees are those of the employees and do not necessarily reflect the view of N-able or its officers and directors. The podcast may also contain forward-looking statements regarding future product plans, functionality, or development efforts that should not be interpreted as a commitment from N-able related to any deliverables or timeframe. All content is based on information available at the time of recording, and N-able has no obligation to update any forward-looking statements.
Send us a textJoin Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore:CyberSaint's Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics.Career Insights: Matthew shares his journey, from running startups to advising new ventures, and how he balances multiple roles (CPO, podcast host, advisor, and family man).Leadership & Communication: Why CISOs need to speak the language of business to earn a seat at the boardroom table.Practical Tips: Advice on avoiding burnout, building a mentorship network, and leveraging your personal brand in cybersecurity. Free Cyber Risk Analysis: Visit CyberSaint.io to benchmark your organization's cyber risk against industry peers. Connect with Matthew: Find him on LinkedIn Matthew Alderman or X @Maldermania Listen to Matthew's Podcast: Check out Business Security Weekly at securityweekly.com/BSW.Chapters00:00 Reconnecting and Reflecting on Podcasting Journey02:19 Balancing Multiple Roles and Responsibilities05:44 The Importance of Personal Well-being07:53 Career Goals and Retirement Aspirations10:31 Integrating Consulting and Podcasting11:55 The Value of Mentorship in Professional Growth15:02 Building Trust and Reputation in Networking16:39 Leveraging Podcasting for Career Opportunities18:20 Innovations in Cyber Risk Management23:07 Integrating Risk and Control Data25:30 The Importance of Risk Quantification28:33 Communicating Cyber Risk to the Board30:41 CISO's Role in Business Strategy33:03 Free Cyber Risk Analysis Offering36:20 Customizing Risk Models39:58 Real-Time Risk Monitoring42:24 Targeting Public Companies for Cyber Risk Solutions45:14 Closing Thoughts and Future DirectionsSubscribe for more cybersecurity insights, leadership tips, and industry trends! Drop your thoughts in the comments below—how do you approach cyber risk in your organization?Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textCyber Defense Meets Leadership Mastery!
In this episode of the "To the Point Cybersecurity" podcast, hosted by Jonathan Knepher and Rachael Lyon, we delve into the intricate world of cybersecurity with Dr. Bill Anderson, the Principal Product Manager at Mattermost. With a focus on AI, quantum cryptography, and secure communications, Bill brings a wealth of experience from his time in the defense and intelligence communities. Throughout the discussion, the team explores the unique challenges faced by defense, intelligence, security, and critical infrastructure organizations in defining cyber resilience. They compare this with the approaches taken by commercial organizations, providing valuable insights into the importance of leadership, training, and collaboration in building a robust cybersecurity strategy. As they navigate issues like information overload, skills gaps, and the need for adaptive incident response, listeners will gain a deeper understanding of the complex landscape of cybersecurity today. Stay tuned for part two of this engaging conversation next week. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e328
summaryIn this episode of No Password Required, host Jack Clabby and guest Trevor Hillegas discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.takeawaysTrevor emphasizes the importance of metaphors in understanding cybersecurity.The public often fears sophisticated threats while ignoring more common dangers.Leadership in cybersecurity should focus on empowering teams rather than micromanaging.A proactive approach in cybersecurity can prevent victimization before it occurs.Technical leaders should understand core concepts to effectively guide their teams.Misconceptions about cyber criminals often stem from Hollywood portrayals.The military experience can significantly shape leadership styles in tech.Daily life in cybersecurity involves constant learning and adaptation.Sophistication in cyber threats does not always correlate with success.Cybersecurity is about both fighting threats and fortifying defenses. Memorable interactions can lead to impactful collaborations in cybersecurity.Sharing knowledge can help mitigate cyber threats effectively.Personal preferences can reveal a lot about an individual's character.Walk-up songs can reflect one's personality and professional identity.Breakfast choices can be a blend of cultural influences and personal tastes.Building a team for an escape room requires diverse skills and personalities.Nerd culture can foster connections and shared interests among individuals.Prank calls can be a humorous way to engage with public figures.Culinary competitions highlight the absurdity of turning survival into entertainment.Networking in cybersecurity can lead to unexpected opportunities.titlesCybersecurity Connections: Memorable MomentsThe Lifestyle Polygraph: Fun and InsightsWalk-Up Songs: A Reflection of IdentityBreakfast Favorites: A Culinary JourneySound Bites"Tell them what needs to get done.""Empower your people to fail.""We can stop that identity theft.""I was in Europe giving a talk.""I sent him everything that we had.""I would get Jack Sparrow.""I love Star Wars.""I would call Gordon Ramsey."Chapters00:00 Introduction to Cybersecurity Insights02:54 Career Path and Unexpected Experiences05:55 Transitioning from Military to Cybersecurity09:07 Daily Life at Spy Cloud12:12 Leadership Philosophy and Management Style14:53 The Nature of Cyber Threats17:50 Technical Skills in Leadership20:52 Misconceptions About Cyber Criminals25:32 Memorable Cybersecurity Interactions28:12 Lifestyle Polygraph Introduction28:35 Walk-Up Songs and Personal Preferences32:07 Breakfast Favorites and Culinary Influences34:40 Building the Ultimate Escape Room Team37:36 Nerd Culture and Personal Interests39:02 Prank Calls and Culinary Competitions41:20 Closing Thoughts and Contact Information
In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton. The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud breach and its communication failures, the misuse of Signal by U.S. government officials, and global cybersecurity regulation efforts such as the UK's new critical infrastructure laws. They also cover notable incidents like the Kuala Lumpur International Airport ransomware attack and the NHS Scotland cyberattack, the continuous challenges of EDR bypasses, and the importance of fusing anti-fraud and cybersecurity efforts. The discussion emphasizes the need for effective communication and stringent security protocols amidst increasing cyber threats. 00:00 Introduction and Panelist Introductions 01:25 Oracle Cloud Breach: A Case Study in Incident Communication 10:13 Signal Group Chat Controversy 20:16 Leadership and Cybersecurity Legislation 23:30 Cybersecurity Certification Program Overview 24:27 Challenges in Cybersecurity Leadership 24:59 Importance of Data Centers and MSPs 26:53 UK Cybersecurity Bill and MSP Standards 28:09 Cyber Essentials and CMMC Standards 32:47 EDR Bypasses and Small Business Security 39:32 Ransomware Attacks on Critical Infrastructure 43:34 Law Enforcement and Cybercrime 47:24 Conclusion and Final Thoughts
Send us a textJoe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you're a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned lessons from getting his ‘bun toasted' by a CISO to mastering the efficiency mindset CEOs crave. Packed with stories—like Joe's two-minute security slam dunk and Peter's factory efficiency analogy—this episode is your cheat code to leadership success. Subscribe for more raw, unfiltered insights!Chapters00:00 Authenticity in Podcasting01:55 Launching an E-Learning Series05:01 Bridging the Gap: Technical to Leadership10:06 Communicating with Executives13:45 Efficiency in Leadership19:05 The Value of Time in Business22:57 Navigating Security Tools and Budget Constraints27:03 Embracing Leadership and Asking for HelpE-Learning Series Links: https://youtu.be/E8sZEMWHRHMhttps://www.youtube.com/watch?v=fYmCzpcg9gwSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
In this episode, we sit down with Dr. Christopher Mitchell, Chief Information Security Officer (CISO) for the City of Houston, to explore the evolving landscape of cybersecurity in a major metropolitan hub. Dr. Mitchell shares his journey into cybersecurity, the key strategies for building and managing a high-performing security team, and the metrics that define success in cybersecurity programs. We dive into the role of AI and machine learning in cyber defense, the risks posed by generative AI, and how threat intelligence shapes decision-making. Dr. Mitchell also provides insights into tracking global threat actors and effectively communicating cyber risks to executive leadership. Tune in for a deep dive into securing a smart city in an era of evolving digital threats.
