Podcast appearances and mentions of ron woerner

  • 11PODCASTS
  • 19EPISODES
  • 1hAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 11, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ron woerner

Latest podcast episodes about ron woerner

UNSECURITY: Information Security Podcast
Meet the Mentors - Ron Woerner

UNSECURITY: Information Security Podcast

Play Episode Listen Later Mar 11, 2024 34:13


Episode 218 of the Unsecurity Podcast is now live!This time, Brad is joined by Ron Woerner for another episode of our "Meet the Mentors" series introducing the 2024 CISSP Mentor Program instructors!Links & information:Find Ron on LinkedInhttps://www.linkedin.com/in/ronwoerner/Please send any questions, comments, or feedback to unsecurity@protonmail.com.About FRSecurehttps://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs.These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

Cyber Crime Junkies
Zero Trust. Social Engineering. Ron Woerner.

Cyber Crime Junkies

Play Episode Listen Later Jun 8, 2023 42:41 Transcription Available


Zero Trust. New Approaches to Social Engineering. Video Episode:  https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity careers. We cover key topics:New approaches to understanding zero trust, New Approaches to understanding social engineering, best cybersecurity practices for business, best policies to limit cyber liability, best practices identity protection, business benefits for having security assessments done, educating on security by podcasting, how intelligence gathering is critical to security, how to communicate effectively internally in business, impact the new us security strategy have on ai, innovative ways for security education, latest security expert insight, lowering risk of a data breach by security awareness training, new approaches to security awareness, new ways to limit cyber liability, newest ways to protect your identity online today, social engineering the science behind it, top security tips we all want to know, understanding the hacker mindset, understanding the neuroscience of social engineering, ways to stop social engineering.Audio Podcast: Available Everywhere.  Thanks for Listening and Watching. PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others. Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg  Connect with us. DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/ Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/ Cyber Crime Junkies Instagram: https://www.instagram.com/cybercrimejunkies/ CyberCrimeJunkies Podcast Cyber Crime Junkies: https://cybercrimejunkies.buzzsprout.com  Site, Research and Marketplace: https://cybercrimejunkies.com Support the showWant EXCLUSIVE Content? For only $4 SUBSCRIBE to Cyber Crime Junkies PRIME https://www.buzzsprout.com/2014652/supporters/newPlease consider subscribing to our YouTube Channel for ALL Video episodes. It's FREE. It helps us help others. Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg

Data Security and Privacy with the Privacy Professor
Individuals & Businesses: Mitigate! Those! Risks!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jun 3, 2023 55:28


Everyone is at risk of cybercrime, privacy breaches, and associated physical risks. Individuals in their personal lives, as well as businesses and their employees within work areas…which are often in homes, and other locations outside of physical business facilities…are at risk. Each and every one of them needs to understand how to recognize information security and privacy risks, and basic ways to mitigate those identified risks. But most folks don't know how to do this. More needs to be done to raise awareness of these important life-encompassing risks if we have any chance at all of slowing down and preventing security incidents and privacy breaches. We dedicate this episode to supporting that goal! In this episode Rebecca has a highly informative discussion with Ron Woerner, a noted international consultant, keynote speaker, teacher, blogger, and writer in the Privacy and Cybersecurity industry. The show starts with the inaugural episode of the new game show, “Mitigate! That! Risk!” Discussion then covers the following: • What are risks in personal lives, as opposed to in business? • What is risk management? • What has been the most significant change in risk management since Ron started his security and privacy career? • What has stayed the same for risk management since the beginning of Ron's career? • What is zero trust, as it relates to risk management? • What is data centric security, as it relates to risk management? • And more… Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #RiskAssessment #RiskAnalysis

Data Security and Privacy with the Privacy Professor
Individuals & Businesses: Mitigate! Those! Risks!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jun 3, 2023 55:28


