Podcasts about hytrust

  • 19PODCASTS
  • 22EPISODES
  • 36mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 4, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hytrust

Latest podcast episodes about hytrust

VanRein Compliance Podcast
Navigating HITRUST Certification + The SPIRIT of Fall and Texas-style Halloween Fun!

VanRein Compliance Podcast

Play Episode Listen Later Oct 4, 2023 24:34 Transcription Available


Ever wondered what it's like to navigate the maze of HITRUST certification for healthcare data security? Well, you're in the right place! Join us, Dawn and Rob, as we unravel the complexities of HITRUST, HIPAA compliance, and the various levels of HITRUST certification. We'll walk you through the cost, the importance of customization, and the crucial steps required for an effective implementation. Documenting everything is key in this process, and we're here to tell you why!As we delve into the nitty-gritty of Control Mapping and Disaster Recovery plans associated with Hytrust implementation, we keep things light and seasonal. Embrace the spirit of fall as we celebrate the arrival of pumpkin spice season and the approach of Halloween. We share our experiences of Texas-style Halloween, complete with trailer-ride trick-or-treating and neon bracelets. It's a delightful mix of in-depth discussion and fun banter that you wouldn't want to miss! Keep listening because next week, Rob will be bringing back insights from the Hytrus Collaborate 2023 in Dallas. So, buckle up and enjoy the ride!Thank You for Listening to the VRC Podcast!Visit us at VanRein ComplianceYou can Book a 15min Call with a GuideFollow us on LinkedInFollow us on TwitterFollow us on Facebook

The CISO Diaries
Chris Morales, CISO at Netenrich - Quick Witted Veteran, Fueled by Data Analytics

The CISO Diaries

Play Episode Listen Later Sep 23, 2021 43:45


About Chris Morales: We're here this week with an AI and threat modeling guru, Chris Morales! He's Netenrich's FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company's security solutions and processes. Chris has 20-something years of information security experience, having previously led advisory services and security analytics for Vectra AI – while at Vectra he educated many of the Cloud Security Alliance chapter members on dissecting a Microsoft Office 365 attack. During his career, he has advised and designed incident response and threat management programs for some of the world's largest enterprises. Chris has held senior roles in cybersecurity engineering, consulting, sales and research at companies such as HyTrust, an Entrust company, NSS Labs, 451 Research, Accuvant (acquired by Blackstone Group), McAfee and IBM. He is also currently a council member with CompTIA Cybersecurity and advisory board member for Saporo. He not only brings his wicked smart knowledge on cyber; his candor and wit is refreshing. To boot, he's from the friendship state – Texas, so listen to this podcast – it's like hearing from a friend!Guest Chris Morales LinkedIn: https://www.linkedin.com/in/cmatx/ (https://www.linkedin.com/in/cmatx/)   Twitter: https://twitter.com/MoralesATX (https://twitter.com/MoralesATX) Highlights: 0:00 - Introductions & About Netenrich Netenrich, Ingram Micro and expanding from roots Evolving IT & Security specialization Moving from consulting to CISO 7:10 - Pathway to CISO What's the definition who makes a good CxO? Six Types of CISO - Ref: https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/ (Forrester Article, Jan 2020) Identifying different types of personalities for industries Every company is a tech company 14:26 - Difference: Secure Operations vs. Security Operations Question of proactive vs reactive Two different focuses - predictive with cultural challenges and buy in Enhancing customer experience Situational awareness is important with looking at same set of data between groups to communicate daily. 18:16 - Bring Value of "Why Do I Care?" Entire management chain needs to care Alignment is important with the C-suite Look at data, threat modeling to share how and why it impacts key holder Chris learned a lot from statistical analysis and appreciation of data 22:48 - How Chris Came To Security Started as Computer Science to make video games Dropped out of college to launch his own business Joined the military Listened to his Dad talk about "The Art of War," Sun Tzu Spent time hacking to get video games Moving positions and being open to job challenges 31:35 - Advice to Future Leaders The title doesn't mean anything It's more important on what you do Have insight and empathy on why people do things, and learn their pain points Don't worry about being good at everything. Pick one thing and be good at it Hacking is social engineering Security breached through end users is a failure of the security team Don't be afraid to fail as a leader People are the victims, not the problem People are suffering from our technology problem 37:25 - How Chris Avoids Burn Out The question - How do you get more sleep? There is no magic answer and sometimes hitting the wall can be scary "I Am Me" - Chris needs to write this book on addressing burn out Do what you like and works for you. Burn out - Working too hard and no one cares. Final Thoughts: On avoiding burn out: Working hard is ok, but recognize when you are working too hard and no one cares.