“I had a team of me…and that was it!” Join us this week on The Tech Leaders Podcast, where Gareth Davies sits down with Darren Desmond, CISO at the AA, to discuss how AI will change the Cyber Security arms race, why it's a strange time for CISOs, and how he was the most un-military recruit his training Sergeant had ever seen… Time stamps:What makes effective leadership in tech? (2:32) Starting from scratch: "I had a team of me... and that was it!" (4:20) Lessons from the Army and Atomic Weapons Establishment (6:20) The Betfair culture shock: "Decisions made on the hoof" (15:20) The key cybersecurity threat: Why ransomware remains a top concern (16:50) How asset management strengthens cybersecurity (18:10) CISO advice: Why asset management is critical for security (22:17) The CyberSec arms race: How AI will change the game (24:58) Why security is a team effort, not a standalone activity (26:00) Ransomware evolution: "The risk of AI-driven attacks" (36:45) AI in cybersecurity: The future, risks, and opportunities (40:20) Career advice: "Pick a goal and work towards it" (45:06)https://www.bedigitaluk.com/
Guest ConnectLinkedIn: https://www.linkedin.com/in/riveracarlosj/ Stats on Stats ResourcesCode & Culture Magazine: https://www.statsonstats.io/flipbooks Merch: https://www.statsonstats.io/shop LinkTree: https://linktr.ee/statsonstatspodcast Stats on Stats Partners & AffiliatesPath AIWebsite: https://yourpath.ai Discount Code: Join our Discord community for access!Antisyphon TrainingWebsite: https://www.antisyphontraining.com MAD20 TrainingWebsite: https://mad20.io Discount Code: STATSONSTATS15Ellington Cyber AcademyWebsite: https://kenneth-ellington.mykajabi.com Discount Code: STATSONSTATSKevtech AcademyWebsite: https://www.kevtechitsupport.com Dream Chaser's Coffee Website: https://dreamchaserscoffee.com Discount code: STATSONSTATSPodcasts We LikeDEM Tech FolksWebsite: https://linktr.ee/developeverymind YouTube: https://www.youtube.com/@demtechfolks IntrusionsInDepthWebsite: https://www.intrusionsindepth.com YouTube: https://www.youtube.com/@IntrusionsInDepth Elastic DoD ArchitectsYouTube: https://www.youtube.com/@elasticdod -----------------------------------------------------Episode was shot and edited at BlueBox Studio Tampahttps://blueboxdigital.com/bluebox-studio/
Allen Ohanian, a pioneering CISO, shares insights on the evolving role of cybersecurity leaders, the integration of AI in digital defense, and the ever-growing challenges of protecting sensitive data. Discover how AI is both a weapon and a shield in today's cyber landscape.00:24- About Allen OhanianMr. Ohanian is the Chief Information Security Officer for the Los Angeles County Department of Children and Family ServicesHe has 20 years of experience in information technology, cybersecurity and defense strategies, risk management, forensics, privacy, compliance, cloud security, and software engineering in the private and public sectors. He served as the first Chief Information Security and Privacy Officer at LA County Counsel where he established an Information Security and Privacy program and ensured compliance with legal mandates.
In this episode of Reimagining Cyber, host Rob Aragao explores the role of the Professional Association of CISOs (PAC) with Demetrius Comes, a CISO executive advisor at EVOTEK and a leader within PAC. Comes, who has held cybersecurity leadership roles at companies like GoDaddy and Warner Brothers Games, discusses PAC's mission to support CISOs through professional development, peer collaboration, and industry education.The conversation covers PAC's initiatives, including local chapters, certification programs, and resources designed to help CISOs navigate leadership responsibilities, liability concerns, and emerging cybersecurity threats. Combs also provides insight into broader industry trends, such as the evolving role of CISOs, the importance of cyber hygiene, and the growing impact of AI in cybersecurity.This episode offers valuable information for cybersecurity professionals looking to understand the benefits of PAC and the challenges facing modern security leaders.Links relevant to this episode: Professional Association of CISOs - https://theciso.org/Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Guest: Todd Fitzgerald, Founder & Chief Strategy Officer, CISO SpotlightLinkedIn: https://www.linkedin.com/in/toddfitzgerald/Host: Dr. Rebecca WynnOn ITSPmagazine
Join Brian Zimmerman of Becker's Healthcare Podcast as he sits down with Vince Crisler, Chief Strategy Officer at Celerium and former White House CISO, to discuss the evolving landscape of cybersecurity in healthcare. Vince shares insights on fostering collaboration between business and clinical leaders, building a culture of awareness, and developing robust strategies to combat emerging threats and the rising threat of data breaches. Don't miss this deep dive into the priorities and advancements shaping healthcare cybersecurity in 2025 and beyond.This episode is sponsored by Celerium.
