show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Artwork

1
Frontmatter

Leanpub

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
In Leanpub's Frontmatter podcast, we interview authors and special guests about their lives & careers, their areas of expertise and the issues of the moment, and their experiences as writers. Every episode is deeply researched and covers areas that are equally of human interest, general interest, and professional interest.
  continue reading
 
Digital Self-Defense is a podcast that explains the basics of cybersecurity and data protection in an accessible, user-friendly voice. DSD instructs listeners in understanding the basics of cybersecurity, dissects and explains significant current events relating to cybersecurity, and helps listeners learn how to keep themselves from hacks and threats. Hosted by cybersecurity professional Tim Honker (CISSP), Digital Self Defense avoids technical jargon at all costs and provides an overview ab ...
  continue reading
 
Artwork

1
Your Career On Target

InterCoast Colleges

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Vocational school is becoming a popular choice among graduates and others looking to pave a new career path, especially with the cost of college climbing. Furthering your education is always a great idea, so if you have your heart set on a particular occupation, check out a trade school first. You may be pleasantly surprised to find you can get your training in the trades or in healthcare faster, for a lot less money and still come out with a job.
  continue reading
 
“The difficulty”, writes Keynes, “lies not in the new ideas, but in escaping from the old ones.” Outgrow’s Marketer of the Month podcast documents this tussle of the old and the new across 21 different industries. Tune in to listen to thought-provoking guests ranging from the leaders of Fortune 500 companies, Tech Unicorns, Governments, Anonymous Collective, Media, Pulitzer Prize Winners, Professors, and (of course) Tiktokers!
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Send us a text Digital signatures are coming to AI models as cybersecurity evolves to meet emerging threats. Google's collaboration with NVIDIA and HiddenLayer demonstrates how traditional security controls must adapt to protect machine learning systems vulnerable to new forms of tampering and exploitation. This essential evolution mirrors the broa…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss recent cybersecurity attacks on Australia's largest pension funds, analyzing the implications of these breaches and the government's response. They discuss the financial impact of the attacks, the strategies being implemented to enhance cybe…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Chris Abacon, and Daniel Acevedo discuss a variety of topics ranging from cybersecurity news to personal updates, including conference experiences, entertainment choices, and family life. They share insights on certifications, gaming preferences, and the challenges …
  continue reading
 
Send us a text Cybersecurity professionals know that mastering identity and access management concepts is essential for CISSP certification success. This deep dive into Domain 5.2 tackles fifteen carefully crafted questions covering everything from just-in-time provisioning to federated identity systems and session security. We begin by examining t…
  continue reading
 
In this Leanpub Podcast episode, Len Epp interviews Nicolas Brown, author of Real World Agility: Backed by evidence, built for results.Nicolas shares his unique path from the Royal Mail to working in e-commerce, financial services, and eventually as a sought-after agility and product consultant. He explains his evidence-based approach to agile coac…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Chris Abacon, and Daniel Acevedo discuss the latest cybersecurity news, focusing on a phishing attack that targeted security expert Troy Hunt. They explore the implications of such attacks, the human vulnerabilities that can lead to breaches, and the importance of b…
  continue reading
 
Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec or Youtube: https://youtube.com/c/BDSPodcast join the Discord: https://bit.ly/brakesecDiscord https://arxiv.org/abs/2302.14172 - EPSS whitepaper https://www.linkedin.com/posts/jayjacobs1_epss-threatintel-vulnerabiltymanagement-activity-7308146548767404032-RubN https://www.first.org/epss/…
  continue reading
 
In this episode, the hosts discuss the alarming rise of sophisticated phishing attacks, particularly focusing on a new phishing-as-a-service (PhaaS) platform, Morphing Meerkat, that utilizes DNS and mail exchange records to create realistic fake login pages for over 114 brands. They emphasize the importance of vigilance and best practices in cybers…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss a significant cybersecurity incident involving a leak on the Signal messaging platform. They explore the implications of this leak, particularly in relation to military standards and accountability. The conversation dives into the misuse of technology in secure communicati…
  continue reading
 
Send us a text Identity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing identification and authentication systems that protect your most valuable assets. Starting wi…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from movie and TV show reviews to cultural commentary on tourism and taxation issues. They share personal experiences, including a recent staycation and gaming achievements, while also touching on t…
  continue reading
 
Send us a text Cybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remote code simply by having users click malicious links. Though initially targeting Russian or…
  continue reading
 
In this Leanpub podcast episode, co-founder Len Epp interviews Isaak Tsalicoglou, author of Northwind Elixir Traders: Learn Elixir and database modeling with Ecto and SQLite, all in one project. They discuss Isaak’s professional background in digital transformation, how a conversation with a friend sparked his obsession with functional programming,…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss the recent acquisition of Pokemon Go, by Saudi Arabia. They delve into the implications of this acquisition on data privacy, the selective outrage surrounding data ownership, and the broader concerns regarding global data privacy laws. The conversation highlights the hypoc…
  continue reading
 