Everyone is at risk of cybercrime, privacy breaches, and associated physical risks. Individuals in their personal lives, as well as businesses and their employees within work areas…which are often in homes, and other locations outside of physical business facilities…are at risk. Each and every one of them needs to understand how to recognize information security and privacy risks, and basic ways to mitigate those identified risks. But most folks don't know how to do this. More needs to be done to raise awareness of these important life-encompassing risks if we have any chance at all of slowing down and preventing security incidents and privacy breaches. We dedicate this episode to supporting that goal! In this episode Rebecca has a highly informative discussion with Ron Woerner, a noted international consultant, keynote speaker, teacher, blogger, and writer in the Privacy and Cybersecurity industry. The show starts with the inaugural episode of the new game show, “Mitigate! That! Risk!” Discussion then covers the following: • What are risks in personal lives, as opposed to in business? • What is risk management? • What has been the most significant change in risk management since Ron started his security and privacy career? • What has stayed the same for risk management since the beginning of Ron's career? • What is zero trust, as it relates to risk management? • What is data centric security, as it relates to risk management? • And more… Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #RiskAssessment #RiskAnalysis

Paul's Security Weekly (Podcast-Only)
PSW #773 - Ron Woerner

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Feb 16, 2023 187:13


Zero Trust is the buzzword of the 2020's. Vendors are selling it, the US Federal Government is requiring it, and organizations are implementing it, but what does it really mean (I mean really beyond the hype)? In this segment, Paul and Ron will talk ways combat threats through people, process, and technology Zero Trust Risk Management. Segment Resources: Forrester Research Zero Trust blogs: https://www.forrester.com/blogs/category/zero-trust-security-framework-ztx/ Ron Woerner YouTube: https://www.youtube.com/user/ronw68123 VetSec: https://veteransec.org/ Free CISSP Training Program: https://frsecure.com/cissp-mentor-program/   In the Security News: If it can run Linux, it should, TikTok thefts, significant vulnerability findings, and I'm not even joking, typo squatting is lame, what will it take Bruce!, stealing from the TPM, GoAnywhere, including root, what if attackers targeted your yacht?, two for the price of one (exploits), X is really old, and vulnerable, come for a ride on a CHERI-OT and be memory safe, codebreaking old letters, and vulnerable wienermobiles! All that, and more, on this episode of Paul's Security Weekly!   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/psw773

Paul's Security Weekly (Video-Only)
Zero Trust ≠ Zero Risk: Leveraging Risk Techniques for Zero Trust Acceleration - Ron Woerner - PSW #773

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Feb 16, 2023 59:20


Zero Trust is the buzzword of the 2020's. Vendors are selling it, the US Federal Government is requiring it, and organizations are implementing it, but what does it really mean (I mean really beyond the hype)? In this segment, Paul and Ron will talk ways combat threats through people, process, and technology Zero Trust Risk Management. Segment Resources: Forrester Research Zero Trust blogs: https://www.forrester.com/blogs/category/zero-trust-security-framework-ztx/ Ron Woerner YouTube: https://www.youtube.com/user/ronw68123 VetSec: https://veteransec.org/ Free CISSP Training Program: https://frsecure.com/cissp-mentor-program/   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw773

Paul's Security Weekly TV
Zero Trust ≠ Zero Risk: Leveraging Risk Techniques for Zero Trust Acceleration - Ron Woerner - PSW #773

Paul's Security Weekly TV

Play Episode Listen Later Feb 16, 2023 59:20


Zero Trust is the buzzword of the 2020's. Vendors are selling it, the US Federal Government is requiring it, and organizations are implementing it, but what does it really mean (I mean really beyond the hype)? In this segment, Paul and Ron will talk ways combat threats through people, process, and technology Zero Trust Risk Management. Segment Resources: Forrester Research Zero Trust blogs: https://www.forrester.com/blogs/category/zero-trust-security-framework-ztx/ Ron Woerner YouTube: https://www.youtube.com/user/ronw68123 VetSec: https://veteransec.org/ Free CISSP Training Program: https://frsecure.com/cissp-mentor-program/   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw773

