Podcasts about cybersecurity leadership

  • 78PODCASTS
  • 179EPISODES
  • 27mAVG DURATION
  • 1WEEKLY EPISODE
  • Jun 16, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cybersecurity leadership

Latest podcast episodes about cybersecurity leadership

Cyber Talks
In Conversation With Tia Hopkins, Chief Cyber Resilience Officer & Field CTO

Cyber Talks

Play Episode Listen Later Jun 16, 2025 58:30


In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives.She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Leadership.--Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Life at Next
E85: A Journey Through Cybersecurity & Leadership at NEXT

Life at Next

Play Episode Listen Later Jun 10, 2025 17:48


Shereen, an Infrastructure Team Leader in Cloud Services at NEXT, shares her inspiring career journey from an IT apprentice at 16 to a team leader.She discusses the critical role of cybersecurity in today's world, emphasising how her team remediates vulnerabilities and defends against constant hacking attempts to ensure business continuity. Shereen also highlights the rewarding aspect of nurturing her team's growth and potential, fostering a supportive and fun work environment. Finally, she offers valuable insights on being a woman in tech, noting the positive shift towards greater female representation in the industry.Don't forget to subscribe to our channel and hit the notification bell to receive updates on everything Life at NEXT!Pursue your ambition and join the NEXT team → https://tinyurl.com/3esp3ux8Follow us!Instagram: www.instagram.com/lifeatnextTikTok: www.tiktok.com/@lifeatnextFacebook: www.facebook.com/lifeatnextLinkedIn: www.linkedin.com/company/lifeatnext#LifeAtNEXT #LetsTakeItOn

Stay On Course: Ingredients for Success
Smart CIOs Do This: The Unspoken Rules of Cybersecurity Leadership with Andrew N. Griffiths

Stay On Course: Ingredients for Success

Play Episode Listen Later Jun 5, 2025 26:56


Smart CIOs Do This: The Unspoken Rules of Cybersecurity Leadership with Guest: Andrew Griffiths, CEO & Founder of Annexus TechnologiesHost: Julie RigaAbout This EpisodeIn this episode, Julie sits down with Andrew Griffiths, a legacy-minded CEO and founder of Annexus Technologies, a multinational IT firm known for building infrastructure so strong it rarely needs fixing. Andrew is a strategist, philosopher of security, and storyteller with a deep belief in designing systems that protect people, not just profits.Together, they dive deep into the three essential ingredients for CIO success and explore the unspoken rules of cybersecurity leadership that smart CIOs follow to protect their organizations.Guest BackgroundAndrew Griffiths is the CEO and founder of Annexus Technologies, a cybersecurity firm registered in Jamaica since 2014, now expanding into Canada. Andrew's unique perspective on IT infrastructure was shaped by early exposure to satellites, electronics, and various technologies, leading him to see IT as ubiquitous and transformative. His philosophy centers on optimizing existing systems and connecting people through technology.Fun Fact: Andrew's favorite food is ackee and corned pork - a unique twist on Jamaica's national dish that substitutes corned pork for the traditional saltfish.Key Topics DiscussedThe Three Ingredients for CIO Success:1 Visibility & AssessmentUnderstanding what's happening both inside and outside your networkThe importance of secure design for internal and external domainsImplementing layers of trust with zero-trust principles2 Proactive Analysis & PlanningMoving from prevention to proactivityUnderstanding your cybersecurity posture rating (0-100)Identifying compromised credentials on the dark webCreating mitigation plans for when breaches occur3 Strategic ImplementationBalancing cost-effectiveness with security requirementsPlanning for short-term, medium-term, and long-term security needsAligning business objectives with IT infrastructureThe Annexus Approach:Public Domain Assessments: Understanding external security postureMulti-standard Compliance: Meeting GDPR, PIPEDA, PCI, and other international standardsProactive Monitoring: Real-time detection of network scanning attemptsVirtual Network Infrastructure: Creating controlled environments for threat analysisKey Insights for CIOsThe Trust-Building Challenge:Cybersecurity sales cycles can take 6 months to a year due to trust requirementsBuilding relationships requires patience and consistent educationSometimes you need to wait for organizations to validate the need themselvesThe Titanic Analogy:Andrew compares cybersecurity professionals to engineers warning about icebergs - often dismissed until disaster strikes, highlighting the importance of persistent, consistent communication about security risks.Multi-Vendor Security Strategy:Avoid vendor lock-in for critical security infrastructureUse different firewall platforms in series to increase security complexityDesign solutions that make it harder for attackers to predict your security stackFuture-Forward ThinkingNext-Generation Platforms:Annexus is focusing on comprehensive ecosystems that protect:Data within organizationsData transfer between organizationsCloud redundancy strategies across multiple providers (Azure, AWS)The Future of IT:Andrew predicts the future lies in "redundancy at cloud scale" - ensuring business continuity even when major cloud providers experience outages.Connect with Andrew GriffithsWebsite: www.annexustech.caSocial Media: Available on YouTube, Twitter, Instagram, FacebookCompany: Annexus TechnologiesConnect with Julie RigaWebsite: www.julieriga.comSocial Media: www.linkedin.com/in/julierigaCoaching: Learn more about leadership coaching and transformationThis episode is perfect for sharing with CIOs and IT leaders in your network who need to hear these insights about modern cybersecurity leadership.

Cyber Security Today
Phishing Scams, DNS Hijacking, and Cybersecurity Leadership Shakeup

Cyber Security Today

Play Episode Listen Later May 28, 2025 11:30 Transcription Available


  In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities of the hacking group Hazy Hawk, which exploits misconfigured DNS records to hijack trusted domains and propagate malware. Organizations are warned about the importance of regular DNS audits to prevent such attacks. The episode also covers the alarming wave of departures at the Cybersecurity and Infrastructure Security Agency (CISA), raising concerns over the agency's effectiveness amid increasing cyber threats. In another segment, Love discusses a sophisticated fraud operation out of Hanoi, where perpetrators manipulated X's Creator Revenue Sharing Program to siphon funds through fraudulent engagement metrics. The need for built-in fraud prevention mechanisms in digital reward systems is stressed. The episode concludes with a call for listener feedback and support. 00:00 Introduction and Overview 00:27 Phishing Scams: Authentic-Looking Emails 02:58 DNS Misconfigurations and Hazy Hawk 05:36 CISA Leadership Exodus 08:16 X's Creator Revenue Sharing Fraud 10:56 Conclusion and Contact Information

The Practical 365 Podcast
M365 Numbers, Viva Engage Evolution, and Cybersecurity Leadership with Adam Banks: Practical 365 Podcast S04E39

The Practical 365 Podcast

Play Episode Listen Later May 20, 2025 62:16


Steve and Paul dissect Microsoft's latest financial report, explore Viva Engage's future, and discuss the role of AI in project management. Adam Banks shares insights on cybersecurity, accountability, and the mindset shifts needed for IT leadership.Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebook, and Linkedin to stay up to date on all things Microsoft!

The Social-Engineer Podcast
Ep. 305 - Security Awareness Series - Using Empathy to Not Become a Mushroom with Julie Chatman

The Social-Engineer Podcast

Play Episode Listen Later May 19, 2025 36:37


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Julie Chatman. Julie is a distinguished cybersecurity executive with nearly two decades of experience in cybersecurity strategy, risk management, and AI governance.   She began her career in the U.S. Navy, serving on active duty as a Hospital Corpsman specializing in Medical Laboratory Science & Technology. Her transition into cybersecurity began at the FBI, where strong mentorship shaped her approach to leadership, problem solving, and talent development.   She currently serves as the Deputy Chief Information Security Officer for Finance at the Virginia Information Technologies Agency (VITA), where she is focused on driving risk reduction across state agencies. The role is part of a strategic engagement through her company, ResilientTech Advisors.   Julie leads CyberPath Coaching, where she draws on her experience as an active CISO to mentor cybersecurity professionals, accelerate their growth, and prepare them for executive roles. She works with individuals breaking into the field, mid-career professionals, aspiring CISOs, and cybersecurity entrepreneurs. [May 19, 2025]   00:00 - Intro 00:53 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:03 - Julie Chatman Intro 03:14 - A Hungry Brain 04:25 - We Are Mushroomed 05:54 - Being an Enabler 10:13 - Speak Their Language 13:33 - Assigning Responsibility 16:05 - A Tool, Not a Replacement 20:35 - Career Challenges 22:40 - Strategic Empathy 23:46 - Setting Boundaries 24:15 - Narrative Control 25:38 - Staying Positive 29:39 - The Target is the Same 32:09 - Book Recommendations -          World War Z  - Max Brooks 33:20 - Mentors -          MB Kinder -          Martha Williams 35:14 - Find Julie Chatman Online -          Website: cyberpathcoaching.net -          LinkedIn: linkedin.com/in/julie-chatman-mba-infosec 35:54     Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Now That's IT: Stories of MSP Success
A Mission to Protect: John McCoy's Path to MSP Ownership