Paul's Security Weekly
Losing Control - ESW #214

Paul's Security Weekly

Play Episode Listen Later Jan 29, 2021 74:40


This week, in the Enterprise Security News, Platform9 unburdens users from the complexities of Kubernetes,Swimlane Raises $40 Million, SonicWall hacked by zero-days in its own products?, Deloitte Buys Root9B, Cygilant and SentinelOne Partnership, Fortinet announces AI-powered XDR, AlgoSec Announced updates to A32, ESET Launches Enhanced Cloud-based Endpoint Security Management, Entrust acquires HyTrust, LogRhythm acquires MistNet, and Huntress Acquires EDR Technology From Level Effect! In the second segment, we welcome Fredrik Nordberg Almroth from Detectify to discuss his recent research into DNS Hijacking to control top-level domains! In the final segment, Allan Alford from The Cyber Ranch Podcast joins us for a discussion on the ever popular topic of Supply Chain Security!   Show Notes: https://securityweekly.com/esw214 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes!

Enterprise Security Weekly (Audio)
Losing Control - ESW #214

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jan 29, 2021 74:40


This week, in the Enterprise Security News, Platform9 unburdens users from the complexities of Kubernetes,Swimlane Raises $40 Million, SonicWall hacked by zero-days in its own products?, Deloitte Buys Root9B, Cygilant and SentinelOne Partnership, Fortinet announces AI-powered XDR, AlgoSec Announced updates to A32, ESET Launches Enhanced Cloud-based Endpoint Security Management, Entrust acquires HyTrust, LogRhythm acquires MistNet, and Huntress Acquires EDR Technology From Level Effect! In the second segment, we welcome Fredrik Nordberg Almroth from Detectify to discuss his recent research into DNS Hijacking to control top-level domains! In the final segment, Allan Alford from The Cyber Ranch Podcast joins us for a discussion on the ever popular topic of Supply Chain Security!   Show Notes: https://securityweekly.com/esw214 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Platform9, Swimlane, SonicWall 0-Days, & Fortinet - ESW #214

Paul's Security Weekly TV

Play Episode Listen Later Jan 28, 2021 30:59


This week, in the Enterprise Security News, Platform9 unburdens users from the complexities of Kubernetes, Swimlane Raises $40 Million, SonicWall hacked by zero-days in its own products, Deloitte Buys Root9B, Cygilant and SentinelOne Partnership, Fortinet announces AI-powered XDR, AlgoSec Announced updates to A32, ESET Launches Enhanced Cloud-based Endpoint Security Management, Entrust acquires HyTrust, LogRhythm acquires MistNet, Huntress Acquires EDR Technology From Level Effect, & more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw214

Enterprise Security Weekly (Video)
Platform9, Swimlane, SonicWall 0-Days, & Fortinet - ESW #214

Enterprise Security Weekly (Video)

Play Episode Listen Later Jan 27, 2021 30:59


This week, in the Enterprise Security News, Platform9 unburdens users from the complexities of Kubernetes, Swimlane Raises $40 Million, SonicWall hacked by zero-days in its own products, Deloitte Buys Root9B, Cygilant and SentinelOne Partnership, Fortinet announces AI-powered XDR, AlgoSec Announced updates to A32, ESET Launches Enhanced Cloud-based Endpoint Security Management, Entrust acquires HyTrust, LogRhythm acquires MistNet, Huntress Acquires EDR Technology From Level Effect, & more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw214

info@theworkforceshow.com
Mary Beth Borgwing--Cyber Expert and Founder of Cyber Guild

info@theworkforceshow.com

Play Episode Listen Later Feb 4, 2020 25:13


Mary Beth has over twenty years of finance, technology and security industry experience. She is an advisor to Clearforce, HyTrust, Robodub, Bluewater International and in 2018 founded The Cyber Guild and Uniting Women in Cyber in Washington, DC. Previously Mary Beth was the CEO and President of LemonFish Technologies and CEO/CFO of two companies acquired by Deloitte and Microsoft. Hosts: Olga Polishchuk and Jeremy Haas , Workforce Show-Cyber Sponsor: Looking Glass Cyber