Paul's Security Weekly
PSW #773 - Ron Woerner

Paul's Security Weekly

Play Episode Listen Later Feb 16, 2023 187:13


Zero Trust is the buzzword of the 2020's. Vendors are selling it, the US Federal Government is requiring it, and organizations are implementing it, but what does it really mean (I mean really beyond the hype)? In this segment, Paul and Ron will talk ways combat threats through people, process, and technology Zero Trust Risk Management. Segment Resources: Forrester Research Zero Trust blogs: https://www.forrester.com/blogs/category/zero-trust-security-framework-ztx/ Ron Woerner YouTube: https://www.youtube.com/user/ronw68123 VetSec: https://veteransec.org/ Free CISSP Training Program: https://frsecure.com/cissp-mentor-program/   In the Security News: If it can run Linux, it should, TikTok thefts, significant vulnerability findings, and I'm not even joking, typo squatting is lame, what will it take Bruce!, stealing from the TPM, GoAnywhere, including root, what if attackers targeted your yacht?, two for the price of one (exploits), X is really old, and vulnerable, come for a ride on a CHERI-OT and be memory safe, codebreaking old letters, and vulnerable wienermobiles! All that, and more, on this episode of Paul's Security Weekly!   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/psw773

UNSECURITY: Information Security Podcast
UNSECURITY Episode 129: Open Discussion with Ron Woerner on RSA, Bellvue, and Social Engineering

UNSECURITY: Information Security Podcast

Play Episode Listen Later Apr 27, 2021 65:43


Evan and Brad are joined by Ron Woerner for episode 129 of the UNSECURITY Podcast. Ron and Evan first met at RSA, and they bonded over their shared passion to help people from all walks of life better protect themselves from cyber threats. Together, the three have an open discussion about current events, projects Ron is working on, and what's generally top of mind.Give episode 129 a listen or watch and send questions, comments, and feedback to unsecurity@protonmail.com.

K12 Cybersecurity Podcast
K12 Cybersecurity Podacst Episode 4: Teaching Cybersecurity to K12

K12 Cybersecurity Podcast

Play Episode Listen Later Apr 16, 2020 30:34


In this episode, we discuss with our guest Ron Woerner what it's like to teach cybersecurity and how a school can get started teaching it, adjusting to the new normal, K12 cybersecurity challenges after COVID and what the average person needs to know at home to be secure.

Business of Security Podcast Series
#21 - Kristin Judge, CEO, Cybercrime Support Network - Great Leadership in Cyber Security While Tackling Cybercrime

Business of Security Podcast Series

Play Episode Listen Later Jan 22, 2019 33:15


Kristin Judge brings a very interesting background in counseling, teaching, public service and leadership to drive cybersecurity awareness and learning to the masses. Ron Woerner and Kristin have a conversation about the qualities of a good leader and how this can translate into driving change and awareness across the cyber security landscape. Kristin stresses the importance of having a mentor and mentee relationship no matter the level of your current role. In the second half of the podcast Kristin takes us through the development of the Cybercrime Support network and the benefits this offers to people impacted by cybercrime where traditional law enforcement may not necessarily be the appropriate avenue or have the right tools to respond to the crimes that occur through electronic interactions.LinkedIn: https://www.linkedin.com/in/kristin-judge-1108b624/Websites:CybercrimeSupport.org Fraudsupport.org

Business of Security Podcast Series
#19 - Joyce Brocaglia - CEO, Alta Associates - Building Diverse and Competitive Teams in Cyber Security

Business of Security Podcast Series

Play Episode Listen Later Dec 20, 2018 38:20


Ron Woerner connects with Joyce Brocaglia, CEO of Alta Associates and Founder of Executive Women's Forum. Joyce covers the importance of investing in one's own career and how to grow into a leadership CISO role to gain the proverbial "seat at the table" with the business. Further discussion leads to describing the importance and approach to building diverse and competitive teams in cyber security and privacy. Joyce takes us through the history of the Executive Women's Forum now on its' sixteenth year. Finally Joyce answers the question: "What do business leaders need to know and understand to build and run a cyber security program?"Executive Women's Forum: https://www.ewf-usa.com/Alta Associates: https://www.altaassociates.com

ceo founders diversity cybersecurity competitive diverse ciso ron woerner alta associates executive women's forum
Business of Security Podcast Series
#15 - Chris Hadnagy, CEO, Social-Engineer, LLC - Hacking the Human!