Now That's IT: Stories of MSP Success

Play Episode Listen Later Apr 24, 2025 27:56 Transcription Available


When John McCoy walked away from a high-paying corporate job, he wasn't chasing freedom—he was answering a calling. In this episode, John shares how his commitment to helping others led him to launch MidSolv, an MSP rooted in community and built on trust. But it wasn't until he caught a ransomware attack in real time that his purpose fully crystallized: protecting clients from the threats they didn't see coming.From mandating a security upgrade for every customer—before they even asked—to shifting his entire client base to fully managed services, John's story is one of bold leadership, cybersecurity-first thinking, and values-driven growth.Whether you're an MSP owner rethinking your tech stack or an IT leader navigating risk and resilience, this episode offers a masterclass in leading with conviction—and securing what matters most.Learn more about Manage My Security.N-able also produces Beyond the Horizon. Hosted by industry veterans, this podcast delves deep into the findings of the annual MSP Horizons Report, providing actionable insights to transform your IT business. Listen & Subscribe Wherever You Get Your Podcasts.'Now that's it: Stories of MSP Success,' dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today. Every episode is packed with the valuable insights, practical strategies, and inspiring anecdotes that lead our guests to the transformative moment when they knew….. Now, that's it.This podcast provides educational information about issues that may be relevant to information technology service providers. Nothing in the podcast should be construed as any recommendation or endorsement by N-able, or as legal or any other advice. The views expressed by guests are their own and their appearance on the podcast does not imply an endorsement of them or any entity they represent. Views and opinions expressed by N-able employees are those of the employees and do not necessarily reflect the view of N-able or its officers and directors. The podcast may also contain forward-looking statements regarding future product plans, functionality, or development efforts that should not be interpreted as a commitment from N-able related to any deliverables or timeframe. All content is based on information available at the time of recording, and N-able has no obligation to update any forward-looking statements.

Security Unfiltered
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint

Security Unfiltered

Play Episode Listen Later Apr 22, 2025 44:16 Transcription Available


Send us a textJoin Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore:CyberSaint's Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics.Career Insights: Matthew shares his journey, from running startups to advising new ventures, and how he balances multiple roles (CPO, podcast host, advisor, and family man).Leadership & Communication: Why CISOs need to speak the language of business to earn a seat at the boardroom table.Practical Tips: Advice on avoiding burnout, building a mentorship network, and leveraging your personal brand in cybersecurity. Free Cyber Risk Analysis: Visit CyberSaint.io to benchmark your organization's cyber risk against industry peers. Connect with Matthew: Find him on LinkedIn Matthew Alderman or X @Maldermania Listen to Matthew's Podcast: Check out Business Security Weekly at securityweekly.com/BSW.Chapters00:00 Reconnecting and Reflecting on Podcasting Journey02:19 Balancing Multiple Roles and Responsibilities05:44 The Importance of Personal Well-being07:53 Career Goals and Retirement Aspirations10:31 Integrating Consulting and Podcasting11:55 The Value of Mentorship in Professional Growth15:02 Building Trust and Reputation in Networking16:39 Leveraging Podcasting for Career Opportunities18:20 Innovations in Cyber Risk Management23:07 Integrating Risk and Control Data25:30 The Importance of Risk Quantification28:33 Communicating Cyber Risk to the Board30:41 CISO's Role in Business Strategy33:03 Free Cyber Risk Analysis Offering36:20 Customizing Risk Models39:58 Real-Time Risk Monitoring42:24 Targeting Public Companies for Cyber Risk Solutions45:14 Closing Thoughts and Future DirectionsSubscribe for more cybersecurity insights, leadership tips, and industry trends! Drop your thoughts in the comments below—how do you approach cyber risk in your organization?Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast

To The Point - Cybersecurity
Bridging the Skills Gap: Effective Cybersecurity Leadership and Collaboration with Bill Anderson

To The Point - Cybersecurity

Play Episode Listen Later Apr 15, 2025 23:09


In this episode of the "To the Point Cybersecurity" podcast, hosted by Jonathan Knepher and Rachael Lyon, we delve into the intricate world of cybersecurity with Dr. Bill Anderson, the Principal Product Manager at Mattermost. With a focus on AI, quantum cryptography, and secure communications, Bill brings a wealth of experience from his time in the defense and intelligence communities. Throughout the discussion, the team explores the unique challenges faced by defense, intelligence, security, and critical infrastructure organizations in defining cyber resilience. They compare this with the approaches taken by commercial organizations, providing valuable insights into the importance of leadership, training, and collaboration in building a robust cybersecurity strategy. As they navigate issues like information overload, skills gaps, and the need for adaptive incident response, listeners will gain a deeper understanding of the complex landscape of cybersecurity today. Stay tuned for part two of this engaging conversation next week. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e328

No Password Required
No Password Required Podcast Episode 58 — Trevor Hilligoss

No Password Required

Play Episode Listen Later Apr 14, 2025 42:32


summaryIn this episode of No Password Required, host Jack Clabby and guest Trevor Hillegas discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.takeawaysTrevor emphasizes the importance of metaphors in understanding cybersecurity.The public often fears sophisticated threats while ignoring more common dangers.Leadership in cybersecurity should focus on empowering teams rather than micromanaging.A proactive approach in cybersecurity can prevent victimization before it occurs.Technical leaders should understand core concepts to effectively guide their teams.Misconceptions about cyber criminals often stem from Hollywood portrayals.The military experience can significantly shape leadership styles in tech.Daily life in cybersecurity involves constant learning and adaptation.Sophistication in cyber threats does not always correlate with success.Cybersecurity is about both fighting threats and fortifying defenses. Memorable interactions can lead to impactful collaborations in cybersecurity.Sharing knowledge can help mitigate cyber threats effectively.Personal preferences can reveal a lot about an individual's character.Walk-up songs can reflect one's personality and professional identity.Breakfast choices can be a blend of cultural influences and personal tastes.Building a team for an escape room requires diverse skills and personalities.Nerd culture can foster connections and shared interests among individuals.Prank calls can be a humorous way to engage with public figures.Culinary competitions highlight the absurdity of turning survival into entertainment.Networking in cybersecurity can lead to unexpected opportunities.titlesCybersecurity Connections: Memorable MomentsThe Lifestyle Polygraph: Fun and InsightsWalk-Up Songs: A Reflection of IdentityBreakfast Favorites: A Culinary JourneySound Bites"Tell them what needs to get done.""Empower your people to fail.""We can stop that identity theft.""I was in Europe giving a talk.""I sent him everything that we had.""I would get Jack Sparrow.""I love Star Wars.""I would call Gordon Ramsey."Chapters00:00 Introduction to Cybersecurity Insights02:54 Career Path and Unexpected Experiences05:55 Transitioning from Military to Cybersecurity09:07 Daily Life at Spy Cloud12:12 Leadership Philosophy and Management Style14:53 The Nature of Cyber Threats17:50 Technical Skills in Leadership20:52 Misconceptions About Cyber Criminals25:32 Memorable Cybersecurity Interactions28:12 Lifestyle Polygraph Introduction28:35 Walk-Up Songs and Personal Preferences32:07 Breakfast Favorites and Culinary Influences34:40 Building the Ultimate Escape Room Team37:36 Nerd Culture and Personal Interests39:02 Prank Calls and Culinary Competitions41:20 Closing Thoughts and Contact Information

Cyber Security Today
Cybersecurity Month-End Review: Oracle Breach, Signal Group Chat Incident, and Global Cybersecurity Regulations

