POPULARITY
In this episode, Mark Ledlow is joined by Michael LaVista, Founder and CEO of Caxy Interactive, a software company based in the Midwest. They delve into the evolving landscape of business, technology, and human interaction. The discussion highlights the importance of digital transformation for companies, the balance between face-to-face interactions and digital communication, and the rising significance of platforms like LinkedIn for business networking. The conversation also explores the potential of AI, the growth of private jet usage, and takes a deep dive into sales strategies and market insights. Key anecdotes include the value of in-person meetings versus digital meetings and the innovative approaches used by prominent companies.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdaptation to Digital: Companies have significant opportunities to become digital and scale operations efficiently without heavy reliance on human resources. Importance of In-Person Interaction: Face-to-face meetings and conferences are regaining importance post-COVID for building trust and effective communication. Human-Centered Approach: Understanding and addressing innate human emotions can improve customer experiences. Innovative Sales Strategies: Focusing on client engagement and real conversations can enhance sales outcomes. Effective Use of Technology: Services like JSX with Starlink show the value of reliable in-flight connectivity for maintaining business operations. Economic Resilience: Despite challenges, the American economy is expected to adapt and continue thriving with smart trade and business practices. AI Integration: Embrace AI cautiously but proactively, experimenting with its applications to stay ahead.QUOTES“The opportunity for a lot of companies is to sort of finally become digital. “People are so much more effective in person.”“Face-to-face time, shaking the hand, having a dinner, creates business intimacy.” “The idea that you can distribute content for basically free on platforms like YouTube is a game changer.” “Don't either be too hyped up or down on AI. It's going to make a difference and you might as well just jump in and start trying stuff.”Get to know more about Michael LaVista through the links below. https://www.linkedin.com/in/michaellavista/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow is joined by Michael LaVista, Founder and CEO of Caxy Interactive, a software company based in the Midwest. They discuss various topics including handling adversity, the rise of AI, and its implications for businesses. Mike shares insights on the software industry's evolution, the significance of automation, and the challenges posed by AI security. He also provides his perspective on the future of the tech industry, the impact of quantum computing, and the volatile nature of cryptocurrencies. The conversation gives listeners a comprehensive view of the current and future trends in technology and business.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdapting to AI: The discussion emphasizes the rapid integration of AI in businesses, moving from experimental phases to becoming part of operational systems. Efficiency and Automation: Mike discusses his passion for automation, stressing the importance of optimizing processes to eliminate manual, time-consuming tasks. AI and Security: There's an outlined concern about AI's role in cybersecurity, particularly the risks of AI being exploited for malicious purposes. Economic Volatility: Tariffs and geopolitical changes are influencing operational costs and strategies for businesses, especially those involved in manufacturing and trading. Technological Talent: There's a notable shortage of skilled developers, emphasizing the necessity for continuous learning and adapting hiring practices to include self-taught individuals. Future Trends: Quantum computing poses significant future risks to current encryption methods, indicating a paradigm shift in cybersecurity.QUOTES"I hate the idea of people doing manual slow, stupid things that drives me crazy." "The idea of like kind of protecting yourself and, you know, putting it in a walled garden where it's protected against hacking." "We're really looking for all of our growth around Chicago to develop like a good, you know, culture, corporate family there." "For me, cryptocurrency is really just gambling and that's okay. I'm not putting a judgment on it." "You have to be able to compete. And I feel like when you have all that waste lying around, that's where your margin dollars just slip away." "Developers aren't going away completely. It's just like a different, your job will be different."Get to know more about Michael LaVista through the links below.https://www.linkedin.com/in/michaellavista/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow, as the guest, sits down with Ben Hosking from Panoptic Solutions at the IPSB Close Protection Conference in Nashville. They share their backgrounds, explore career transitions, and discuss the value of industry events in the executive protection field. The conversation touches on the challenges of maintaining a fearless mindset, the critical role of trust in client relationships, and the evolving demands of the security industry. Personal anecdotes bring to life their journeys from military and firefighting roles to leadership positions in corporate and high-profile security sectors.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSHandling Adversity: The podcast emphasizes adapting and persevering through challenges, pointing out that career paths often evolve through unexpected events. Networking and Building Trust: Success in executive protection often hinges on trust and established relationships. Attending conferences and creating long-term partnerships are vital. Executive Protection Landscape: The industry has shifted significantly over the years due to technology and geopolitical changes, increasing the importance of protective intelligence and comprehensive security solutions. Service and Purpose: Many professionals in the industry are driven by a sense of purpose and service, often stemming from military or law enforcement backgrounds. Overcoming Fear: Emphasizes the importance of a fearless mindset, both personally and professionally, to achieve significant growth and success.QUOTES"We're selling trust, not executive protection." "Every overnight success takes