About the CISO Circuit SeriesSean Martin and Michael Piacente join forces roughly once per month (or so, depending on schedules) to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity for business and society. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guests: Heather Hinton, CISO-in-Residence, Professional Association of CISOsOn LinkedIn | https://www.linkedin.com/in/heather-hinton-9731911/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMichael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988LevelBlue | https://itspm.ag/levelblue266f6cThreatLocker | https://itspm.ag/threatlocker-r974___________________________Episode NotesIn this episode of the CISO Circuit Series, part of the Redefining Cybersecurity Podcast on ITSPmagazine, hosts Sean Martin and Michael Piacente welcomed Heather Hinton, seasoned cybersecurity leader, to discuss the evolving responsibilities and recognition of Chief Information Security Officers (CISOs). Their conversation explored the transformative work of the Professional Association of CISOs (PAC), an organization dedicated to establishing standards, accreditation, and support for cybersecurity leaders globally.This episode addressed three critical questions shaping the modern CISO role:How can CISOs build trust within their organizations?What is PAC doing to elevate cybersecurity as a recognized profession?How can CISOs prepare for increasing scrutiny and legal risks?Building Trust: A CISO's Key ResponsibilityHeather Hinton, whose career includes leadership roles like VP and CISO for IBM Cloud and PagerDuty, underscores that trust is foundational for a CISO's success. Beyond technical expertise, a CISO must demonstrate leadership, strategic thinking, and effective communication with boards, executives, and teams. Hinton highlights that cybersecurity should not be perceived as merely a technical function but as a critical enabler of business objectives.The PAC accreditation process reinforces this perspective by formalizing the skills needed to build trust. From fostering collaboration to aligning security strategies with organizational goals, PAC equips CISOs with tools to establish credibility and demonstrate value from day one.Elevating Cybersecurity as a Recognized ProfessionMichael Piacente, Managing Partner at Hitch Partners and co-host of the CISO Circuit Series, emphasizes PAC's role in professionalizing cybersecurity. By introducing a Code of Professional Conduct, structured accreditation programs, and robust career development resources, PAC is raising the bar for the profession. Hinton and Piacente explain that PAC's ultimate vision is to make membership and accreditation standard for CISO roles, akin to certifications we've come to expect and rely upon for doctors or lawyers.This vision reflects a growing recognition of cybersecurity as a discipline critical not only to organizations but to society as a whole. PAC's advocacy extends to shaping global policies, setting professional standards, and fostering an environment where CISOs are equipped to handle emerging challenges like hybrid warfare and AI-driven threats.Preparing for Legal Risks and Industry ChallengesThe conversation also delves into the increasing legal and regulatory scrutiny CISOs face. Piacente and Hinton stress the importance of having clear job descriptions, liability protections, and professional resources—areas where PAC is driving significant progress. By providing legal and mental health support, along with peer-driven mentorship, PAC empowers CISOs to navigate these challenges with confidence.Hinton notes that PAC is also a critical voice in addressing broader systemic risks, advocating for policies that protect CISOs while ensuring they are well-positioned to protect their organizations and society.Looking AheadWith goals to expand its membership to 1,000 and scale its accreditation programs by 2025, PAC is setting the foundation for a more unified and professionalized cybersecurity community. Hinton envisions PAC becoming a global authority, advising governments and organizations on cybersecurity standards and policies while fostering collaboration among professionals.For those aspiring to advance cybersecurity as a recognized profession, PAC offers a platform to shape the future of the field. Learn more about PAC and how to join at TheCISO.org.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
About the CISO Circuit SeriesSean Martin and Michael Piacente join forces roughly once per month (or so, depending on schedules) to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity for business and society. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guests: Heather Hinton, CISO-in-Residence, Professional Association of CISOsOn LinkedIn | https://www.linkedin.com/in/heather-hinton-9731911/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMichael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988LevelBlue | https://itspm.ag/levelblue266f6cThreatLocker | https://itspm.ag/threatlocker-r974___________________________Episode NotesIn this episode of the CISO Circuit Series, part of the Redefining Cybersecurity Podcast on ITSPmagazine, hosts Sean Martin and Michael Piacente welcomed Heather Hinton, seasoned cybersecurity leader, to discuss the evolving responsibilities and recognition of Chief Information Security Officers (CISOs). Their conversation explored the transformative work of the Professional Association of CISOs (PAC), an organization dedicated to establishing standards, accreditation, and support for cybersecurity leaders globally.This episode addressed three critical questions shaping the modern CISO role:How can CISOs build trust within their organizations?What is PAC doing to elevate cybersecurity as a recognized profession?How can CISOs prepare for increasing scrutiny and legal risks?Building Trust: A CISO's Key ResponsibilityHeather Hinton, whose career includes leadership roles like VP and CISO for IBM Cloud and PagerDuty, underscores that trust is foundational for a CISO's success. Beyond technical expertise, a CISO must demonstrate leadership, strategic thinking, and effective communication with boards, executives, and teams. Hinton highlights that cybersecurity should not be perceived as merely a technical function but as a critical enabler of business objectives.The PAC accreditation process reinforces this perspective by formalizing the skills needed to build trust. From fostering collaboration to aligning security strategies with organizational goals, PAC equips CISOs with tools to establish credibility and demonstrate value from day one.Elevating Cybersecurity as a Recognized ProfessionMichael Piacente, Managing Partner at Hitch Partners and co-host of the CISO Circuit Series, emphasizes PAC's role in professionalizing cybersecurity. By introducing a Code of Professional Conduct, structured accreditation programs, and robust career development resources, PAC is raising the bar for the profession. Hinton and Piacente explain that PAC's ultimate vision is to make membership and accreditation standard for CISO roles, akin to certifications we've come to expect and rely upon for doctors or lawyers.This vision reflects a growing recognition of cybersecurity as a discipline critical not only to organizations but to society as a whole. PAC's advocacy extends to shaping global policies, setting professional standards, and fostering an environment where CISOs are equipped to handle emerging challenges like hybrid warfare and AI-driven threats.Preparing for Legal Risks and Industry ChallengesThe conversation also delves into the increasing legal and regulatory scrutiny CISOs face. Piacente and Hinton stress the importance of having clear job descriptions, liability protections, and professional resources—areas where PAC is driving significant progress. By providing legal and mental health support, along with peer-driven mentorship, PAC empowers CISOs to navigate these challenges with confidence.Hinton notes that PAC is also a critical voice in addressing broader systemic risks, advocating for policies that protect CISOs while ensuring they are well-positioned to protect their organizations and society.Looking AheadWith goals to expand its membership to 1,000 and scale its accreditation programs by 2025, PAC is setting the foundation for a more unified and professionalized cybersecurity community. Hinton envisions PAC becoming a global authority, advising governments and organizations on cybersecurity standards and policies while fostering collaboration among professionals.For those aspiring to advance cybersecurity as a recognized profession, PAC offers a platform to shape the future of the field. Learn more about PAC and how to join at TheCISO.org.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Breaking Into Cybersecurity Leadership with Phani Dasari In this episode of Breaking into Cybersecurity, join host Christophe as he interviews Phani Dasari, the Global CISO at Hinduja Global Solutions (HGS). Phani shares his remarkable journey into cybersecurity, from his early days in the United States during the 2008 recession, to his pivotal roles at EMC, RSA, ADP, TikTok, and HGS. He delves into valuable insights on navigating and succeeding in the cybersecurity industry, emphasizing the importance of personal branding, continuous learning, and people management skills. This episode offers actionable advice for aspiring and current cybersecurity professionals on developing a broad skill set, pursuing career advancements, and effectively leading teams in a dynamic and challenging field. Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way. The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders. Check out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUI Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/ Hacker Inc.: Mindset For Your Career https://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/ _________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/book Christophe Foulon focuses on helping to secure people and processes, using a solid understanding of the technology involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing the use of technology while balancing the implications for people, processes, and information security through a consultative approach. https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://www.cpf-coaching.com - Website: https://www.cyberhubpodcast.com/breakingintocybersecurity - Podcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuri - YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity - Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/ - Twitter: https://twitter.com/BreakintoCyber - Twitch: https://www.twitch.tv/breakingintocybersecurity