Cyber Security Today

Play Episode Listen Later Apr 5, 2025 48:19 Transcription Available


In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton. The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud breach and its communication failures, the misuse of Signal by U.S. government officials, and global cybersecurity regulation efforts such as the UK's new critical infrastructure laws. They also cover notable incidents like the Kuala Lumpur International Airport ransomware attack and the NHS Scotland cyberattack, the continuous challenges of EDR bypasses, and the importance of fusing anti-fraud and cybersecurity efforts. The discussion emphasizes the need for effective communication and stringent security protocols amidst increasing cyber threats. 00:00 Introduction and Panelist Introductions 01:25 Oracle Cloud Breach: A Case Study in Incident Communication 10:13 Signal Group Chat Controversy 20:16 Leadership and Cybersecurity Legislation 23:30 Cybersecurity Certification Program Overview 24:27 Challenges in Cybersecurity Leadership 24:59 Importance of Data Centers and MSPs 26:53 UK Cybersecurity Bill and MSP Standards 28:09 Cyber Essentials and CMMC Standards 32:47 EDR Bypasses and Small Business Security 39:32 Ransomware Attacks on Critical Infrastructure 43:34 Law Enforcement and Cybercrime 47:24 Conclusion and Final Thoughts

Security Unfiltered
From Tech Geek to C-Suite: Secrets to Winning Over Executives

Security Unfiltered

Play Episode Listen Later Mar 27, 2025 35:30 Transcription Available


Send us a textJoe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you're a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned lessons from getting his ‘bun toasted' by a CISO to mastering the efficiency mindset CEOs crave. Packed with stories—like Joe's two-minute security slam dunk and Peter's factory efficiency analogy—this episode is your cheat code to leadership success. Subscribe for more raw, unfiltered insights!Chapters00:00 Authenticity in Podcasting01:55 Launching an E-Learning Series05:01 Bridging the Gap: Technical to Leadership10:06 Communicating with Executives13:45 Efficiency in Leadership19:05 The Value of Time in Business22:57 Navigating Security Tools and Budget Constraints27:03 Embracing Leadership and Asking for HelpE-Learning Series Links: https://youtu.be/E8sZEMWHRHMhttps://www.youtube.com/watch?v=fYmCzpcg9gwSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast

Business, Brains & the Bottom Line
Ep. 120: Securing a Smart City: Cybersecurity Leadership with Dr. Christopher Mitchell

Business, Brains & the Bottom Line

Play Episode Listen Later Mar 26, 2025 44:36


In this episode, we sit down with Dr. Christopher Mitchell, Chief Information Security Officer (CISO) for the City of Houston, to explore the evolving landscape of cybersecurity in a major metropolitan hub. Dr. Mitchell shares his journey into cybersecurity, the key strategies for building and managing a high-performing security team, and the metrics that define success in cybersecurity programs. We dive into the role of AI and machine learning in cyber defense, the risks posed by generative AI, and how threat intelligence shapes decision-making. Dr. Mitchell also provides insights into tracking global threat actors and effectively communicating cyber risks to executive leadership. Tune in for a deep dive into securing a smart city in an era of evolving digital threats.

Tech Hive: The Tech Leaders Podcast
#112, CISO at the AA, Darren Desmond: Covert Ops to Cyber Security

Tech Hive: The Tech Leaders Podcast

Play Episode Listen Later Mar 26, 2025 48:48


“I had a team of me…and that was it!” Join us this week on The Tech Leaders Podcast, where Gareth Davies sits down with Darren Desmond, CISO at the AA, to discuss how AI will change the Cyber Security arms race, why it's a strange time for CISOs, and how he was the most un-military recruit his training Sergeant had ever seen… Time stamps:What makes effective leadership in tech? (2:32) Starting from scratch: "I had a team of me... and that was it!" (4:20) Lessons from the Army and Atomic Weapons Establishment (6:20) The Betfair culture shock: "Decisions made on the hoof" (15:20) The key cybersecurity threat: Why ransomware remains a top concern (16:50) How asset management strengthens cybersecurity (18:10) CISO advice: Why asset management is critical for security (22:17) The CyberSec arms race: How AI will change the game (24:58) Why security is a team effort, not a standalone activity (26:00) Ransomware evolution: "The risk of AI-driven attacks" (36:45) AI in cybersecurity: The future, risks, and opportunities (40:20) Career advice: "Pick a goal and work towards it" (45:06)https://www.bedigitaluk.com/

Stats On Stats Podcast
Transitioning from Military to Cybersecurity Leadership with Carlos Rivera

Stats On Stats Podcast

Play Episode Listen Later Mar 24, 2025 55:55


Guest ConnectLinkedIn: https://www.linkedin.com/in/riveracarlosj/ Stats on Stats ResourcesCode & Culture Magazine: https://www.statsonstats.io/flipbooks Merch: https://www.statsonstats.io/shop LinkTree: https://linktr.ee/statsonstatspodcast Stats on Stats Partners & AffiliatesPath AIWebsite: https://yourpath.ai Discount Code: Join our Discord community for access!Antisyphon TrainingWebsite: https://www.antisyphontraining.com MAD20 TrainingWebsite: https://mad20.io Discount Code: STATSONSTATS15Ellington Cyber AcademyWebsite: https://kenneth-ellington.mykajabi.com Discount Code: STATSONSTATSKevtech AcademyWebsite: https://www.kevtechitsupport.com Dream Chaser's Coffee Website: https://dreamchaserscoffee.com Discount code: STATSONSTATSPodcasts We LikeDEM Tech FolksWebsite: https://linktr.ee/developeverymind YouTube: https://www.youtube.com/@demtechfolks IntrusionsInDepthWebsite: https://www.intrusionsindepth.com YouTube: https://www.youtube.com/@IntrusionsInDepth Elastic DoD ArchitectsYouTube: https://www.youtube.com/@elasticdod -----------------------------------------------------Episode was shot and edited at BlueBox Studio Tampahttps://blueboxdigital.com/bluebox-studio/

The Brand Called You
AI-Powered Cybersecurity Leadership | Allen Ohanian, Chief Information Security Officer, LA County Department

The Brand Called You

Play Episode Listen Later Mar 8, 2025 35:41


Allen Ohanian, a pioneering CISO, shares insights on the evolving role of cybersecurity leaders, the integration of AI in digital defense, and the ever-growing challenges of protecting sensitive data. Discover how AI is both a weapon and a shield in today's cyber landscape.00:24- About Allen OhanianMr. Ohanian is the Chief Information Security Officer for the Los Angeles County Department of Children and Family ServicesHe has 20 years of experience in information technology, cybersecurity and defense strategies, risk management, forensics, privacy, compliance, cloud security, and software engineering in the private and public sectors. He served as the first Chief Information Security and Privacy Officer at LA County Counsel where he established an Information Security and Privacy program and ensured compliance with legal mandates.

Reimagining Cyber
Professional Association of CISOs: Redefining Cybersecurity Leadership - Ep 136

Reimagining Cyber

Play Episode Listen Later Feb 12, 2025 26:19 Transcription Available


In this episode of Reimagining Cyber, host Rob Aragao explores the role of the Professional Association of CISOs (PAC) with Demetrius Comes, a CISO executive advisor at EVOTEK and a leader within PAC. Comes, who has held cybersecurity leadership roles at companies like GoDaddy and Warner Brothers Games, discusses PAC's mission to support CISOs through professional development, peer collaboration, and industry education.The conversation covers PAC's initiatives, including local chapters, certification programs, and resources designed to help CISOs navigate leadership responsibilities, liability concerns, and emerging cybersecurity threats. Combs also provides insight into broader industry trends, such as the evolving role of CISOs, the importance of cyber hygiene, and the growing impact of AI in cybersecurity.This episode offers valuable information for cybersecurity professionals looking to understand the benefits of PAC and the challenges facing modern security leaders.Links relevant to this episode: Professional Association of CISOs -  https://theciso.org/Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity Leadership: Balancing Risk, Growth, and Strategy | A Conversation with Todd Fitzgerald | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 4, 2025 16:27


Becker’s Healthcare Podcast
Securing Healthcare: Cybersecurity, Leadership, and Strategy

Becker’s Healthcare Podcast

Play Episode Listen Later Jan 21, 2025 15:27


Join Brian Zimmerman of Becker's Healthcare Podcast as he sits down with Vince Crisler, Chief Strategy Officer at Celerium and former White House CISO, to discuss the evolving landscape of cybersecurity in healthcare. Vince shares insights on fostering collaboration between business and clinical leaders, building a culture of awareness, and developing robust strategies to combat emerging threats and the rising threat of data breaches. Don't miss this deep dive into the priorities and advancements shaping healthcare cybersecurity in 2025 and beyond.This episode is sponsored by Celerium.