about 10 years." "Fear is the mind killer and it stops more dreams than it does physical objections." "Service is absolutely everything; purpose comes through service." "You don't know what your calling is until your thirties or forties."Get to know more about Ben Hosking through the link below.https://www.linkedin.com/in/ben-hosking/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow dives into a refreshing discussion with security experts Bruno Dias and Matt Talbot. They share their extensive backgrounds in law enforcement and recount a harrowing incident involving a school shooting. Bruno discusses the complexities and challenges of managing the aftermath, focusing on the importance of prevention and creating collaborative safety environments. The conversation expands to broader societal issues, including the impact of technology and social media on security and well-being. Both guests emphasize the need for a preventative stance and a compassionate, community-focused approach to addressing and mitigating threats.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSchool Shooting Experience: Bruno shares his firsthand experience with a school shooting and the importance of preparation and response. Prevention Over Reaction: Emphasized the need for proactive threat assessment and the importance of early reporting to prevent violence. Impact of Technology: The conversation highlighted how technology, especially social media, can be both a tool and a threat in behavioral threat assessment. Community and Compassion: Stressed the significance of community support and compassion during times of economic and social hardship. Future Predictions: Discussion on the potential increase in workplace violence and emotional wellness challenges due to economic and political changes.QUOTES"You have to do the work with fidelity...threat assessment is not about risk elimination, it's about risk reduction.""Technology can be an accelerant...it can help validate feelings, stimulate ideas, and make ideas operational.""In desperate moments, people sometimes will resort to trying to control what they can't...often in destructive ways.""We need to use technology as a force for good...it's becoming increasingly difficult for parents and schools to monitor kids' use of technology.""By simply letting people know that you have a violence prevention model, you immediately improve their sense of wellness and security."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Reducing personal risk with your organisation's liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/
In this inspiring episode of The Women in the Arena Podcast, we sit down with Janet B. Nalls, Director and Chief of Staff at NetCentrics Corporation. A U.S. Air Force veteran and national security expert with over 25 years of experience, Janet shares her remarkable journey from serving as an intelligence analyst to advising top intelligence and DoD organizations.Janet opens up about her passion for mentorship, leadership, and empowering the next generation of national security professionals. She offers valuable insights into the critical areas of insider threat, counterintelligence, and strategic operations, all while reflecting on the importance of integrity, collaboration, and resilience in a demanding field.Beyond her professional achievements, Janet talks about balancing her role as a devoted mom and lifelong learner. Tune in for an authentic and motivating conversation that highlights what it truly means to lead with vision, heart, and strength.
In this episode, Mark Ledlow and Chuck Andrews discuss various topics including the economic growth in Texas, cultural differences across states, and the significance of diversifying business portfolios. The conversation touches on Chuck's experiences in law enforcement and the security industry, the evolving work ethic in younger generations, and the importance of mental toughness. They also discuss the challenges of organizing large events like Texas Night during hurricane season, the increase in school shootings versus domestic terrorism, and strategies for staying informed and proactive in an ever-changing business landscape. Tune in to gain insights from industry leaders and to understand what it takes to remain fearless amid adversity.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEconomic Growth in Texas: Discussion on the migration of financial and tech companies to Texas, contributing to its growing economy.Cultural Differences: Exploration of cultural contrasts between Texas and other states like California and New York.Relocating and Adapting: Emphasis on the importance of embracing new cultures and adapting to different environmentsWork Ethic: Reflection on the changing work ethic among younger generations compared to older ones.Diverse Experiences: Value of having diverse experiences, from law enforcement to business, in shaping a well-rounded career.School Safety and Behavior: Importance of focusing on the behavioral aspects of students to prevent school shootings, rather than just increasing security hardware.AI and Information Verification: Necessity of verifying sources in the age of AI to avoid being misled.QUOTES"Texas does remain the friendliest state in the United States.""Business is simple. Humans are simple. You just gotta take your time getting to know people.""Focus on the kids in terms of that. Invest in counseling and literally having the kids involve themselves.""With AI, you're gonna be fooled in a very big way. Big decisions are gonna be made and you'll have no idea what's going on.""Treat life in a more meaningful way; build trust and all that good stuff comes. Just gotta be patient. Play the long game."Get to know more about Charles "CHUCK" Andrews through the link below. https://www.linkedin.com/in/charlesandrewscpp/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow and Chuck Andrews, a renowned figure in the security industry known for his extensive global network and profound insights. Chuck shares his journey of building qualitative relationships, his strategies for managing a substantial LinkedIn following, and his future endeavors including a book tour across Europe. The discussion also delves into the challenges and opportunities in the security business, emphasizing the importance of trust and consistent relationship maintenance. Moreover, Chuck touches on issues like the impact of AI on business, geopolitical concerns, and the future of private equity in the industry. The episode is a rich blend of professional advice, personal anecdotes, and strategic insights pivotal for anyone looking to thrive in the security and business landscape.