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Guest: Joe Sulllivan, CEO at Ukraine Friends [@UkraineFriends_]On Linkedin | https://www.linkedin.com/in/joesu11ivan/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference's stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.Sullivan's career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.Joe Sullivan's Career JourneyReflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.The Role of Regulation in CybersecuritySullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.Connecting with Security Professionals GloballyThrough his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today's interconnected world.Humanitarian Efforts Beyond CybersecurityBeyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children's education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.ConclusionAs the Australian Cyber Conference 2024 approaches, Joe Sullivan's insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.____________________________This Episode's SponsorsTHREATLOCKER: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/asia24UkraineFriends: https://ukrainefriends.org/Learn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More
Guest: Joe Sulllivan, CEO at Ukraine Friends [@UkraineFriends_]On Linkedin | https://www.linkedin.com/in/joesu11ivan/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference's stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.Sullivan's career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.Joe Sullivan's Career JourneyReflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.The Role of Regulation in CybersecuritySullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.Connecting with Security Professionals GloballyThrough his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today's interconnected world.Humanitarian Efforts Beyond CybersecurityBeyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children's education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.ConclusionAs the Australian Cyber Conference 2024 approaches, Joe Sullivan's insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesUkraineFriends: https://itspm.ag/ukrainwwmj____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More
In this eye-opening episode of Legacy Leaders Show, we are joined by cybersecurity visionary Chuck Brooks, a renowned author, Georgetown University professor, and two-time presidential appointee, to unpack the future of digital security. Discussing his groundbreaking book, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security, Chuck dives into why every organization needs dedicated roles like Chief Information Security Officer (CISO) and Chief Strategy Integration Officer (CSIO) to meet today's cybersecurity challenges. We explore how the digital landscape has evolved over the past five years, reshaping corporate strategy and cyber risk management. Tune in to learn why cybersecurity leadership is crucial to protecting your organization's legacy in an increasingly connected world.
Tammy Klotz, Chief Information Security Officer at Trendzeo and author of "Leading with Empathy and Grace," joins us for a compelling conversation about redefining leadership in the cybersecurity world. Tammy opens up about her formative years, sharing a childhood story that laid the foundation for her empathetic leadership style. As a self-proclaimed "unicorn" in the field, she challenges the outdated perception of the security office as the "office of no," advocating instead for a collaborative approach that welcomes innovation while maintaining robust security.In a year of personal transformation, Tammy made the courageous decision to step away from her long-term role at Air Products and Chemicals, focusing instead on family and writing her book. Her journey underscores the power of authenticity and humility in leadership, offering indispensable insights for anyone guiding a team or community. Tammy's story is a testament to the importance of aligning personal values with professional goals, inspiring listeners to embrace change and pursue their own leadership aspirations.We explore Tammy's innovative TIPSI principles—transparency, togetherness, inclusion, presence, participation, and consistency—as she shares how these core values have helped her build high-performing teams. From using Disney quotes and pixie dust to motivate her teams through organizational changes to balancing work with personal responsibilities as a single mother, Tammy embodies resilience and connection. Her emphasis on self-care and setting priorities serves as a powerful reminder that personal well-being is crucial for sustained success in leadership roles. Join us for an insightful episode filled with practical advice and heartfelt stories.Connect with Tammy on LinkedInBuy Tammy's Book, Leading With Empathy & GraceThanks for listening in to the Uncommon Leader Podcast. Please take just a minute to share this podcast with that someone you know that you thought of when you heard this episode. One of the most valuable things you can do is to rate the podcast and leave a review. You can do that on Apple podcasts, or rate the podcast on Spotify or any other platform you listen. Did you know that many of the things that I discuss on the Uncommon Leader Podcast are subjects that I coach other leaders and organizations ? If you would be interested in having me discuss 1:1 or group coaching with you, or know someone who is looking to move from Underperforming to Uncommon in their business or life, I would love to chat with you. Click this link to set up a FREE CALL to discuss how coaching might benefit you and your team) Until next time, Go and Grow Champions!!Connect with me
In this insightful episode of Healthy Mind, Healthy Life, Avik Chakraborty sits down with Steve Durbin, Chief Executive of the Information Security Forum (ISF), to explore the intersection of leadership and mental health within the high-pressure world of cybersecurity. As cyber threats evolve at an unprecedented pace, leaders in this field face mounting stress and anxiety. Steve shares his extensive experience guiding Fortune 500 companies and global leaders, discussing the unique challenges cybersecurity leaders face today, including managing stress, avoiding burnout, and maintaining resilience. Join us as we uncover strategies for sustaining mental well-being in a rapidly changing digital landscape. About the Guest: Steve Durbin is the Chief Executive of the Information Security Forum, a leading authority on cybersecurity strategy and emerging threats. With a career spanning advising Fortune 500 companies and global leaders, Steve is a powerful voice on issues that extend beyond technology. His deep understanding of the cybersecurity landscape, coupled with his insights into the human challenges of leadership, make him an invaluable resource for those navigating this complex field. Key Takeaways: The Challenge of Time in Cybersecurity: Steve highlights the increasing speed at which cyber threats evolve and how this compresses the time leaders have to respond, creating significant stress and anxiety. Impact of Remote Leadership: The transition to remote work during the pandemic introduced new challenges for cybersecurity leaders, who had to adapt to managing teams without the benefit of in-person interactions, leading to increased stress. Recognizing Burnout: Steve discusses the subtle signs of burnout in cybersecurity professionals, emphasizing that those experiencing burnout often don't recognize it themselves. Leaders must be vigilant in identifying these signs among their teams. Building Resilience: The conversation touches on the importance of resilience in cybersecurity leadership, with Steve sharing strategies on how leaders can foster a work environment that supports mental well-being and high performance. Leadership Beyond Technology: The discussion expands beyond technical skills, focusing on the human aspects of leadership in cybersecurity, including the importance of empathy, communication, and understanding individual needs. This episode is a must-listen for anyone involved in cybersecurity leadership or those interested in how leaders can maintain their mental health while navigating the complexities of today's digital threats.