ITSPmagazine | Technology. Cybersecurity. Society
Establishing a New Standard for Cybersecurity Professionals Worldwide: Addressing Trust, Standards, and Risk for the CISO Role | CISO Circuit Series with Heather Hinton | Michael Piacente and Sean Martin | Redefining CyberSecurity Podcast

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 17, 2025 41:44


About the CISO Circuit SeriesSean Martin and Michael Piacente join forces roughly once per month (or so, depending on schedules) to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity for business and society. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guests: Heather Hinton, CISO-in-Residence, Professional Association of CISOsOn LinkedIn | https://www.linkedin.com/in/heather-hinton-9731911/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMichael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988LevelBlue | https://itspm.ag/levelblue266f6cThreatLocker | https://itspm.ag/threatlocker-r974___________________________Episode NotesIn this episode of the CISO Circuit Series, part of the Redefining Cybersecurity Podcast on ITSPmagazine, hosts Sean Martin and Michael Piacente welcomed Heather Hinton, seasoned cybersecurity leader, to discuss the evolving responsibilities and recognition of Chief Information Security Officers (CISOs). Their conversation explored the transformative work of the Professional Association of CISOs (PAC), an organization dedicated to establishing standards, accreditation, and support for cybersecurity leaders globally.This episode addressed three critical questions shaping the modern CISO role:How can CISOs build trust within their organizations?What is PAC doing to elevate cybersecurity as a recognized profession?How can CISOs prepare for increasing scrutiny and legal risks?Building Trust: A CISO's Key ResponsibilityHeather Hinton, whose career includes leadership roles like VP and CISO for IBM Cloud and PagerDuty, underscores that trust is foundational for a CISO's success. Beyond technical expertise, a CISO must demonstrate leadership, strategic thinking, and effective communication with boards, executives, and teams. Hinton highlights that cybersecurity should not be perceived as merely a technical function but as a critical enabler of business objectives.The PAC accreditation process reinforces this perspective by formalizing the skills needed to build trust. From fostering collaboration to aligning security strategies with organizational goals, PAC equips CISOs with tools to establish credibility and demonstrate value from day one.Elevating Cybersecurity as a Recognized ProfessionMichael Piacente, Managing Partner at Hitch Partners and co-host of the CISO Circuit Series, emphasizes PAC's role in professionalizing cybersecurity. By introducing a Code of Professional Conduct, structured accreditation programs, and robust career development resources, PAC is raising the bar for the profession. Hinton and Piacente explain that PAC's ultimate vision is to make membership and accreditation standard for CISO roles, akin to certifications we've come to expect and rely upon for doctors or lawyers.This vision reflects a growing recognition of cybersecurity as a discipline critical not only to organizations but to society as a whole. PAC's advocacy extends to shaping global policies, setting professional standards, and fostering an environment where CISOs are equipped to handle emerging challenges like hybrid warfare and AI-driven threats.Preparing for Legal Risks and Industry ChallengesThe conversation also delves into the increasing legal and regulatory scrutiny CISOs face. Piacente and Hinton stress the importance of having clear job descriptions, liability protections, and professional resources—areas where PAC is driving significant progress. By providing legal and mental health support, along with peer-driven mentorship, PAC empowers CISOs to navigate these challenges with confidence.Hinton notes that PAC is also a critical voice in addressing broader systemic risks, advocating for policies that protect CISOs while ensuring they are well-positioned to protect their organizations and society.Looking AheadWith goals to expand its membership to 1,000 and scale its accreditation programs by 2025, PAC is setting the foundation for a more unified and professionalized cybersecurity community. Hinton envisions PAC becoming a global authority, advising governments and organizations on cybersecurity standards and policies while fostering collaboration among professionals.For those aspiring to advance cybersecurity as a recognized profession, PAC offers a platform to shape the future of the field. Learn more about PAC and how to join at TheCISO.org.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Establishing a New Standard for Cybersecurity Professionals Worldwide: Addressing Trust, Standards, and Risk for the CISO Role | CISO Circuit Series with Heather Hinton | Michael Piacente and Sean Martin | Redefining CyberSecurity Podcast

Redefining CyberSecurity

Play Episode Listen Later Jan 17, 2025 41:44


About the CISO Circuit SeriesSean Martin and Michael Piacente join forces roughly once per month (or so, depending on schedules) to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity for business and society. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guests: Heather Hinton, CISO-in-Residence, Professional Association of CISOsOn LinkedIn | https://www.linkedin.com/in/heather-hinton-9731911/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMichael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988LevelBlue | https://itspm.ag/levelblue266f6cThreatLocker | https://itspm.ag/threatlocker-r974___________________________Episode NotesIn this episode of the CISO Circuit Series, part of the Redefining Cybersecurity Podcast on ITSPmagazine, hosts Sean Martin and Michael Piacente welcomed Heather Hinton, seasoned cybersecurity leader, to discuss the evolving responsibilities and recognition of Chief Information Security Officers (CISOs). Their conversation explored the transformative work of the Professional Association of CISOs (PAC), an organization dedicated to establishing standards, accreditation, and support for cybersecurity leaders globally.This episode addressed three critical questions shaping the modern CISO role:How can CISOs build trust within their organizations?What is PAC doing to elevate cybersecurity as a recognized profession?How can CISOs prepare for increasing scrutiny and legal risks?Building Trust: A CISO's Key ResponsibilityHeather Hinton, whose career includes leadership roles like VP and CISO for IBM Cloud and PagerDuty, underscores that trust is foundational for a CISO's success. Beyond technical expertise, a CISO must demonstrate leadership, strategic thinking, and effective communication with boards, executives, and teams. Hinton highlights that cybersecurity should not be perceived as merely a technical function but as a critical enabler of business objectives.The PAC accreditation process reinforces this perspective by formalizing the skills needed to build trust. From fostering collaboration to aligning security strategies with organizational goals, PAC equips CISOs with tools to establish credibility and demonstrate value from day one.Elevating Cybersecurity as a Recognized ProfessionMichael Piacente, Managing Partner at Hitch Partners and co-host of the CISO Circuit Series, emphasizes PAC's role in professionalizing cybersecurity. By introducing a Code of Professional Conduct, structured accreditation programs, and robust career development resources, PAC is raising the bar for the profession. Hinton and Piacente explain that PAC's ultimate vision is to make membership and accreditation standard for CISO roles, akin to certifications we've come to expect and rely upon for doctors or lawyers.This vision reflects a growing recognition of cybersecurity as a discipline critical not only to organizations but to society as a whole. PAC's advocacy extends to shaping global policies, setting professional standards, and fostering an environment where CISOs are equipped to handle emerging challenges like hybrid warfare and AI-driven threats.Preparing for Legal Risks and Industry ChallengesThe conversation also delves into the increasing legal and regulatory scrutiny CISOs face. Piacente and Hinton stress the importance of having clear job descriptions, liability protections, and professional resources—areas where PAC is driving significant progress. By providing legal and mental health support, along with peer-driven mentorship, PAC empowers CISOs to navigate these challenges with confidence.Hinton notes that PAC is also a critical voice in addressing broader systemic risks, advocating for policies that protect CISOs while ensuring they are well-positioned to protect their organizations and society.Looking AheadWith goals to expand its membership to 1,000 and scale its accreditation programs by 2025, PAC is setting the foundation for a more unified and professionalized cybersecurity community. Hinton envisions PAC becoming a global authority, advising governments and organizations on cybersecurity standards and policies while fostering collaboration among professionals.For those aspiring to advance cybersecurity as a recognized profession, PAC offers a platform to shape the future of the field. Learn more about PAC and how to join at TheCISO.org.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Breaking Into Cybersecurity
Breaking Into Cybersecurity Leadership with Phani Dasari