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Management: Insights into how business leaders handle challenges and adversity.Business Optimism: There's a noticeable sense of optimism in the business community, particularly in Texas.Quality vs. Quantity in Networking: The importance of building quality relationships rather than focusing on the number of connections.Trust and Relationships: Trust is the cornerstone of effective business relationships and must be maintained through consistency and integrity.Importance of Adaptability: The need to adapt business strategies in response to changing environments and tech advancements.Upcoming Events: Details on Chuck's book tour and the impactful events he is organizing, including a cruise focused on networking.QUOTES"You ain't seen nothing yet. The next four years is gonna be a Yee-haw version to the 10th power, you watch!""Maintenance of relationships...that's where the work begins.""It's better not to own boats, planes, and trains, but it's better to have friends who have boats, planes, and trains.""Get shit done. Everybody likes to get shit done.""Trust is earned in this business. People are watching you, they're vetting you, even when they're not talking to you.""AI is going to be the biggest investment space.""You will not be able to discern the difference between fact and fiction, right and wrong...that's how dangerous artificial intelligence can be."Get to know more about Charles "CHUCK" Andrews through the link below.https://www.linkedin.com/in/charlesandrewscpp/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Episode Topic In this episode of PayPd, host Kevin Rosenquist explores the urgent and growing issue of online impersonation and digital fraud with Kate Cox, Business Development Lead at Memcyco. As cyber threats become more sophisticated, Memcyco is pioneering real-time detection technology to uncover spoofed websites and protect both businesses and their customers from fraud. Lessons You'll Learn This episode dives deep into how fake websites are created, the mechanics of phishing and spoofing attacks, and the real-time tools being used to stop fraud before it starts. You'll gain insight into the role AI plays on both sides of the cybersecurity battle—enabling cybercriminals and empowering defenders. Kate also shares how businesses can protect their users and build long-term digital trust in an increasingly risky online world. About Our Guest Kate Cox is the Business Development Lead at Memcyco, a company at the forefront of digital fraud prevention. With a strong background in cybersecurity and business strategy, Kate works closely with organizations to implement proactive fraud protection solutions. Her mission is to make the internet safer by helping companies detect and block spoof sites in real time—before the damage is done. Topics Covered The rise and risk of spoofed websites The difference between phishing and spoofing attacks How Memcyco's real-time detection technology works The role of AI in modern cybercrime Building digital trust through proactive protection Emerging threats like session hijacking and man-in-the-browser attacks
Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.
March 26, 2025 ~ The editor in chief of The Atlantic, Jeffrey Goldberg, had been inadvertently added to a group chat on the messaging app Signal, featuring some of the most senior members of the United States government, to discuss a then-imminent U.S. attack on Houthi targets in Yemen earlier this month. Former Congressman Dave Trott joins Guy, Lloyd, and Jamie to discuss the raised questions about the administration's handling of national security.
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe importance of proactive surveillance and intelligence gathering in security.Lessons learned from historical security breaches and attack plots.The significance of cultural fit and adaptability in security teams.Challenges faced by security personnel in adjusting to different operational environments.The necessity to constantly update and share intelligence within the security community.The evolving methods of threat actors and their preparedness.Fred Burton's involvement in upcoming TV and film projects based on his books.QUOTES"The scope of detail that some of these threat actors are engaged with is just frightening.""Intelligence is powerful when done correctly.""You can't run a program without intelligence today.""If you've got a good security team, trained in observation skills, you should be able to spot threat actors ahead of time.""Getting people in and out without being hassled is the kind of value add that we routinely do in this business.""It's amazing what you can do if you just try to blend in and ask questions.""Some degree of protection at public venues is essential, especially for controversial issues.""Surveillance is critical before you get the bodies out there. Get that team out there moving around snooping."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode of The New CISO, host Steve Moore sits down with Michael Mendelsohn, CISO at Majesco, to discuss his journey in cybersecurity—from his early days as a software developer to leading security for a major insurance software company.Michael shares insights into the evolving role of a CISO, the intersection of security and technology, and how curiosity and problem-solving have shaped his career. He dives into his experience building Arcus, an early security tool designed for software inventory and patch management, and how grassroots security engineering played a pivotal role in his professional growth.Other key topics include:✅ The changing landscape of cybersecurity leadership✅ The balance between open-source tools and enterprise security solutions✅ AI's impact on security automation and risk management✅ How security leaders can work effectively with legal teams✅ The importance of curiosity, adaptability, and mentorship in a security careerWhether you're a seasoned security professional or an aspiring CISO, this episode offers valuable insights into the challenges and opportunities of leading security in today's rapidly evolving digital landscape.
Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Paul John Spaulding and Tim Brown, CISO at Solarwinds, to discuss cybersecurity talent, diving into the skills gap faced by security leaders today and what can be done about it. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSecurity Concerns on Open Borders: Despite the high number of migrants, there has not been a domestic act of terror directly linked to transnational terrorists from the southern border.Domestic vs. Geopolitical Threats: Domestic threats such as school shootings are more frequent and concerning compared to geopolitical and international threats.Historical Predictive Failures: The U.S. has historically struggled to predict major geopolitical events, regardless of advancements in intelligence.Adaptation and Responsiveness: The executive protection industry often operates reactively, highlighting the need for better proactive measures and adequate resourcing.Regional Differences in Security Perception: Security needs and perceptions differ greatly across the U.S., with coastal regions being more open to private security compared to more self-reliant attitudes in middle America.QUOTES"To the best of my knowledge, there never has been a domestic act of terror directly linked to a transnational terrorist coming from the southern border.""Trust me, you'll be the first one to know if I uncover something that you really need to be concerned about for you or your family.""Our nation seems to always be surprised... I want to believe that we're better today at anticipating surprise, but history has shown we're not.""Most CEOs today are almost more receptive to that kind of low-key protection."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, we sit down with Sounil Yu, Co-Founder and CTO at Knostic, a security company focusing on need-to-know-based access controls for LLM-based Enterprise AI.Sounil is a recognized industry security leader and the author of the widely popular Cyber Defense Matrix.Sounil and I dug into a lot of interesting topics, such as:The latest news with DeepSeek and some of its implications regarding broader AI, cybersecurity, and the AI arms race, most notably between China and the U.S.The different approaches to AI security and safety we're seeing unfold between the U.S. and EU, with the former being more best-practice and guidance-driven and the latter being more rigorous and including hard requirements.The age-old concept of need-to-know access control, the role it plays, and potentially new challenges implementing it when it comes to LLM'sOrganizations rolling out and adopting LLMs and how they can go about implementing least-permissive access control and need-to-knowSome of the different security considerations betweenSome of the work Knostic is doing around LLM enterprise readiness assessments, focusing on visibility, policy enforcement, and remediation of data exposure risks----------------Interested in sponsoring an issue of Resilient Cyber?This includes reaching over 16,000 subscribers, ranging from Developers, Engineers, Architects, CISO's/Security Leaders and Business ExecutivesReach out below!-> Contact Us! ----------------
Tyler Sweatt , CEO of Second Front Systems, joins host Aileen Blackon Leaders and Legends to discuss leadership, innovation, and the challengesfaced by national security leaders in today's rapidly changing environment.As the chief executive officer of Second Front Systems, Sweatt works to bridgethe gap between innovative technologies and national security organizations. In addition, he serves as a technical advisor at Pallas Advisors and a partner atthe non-profit Silicon Valley Defense Group. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Tyler Sweatt , CEO of Second Front Systems, joins host Aileen Black on Leaders and Legends to discuss leadership, innovation, and the challenges faced by national security leaders in today's rapidly changing environment. As the chief executive officer of Second Front Systems, Sweatt works to bridge the gap between innovative technologies and national security organizations. In addition, he serves as a technical advisor at Pallas Advisors and a partner at the non-profit Silicon Valley Defense Group. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Η κλιματική αλλαγή, και όχι η στρατιωτική απειλή της Κίνας, είναι το μεγαλύτερο ζήτημα ασφάλειας που αντιμετωπίζει η Αυστραλία, προειδοποιούν εμπειρογνώμονες.
9.27.2024 #RolandMartinUnfiltered: Trump 2.0's DOJ & Policing, National Security Leaders Endorse VP Harris, Project 2025 We saw what the Justice Department looked like under Trump. Tonight, a special panel will examine what a Trump 2.0 DOJ would look like. The list of those supporting Vice President Kamala Harris is growing. Over 700 National Security Leaders have Endorsed a Harris presidency. We'll talk to one of the National Security Leaders for America members. The CEO Black Economic Alliance will break down the Vice President's economic plan. New York Mayor Eric Adams makes his first court appearance on federal charges. A Michigan judge gets demoted after handcuffing a teenage girl for falling asleep in his courtroom during a field trip. We'll talk to a Law School graduate who breaks Down Project 2025 on social media. Download the #BlackStarNetwork app on iOS, AppleTV, Android, Android TV, Roku, FireTV, SamsungTV and XBox http://www.blackstarnetwork.com The #BlackStarNetwork is a news reporting platforms covered under Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.See omnystudio.com/listener for privacy information.