In this episode of Lead Gen HQ, we sit down with Alec Hall, President of Alliance Cyber and a seasoned expert in enterprise network security. With over 30 years of experience, Alec has successfully delivered technology and security solutions that drive business growth across organizations of all sizes. Join us as we talk about his journey, discussing his approach to managing major projects, fostering collaboration, and implementing security best practices. Whether you're in cybersecurity or just curious about leadership in tech, this episode offers valuable insights from a true industry leader. Don't miss it! Learn about Alliance Cyber: https://alliancecyber.com/
This week Ivy Slater, host of Her Success Story, chats with her guest, Melissa Aarskaug. The two talk about the gaming industry and its constant evolution, tips in building a leadership legacy, and the importance of starting every day with intention and focus. She tells us, “I run my day, my day does not run me.” In this episode, we discuss: How she became involved in the gaming industry, and how she has made her mark How she manages to build relationships and keep up with people Melissa's tips for providing continued growth and betterment for the job, company, and industry you're in Why the gaming industry is constantly evolving, and how she keeps up with it all How she navigates the family piece of life, and what she and her husband do to remain in consistent collaboration Why she starts every day with intention and focus through strategy and planning How to flip your mindset from the negative, and look deeper into the why of what your managers are trying to teach you What drove Melissa to start a podcast on top of all the many other things she does Advice in building a leadership legacy Melissa Aarskaug is an accomplished global executive and business leader within the technology and cybersecurity sectors. With over 15 years of experience, she has demonstrated expertise in shaping strategic direction, leading teams, and forging partnerships with Fortune 500 companies. She currently is serving as the Global Vice President of Gaming Laboratories International (a 1700+ employee company). Melissa's work as a women leader and expert in cybersecurity makes her a rare and sought-after speaker. She has spoken at over 60+ events hosted by famous Gaming, Cybersecurity & Leadership organizations. Melissa believes in expanding her knowledge by learning through other's stories so she started her own podcast, “ExecutiveConnect”. With a focus on leadership, strategy, and innovation, each podcast episode delivers actionable advice and inspiring stories from industry experts and thought leaders. LinkedIn: https://www.linkedin.com/in/melissa-aarskaug/
In this episode of "Reimagining Cyber," Rob Aragao hosts a conversation with Tammy Klotz, a best-selling author and current CISO at Trinseo. Tammy discusses her career trajectory, which includes leadership roles at Covanta Energy and Versum Materials, and shares insights from her recent book, Leading with Empathy and Grace: Secrets to Developing High-Performing Teams. Additionally, she addresses the challenges women face in cybersecurity, offering advice on building confidence, taking risks, and overcoming barriers in a male-dominated field. The episode provides valuable takeaways for aspiring leaders and women looking to enter or advance in the cybersecurity industry.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Sharing a Blueprint for Cybersecurity LeadershipUnlock leadership strategies to elevate your cybersecurity career and get perspective on quality pentesting providers versus commodity ones with Tunde Oni-Daniel's expert insights.
In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America's Companies, Judge Rejects SEC's Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360
In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America's Companies, Judge Rejects SEC's Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360
In today's episode of Tech Talks Daily, I sit down with Nick Walker and Giles Inkson from NetSPI to explore how proactive approaches are reshaping cybersecurity. NetSPI recently rebranded and launched a unified security platform designed to help organizations take a more proactive stance against cyber threats. This platform combines Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Breach and Attack Simulation (BAS) to provide a comprehensive view of assets, risks, and security improvements. We discuss the latest trends in cybersecurity, including the rapid adoption of generative AI and the complex risks it introduces. As cyber attacks grow more sophisticated, there's a significant shift towards holistic risk management beyond just vulnerability patching. This involves understanding critical assets and the pathways that could be exploited. The role of the Chief Information Security Officer (CISO) is evolving too, with an increasing focus on board-level communication and strategic risk management. CISOs are now essential in translating cyber risks to leadership and ensuring cost-effective security programs. We also discuss the EU's Digital Operational Resilience Act (DORA), set to take effect in January 2024. This regulation mandates practices like threat-led testing and intelligence sharing for financial institutions, aiming to enhance resilience through rigorous scenario-based tests and improved information sharing. How do you see the role of proactive measures in cybersecurity evolving? We'd love to hear your thoughts. Connect with us online to continue the conversation and learn more about the topics we covered today.