Breaking Into Cybersecurity

Play Episode Listen Later Nov 25, 2024 30:52


Breaking Into Cybersecurity Leadership with Phani Dasari In this episode of Breaking into Cybersecurity, join host Christophe as he interviews Phani Dasari, the Global CISO at Hinduja Global Solutions (HGS). Phani shares his remarkable journey into cybersecurity, from his early days in the United States during the 2008 recession, to his pivotal roles at EMC, RSA, ADP, TikTok, and HGS. He delves into valuable insights on navigating and succeeding in the cybersecurity industry, emphasizing the importance of personal branding, continuous learning, and people management skills. This episode offers actionable advice for aspiring and current cybersecurity professionals on developing a broad skill set, pursuing career advancements, and effectively leading teams in a dynamic and challenging field. Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way. The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders. Check out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUI Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/ Hacker Inc.: Mindset For Your Career https://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/ _________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/book Christophe Foulon focuses on helping to secure people and processes, using a solid understanding of the technology involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing the use of technology while balancing the implications for people, processes, and information security through a consultative approach. https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://www.cpf-coaching.com - Website: https://www.cyberhubpodcast.com/breakingintocybersecurity - Podcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuri - YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity - Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/ - Twitter: https://twitter.com/BreakintoCyber - Twitch: https://www.twitch.tv/breakingintocybersecurity

ITSPmagazine | Technology. Cybersecurity. Society
Pre-Event Coverage | Different Hats, Shared Goals: Insights and Anticipations for Conversations and Stories from Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 24, 2024 9:32


Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

Redefining CyberSecurity
Pre-Event Coverage | Different Hats, Shared Goals: Insights and Anticipations for Conversations and Stories from Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Nov 24, 2024 9:32


Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Pre Event Coverage | Unveiling Cybersecurity's Future: Joe Sullivan's Keynote Journey to Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 20, 2024 28:27


Guest: Joe Sulllivan, CEO at Ukraine Friends [@UkraineFriends_]On Linkedin | https://www.linkedin.com/in/joesu11ivan/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference's stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.Sullivan's career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.Joe Sullivan's Career JourneyReflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.The Role of Regulation in CybersecuritySullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.Connecting with Security Professionals GloballyThrough his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today's interconnected world.Humanitarian Efforts Beyond CybersecurityBeyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children's education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.ConclusionAs the Australian Cyber Conference 2024 approaches, Joe Sullivan's insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.____________________________This Episode's SponsorsTHREATLOCKER: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/asia24UkraineFriends: https://ukrainefriends.org/Learn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More

Redefining CyberSecurity
Pre Event Coverage | Unveiling Cybersecurity's Future: Joe Sullivan's Keynote Journey to Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Nov 20, 2024 28:27


Guest: Joe Sulllivan, CEO at Ukraine Friends [@UkraineFriends_]On Linkedin | https://www.linkedin.com/in/joesu11ivan/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference's stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.Sullivan's career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.Joe Sullivan's Career JourneyReflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.The Role of Regulation in CybersecuritySullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.Connecting with Security Professionals GloballyThrough his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today's interconnected world.Humanitarian Efforts Beyond CybersecurityBeyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children's education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.ConclusionAs the Australian Cyber Conference 2024 approaches, Joe Sullivan's insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesUkraineFriends: https://itspm.ag/ukrainwwmj____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More

The Legacy Leaders Show With Izabela Lundberg
Cybersecurity Leadership Insights: How To Build Digital Resilience

The Legacy Leaders Show With Izabela Lundberg

Play Episode Listen Later Nov 4, 2024 39:58


In this eye-opening episode of Legacy Leaders Show, we are joined by cybersecurity visionary Chuck Brooks, a renowned author, Georgetown University professor, and two-time presidential appointee, to unpack the future of digital security. Discussing his groundbreaking book, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security, Chuck dives into why every organization needs dedicated roles like Chief Information Security Officer (CISO) and Chief Strategy Integration Officer (CSIO) to meet today's cybersecurity challenges. We explore how the digital landscape has evolved over the past five years, reshaping corporate strategy and cyber risk management. Tune in to learn why cybersecurity leadership is crucial to protecting your organization's legacy in an increasingly connected world.

The Uncommon Leader Podcast
Redefining Cybersecurity Leadership with Empathy and Grace: Tammy Klotz's Journey

The Uncommon Leader Podcast

Play Episode Listen Later Oct 29, 2024 41:20 Transcription Available


Tammy Klotz, Chief Information Security Officer at Trendzeo and author of "Leading with Empathy and Grace," joins us for a compelling conversation about redefining leadership in the cybersecurity world. Tammy opens up about her formative years, sharing a childhood story that laid the foundation for her empathetic leadership style. As a self-proclaimed "unicorn" in the field, she challenges the outdated perception of the security office as the "office of no," advocating instead for a collaborative approach that welcomes innovation while maintaining robust security.In a year of personal transformation, Tammy made the courageous decision to step away from her long-term role at Air Products and Chemicals, focusing instead on family and writing her book. Her journey underscores the power of authenticity and humility in leadership, offering indispensable insights for anyone guiding a team or community. Tammy's story is a testament to the importance of aligning personal values with professional goals, inspiring listeners to embrace change and pursue their own leadership aspirations.We explore Tammy's innovative TIPSI principles—transparency, togetherness, inclusion, presence, participation, and consistency—as she shares how these core values have helped her build high-performing teams. From using Disney quotes and pixie dust to motivate her teams through organizational changes to balancing work with personal responsibilities as a single mother, Tammy embodies resilience and connection. Her emphasis on self-care and setting priorities serves as a powerful reminder that personal well-being is crucial for sustained success in leadership roles. Join us for an insightful episode filled with practical advice and heartfelt stories.Connect with Tammy on LinkedInBuy Tammy's Book, Leading With Empathy & GraceThanks for listening in to the Uncommon Leader Podcast. Please take just a minute to share this podcast with that someone you know that you thought of when you heard this episode. One of the most valuable things you can do is to rate the podcast and leave a review. You can do that on Apple podcasts, or rate the podcast on Spotify or any other platform you listen. Did you know that many of the things that I discuss on the Uncommon Leader Podcast are subjects that I coach other leaders and organizations ? If you would be interested in having me discuss 1:1 or group coaching with you, or know someone who is looking to move from Underperforming to Uncommon in their business or life, I would love to chat with you. Click this link to set up a FREE CALL to discuss how coaching might benefit you and your team) Until next time, Go and Grow Champions!!Connect with me

Healthy Mind, Healthy Life
Navigating Cybersecurity Leadership: Stress, Burnout, and Building Resilience -with Steve Durbin

Healthy Mind, Healthy Life

Play Episode Listen Later Aug 30, 2024 23:10


In this insightful episode of Healthy Mind, Healthy Life, Avik Chakraborty sits down with Steve Durbin, Chief Executive of the Information Security Forum (ISF), to explore the intersection of leadership and mental health within the high-pressure world of cybersecurity. As cyber threats evolve at an unprecedented pace, leaders in this field face mounting stress and anxiety. Steve shares his extensive experience guiding Fortune 500 companies and global leaders, discussing the unique challenges cybersecurity leaders face today, including managing stress, avoiding burnout, and maintaining resilience. Join us as we uncover strategies for sustaining mental well-being in a rapidly changing digital landscape. About the Guest: Steve Durbin is the Chief Executive of the Information Security Forum, a leading authority on cybersecurity strategy and emerging threats. With a career spanning advising Fortune 500 companies and global leaders, Steve is a powerful voice on issues that extend beyond technology. His deep understanding of the cybersecurity landscape, coupled with his insights into the human challenges of leadership, make him an invaluable resource for those navigating this complex field. Key Takeaways: The Challenge of Time in Cybersecurity: Steve highlights the increasing speed at which cyber threats evolve and how this compresses the time leaders have to respond, creating significant stress and anxiety. Impact of Remote Leadership: The transition to remote work during the pandemic introduced new challenges for cybersecurity leaders, who had to adapt to managing teams without the benefit of in-person interactions, leading to increased stress. Recognizing Burnout: Steve discusses the subtle signs of burnout in cybersecurity professionals, emphasizing that those experiencing burnout often don't recognize it themselves. Leaders must be vigilant in identifying these signs among their teams. Building Resilience: The conversation touches on the importance of resilience in cybersecurity leadership, with Steve sharing strategies on how leaders can foster a work environment that supports mental well-being and high performance. Leadership Beyond Technology: The discussion expands beyond technical skills, focusing on the human aspects of leadership in cybersecurity, including the importance of empathy, communication, and understanding individual needs. This episode is a must-listen for anyone involved in cybersecurity leadership or those interested in how leaders can maintain their mental health while navigating the complexities of today's digital threats.