Executive Perspective: Behind the Business
EP. 9 | Wayne Lewandowski, SVP & GM at HyTrust

Executive Perspective: Behind the Business

Play Episode Listen Later Nov 21, 2019 26:11


In this episode we sit down with Wayne Lewandowski, SVP & GM, of HyTrust a Cyber Security Solution provider to talk about what traits he looks for to build a successful technology sales teams, the early days of cold calling, his favorite vacation spots and his current reading list.

Intel Chip Chat
How to Protect Critical Data within Your Cloud Infrastructure – Intel® Chip Chat episode 662

Intel Chip Chat

Play Episode Listen Later Jun 27, 2019 13:34


In this episode of Intel Chip Chat, Pat Conte, Senior VP of Global Business Development at HyTrust talks about the ever-evolving security landscape and the work they are doing to deliver a more secure cloud infrastructure. HyTrust is a cybersecurity company focused on locking down virtual infrastructure that support all cloud environments, and protecting the critical data within the cloud workloads. Security is a top priority for IT managers, and HyTrust partners with Intel to help secure the underlying infrastructure. Pat chats about BoundaryControl, a HyTrust solution that integrates Intel® Trusted Execution Technology (Intel TXT) and Intel® Trusted Platform Modules (Intel TPM) technologies to essentially put a boundary around a designated server or servers to help ensure that workload is only getting executed on the server that you designate it to. New capabilities and evolving landscape gives Intel and HyTrust the opportunity to enhance encryption and geo-fencing and adopt new Intel® Security Technologies, like the 2nd Generation Intel® Xeon Scalable Processors with Intel® Security Libraries for Data Centers (Intel® SecL–DC). More Information: HyTrust and Intel Ease Integration of Trusted Compute: https://www.hytrust.com/blog/hytrust-and-intel-ease-integration-of-trusted-compute/ Intel technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. © Intel Corporation

B2B Revenue Acceleration
10: Establishing a US Technology Vendor in Europe w/ Patrick Conte

B2B Revenue Acceleration

Play Episode Listen Later Aug 29, 2018 30:20 Transcription Available


It’s tempting to think that just because you’ve had success in one market… You’ll automatically be successful wherever you decide to expand your business. Patrick Conte is the Senior Vice President & General Manager of International Business at HyTrust, and he understands the challenge in taking your product and moving it to another market like Europe. HyTrust is a cyber-security company that specializes in cloud security.  They protect the cloud workload for their clients (which is becoming increasingly important in this era of data protection we live in). They also focus on locking down the virtual infrastructure (cloud servers and admins) for their clients. Patrick and his team were able to expand their technology into the European market through careful strategy and execution.  Patrick joined us for this episode of B2B Revenue Acceleration to talk about the European expansion journey and the lessons learned along the way.

Sales Game Changers | Tip-Filled  Conversations with Sales Leaders About Their Successful Careers
082: How Do You Get the Optimal Sales Mindset? Listen to Federal Cybersecurity Sales Executive Wayne Lewandowski and Find Out Now

Sales Game Changers | Tip-Filled Conversations with Sales Leaders About Their Successful Careers

Play Episode Listen Later Jun 28, 2018 24:27


Read the complete transcription on The Sales Game Changers Podcast website. WAYNE'S CLOSING TIP TO EMERGING SALES LEADERS: "It's in your head. You can do it or you can't and in either case whatever the answer is in your head, you're right, because that's what you believe. So stay committed to your career, believe that this is going to be something that is going to take a lot of hard work and sweat equity and go after it." Wayne Lewandowski is the Senior VP and General Manager for North American Public Sector at HyTrust. He started his career with Bell Atlantic. He has sold many disruptive technologies in his career. HyTrust helps organizations securely manage their workloads and data in the data center and the cloud while ensuring their compliant with key regulations and that privileged users cannot create significant disruptions to the data center or exfiltrate sensitive data and workloads.

Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation
189: Ashwin Krishnan: The Moral Compass For Cybersecurity – Should We or Shouldn't We?

Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation

Play Episode Listen Later Jun 11, 2018 45:56


Ashwin Krishnan is a technology expert with over two decades of experience in cybersecurity and cloud technologies. Formerly Senior Vice President of Products and Strategy at HyTrust, a late stage security startup, Ashwin is now a reformed high tech executive turned freelance Cyber Moralist and Tech Demystifier. He is the host of The Moral Compass Podcast, and a regular columnist for CSOOnline.com, ITSPMagazine, ThriveGlobal and Qrius. He also contributes to publications such as LightReading.com, Securitynow.com, CIOreview.com, SDxcentral.com, Virtual-Strategy.com, SoftwareMag.com, TEISS.co.uk and CloudTweaks.com, and is further quoted in publications including Erpscan.com, DigitalGuardian, FutureOfEverything.com, TalkinCloud.com, EnterpriseProject, MRC  and SiliconIndia.com. A recognized thought leader, his speaking engagements have included the Mobile World Congress, CSA World Congress, ISACA,RSA Security Conference, VMWorld, Telecom Industry Association, and Product Camp Silicon Valley. In our eye-opening discussion with Ashwin, he sheds light on the impact of cybersecurity on our day-to-day lives and our businesses. Massive amounts of data are being collected and stored – how is it being protected and used? Who is responsible if/when things go wrong? Ashwin addresses these questions and more, as we delve into the complex world of technology, artificial intelligence and automation. We are getting there faster than most realize. Whether you are a small business owner, an industry leader, or simply a consumer in today's society, this episode will enlighten and engage you in an important conversation about the morality and ethics of cybersecurity and what it means to us today. Key Takeaways We are at the cusp of something dramatic. We have gotten to where we're at by the efforts of humans. Now, humans are being outpaced by machines, however they lack fundamental human concepts of ethics and moral values. A lot of research is being done on cyber morality and its impact, but it's not yet translating into the business world. Twitter can already predict the onset of depression based on the words you use repeatedly. The question is, “What they do with that information? Who do they inform?” It is getting easier to manufacture numbers of followers. Which begs the question, “If my competitors are doing it, should I or shouldn't I?” There are 3 stages of Artificial Intelligence: Data insights, Prediction, and Action. The morale framework needs to be applied at all stages. At what point goes a human need to step in to make the right decision? The problem is the amount of data – it will be impossible. We're getting there faster than people realize. Uber is going towards driverless vehicles and trucks. An important question to ask is, “What biases are getting built into autonomous vehicles?” Small companies need to pay attention to the information they are collecting and storing and how the data is being put into application. They can use a 3rd party, but who will ultimately be accountable if something goes wrong? Resources The Moral Compass Podcast Connect With Ashwin Krishnan Website LinkedIn Twitter Facebook

Datacenter Technical Deep Dives
#vBrownBag US - VMware HYTRUST vSAN Encryption with Vic Camacho (@Virtual_Vic) and Voung Pham (@digital_kungfu)

Datacenter Technical Deep Dives

Play Episode Listen Later Nov 9, 2017 55:30


Vic Camacho and Voung Pham deep dive into vSAN encryption using HyTrust KeyControl 0:00 Introductions 3:10 VSAN encryption introduction and terminologies 7:28 Overview of adding a KMS and initial setup 9:30 Difference between VSAN encryption and SED drives 13:30 Re-key, design, operational considerations 21:34 Use Cases (VM encryption vs VSAN encryption) 25:10 Day 2 considerations and KMS server availability 32:15 Learning resources 36:03 DEMO!! 53:50 wrap-up and one last thing: vxRAIL applicability

Intel Conversations in the Cloud
Data Sovereignty with Intel TXT and HyTrust – Conversations in the Cloud – Episode 105

Intel Conversations in the Cloud

Play Episode Listen Later Aug 31, 2017


In this Intel Conversations in the Cloud audio podcast: In this episode of Conversations in the Cloud we are joined by John Skinner, Senior Vice President of Business Development at HyTrust, to discuss security, regulations, and the work that both Intel and HyTrust are doing to make the cloud as secure as possible. John discusses […]

Cloud Computing – Connected Social Media
Data Sovereignty with Intel TXT and HyTrust – Conversations in the Cloud – Episode 105