Alexandra Rose is the Director, Government Partnerships & Counter Threat Unit at Secureworks. In this episode, she joins host Heather Engel to discuss the value of threat intelligence for security leaders, including how it can reduce organizational risk, inform strategic decision-making, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Retired Army Major General Randy Manner of National Security Leaders for America joins Joan Esposito at the DNC to talk about his group's endorsement of Kamala Harris for president. Catch "Joan Esposito: Live, Local and Progressive" weekdays from 2:00 to 5:00 p.m. on WCPT.
Mark Ledlow features an in-depth discussion with a security expert, Adam Korn. They dive into the complexities of national security, focusing on nuclear threats, the protection of radiological materials, and the essential practices for securing them against potential terrorists. Discussions extend to the training of SWAT teams and responders to handle radiological threats, emphasizing the critical nature of best practices in security measures. Adam, with a background in criminal justice and international affairs, shares insights from his extensive experience at the National Nuclear administration and his current role as a security consultant. The conversation covers the convergence of physical and cybersecurity, the importance of emotional intelligence in the security industry, and the challenges and opportunities for training in the digital age. The episode also touches on the necessity for impactful onboarding and development programs that go beyond mere compliance, aiming to genuinely empower and prepare employees for safety and security challenges. Furthermore, they discuss upcoming regulations, like California's Senate Bill 553, and the pivotal role of detailed and effective training to meet and exceed such requirements.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe convergence of physical security and cybersecurity is essential in modern security strategies.Emotional intelligence (EQ) is crucial in security roles, aiding in de-escalation and effective communication.Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application.The importance of preparing for emerging threats like AI, which can enhance security measures when embraced effectively.Workplace violence prevention and compliance, as mandated by Senate Bill 553 in California, necessitate proactive training and policy development.QUOTES"The ideal training is in live interaction...My second most favorite is when you're having a live video session, but then again, people start to disengage because they're attached to a computer.""Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
The State Department investigates an alleged breach. The FCC looks at regulating connected vehicles. A big-tech consortium hopes to mitigate AI-related job losses. Google aims to thwart cookie-thieves. SurveyLama exposes sensitive info of over four millions users. Omni Hotels & Resorts is recovering from a cyberattack. A national cancer treatment center suffers a breach. How cyber is approached on both sides of the pond. In our Industry Voices segment , George Jones, CISO at Critical Start, discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Playing the identity theft long-game. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On Industry Voices, guest George Jones, CISO at Critical Start, joins us to share thoughts on the topic "Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders." George discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Selected Reading Threat Actor Claims Classified Five Eyes Data Theft (Infosecurity Magazine) Automakers and FCC square off over potential regulations for connected cars (The Record) Big tech companies form new consortium to allay fears of AI job takeovers (TechCrunch) Amazon is cutting hundreds of jobs in its cloud computing unit AWS (NPR) Google Proposes Method for Stopping Multifactor Runaround (GovInfo Security) Google fixes two Pixel zero-day flaws exploited by forensics firms (Bleeping Computer) SurveyLama data breach exposes info of 4.4 million users (Bleeping Computer) Omni Hotels confirms cyberattack behind ongoing IT outage (Bleeping Computer) The US or the UK: Where Should You Get a Cybersecurity Job? (GovInfo Security) US Cancer Center Data Breach Impacting 800,000 (SecurityWeek) Iowa sysadmin pleads guilty to 33-year identity theft of former coworker (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Shiva Nathan, Founder and CEO of Onymos, provides insight to recent government requirements for PII protection and how security leaders can implement them.
Given the macroeconomic climate, security leaders are constantly tasked to do more with less – you're being asked to take on more responsibility and protect your organizations against increasing cyber threats while balancing evolving regulatory frameworks and third-party vendor risk management. In this episode, Tia Hopkins, Chief Cyber Resilience Officer at eSentire, and Greg Crowley, Chief Information Security Officer at eSentire, discuss the trends they are seeing from a budgetary perspective and how security leaders can build a more resilient security operation. Key topics of discussion include: Most common types of cyber threats impacting businesses (e.g., the ‘as-a-service' business model, nation-state cyberattacks, etc.) Why security leaders need to shift from a cyber risk reduction mindset to building cyber resilience mindset The two options that security leaders have to build a more resilient security operation (i.e., DIY approach vs. outsourcing 24/7 threat detection, investigation, and response capabilities) How to build alignment with finance leaders to get the cybersecurity investment you need --- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.