This week: the aftermath of the CrowdStrike outage, the larger forces at play, the future of cybersecurity, and where the world is headed long-term. Our guest is Erik Moore, a veteran of the cybersecurity field and program director for the online Master of Science Program in Cybersecurity Leadership at Seattle University's Albers School of Business and Economics. Moore says cybersecurity companies are facing faster and more complex threats due to factors including AI, and geopolitical and financial forces, requiring quicker responses. Current testing and deployment processes need to be overhauled handle these new challenges effectively. But long-term, he's optimistic about where the field and the world are headed. Related Links GeekWire News Coverage: ‘A little frightening': CrowdStrike outage puts Microsoft's role in global IT back in the spotlight CrowdStrike Blog Post: Technical Details on Today's Outage Microsoft: Helping our customers through the CrowdStrike outage Seattle University: Master of Science Program in Cybersecurity Leadership CNBC: CrowdStrike update that caused global outage likely skipped checks, experts say KING-5: CrowdStrike Outage Hits Microsoft Channel News Asia: What do we know about CrowdStrike? See omnystudio.com/listener for privacy information.
Guest: Jack Leidecker, Chief Information Security Officer, GongLinkedIn: https://www.linkedin.com/in/leideckerHost: Dr. Rebecca WynnOn ITSPmagazine
Darren is the Co-Founder and CEO of Carbide. This cyber security firm provides businesses of all sizes with the tools they need to adopt a robust cybersecurity and privacy posture, enabling them to protect their data from cybercriminals, transform security from a potential liability to a competitive advantage, and accelerate their growth. A TechStars alum, Carbide has raised 7M+, and its clientele is quickly growing in highly regulated markets, including e-commerce, FinTech, healthcare, and insurtech. Darren has 15+ years of experience as the CEO and Chief Information Security Officer (CISO) of several businesses that handle sensitive data. This experience has given him a solid grasp of evaluating and managing risk according to organizational goals while fostering growth. Before starting Carbide, he Co-Founded Marcato, an innovative event management platform that managed 300+ music and cultural events, including Burning Man and Coachella, in 27 countries worldwide. Darren ran the business as CEO and CISO for ten years until it was acquired by Patron Technology in 2018. At that point, he decided to go into the cybersecurity industry. He is a Certified Information Privacy Manager (CIPM) and Certified Information Systems Security Professional (CISSP). On the podcast, Darren would love to talk about: How to engage your team in cybersecurity to build a secure by-default company in a way that enables you to breeze through audits and assessments while, at the same time, being something your team enjoys. How to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust. How to make cybersecurity and data privacy a part of your service or product offering. This topic would interest startups and service companies that provide tools and services outside of IT and security and service companies like MSPs that can benefit from adding security products and services to their offerings. How fast-growing organizations achieve enterprise-class security and privacy. To get a sense of Darren, here's an episode he did on the Privacy Please Podcast, where he shared advice for founders on securing their startups. Quick recap Summary Darren's Cybersecurity Journey and Insights Darren and Michael discussed Darren's background and experience in cybersecurity and data privacy. Darren shared his unconventional entry into the field, having previously worked in various leadership roles before focusing on security. He emphasized the importance of security no longer being a "bolt-on" but an essential component of leadership and business operations. He also mentioned his current role as a board member for the International Information System Security Certification Consortium and his upcoming plans for the quarter. Michael showed interest in understanding more about Darren's insights. Turbine's AI Integration and Business Model Shift darrengallop, the CEO and co-founder of Turbine cyber security and data privacy company, discussed the company's development and future plans in the meeting. He elaborated on how they have been using AI and machine learning (ML) as a component of their product, which was launched in December after about a year of development. Darren also shared that they have shifted their business model to encompass AI to enhance the human experience and better support their customers. He further discussed his passion for cyber security and data privacy, especially in healthcare and manufacturing industries. The conversation then moved to the fast-paced world we live in, with Michael jokingly relating his recent stress test experience to the ever-accelerating speed of technology. Cybersecurity Leadership and Prioritization Michael emphasized the critical importance of cybersecurity and the need for it to be a top priority within organizations, arguing that it's as crucial as accounting and customer service departments. He also touched on the significance of leadership in cybersecurity, stating that it's a skill that can be learned and that he, as an accountant, had successfully transitioned into the tech space due to his curiosity and leadership ability. Darren agreed with Michael's points, asserting that effective leadership is essential for the proper use and management of cybersecurity and data privacy within an organization. Leadership Engagement in IT Security Challenges darrengallop discussed the challenges IT security teams face in organizations where leadership is not engaged or committed to ensuring security. He noted that many organizations prioritize sales and fiscal responsibilities over security, leading to a reactive approach dubbed "security theater." Darren emphasized the need for leadership to prioritize security and recognize the evolving threat landscape, including the increasing profitability of cybercrime. Michael concurred, pointing out the lower overheads and ease of recruitment in cybercrime, compared to traditional criminal activities like drug cartels. Attracting Younger Generations to Computer Activities Michael and Darren discussed the attraction of computer-based activities for younger generations, likening it to a game or a puzzle that they find engaging and challenging. Michael suggested that this behavior could lead to criminal activities like hacking, especially for those in difficult economic situations. However, he emphasized the possibility of separating the criminal aspect from these activities and using their skills for legitimate purposes, setting them up for future success. Darren agreed with Michael's points. Organized Crime and Human Trafficking Discussion Michael and Darren discussed the prevalence of certain criminal activities within their borders and worldwide. Darren elaborated on the operations of organized criminal groups, mentioning cases in poor countries where people are exploited and demonized as targets. He also introduced the concept of human trafficking for hacking camps, where individuals are forced to conduct social engineering scams. Darren estimated that over 200,000 people are in captivity conducting these types of operations, making it difficult for law enforcement to have a meaningful impact on stopping and catching the perpetrators. AI Fraud and Preventive Measures Michael discussed the potential dangers of AI technology being used for fraudulent activities, such as scam phone calls using cloned voices. He suggested the use of code words and education as preventive measures. darrengallop agreed, emphasizing the importance of educating individuals at all levels to identify and prevent such criminal activities. He also highlighted the potential futility of relying solely on law enforcement to combat this issue, given the vast scope and complexity of the problem. Identity Theft and Financial Vulnerability Discussion darrengallop and Michael discussed the potential risks of identity theft and financial loss in today's world. Darren emphasized the importance of understanding the various factors contributing to vulnerability, such as owning property or having good credit, and noted how these factors could be used against individuals. Michael shared his experience managing his mother's estate and highlighted the need to freeze credit applications for the deceased. Both acknowledged the growing use of AI and other tools to automate finding weaknesses and vulnerabilities and how criminals could exploit this. They also discussed the possibility of identity theft through obituaries and the physical theft of mail. Data Theft, Hacking, and Customer Expectations Michael and Darren discussed the creative and often criminal activities surrounding data theft and hacking. They highlighted the need for organizations to monitor their systems and data closely and emphasized the importance of protecting sensitive information. Darren noted customers' increasing awareness and expectation regarding privacy and security, with many technology providers now implementing these concepts by default. However, he also pointed out the ongoing risks posed by social engineering and criminal activities, which have been refined over time. Both agreed on the need for these issues to be part of an organization's DNA, not an add-on, to prevent future breaches. Cybersecurity, Global Impact, and Resources darrengallop and Michael discussed the changing global landscape and its impact on businesses, emphasizing the importance of cybersecurity and data protection. Darren introduced his website, carbidesecure.com, as a resource for companies seeking cybersecurity implementation and maintenance assistance.