Cloud Computing – Connected Social Media

Play Episode Listen Later Aug 31, 2017


In this Intel Conversations in the Cloud audio podcast: In this episode of Conversations in the Cloud we are joined by John Skinner, Senior Vice President of Business Development at HyTrust, to discuss security, regulations, and the work that both Intel and HyTrust are doing to make the cloud as secure as possible. John discusses […]

Intel CitC
Data Sovereignty with Intel® TXT and HyTrust – CitC Episode 105

Intel CitC

Play Episode Listen Later Aug 30, 2017 13:37


In this episode of Conversations in the Cloud we are joined by John Skinner, Senior Vice President of Business Development at HyTrust, to discuss security, regulations, and the work that both Intel and HyTrust are doing to make the cloud as secure as possible. John discusses a solution that HyTrust and Intel worked closely on to create called BoundaryControl. BoundaryConrol for VMs uses Intel® Trusted Execution Technology (Intel® TXT) and runs on Intel® Xeon® Processors, to secure the most important elements in virtualized datacenters and cloud applications, allowing you to meet data sovereignty, data security, and hardware specification requirements.? To learn more about HyTrust and data sovereignty go to https://www.hytrust.com/solutions/data-sovereignty/, or follow HyTrust on Twitter at https://twitter.com/HyTrust.

Business Security Weekly (Audio)
Startup Security Weekly #47 - Cupcakes For Breakfast

Business Security Weekly (Audio)

Play Episode Listen Later Jul 24, 2017 78:47


Ronnie Feldman of Learnings & Entertainments joins us. In the news, how to be “customer first”, four components of a successful sales strategy, and updates from Symantec, Nok Nok Labs, Flashpoint, HyTrust, and more! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode47Visit https://www.securityweekly.com for all the latest episodes!

Paul's Security Weekly
Startup Security Weekly #47 - Cupcakes For Breakfast

Paul's Security Weekly

Play Episode Listen Later Jul 24, 2017 78:47


Ronnie Feldman of Learnings & Entertainments joins us. In the news, how to be “customer first”, four components of a successful sales strategy, and updates from Symantec, Nok Nok Labs, Flashpoint, HyTrust, and more! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode47Visit https://www.securityweekly.com for all the latest episodes!

Intel Chip Chat
HyTrust, IBM and Intel Remove Security Barriers for Cloud Adoption - Intel® Chip Chat episode 535

Intel Chip Chat

Play Episode Listen Later Jun 15, 2017 13:23


Bill Hackenberger, Vice President of Data Security at HyTrust, joins us to talk about security with virtualization and across cloud environments. HyTrust has been securing virtualized environments for enterprises since 2007. The company provides workload security, automated compliance, and policy enforcement solutions for multi-cloud infrastructure. In this interview, Hackenberger talks about how the dynamic nature of virtualized cloud environments has dramatically changed the complexity and scope of security policy, encryption, and key management. He explains how Intel® Trusted Execution Technology and HyTrust Cloud Control work together as an attestation server that identifies known and trusted workloads across virtualized environments. Bill also discusses the new IBM Cloud Secure Virtualization service, which is the result of the partnership between HyTrust, IBM, and Intel. For more information on securing mutli-cloud and virtualized environments, please visit www.hytrust.com.

Your Working Life with Caroline Dowd-Higgins

Hemma Prafullchandra is CTO and EVP, Products at HyTrust and an evangelist for what's possible.

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
E-4 Vic Wheatman Speaks to Hytrust's President Eric Chui on Defensive Cloud and Virtualization

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Play Episode Listen Later Mar 2, 2014 9:32


A soon to be released survey conducted by cloud security automation provider Hytrust found that consumers believe corporations don't really care about protecting consumer data. Yet companies are increasingly moving to the cloud, causing a concentration of risk. securitycurrent's Vic Wheatman speaks with Hytrust's Co-founder and President Eric Chiu about improving trust and what comes after cloud.

Intel CitC
Securing the Cloud with Hytrust* - Intel® CitC epsiode 11

Intel CitC

Play Episode Listen Later May 20, 2012 7:08


Hytrust* CTO Hemma Prafullchandra discusses the security challanages faced by virtualized, private, and public cloud data centers alike and solutions for those challenges.