What are CISOs to make of recent rulings against their colleagues and increasing scrutiny from the SEC, whose new reporting rules are dnow in effect? Host Pam Kubiatowski sits down with renowned Voya Financial CISO and FinTech veteran Stacy Hughes to discuss how the new rules affect incident response, the importance of CEO support, and considerations unique to the financial industry.
In an era characterized by the profound interconnection of technology, business strategy, and people within the realm of cybersecurity, the need for leaders with transformative capabilities has never been more critical. Join us as we explore the SANS Transformational Triad, an integral framework encompassing SANS' three most advanced security courses meticulously crafted for both existing and aspiring security leaders as well as Chief Information Security Officers (CISOs). This conversation will not only equip you with cutting-edge insights but also fortify your strategic ability to navigate the complex and dynamic landscape of cybersecurity leadership.Wait Just an Infosec is produced by the SANS Institute. You can watch the full, weekly Wait Just an Infosec live stream on the SANS Institute YouTube, LinkedIn, Twitter, and Facebook channels on Tuesdays at 10:00am ET (2:00pm UTC). Feature segments from each episode are published in a podcast format on Wednesdays at noon eastern. If you enjoy the Wait Just an Infosec live, weekly show covering the latest cybersecurity trends and news and featuring world-renowned information security experts, be sure and become a member of our community. When you join the SANS Community, you will have access to cutting edge cyber security news, training, and free tools you can't find anywhere else. Learn more about Wait Just an Infosec at sans.org/wjai and become a member of our community at sans.org/join. Connect with SANS on social media and watch the weekly live show: YouTube | LinkedIn | Facebook | Twitter
In today's episode, we welcome Darren Kane, Chief Security Officer at Australia's National Broadband Network to share his thoughts on the evolving role of security in the C-suite. Join us as Darren sits down with Clarke Rodgers, Director of AWS Enterprise Strategy to discuss the differences between the CISO and CSO roles and why “dropping the I” may be the next step in the evolution of security leadership.
What challenges do aspiring cybersecurity leaders face while trying to join the field? What can current security leaders do to help them? Answer these questions and more with George Gerchow, Chief Security Officer at Sumo Logic.
What do federal guidelines say about quantum computing preparation? How do security leaders prepare for future risks? Answer these questions and more on this episode of The Security Podcasts with Greg Wetmore, Vice President of Software Development at Entrust.
The long-standing divide between tech executives and security leaders has widened of late, says VP and Principal Analyst Jinan Budge. What's behind the tension, and what can be done to fix it? Budge shares insights from her latest research this week on What It Means.
All links and images for this episode can be found on CISO Series. When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our special guest, Tim Brown, CISO, Solarwinds. Thanks to our podcast sponsor, Push Security Do you have visibility of all the SaaS apps your employees are storing corporate data on? Are employees protecting all their accounts against identity-based attacks? Discover all the SaaS your employees use - including shadow apps and identities - and secure your data. Find out more at pushsecurity.com. In this episode: When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? During a major incident, which stress is more difficult to manage? Your own, or those around you? How is this everyone's concern?
In this episode, host Steve Morgan is joined by Mic McCully, Field CTO, and Jamie Smith, Product Marketing Director, at Snyk. Together, they discuss software supply chain attacks, what CISOs and security leaders need to know, and more. To learn more about our sponsor, Snyk, the developer security company, visit https://snyk.io
In this Security Leaders conversation, we're catching up with CJ Moses, Chief Information Security Officer at AWS, on the topic of vulnerability management. Join CJ and Clarke Rodgers, Director of AWS Enterprise Strategy, as they discuss basic cyber-defense strategies that have enormous impact.