Lead Generation HQ
Cybersecurity Leadership: Alec Hall of Alliance Cyber

Lead Generation HQ

Play Episode Listen Later Aug 27, 2024 43:18


In this episode of Lead Gen HQ, we sit down with Alec Hall, President of Alliance Cyber and a seasoned expert in enterprise network security. With over 30 years of experience, Alec has successfully delivered technology and security solutions that drive business growth across organizations of all sizes. Join us as we talk about his journey, discussing his approach to managing major projects, fostering collaboration, and implementing security best practices. Whether you're in cybersecurity or just curious about leadership in tech, this episode offers valuable insights from a true industry leader. Don't miss it! Learn about Alliance Cyber: https://alliancecyber.com/

Her Success Story
Leading with Intention

Her Success Story

Play Episode Listen Later Aug 26, 2024 26:56


This week Ivy Slater, host of Her Success Story, chats with her guest, Melissa Aarskaug. The two talk about the gaming industry and its constant evolution, tips in building a leadership legacy, and the importance of starting every day with intention and focus. She tells us, “I run my day, my day does not run me.” In this episode, we discuss: How she became involved in the gaming industry, and how she has made her mark How she manages to build relationships and keep up with people  Melissa's tips for providing continued growth and betterment for the job, company, and industry you're in Why the gaming industry is constantly evolving, and how she keeps up with it all How she navigates the family piece of life, and what she and her husband do to remain in consistent collaboration  Why she starts every day with intention and focus through strategy and planning How to flip your mindset from the negative, and look deeper into the why of what your managers are trying to teach you What drove Melissa to start a podcast on top of all the many other things she does Advice in building a leadership legacy Melissa Aarskaug is an accomplished global executive and business leader within the technology and cybersecurity sectors. With over 15 years of experience, she has demonstrated expertise in shaping strategic direction, leading teams, and forging partnerships with Fortune 500 companies. She currently is serving as the Global Vice President of Gaming Laboratories International (a 1700+ employee company). Melissa's work as a women leader and expert in cybersecurity makes her a rare and sought-after speaker. She has spoken at over 60+ events hosted by famous Gaming, Cybersecurity & Leadership organizations. Melissa believes in expanding her knowledge by learning through other's stories so she started her own podcast, “ExecutiveConnect”. With a focus on leadership, strategy, and innovation, each podcast episode delivers actionable advice and inspiring stories from industry experts and thought leaders. LinkedIn: https://www.linkedin.com/in/melissa-aarskaug/

Reimagining Cyber
Leadership, Empathy, and Women in Cybersecurity - Ep 111

Reimagining Cyber

Play Episode Listen Later Aug 21, 2024 29:58 Transcription Available


In this episode of "Reimagining Cyber," Rob Aragao hosts a conversation with Tammy Klotz, a best-selling author and current CISO at Trinseo. Tammy discusses her career trajectory, which includes leadership roles at Covanta Energy and Versum Materials, and shares insights from her recent book, Leading with Empathy and Grace: Secrets to Developing High-Performing Teams.  Additionally, she addresses the challenges women face in cybersecurity, offering advice on building confidence, taking risks, and overcoming barriers in a male-dominated field. The episode provides valuable takeaways for aspiring leaders and women looking to enter or advance in the cybersecurity industry.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Agent of Influence
Episode 060 - Sharing a Blueprint for Cybersecurity Leadership - Tunde Oni-Daniel

Agent of Influence

Play Episode Listen Later Aug 19, 2024 36:41


Sharing a Blueprint for Cybersecurity LeadershipUnlock leadership strategies to elevate your cybersecurity career and get perspective on quality pentesting providers versus commodity ones with Tunde Oni-Daniel's expert insights.

Paul's Security Weekly TV
Cybersecurity Leadership Crisis, Is It Time to Pivot Your Strategy? - BSW #360

Paul's Security Weekly TV

Play Episode Listen Later Aug 13, 2024 31:34


In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America's Companies, Judge Rejects SEC's Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360

Business Security Weekly (Video)
Cybersecurity Leadership Crisis, Is It Time to Pivot Your Strategy? - BSW #360

Business Security Weekly (Video)

Play Episode Listen Later Aug 13, 2024 31:34


In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America's Companies, Judge Rejects SEC's Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360

The Tech Blog Writer Podcast
2980: The Evolution of the CISO Role and NetSPI's Impact on Cybersecurity Leadership

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 1, 2024 44:45


In today's episode of Tech Talks Daily, I sit down with Nick Walker and Giles Inkson from NetSPI to explore how proactive approaches are reshaping cybersecurity. NetSPI recently rebranded and launched a unified security platform designed to help organizations take a more proactive stance against cyber threats. This platform combines Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Breach and Attack Simulation (BAS) to provide a comprehensive view of assets, risks, and security improvements. We discuss the latest trends in cybersecurity, including the rapid adoption of generative AI and the complex risks it introduces. As cyber attacks grow more sophisticated, there's a significant shift towards holistic risk management beyond just vulnerability patching. This involves understanding critical assets and the pathways that could be exploited. The role of the Chief Information Security Officer (CISO) is evolving too, with an increasing focus on board-level communication and strategic risk management. CISOs are now essential in translating cyber risks to leadership and ensuring cost-effective security programs. We also discuss the EU's Digital Operational Resilience Act (DORA), set to take effect in January 2024. This regulation mandates practices like threat-led testing and intelligence sharing for financial institutions, aiming to enhance resilience through rigorous scenario-based tests and improved information sharing. How do you see the role of proactive measures in cybersecurity evolving? We'd love to hear your thoughts. Connect with us online to continue the conversation and learn more about the topics we covered today.

GeekWire
Beyond the CrowdStrike outage: The larger forces at play, and a long-term view on cybersecurity

GeekWire

Play Episode Listen Later Jul 20, 2024 26:36


This week: the aftermath of the CrowdStrike outage, the larger forces at play, the future of cybersecurity, and where the world is headed long-term. Our guest is Erik Moore, a veteran of the cybersecurity field and program director for the online Master of Science Program in Cybersecurity Leadership at Seattle University's Albers School of Business and Economics. Moore says cybersecurity companies are facing faster and more complex threats due to factors including AI, and geopolitical and financial forces, requiring quicker responses. Current testing and deployment processes need to be overhauled handle these new challenges effectively. But long-term, he's optimistic about where the field and the world are headed. Related Links  GeekWire News Coverage: ‘A little frightening': CrowdStrike outage puts Microsoft's role in global IT back in the spotlight  CrowdStrike Blog Post: Technical Details on Today's Outage Microsoft: Helping our customers through the CrowdStrike outage Seattle University: Master of Science Program in Cybersecurity Leadership CNBC: CrowdStrike update that caused global outage likely skipped checks, experts say KING-5: CrowdStrike Outage Hits Microsoft  Channel News Asia: What do we know about CrowdStrike?  See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity Leadership: AL, Burnout, and Success Strategies | A Conversation with Jack Leidecker | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 9, 2024 29:44