In this episode, the hosts discuss the evolving landscape of cybersecurity, focusing on Hong Kong's new cybersecurity law aimed at safeguarding key facilities. They explore the implications of this law, the global trend towards stricter cybersecurity regulations, and the U.S. perspective on international cybersecurity threats. The conversation high…
  continue reading
 
⬥GUEST⬥ Ken Huang, Co-Chair, AI Safety Working Groups at Cloud Security Alliance | On LinkedIn: https://www.linkedin.com/in/kenhuang8/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this e…
  continue reading
 
Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec Join the Discord! https://bit.ly/brakesecDiscord Questions and topics: (please feel free to update or make comments for clarifications) * https://techoreon.com/http-flaw-in-apple-passwords-left-iphones-vulnerable/ * https://darkmarc.substack.com/p/attackers-dont-need-exploits-when * http…
  continue reading
 
Retired US Air Force cybersecurity expert, Chris Hannifin, finds himself at the center of a potential economic espionage scandal in San Antonio, Texas. His company, DefendIT Services, is under suspected of being a front for the selling of sensitive information to foreign state actors, and brokers. Hannifin's previous employment at companies handlin…
  continue reading
 
Send us a text The unexpected convergence of consumer technology and warfare takes center stage as Sean Gruber explores how Chinese e-commerce giants now sell drone accessories that transform $300 toys into semi-autonomous weapons. This eye-opening discussion reveals how modern drones with AI guidance modules and fiber optic tethers mirror strategi…
  continue reading
 
Article: US teachers’ union says hackers stole sensitive personal data on over 500,000 members https://techcrunch.com/2025/03/19/us-teachers-union-says-hackers-stole-sensitive-personal-data-on-over-500000-members/?fbclid=IwZXh0bgNhZW0CMTAAAR3rPZEGWCJmue72EMeyZMfQTOhAXMC4ydOXW1WBYzF285xzlOggdYVrjJM_aem_iaRfgO6u7MZgw7tQEYRLiA&guccounter=1 Please LIST…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss their week, including media they consumed, upcoming spring break plans, and reviews of popular shows and movies like Invincible and Captain America: Brave New World. They share personal anecdotes and insights into the entertainment industry,…
  continue reading
 
Send us a text Today's cybersecurity landscape demands vigilance on multiple fronts, something Sean Gerber demonstrates masterfully in this information-packed episode focused on CISSP Domain 3 security principles. The episode opens with a critical security alert regarding Cox modems—a vulnerability potentially affecting millions of American househo…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the pressing cybersecurity challenges faced by rural hospitals, particularly in the aftermath of the COVID-19 pandemic. They explore the optimism of rural healthcare providers regarding their finances despite the ongoing risks, the role of AI in healthcare, and the importance of maintaini…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the Navy's introduction of the Mosaics Cybersecurity Framework aimed at enhancing the security of critical infrastructure. They explore the importance of safeguarding industrial control systems, the historical context of cybersecurity effort…
  continue reading
 
⬥GUEST⬥ Allie Mellen, Principal Analyst, Forrester | On LinkedIn: https://www.linkedin.com/in/hackerxbella/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE NOTES⬥ In this episode, Allie Mellen, Principal Analyst on the Security and…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the recent cuts to CISA's funding and workforce, exploring the implications for cybersecurity services provided to local governments. They emphasize the importance of CISA's role in protecting national security and the potential consequences…
  continue reading
 
Send us a text The cybersecurity landscape is constantly evolving, with even major corporations falling victim to devastating attacks. A recent UnitedHealthcare ransomware incident cost the company $22 million, with fingers pointing at leadership for allegedly appointing an unqualified CISO. This sobering reality highlights why defense in depth str…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from personal updates, family celebrations, and media consumption to gaming experiences and the upcoming NFL draft. They share insights on the latest shows, including Severance and Daredevil, and re…
  continue reading
 
Send us a text A seemingly simple company restructuring at Eaton triggered a devastating cybersecurity incident when software developer Davis Liu planted a logic bomb on their systems after learning his responsibilities would be reduced. This cautionary tale kicks off our deep dive into CISSP Domain 1 concepts, showing exactly why understanding sec…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss the critical role of identity management in cybersecurity. They emphasize the importance of access control, risk management, and the need for proper onboarding and offboarding procedures to mitigate insider threats. The conversation also highlights the necessity of integra…
  continue reading
 
⬥GUEST⬥ Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE NOTES⬥ The Europ…
  continue reading
 
In this episode, the hosts discuss the recent cuts made by DOGE to cybersecurity positions, highlighting the implications for national security and the emotional toll on affected employees. They explore the challenges of attracting and retaining top talent in government roles, especially in the cybersecurity sector, and the long-term consequences o…
  continue reading
 