As part of our ongoing coverage on cybercrime and cybersecurity, we recently spoke to several top experts about how they see it. On this episode, Jelle Wieringa, Security Awareness Advocate at KnowBe4, is joined by Bobby Ford, Senior Vice President and Chief Security Officer at HPE; Alissa Abdullah, aka Dr Jay, Deputy CSO and Senior VP of Emerging Corporate Security Solutions at Mastercard; Bret Arsenault, CVP & CISO at Microsoft; and Devon Bryan, Global CISO at Carnival Corporation. To learn more about our sponsor, KnowBe4, visit https://knowbe4.com
Guests: Allie Mellen, Senior Analyst at Forrester [@forrester]On Linkedin | https://www.linkedin.com/in/hackerxbella/On Twitter | https://twitter.com/hackerxbellaJeff Pollard, VP & Principal Analyst at Forrester [@forrester]On LinkedIn | https://www.linkedin.com/in/jpollard96/On Twitter | https://twitter.com/jeff_pollard2____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this new episode of Redefining CyberSecurity with Sean Martin, Allie Mellen, and Jeff Pollard engage in an in-depth conversation exploring security metrics' critical role and power in the infoSec decision-making processes. Throughout the dialogue, listeners can gain an understanding of the importance of implementing relevant metrics, such as Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR), for tracking growth within cybersecurity contexts. However, there's much more to metrics than just these two figures.Both Allie and Jeff emphasize that metrics should be perceived not merely as numerical values but as valuable guideposts aiding decision-making. This perspective, attributed to the Lean Startup philosophy by Eric Ries, encourages using metrics to guide future actions, understand current decisions, or evaluate past outcomes. They stress that metrics should have a genuine purpose and contribute meaningfully rather than just providing quantitative data.Furthermore, the conversation underscores the relevance of metrics to the decision-making audience. Allie and Jeff agree that metrics should differentiate between what matters only to your team and what's necessary for strategic decisions in the broader organization. They become truly impactful by ensuring metrics support decision-making and reach the right audience, whether it's senior leadership, the security program, or the tactical metric practitioners.Storytelling's role is highlighted as vital in presenting these metrics to various stakeholders, making the data more meaningful, understandable, and actionable. The conversation extends the notion of metrics, applying concepts like readmission rates, commonly used in healthcare, to measure incident recurrence in cybersecurity.The trio also spotlights the need for a synergistic relationship between the Security Operations Center (SOC) and Vulnerability Risk Management (VRM). Such a relationship fosters improved security posture through effective incident management and prevention, with Allie reasoning that translating data into something meaningful for other business units is crucial.Touching upon individual metrics in the context of career progression, both Allie and Jeff emphasize the necessity for individuals to define their career-oriented metrics based on their personal goals and organizational expectations. This understanding can help leaders prove their program's success and influence others.The conversation ultimately underscores the importance of the right data sources for calculating meaningful metrics. Without the correct data, generating truly impactful and actionable metrics becomes impossible. Jeff cites an example of a financial organization that used a unique metric to measure insider risk, emphasizing the complexities and challenges of deriving meaningful and actionable cybersecurity metrics.There's a lot to unpack in this conversation. Listen to the entire episode so you don't miss a beat.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance. Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare. Check out Duality's webinar, Why Data, Privacy, & Security Leaders are Key to Growth & Innovation Impactful Moments: 00:00 - Introduction 01:09 - What is homomorphic encryption? 04:03 - Misconceptions of security and privacy 06:25 - What is Duality's mission? 10:04 - Does Google Drive use homomorphic encryption? 13:08 - What homomorphic encryption enables 22:08 - Innovations that Duality is working on 24:37 - Secure data analytics and Homomorphic encryption 31:41 - Impact of AI and LLMs on security and privacy Links: Stay in touch with Derek Wood on LinkedIn: https://www.linkedin.com/in/drwood/ Learn more about Duality Technologies: https://dualitytech.com/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
In this episode of The New CISO, Steve is joined by guest Michael Meis, Associate CISO of the University of Kansas Health System.Beginning his career in the U.S. Army Signal Corp, Michael eventually transitioned into government consulting and the private sector. Today, he shares his philosophies on leadership and ownership in the cybersecurity field. Listen to the episode to learn more about his extensive technology background, the importance of inter-department friendships, and how he helps fellow service members make their professional transitions.Listen to Steve and Adam discuss how to navigate bureaucracy and adapt to corporate environments:Meet Michael (1:41)Host Steve Moore introduces our guest today, Michael Meis. Michael has been in IT and security for fifteen years and healthcare for two years. Michael met Steve a year ago during a security conference, leading to their connecting around the industry and their philosophies on leadership.Michael also reflects on his role in the military, which began with him working with radios and evolved into performing general technology support.Getting His Start (6:09)Michael was always interested in computers but initially never saw it as a career. He decided to join the military instead. However, his military recruiter encouraged him to take a tech-related job, and his security journey began. This first army signal corps job was less computer-heavy than expected, but Michael still learned a lot.Dealing With Corporate Politics (9:07)For ten years, Michael worked as a government consultant. This experience taught Michael to navigate complex bureaucratic dynamics to get past red tape.Michael highlights the importance of having solid relationships in different departments to get things done. You can determine which workplace rules to bend when you understand how things are and how your organization operates. Finding a Path (14:01)Michael expands on the importance of relationships in a corporate setting. You can leverage those relationships when needed to promote your department's agendas.The more you understand your organization's rules and politics, the less friction you will face, and the more you can build a trusted security culture. Government Challenges (22:44)Steve presses Michael on his quote, “Governance is important, but alone won't solve all of your problems.”Anyone who has worked in government understands that there are always challenges within its IT environments. Since the government has total control over its IT, Michael learned early on that more than governance is needed to perfect these systems. Collaboration is needed between parties.Excuses, Excuses (28:13)Michael shares the security community's common excuses that tend to irk him. Budget professionals can be challenging to work with from a leadership perspective. He also gets frustrated when people use a lack of training as a reason not to try something. Michael values training, but he understands that sometimes you have to take action before that formal training comes.Behavioral Norms (33:50)Michael explores the behavioral norms that came out of his military service.Learning how to function in a corporate environment is essential for people to know when leaving the military. The benefits of this experience were the rigor and structure, which can provide direction in life. On the flip side, it can be challenging to transition from that structure because you can grow dependent on it.Helping Others (39:07)As a leader, Michael tries to help other service members remove their need for a manual when making corporate transitions. That way, they can learn to embrace their...