In this episode, Rob Aragao and Stan Wisseman look at the intriguing transition from Chief Information Security Officer (CISO) to Chief Technology Officer (CTO). Drawing from a recent sidebar conversation among CISOs and an insightful article from Dark Reading, they examine why this trend is becoming more prominent. With examples from organizations like Bank of America, Fifth Third Bank, and Equifax, Rob and Stan discuss the key attributes that make this career move logical and beneficial.The conversation highlights the importance of collaboration, strategic thinking, and the deep understanding of both technology and business impact that CISOs bring to the table. They delve into how the roles of CISO and CTO overlap, particularly in driving innovation, increasing revenue, and embedding security by design into business solutions.Rob and Stan also consider the broader influence a CTO has on an organization's technology strategy, the operational experience both roles share, and the potential motivations behind CISOs seeking to transition—whether to escape the increasing personal liability associated with security breaches or to pursue new professional growth opportunities.Additionally, the episode touches on the challenges CISOs might face in this transition, such as the need for expertise in product development and the software lifecycle. As discussed in this episode: https://www.darkreading.com/cybersecurity-careers/ciso-as-a-cto-when-and-why-it-makes-senseFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
This episode of CISO Tradecraft features a comprehensive discussion between host G Mark Hardy and guest Rafeeq Rehman, centered around the evolving role of CISOs, the impact of Generative AI, and strategies for effective cybersecurity leadership. Rafeeq shares insights on the CISO Mind Map, a tool for understanding the breadth of responsibilities in cybersecurity leadership, and discusses various focal areas for CISOs in 2024-2025, including the cautious adoption of Gen AI, tool consolidation, cyber resilience, branding for security teams, and maximizing the business value of security controls. The episode also addresses the importance of understanding and adapting to technological advancements, advocating for cybersecurity as a business-enabling function, and the significance of lifelong learning in information security. Cybersecurity Learning Saturday: https://www.linkedin.com/company/cybersecurity-learning-saturday/ 2024 CISO Mindmap: https://rafeeqrehman.com/2024/03/31/ciso-mindmap-2024-what-do-infosec-professionals-really-do/ Transcripts: https://docs.google.com/document/d/1axXQJoAdJI26ySKVfROI9rflvSe9Yz50 Chapters 00:00 Introduction 00:57 Rafeeq Rehman: Beyond the CISO MindMap 04:17 The Evolution of the CISO MindMap 08:30 AI and the Future of Cybersecurity Leadership 11:47 Embracing Change: The Role of AI in Cybersecurity 14:16 Generative AI: Hype, Reality, and Strategic Advice for CISOs 22:32 Navigating the Future Job Market with AI 22:53 Framing AI for Specific Roles 24:12 Harnessing Creativity with Generative AI 25:14 Consolidating Security Tools for Efficiency 28:31 Evaluating Security Tools: A Deep Dive 32:21 Cyber Resilience: Beyond Incident Response 35:51 Building a Business-Focused Security Strategy 39:39 Maximizing Business Value Through Security 43:15 Looking Ahead: Focus Areas for the Future 43:53 Concluding Thoughts and Future Predictions
Guest: Neal Bridges, CISO, Query [@QueryAi_net]On LinkedIn | https://www.linkedin.com/in/nealbridges/On Twitter | https://twitter.com/itjunkieOn YouTube | https://www.youtube.com/@CyberInsecurityHost: Josh MasonOn ITSPmagazine
Guests: Jessica Robinson, Executive Officer of PurePoint International [@PurIntl]On LinkedIn | https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/At RSAC | https://www.rsaconference.com/experts/jessica-robinson____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe RSA Conference 2024 is just around the corner, and our hosts Sean Martin and Marco Ciappelli are gearing up for an insightful and engaging on-location coverage of the event. In this second Chat On The Road to RSA Conference 2024 conversation with cybersecurity expert Jessica Robinson, we got a sneak peek into what to expect from this year's talk she will give during the event.Now You're in Role: The Fearless CISOAs a follow up to the talk last year at RSAC, attendees will learn the top three skills for success for any first time CISOs to advance and grow their cybersecurity program. This talk will be a discussion on what is most important as we start to really think about what is required for success in the CISO role as it directly relates to the success of the cybersecurity program.The stage is set for an enriching dialogue on the nuances of the CISO role, cybersecurity programs, and the evolving landscape of cyber threats. Jessica Robinson, with her wealth of experience and fearless approach to cybersecurity leadership, promises to dive deep into the art of making possibilities a reality in the realm of cybersecurity.Embracing Fear to Unlock PotentialOne of the key themes that emerged from the conversation was the idea of embracing fear to unlock untapped potential. Jessica emphasized the importance of facing challenges head-on, advocating for cybersecurity programs, and pushing boundaries to drive meaningful change within organizations. By transforming fear into a catalyst for growth and innovation, CISOs can navigate the complex cybersecurity landscape with confidence and resilience.The Art of Possibility in CybersecurityThe theme of this year's RSA Conference, "The Art of Possible," resonates deeply with Jessica's approach to cybersecurity leadership. By infusing creativity, strategic thinking, and a proactive mindset into their roles, CISOs can redefine what is achievable in the realm of cybersecurity. The session with Jessica promises to offer valuable insights on how to leverage the art of possibility to advance cybersecurity programs and drive success in an ever-evolving threat landscape.Joining the ConversationAs Sean Martin and Marco Ciappelli gear up for the RSA Conference 2024, they invite cybersecurity enthusiasts, industry experts, and professionals to join them on this enriching journey. The on-location coverage promises to capture the pulse of the conference, featuring engaging conversations, expert insights, and thought-provoking discussions on the future of cybersecurity.With Jessica Robinson's fearless approach to cybersecurity leadership and the insightful conversations lined up for the RSA Conference 2024, this year's event is set to be a landmark gathering for cybersecurity professionals. Stay tuned for more updates, interviews, and coverage as Sean Martin and Marco Ciappelli bring you the latest insights from the forefront of cybersecurity innovation.RSA Conference 2024 promises to be a platform where possibilities converge with reality, fear transforms into opportunity, and cybersecurity leaders pave the way for a secure digital future. Join us on this exciting journey as we explore the art of possibility in cybersecurity with Sean Martin, Marco Ciappelli, and a host of industry experts at RSA Conference 2024.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Breaking into Cybersecurity Leadership Roselle SafranRoselle Safran on LinkedIn https://www.linkedin.com/in/rosellesafran/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.comWebsite: https://www.cyberhubpodcast.com/breakingintocybersecurityPodcast: https://feeds.captivate.fm/breaking-into-cybersecurity/YouTube: https://www.youtube.com/c/BreakingIntoCybersecurityLinkedin:
Breaking into Cybersecurity Leadership with Paul RuppertPaul Ruppert on LinkedIn https://www.linkedin.com/in/paulruppertintl/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring
Breaking into Cybersecurity Leadership w Warner MooreWarner Moore on Linkedin https://www.linkedin.com/in/warnermoore/ Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring
Breaking into Cybersecurity Leadership - David Adeoye AbodunrinDavid Adeoye Abodunrin on LinkedIn - https://www.linkedin.com/in/abodunrinadeoyedavid/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityWant to create live streams like this? Check out StreamYard: https://streamyard.com/pal/d/6338015336071168Mentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring
Breaking into Cybersecurity w Kyle McIntyreKyle McIntyre on Linkedin https://www.linkedin.com/in/thekylemcintyre/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityI host a podcast called Breaking Into Cybersecurity (https://www.youtube.com/c/BreakingIntoCybersecurity) which is usually recorded live, however, I am recording shorter offline spots for Security Leadership. Would you be interested in doing an episode?Its a quick episode recorded offline with a series of different questions on your views on leadership competencies and advice you would want to share with others in cybersecurity an overview of the questions are located in the booking https://calendly.com/christophefoulon/cybersecurity-leadership-callLeadership SeriesFocuses on the skills and competencies associated with cybersecurity leadership, as well as tips/tricks/advice from cybersecurity leaders. Breaking into Cybersecurity #LeadershipWe are doing a slight pivot to the show; we will start with the questions below, then pivot to a conversational style.1. Why did you become a cybersecurity leader vs. staying an individual contributor?2. What are the critical skills for cybersecurity leadership?3. What is your comfort level (1-5) with delegation, collaboration, and communication?4. How important would you consider “influence” as a skill, and why?5. How important would you consider ”networking” as a skill, and why?6. What advice would you give to future cybersecurity...
In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show's 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues' 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners. As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era. Clips featured in this episode from the following guests:Eran Shimony, Principal Security Researcher, CyberArk LabsAndy Thompson, Offensive Security Research Evangelist, CyberArk LabsEric O'Neill, Former FBI Counterintelligence Operative & Current National Security Strategist Shay Nahari, VP of Red Team Services, CyberArkDiana Kelley, CISO, Protect AI Len Noe, Technical Evangelist, White Hat Hacker & Biohacker, CyberArkTheresa Payton, Former White House CIO, Founder & CEO of Fortalice SolutionsLarry Lidz, VP & CISO, Cisco CX CloudMatt Cohen, CEO, CyberArkCharles Chu, GM of Cloud Security, CyberArkBrad Jones, CISO & VP of Information Security, Seagate TechnologyDusty Anderson, Managing Director, Global Digital Identity, ProtivitiPhilip Wylie, Offensive Security Professional, Evangelist & Ethical Hacker
Today's guest is Anthony Pacilio, VP Neurodiverse Solutions at CAI. I met Pacilio at this year's ISACA Digital Trust World event in Boston, and I was immediately fascinated with his insights on hiring and attracting neurodiverse professionals in security, IT, engineering and related industries, all of which suffer a skills gap and all of which are in need of new insights and working methods. Pacilio and I have a substantive conversation about changing the structure of the “6-hour marathon” interview process, the difference between an employee who stays in one job role vs. an employee who stays in but re-imagines that one job role, and why this new way of hiring and recruitment can lead to nothing less than an entire transformation of a company's work culture. 0:00 - Neurodiversity and cybersecurity leadership 4:18 - Pacilio's early years with tech7:40 - Shifting roles in cybersecurity 12:55 - VP of neurodiverse solutions 16:10 - CAI's dedication to neurodiversity 19:27 - Neurodiverse solutions in cybersecurity and IT23:50 - Rethinking the cybersecurity role interview26:32 - Adopting new interview strategies 33:03 - Examples and success stories 35:30 - Where neurodiverse workers succeed in cybersecurity 42:04 - Tips for neurodiverse learners in cybersecurity 45:58 - Advice for new cybersecurity professionals 52:30 - Learn more about CAI53:05 - Outro– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Breaking into Cybersecurity Leadership - Jeffrey WheatmanJeffrey Wheatman on LinkedIn - https://www.linkedin.com/in/jnwheatman/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for Sponsoring
Breaking into Cybersecurity Leadership with Larry Whiteside JrLarry Whiteside Jr on LinkedIn https://www.linkedin.com/in/larrywhitesidejr/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.Check out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:Thank you to CPF Coaching for SponsoringCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for Sponsoring
Breaking into Cybersecurity Leadership - Ryan CloutierRyan Cloutier on Linkedin https://www.linkedin.com/in/ryan-cloutier/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurity
It's time to review the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. We also update you on the Security Weekly 25 index. The index is rebounding, but there's a long way to go to get back to the top. In the leadership and communications segment, SolarWinds Is A Game Changer - You Cannot Sugarcoat Cybersecurity, Rethinking CISO Accountability: A Call for Balance in Cybersecurity Leadership, How to improve communication in the workplace: Strategies for enhanced productivity, and more. Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/bsw-327