Send us a text The traditional boundaries between physical and cyber security are rapidly disappearing, creating both risks and opportunities for organizations of all sizes. This eye-opening conversation with Casey Rash from Secure Passage explores the critical intersection where these two domains meet and the innovative solutions emerging to bridg…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the importance of diversity in cybersecurity, particularly in light of Women's History Month. They explore how diverse perspectives can lead to financial success for companies, the significance of mentorship and networking for…
  continue reading
 
Send us a text The $150 million cryptocurrency heist linked to the 2022 LastPass breach serves as a powerful wake-up call for cybersecurity professionals. As Sean Gerber explains in this comprehensive breakdown of CISSP Domain 2.1, even security-focused tools can become vulnerability points when housing your most sensitive information. Dive deep in…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, Daniel Acevedo, and guest Alfredzo Nash discuss various topics ranging from their personal lives to media recommendations. They delve into the latest episodes of popular shows like Invincible and Reacher, share updates on family matters, and reflect o…
  continue reading
 
Send us a text Ransomware attacks are a growing concern for both businesses and individuals, as the frequency and sophistication of these threats continue to escalate. In this episode, we take a closer look at this alarming trend and introduce six effective methods for recovering critical data that's been locked away due to ransomware encryption, s…
  continue reading
 
In this episode, the hosts discuss the pressing issues surrounding cybersecurity, particularly focusing on the challenges faced by local governments in securing their systems against rising threats. They explore the need for federal funding to support these initiatives, the complexities of managing cybersecurity budgets, and the importance of workf…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss a recent incident involving a Disney employee who downloaded an AI tool that led to a significant cybersecurity breach. The conversation explores the implications of AI in cybersecurity, the importance of defense in depth, and the necessity of maintaining good cyber hygien…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Daniel Acevedo, along with special guest Alfredzo Nash, discuss the latest innovations in cybersecurity, particularly focusing on MasterCard's advancements in cyber threat intelligence. They explore the integration of AI in threat analysis, the im…
  continue reading
 
⬥GUEST⬥ Jake Braun, Acting Principal Deputy National Cyber Director, The White House | On LinkedIn: https://www.linkedin.com/in/jake-braun-77372539/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE…
  continue reading
 
Send us a text Welcome to a compelling exploration of the crucial importance of Business Impact Analysis (BIA) in ensuring cybersecurity resilience, especially for those preparing for the CISSP exam. In this episode, we dive deep into the essentials of BIA, breaking down both qualitative and quantitative impact assessments that help organizations e…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from personal experiences and weekly updates to TV show recommendations and gaming nostalgia. They share insights on popular shows like 'Severance' and 'Invincible', delve into the world of gaming w…
  continue reading
 
Send us a text Get ready for an eye-opening deep dive into the world of cybersecurity! This episode reveals the alarming speed at which hackers adapt and exploit vulnerabilities, with over 61% of them leveraging new exploits within 48 hours of discovery. We discuss enlightening insights from InfoSecurity Magazine and showcase the new Netflix docume…
  continue reading
 
This episode of the podcast takes a look at the emotional and mental health challenges faced by cybersecurity professionals, particularly in light of increasing workloads and stress. The discussion highlights a report that reveals significant mental health declines among security professionals, the pressures faced by CISOs, and the importance of cr…
  continue reading
 
In this episode, the hosts discuss the current landscape of cybersecurity, focusing on the Ghost ransomware group and their tactics of exploiting known vulnerabilities. They emphasize the importance of patch management and the need for organizations, especially small businesses, to take proactive measures in securing their systems. The conversation…
  continue reading
 
Send us a text Unlock the secrets to fortifying your software development practices with expert insights from Shon Gerber. As we navigate the complex landscape of cybersecurity, we delve deep into the urgent risks posed by TP-Link routers, used by a staggering portion of U.S. households. Discover practical strategies for protecting your network, li…
  continue reading
 
In this episode, the hosts discuss the recent $1.5 million penalty imposed on Warby Parker due to a HIPAA violation resulting from a cybersecurity attack. They delve into the implications of credential stuffing attacks, the importance of cybersecurity maturity, and the potential risks associated with data breaches. The conversation emphasizes the n…
  continue reading
 
Substance Use Disorder (SUD) affects millions globally, yet stigma remains a significant barrier to seeking help. This video explores the impact of stigma on individuals with SUD, highlighting personal stories, statistics, and the cycle of substance use exacerbated by judgment. We delve into how stigma leads to isolation, discrimination, and hopele…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Daniel Acevedo discuss a variety of topics ranging from their personal media consumption, including movies and TV shows, to life updates and gaming experiences. They share recommendations for action films, dive into their favorite series, and refl…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play