Guests: Sarah Freeman, Principal Cyber Engagement Operations Engineer, MITRE [@MITREcorp]On LinkedIn | https://www.linkedin.com/in/sarah-freeman-7817b121/At RSAC | https://www.rsaconference.com/experts/sarah-freemanMegha Kalsi, Director - Digital, Cybersecurity, AlixPartners [@AlixPartnersLLP]On LinkedIn | https://www.linkedin.com/in/meghakalsi/At RSAC | https://www.rsaconference.com/experts/megha-kalsiKristy Westphal, Director, Information Security and Operations, HealthEquity [@HealthEquity]On LinkedIn | https://www.linkedin.com/in/kmwestphal/At RSAC | https://www.rsaconference.com/experts/kristy-westphal____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesGiven recent changes in the financial posture in nearly every economy, many organizations are faced with challenges from rising interest rates, bank failures, and dissipating venture capital. With this, and other fiscal issues that may be surfacing, how do security leaders look at budgets differently? In this session, we'll explore:How, where — and on which technologies — are organizations spending their money earmarked for cybersecurity?How do they know they are spending the right amount of money in the right places at the right times?How do security teams organize their thoughts, plans, and budget requests — and how do they present them to executive staff — to ensure they are speaking to these fiscal challenges they face in the context of the rest of the business?____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
In today's episode we explore why positive choices are critical in conflict de-escalation. As church security leaders, it's important to understand how positive choices can be used to empower individuals to make the right decisions in potentially volatile situations. Join me as I take you through a real-life example of how giving a highly agitated person positive choices can help you de-escalate conflicts effectively. If you're interested in learning more, be sure to check out my Amazon best-selling book, "10 Powerful Strategies for Conflict De-Escalation," available here: https://a.co/d/5SEkSQ8
Greg Crowley, CISSP, CISM is the Chief Information Security Officer at eSentire. In this episode, Greg joins host Steve Morgan in the Cybercrime Magazine studios to discuss what it means to do more with less in the cybersecurity space, alongside sharing some advice for security leaders looking to reprioritize their spends, and more. To learn more about eSentire, visit https://esentire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In the leadership and communications section, Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape, Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025, How to Empower Teams, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw295
Debbie Gordon is the CEO at Cloud Range. In this episode of Cybercrime Radio, Debbie joins host Steve Morgan to discuss some of Cloud Range's most valuable content for CISOs and security leaders, including the Cloud Range Blog, FlexLabs, and more. To learn more about our sponsor, visit https://cloudrangecyber.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
In this episode of Cybercrime Radio, host Steve Morgan is joined by Gordon Lawson, CEO at Conceal, and Ron Gula, President and Co-Founder of Gula Tech Adventures, who is on the Board of Advisors for Conceal. Together, they discuss ‘good security,' how vulnerability scanning, penetration testing, and the practice of finding malicious implants are all part of it, and more. To learn more about our sponsor, visit https://conceal.io
All links and images for this episode can be found on CISO Series Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gatekeepers. What can be done to improve recruiting of CISOs? Check out this post and this post for the discussions that are the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn with our guest Ty Sbano (@tysbano), CISO, Vercel. Thanks to our podcast sponsor, Thinkst Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents. In this episode: What can be done to improve CISO recruiting? Is there a disconnect between HR and what the company actually needs regarding a position? How long should the interview process take?