Breakfast Leadership
Thoughtful Thursdays: Cybersecurity with Darren Gallop

Breakfast Leadership

Play Episode Listen Later Jul 4, 2024 28:48


Darren is the Co-Founder and CEO of Carbide. This cyber security firm provides businesses of all sizes with the tools they need to adopt a robust cybersecurity and privacy posture, enabling them to protect their data from cybercriminals, transform security from a potential liability to a competitive advantage, and accelerate their growth.   A TechStars alum, Carbide has raised 7M+, and its clientele is quickly growing in highly regulated markets, including e-commerce, FinTech, healthcare, and insurtech.   Darren has 15+ years of experience as the CEO and Chief Information Security Officer (CISO) of several businesses that handle sensitive data. This experience has given him a solid grasp of evaluating and managing risk according to organizational goals while fostering growth.   Before starting Carbide, he Co-Founded Marcato, an innovative event management platform that managed 300+ music and cultural events, including Burning Man and Coachella, in 27 countries worldwide. Darren ran the business as CEO and CISO for ten years until it was acquired by Patron Technology in 2018. At that point, he decided to go into the cybersecurity industry.   He is a Certified Information Privacy Manager (CIPM) and Certified Information Systems Security Professional (CISSP).   On the podcast, Darren would love to talk about:   How to engage your team in cybersecurity to build a secure by-default company in a way that enables you to breeze through audits and assessments while, at the same time, being something your team enjoys.  How to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust. How to make cybersecurity and data privacy a part of your service or product offering. This topic would interest startups and service companies that provide tools and services outside of IT and security and service companies like MSPs that can benefit from adding security products and services to their offerings. How fast-growing organizations achieve enterprise-class security and privacy.   To get a sense of Darren, here's an episode he did on the Privacy Please Podcast, where he shared advice for founders on securing their startups.   Quick recap Summary Darren's Cybersecurity Journey and Insights Darren and Michael discussed Darren's background and experience in cybersecurity and data privacy. Darren shared his unconventional entry into the field, having previously worked in various leadership roles before focusing on security. He emphasized the importance of security no longer being a "bolt-on" but an essential component of leadership and business operations. He also mentioned his current role as a board member for the International Information System Security Certification Consortium and his upcoming plans for the quarter. Michael showed interest in understanding more about Darren's insights. Turbine's AI Integration and Business Model Shift darrengallop, the CEO and co-founder of Turbine cyber security and data privacy company, discussed the company's development and future plans in the meeting. He elaborated on how they have been using AI and machine learning (ML) as a component of their product, which was launched in December after about a year of development. Darren also shared that they have shifted their business model to encompass AI to enhance the human experience and better support their customers. He further discussed his passion for cyber security and data privacy, especially in healthcare and manufacturing industries. The conversation then moved to the fast-paced world we live in, with Michael jokingly relating his recent stress test experience to the ever-accelerating speed of technology. Cybersecurity Leadership and Prioritization Michael emphasized the critical importance of cybersecurity and the need for it to be a top priority within organizations, arguing that it's as crucial as accounting and customer service departments. He also touched on the significance of leadership in cybersecurity, stating that it's a skill that can be learned and that he, as an accountant, had successfully transitioned into the tech space due to his curiosity and leadership ability. Darren agreed with Michael's points, asserting that effective leadership is essential for the proper use and management of cybersecurity and data privacy within an organization. Leadership Engagement in IT Security Challenges darrengallop discussed the challenges IT security teams face in organizations where leadership is not engaged or committed to ensuring security. He noted that many organizations prioritize sales and fiscal responsibilities over security, leading to a reactive approach dubbed "security theater." Darren emphasized the need for leadership to prioritize security and recognize the evolving threat landscape, including the increasing profitability of cybercrime. Michael concurred, pointing out the lower overheads and ease of recruitment in cybercrime, compared to traditional criminal activities like drug cartels. Attracting Younger Generations to Computer Activities Michael and Darren discussed the attraction of computer-based activities for younger generations, likening it to a game or a puzzle that they find engaging and challenging. Michael suggested that this behavior could lead to criminal activities like hacking, especially for those in difficult economic situations. However, he emphasized the possibility of separating the criminal aspect from these activities and using their skills for legitimate purposes, setting them up for future success. Darren agreed with Michael's points. Organized Crime and Human Trafficking Discussion Michael and Darren discussed the prevalence of certain criminal activities within their borders and worldwide. Darren elaborated on the operations of organized criminal groups, mentioning cases in poor countries where people are exploited and demonized as targets. He also introduced the concept of human trafficking for hacking camps, where individuals are forced to conduct social engineering scams. Darren estimated that over 200,000 people are in captivity conducting these types of operations, making it difficult for law enforcement to have a meaningful impact on stopping and catching the perpetrators. AI Fraud and Preventive Measures Michael discussed the potential dangers of AI technology being used for fraudulent activities, such as scam phone calls using cloned voices. He suggested the use of code words and education as preventive measures. darrengallop agreed, emphasizing the importance of educating individuals at all levels to identify and prevent such criminal activities. He also highlighted the potential futility of relying solely on law enforcement to combat this issue, given the vast scope and complexity of the problem. Identity Theft and Financial Vulnerability Discussion darrengallop and Michael discussed the potential risks of identity theft and financial loss in today's world. Darren emphasized the importance of understanding the various factors contributing to vulnerability, such as owning property or having good credit, and noted how these factors could be used against individuals. Michael shared his experience managing his mother's estate and highlighted the need to freeze credit applications for the deceased. Both acknowledged the growing use of AI and other tools to automate finding weaknesses and vulnerabilities and how criminals could exploit this. They also discussed the possibility of identity theft through obituaries and the physical theft of mail. Data Theft, Hacking, and Customer Expectations Michael and Darren discussed the creative and often criminal activities surrounding data theft and hacking. They highlighted the need for organizations to monitor their systems and data closely and emphasized the importance of protecting sensitive information. Darren noted customers' increasing awareness and expectation regarding privacy and security, with many technology providers now implementing these concepts by default. However, he also pointed out the ongoing risks posed by social engineering and criminal activities, which have been refined over time. Both agreed on the need for these issues to be part of an organization's DNA, not an add-on, to prevent future breaches. Cybersecurity, Global Impact, and Resources darrengallop and Michael discussed the changing global landscape and its impact on businesses, emphasizing the importance of cybersecurity and data protection. Darren introduced his website, carbidesecure.com, as a resource for companies seeking cybersecurity implementation and maintenance assistance. 

Reimagining Cyber
CISO's Journey to CTO - Ep 101

Reimagining Cyber

Play Episode Listen Later Jun 12, 2024 17:32 Transcription Available


In this episode, Rob Aragao and Stan Wisseman look at the intriguing transition from Chief Information Security Officer (CISO) to Chief Technology Officer (CTO). Drawing from a recent sidebar conversation among CISOs and an insightful article from Dark Reading, they examine why this trend is becoming more prominent. With examples from organizations like Bank of America, Fifth Third Bank, and Equifax, Rob and Stan discuss the key attributes that make this career move logical and beneficial.The conversation highlights the importance of collaboration, strategic thinking, and the deep understanding of both technology and business impact that CISOs bring to the table.  They delve into how the roles of CISO and CTO overlap, particularly in driving innovation, increasing revenue, and embedding security by design into business solutions.Rob and Stan also consider the broader influence a CTO has on an organization's technology strategy, the operational experience both roles share, and the potential motivations behind CISOs seeking to transition—whether to escape the increasing personal liability associated with security breaches or to pursue new professional growth opportunities.Additionally, the episode touches on the challenges CISOs might face in this transition, such as the need for expertise in product development and the software lifecycle. As discussed in this episode: https://www.darkreading.com/cybersecurity-careers/ciso-as-a-cto-when-and-why-it-makes-senseFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

CISO Tradecraft
#177 - 2024 CISO Mindmap (with Rafeeq Rehman)

CISO Tradecraft

Play Episode Listen Later Apr 15, 2024 46:28 Transcription Available


This episode of CISO Tradecraft features a comprehensive discussion between host G Mark Hardy and guest Rafeeq Rehman, centered around the evolving role of CISOs, the impact of Generative AI, and strategies for effective cybersecurity leadership. Rafeeq shares insights on the CISO Mind Map, a tool for understanding the breadth of responsibilities in cybersecurity leadership, and discusses various focal areas for CISOs in 2024-2025, including the cautious adoption of Gen AI, tool consolidation, cyber resilience, branding for security teams, and maximizing the business value of security controls. The episode also addresses the importance of understanding and adapting to technological advancements, advocating for cybersecurity as a business-enabling function, and the significance of lifelong learning in information security. Cybersecurity Learning Saturday: https://www.linkedin.com/company/cybersecurity-learning-saturday/ 2024 CISO Mindmap: https://rafeeqrehman.com/2024/03/31/ciso-mindmap-2024-what-do-infosec-professionals-really-do/ Transcripts: https://docs.google.com/document/d/1axXQJoAdJI26ySKVfROI9rflvSe9Yz50 Chapters  00:00 Introduction 00:57 Rafeeq Rehman: Beyond the CISO MindMap 04:17 The Evolution of the CISO MindMap 08:30 AI and the Future of Cybersecurity Leadership 11:47 Embracing Change: The Role of AI in Cybersecurity 14:16 Generative AI: Hype, Reality, and Strategic Advice for CISOs 22:32 Navigating the Future Job Market with AI 22:53 Framing AI for Specific Roles 24:12 Harnessing Creativity with Generative AI 25:14 Consolidating Security Tools for Efficiency 28:31 Evaluating Security Tools: A Deep Dive 32:21 Cyber Resilience: Beyond Incident Response 35:51 Building a Business-Focused Security Strategy 39:39 Maximizing Business Value Through Security 43:15 Looking Ahead: Focus Areas for the Future 43:53 Concluding Thoughts and Future Predictions