Business of Security Podcast Series

Play Episode Listen Later Nov 8, 2018 35:58


Chris Hadnagy joins Ron Woerner on this season 2 episode 6 titled Hacking the Human. A master of social engineering, Chris starts the episode with real-world scenarios that interesting and entertaining based on real-life social engineering exercises he has conducted. Further in the episode Chris shares valuable insight into understanding people and the value of becoming an active listener - specifically as a leader. Ron dives into the inevitable of being phished with Chris providing insights on responding to phishing attacks and improving protection in the future. Linkedin: https://www.linkedin.com/in/christopherhadnagy/Twitter: @SocEngineerIncWeb: social-engineer.com

Business of Security Podcast Series
#14 - Ben Rothke, Senior Security Consultant, Nettitude - Securing Small-Medium Business

Business of Security Podcast Series

Play Episode Listen Later Nov 1, 2018 42:05


Ben Rothke joins Ron Woerner on this episode to discuss Ben's experience that lead to his book titled Computer Security: 20 Things Every Employee Should Know (McGraw-Hill). Ben addresses the question "what has changed in 20 years" and also reviews some best practices that are very relevant today. Focusing security on the data is where the conversation should start and build out cybersecurity capabilities from there. As cybersecurity is no longer an option, it is a cost of doing business, this episode speaks to the necessity and potential trade off of investing in cyber security. Ben follows up with the top skills a person should have to be a great cyber security practitioner.Ben Rothke's website: http://www.rothke.comAuthor of: Computer Security: 20 Things Every Employee Should KnowTwitter: @benrothke

Business of Security Podcast Series
#11 - Robert Baldi, Director of Cyber Security Audit, Equifax - Audit as a Security Partner and Line of Defense

Business of Security Podcast Series

Play Episode Listen Later Oct 14, 2018 40:47


Robert Baldi joins Ron Woerner on the Business of Security Podcast Series for a discussion about Cyber Security Audit and using the audit capability as a way to leverage change and enhance overall security performance. Robert discusses using a mathematical formula for risk and translating this back into the investments for a Board discussion. Collaboration between security, audit and risk teams is key to success of all three parties.

Business of Security Podcast Series
#10 - Introduction to Season 02 - Ron Woerner and Chad Boeckmann

Business of Security Podcast Series

Play Episode Listen Later Sep 30, 2018 29:22


Chad Boeckmann and Ron Woerner discuss the theme of Season 2 podcast, upcoming guests and also share some of their own experiences over many years in the cyber security industry. Topics include the important skills the industry still needs and where the emphasis should be for upcoming professionals. We also discuss the definition of "Security Ground-Hog Day. Tune in!

business leadership cybersecurity ron woerner chad boeckmann
Bill Murphy's  RedZone Podcast | World Class IT Security
Top 4 Cyber Security Competitions to build Tenacity, Will, Grit, Determination, IQ and Neuro-musculature | Episode #26

Bill Murphy's RedZone Podcast | World Class IT Security

Play Episode Listen Later Oct 1, 2015 58:45


Ron is an expert in what it takes to develop the next generation of cyber security leaders. • He is the Air Force Association US CyberPatriot 2013-2014 Mentor of the Year for his work with high school cybersecurity competitions. • Ron Woerner is the Director of Cybersecurity Studies at Bellevue University. He has over 25 years of corporate and military experience in IT and Security Resources for Cyber Security Team Competitions 1) Cyber Patriot Youth cyber security team competitions and explanations of the various levels of competition 2) ISC2/MITRE Cyber Challenge Academy Competitions – Capture the Flag 3) National Collegiate Cyber Defense Competition (CCDC) 4) Dr Dan Manson Cal State Pomona who created a single site to coordinate all cyber security competitions into one site called Cyber Security Federation - Single Site for information - Creating a sport out of cyber security competitions

CYBER LIFE
Season 3 Episode 12: Ron Woerner and Charlie Dagwell

CYBER LIFE

Play Episode Listen Later Dec 31, 1969 30:06


Join me in the latest episode of the Cyber Life podcast, where I chat with Ron Woerner and Charlie Dagwell.We'll talk about some security fundamentals from Ron that small business owners can do and also learn from recruiting expert Charlie on things you can do to get that dream job.Connect with Ron and Charlie on LinkedIn and be sure to personalize the invite to let them know you enjoyed this episode.Ron Woernerhttps://www.linkedin.com/in/ronwoerner/Charlie Dagwellhttps://www.linkedin.com/in/charlie-dagwell-27231092/Support this podcast at — https://redcircle.com/cyber-life/donations

ron woerner