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Code: Neal Bridges on Cybersecurity, Leadership, and Lifelong Learning | Loops and Lifecycles Podcast with Josh Mason

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 3, 2024 57:33


Guest: Neal Bridges, CISO, Query [@QueryAi_net]On LinkedIn | https://www.linkedin.com/in/nealbridges/On Twitter | https://twitter.com/itjunkieOn YouTube | https://www.youtube.com/@CyberInsecurityHost: Josh MasonOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
Now You're in Role: The Fearless CISO | A Conversation With Jessica Robinson | A Deep Dive into RSA Conference 2024 | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 2, 2024 23:26


Guests: Jessica Robinson, Executive Officer of PurePoint International [@PurIntl]On LinkedIn | https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/At RSAC | https://www.rsaconference.com/experts/jessica-robinson____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe RSA Conference 2024 is just around the corner, and our hosts Sean Martin and Marco Ciappelli are gearing up for an insightful and engaging on-location coverage of the event. In this second Chat On The Road to RSA Conference 2024 conversation with cybersecurity expert Jessica Robinson, we got a sneak peek into what to expect from this year's talk she will give during the event.Now You're in Role: The Fearless CISOAs a follow up to the talk last year at RSAC, attendees will learn the top three skills for success for any first time CISOs to advance and grow their cybersecurity program. This talk will be a discussion on what is most important as we start to really think about what is required for success in the CISO role as it directly relates to the success of the cybersecurity program.The stage is set for an enriching dialogue on the nuances of the CISO role, cybersecurity programs, and the evolving landscape of cyber threats. Jessica Robinson, with her wealth of experience and fearless approach to cybersecurity leadership, promises to dive deep into the art of making possibilities a reality in the realm of cybersecurity.Embracing Fear to Unlock PotentialOne of the key themes that emerged from the conversation was the idea of embracing fear to unlock untapped potential. Jessica emphasized the importance of facing challenges head-on, advocating for cybersecurity programs, and pushing boundaries to drive meaningful change within organizations. By transforming fear into a catalyst for growth and innovation, CISOs can navigate the complex cybersecurity landscape with confidence and resilience.The Art of Possibility in CybersecurityThe theme of this year's RSA Conference, "The Art of Possible," resonates deeply with Jessica's approach to cybersecurity leadership. By infusing creativity, strategic thinking, and a proactive mindset into their roles, CISOs can redefine what is achievable in the realm of cybersecurity. The session with Jessica promises to offer valuable insights on how to leverage the art of possibility to advance cybersecurity programs and drive success in an ever-evolving threat landscape.Joining the ConversationAs Sean Martin and Marco Ciappelli gear up for the RSA Conference 2024, they invite cybersecurity enthusiasts, industry experts, and professionals to join them on this enriching journey. The on-location coverage promises to capture the pulse of the conference, featuring engaging conversations, expert insights, and thought-provoking discussions on the future of cybersecurity.With Jessica Robinson's fearless approach to cybersecurity leadership and the insightful conversations lined up for the RSA Conference 2024, this year's event is set to be a landmark gathering for cybersecurity professionals. Stay tuned for more updates, interviews, and coverage as Sean Martin and Marco Ciappelli bring you the latest insights from the forefront of cybersecurity innovation.RSA Conference 2024 promises to be a platform where possibilities converge with reality, fear transforms into opportunity, and cybersecurity leaders pave the way for a secure digital future. Join us on this exciting journey as we explore the art of possibility in cybersecurity with Sean Martin, Marco Ciappelli, and a host of industry experts at RSA Conference 2024.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:

Breaking Into Cybersecurity
Breaking into Cybersecurity Leadership Roselle Safran

Breaking Into Cybersecurity

Play Episode Listen Later Feb 14, 2024 30:03


Breaking into Cybersecurity Leadership Roselle SafranRoselle Safran on LinkedIn https://www.linkedin.com/in/rosellesafran/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.comWebsite: https://www.cyberhubpodcast.com/breakingintocybersecurityPodcast: https://feeds.captivate.fm/breaking-into-cybersecurity/YouTube: https://www.youtube.com/c/BreakingIntoCybersecurityLinkedin:

Breaking Into Cybersecurity
Breaking into Cybersecurity Leadership with Paul Ruppert

Breaking Into Cybersecurity

Play Episode Listen Later Feb 8, 2024 23:58 Transcription Available


Breaking into Cybersecurity Leadership with Paul RuppertPaul Ruppert on LinkedIn https://www.linkedin.com/in/paulruppertintl/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring

Breaking Into Cybersecurity
Breaking into Cybersecurity Leadership w Warner Moore

Breaking Into Cybersecurity

Play Episode Listen Later Jan 29, 2024 17:18 Transcription Available


Breaking into Cybersecurity Leadership w Warner MooreWarner Moore on Linkedin https://www.linkedin.com/in/warnermoore/ Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityMentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring

Breaking Into Cybersecurity
Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Breaking Into Cybersecurity

Play Episode Listen Later Jan 16, 2024 38:34 Transcription Available


Breaking into Cybersecurity Leadership - David Adeoye AbodunrinDavid Adeoye Abodunrin on LinkedIn - https://www.linkedin.com/in/abodunrinadeoyedavid/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurityWant to create live streams like this? Check out StreamYard: https://streamyard.com/pal/d/6338015336071168Mentioned in this episode:CPF Coaching: Cybersecurity Leadership and Talent Development ConsultantCPF Coaching: Cybersecurity Leadership and Talent Development ConsultantThank you to CPF Coaching for SponsoringThank you to CPF Coaching for Sponsoring

Trust Issues
EP 42 - Year in Review 2023: Unleashing AI, Securing Identities

Trust Issues

Play Episode Listen Later Dec 27, 2023 35:22


In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show's 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues' 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners. As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era. Clips featured in this episode from the following guests:Eran Shimony, Principal Security Researcher, CyberArk LabsAndy Thompson, Offensive Security Research Evangelist, CyberArk LabsEric O'Neill, Former FBI Counterintelligence Operative & Current National Security Strategist Shay Nahari, VP of Red Team Services, CyberArkDiana Kelley, CISO, Protect AI Len Noe, Technical Evangelist, White Hat Hacker & Biohacker, CyberArkTheresa Payton, Former White House CIO, Founder & CEO of Fortalice SolutionsLarry Lidz, VP & CISO, Cisco CX CloudMatt Cohen, CEO, CyberArkCharles Chu, GM of Cloud Security, CyberArkBrad Jones, CISO & VP of Information Security, Seagate TechnologyDusty Anderson, Managing Director, Global Digital Identity, ProtivitiPhilip Wylie, Offensive Security Professional, Evangelist & Ethical Hacker

Cyber Work
Neurodiversity and cybersecurity leadership positions | Guest Anthony Pacilio

Cyber Work

Play Episode Listen Later Dec 18, 2023 55:01 Transcription Available


Today's guest is Anthony Pacilio, VP Neurodiverse Solutions at CAI. I met Pacilio at this year's ISACA Digital Trust World event in Boston, and I was immediately fascinated with his insights on hiring and attracting neurodiverse professionals in security, IT, engineering and related industries, all of which suffer a skills gap and all of which are in need of new insights and working methods. Pacilio and I have a substantive conversation about changing the structure of the “6-hour marathon” interview process, the difference between an employee who stays in one job role vs. an employee who stays in but re-imagines that one job role, and why this new way of hiring and recruitment can lead to nothing less than an entire transformation of a company's work culture.  0:00 - Neurodiversity and cybersecurity leadership 4:18 - Pacilio's early years with tech7:40 - Shifting roles in cybersecurity 12:55 - VP of neurodiverse solutions 16:10 - CAI's dedication to neurodiversity  19:27 - Neurodiverse solutions in cybersecurity and IT23:50 - Rethinking the cybersecurity role interview26:32 - Adopting new interview strategies 33:03 - Examples and success stories 35:30 - Where neurodiverse workers succeed in cybersecurity 42:04 - Tips for neurodiverse learners in cybersecurity 45:58 - Advice for new cybersecurity professionals 52:30 - Learn more about CAI53:05 - Outro– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.