Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
Frontmatter

Leanpub

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
In Leanpub's Frontmatter podcast, we interview authors and special guests about their lives & careers, their areas of expertise and the issues of the moment, and their experiences as writers. Every episode is deeply researched and covers areas that are equally of human interest, general interest, and professional interest.
  continue reading
 
“The difficulty”, writes Keynes, “lies not in the new ideas, but in escaping from the old ones.” Outgrow’s Marketer of the Month podcast documents this tussle of the old and the new across 21 different industries. Tune in to listen to thought-provoking guests ranging from the leaders of Fortune 500 companies, Tech Unicorns, Governments, Anonymous Collective, Media, Pulitzer Prize Winners, Professors, and (of course) Tiktokers!
  continue reading
 
Artwork

1
Your Career On Target

InterCoast Media Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Part of the InterCoast Media Network. This podcast brings you real talk about career training, skill building, and personal growth. Vocational school is becoming a popular choice among graduates and others looking to pave a new career path, especially with the cost of college climbing. Furthering your education is always a great idea, so if you have your heart set on a particular occupation, check out a trade school first. You may be pleasantly surprised to find you can get your training in ...
  continue reading
 
Digital Self-Defense is a podcast that explains the basics of cybersecurity and data protection in an accessible, user-friendly voice. DSD instructs listeners in understanding the basics of cybersecurity, dissects and explains significant current events relating to cybersecurity, and helps listeners learn how to keep themselves from hacks and threats. Hosted by cybersecurity professional Tim Honker (CISSP), Digital Self Defense avoids technical jargon at all costs and provides an overview ab ...
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Send us a text Ever wonder why organizations with robust cybersecurity teams still fall victim to devastating attacks? The answer often lies not in fancy technology but in something far more fundamental: documentation. In this eye-opening episode, Shon Gerber takes listeners into the critical world of cybersecurity documentation hierarchy, revealin…
  continue reading
 
In this episode of the Ask a CISSP podcast, Ryan Williams Sr. engages in a deep conversation with Mark Christian, exploring his journey from military service to a successful career in cybersecurity. They discuss the importance of training, the challenges of transitioning to civilian life, and the significance of building a supportive community for …
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss alarming statistics regarding cybercrime, including a record loss of $16.6 billion in 2024. They highlight the vulnerability of older Americans to cyber scams and the potential underreporting of these crimes. The conversation also touches on…
  continue reading
 
ABOUT THIS EPISODE: The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 1 featuring Walter Haydock, owner of Stackaware, an AI Governance consulting company. Please subscribe and share to support this podcast. Be sure to tap the "SUBSCRIBE" buttonl! Walter's LinkedIn: https://linkedin.com/in/walter-haydock Walter's Website: h…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and weather experiences to media consumption, including movies and documentaries. They delve into the phenomenon of romantic scams and share insights on the film 'Sinners,' highlighting its c…
  continue reading
 
Send us a text Cybersecurity isn't just for enterprises—small and medium businesses face increasingly sophisticated threats with fewer resources to combat them. In this information-packed episode, Shon Gerber explores why cybersecurity matters critically for SMBs while delivering practical CISSP exam questions focused on Domain 8.3. Shon begins by …
  continue reading
 
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the intersection of cybersecurity and emerging trends in technology, particularly focusing on the risks associated with AI-generated action figures and the implications of social media on personal privacy. They explore how seemingly harmless fun c…
  continue reading
 
Guest Info: Name: Bronwen Aker Contact Information (N/A): https://br0nw3n.com/ Time Zone(s): Pacific, Central, Eastern –Copy begins– Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss a significant cybersecurity breach at a local hospital, where a cybersecurity CEO is accused of hacking the facility to prove its vulnerabilities. They explore the ethical implications of penetration testing, the importance of questioning securi…
  continue reading
 
Send us a text Software security assessment can make or break your organization's defense posture, yet many professionals struggle with implementing effective evaluation strategies. This deep dive into CISSP Domain 8.3 reveals critical approaches to software security that balance technical requirements with business realities. The recent funding cr…
  continue reading
 
In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the recent developments regarding the CVE (Common Vulnerabilities and Exposures) database, its importance in cybersecurity, and the implications of its funding and management. They explore the potential future of the CVE database, including the integration of AI to enhance …
  continue reading
 
Jaime Marconette is the VP of Music Insights & Industry Relations at Luminate, the data company behind the Billboard charts. With a background in digital strategy and data-driven artist marketing, he previously led digital strategy at Sony Music Nashville. His expertise spans music insights, industry relations, and progressive marketing strategies.…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from their latest media interests, personal updates, and hobbies to video gaming experiences and upcoming movie releases. They also delve into the realism of medical dramas and share their thoughts …
  continue reading
 
In this webinar, Matt Halbleib (Director of Assessments) and Lee Pierce (Director of HITRUST Sales) will discuss: How to determine which HITRUST Assessment type to choose How to prepare for a HITRUST Validation Assessment What to expect from a SecurityMetrics HITRUST Assessment Ready to discuss your HITRUST needs? Request a quote here. Read our new…
  continue reading
 
⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
  continue reading
 
Send us a text Wondering how to tackle incident response questions on the CISSP exam? This episode delivers exactly what you need, walking through fifteen essential incident management scenarios that test your understanding of this critical domain. Sean Gerber breaks down the fundamentals of incident management, exploring how security professionals…
  continue reading
 
In this episode, Ryan Williams Sr. and Alfredzo Nash discuss the journey into cybersecurity, the importance of mentorship, and the creation of the Cyber Coffee Hour podcast. Alfredzo shares his personal experiences, challenges, and insights on navigating the IT and cybersecurity landscape. The conversation emphasizes the value of community, educati…
  continue reading
 
In this episode, the hosts discuss the potential impact of tariffs on cybersecurity spending and the subsequent rise in cybercrime. They highlight the importance of maintaining cybersecurity efforts during economic downturns and the risks associated with cutting these departments. The conversation also touches on the role of hacktivism in the curre…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the importance of the State and Local Cybersecurity Grant Program, its funding allocations, and the implications of its potential renewal. They emphasize the need for continued support for cybersecurity initiatives at the loca…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, the hosts discuss the latest cybersecurity news, focusing on China's recent admission of cyberattacks against the US. They explore the implications of advanced persistent threats, the geopolitical tensions surrounding Taiwan, and the vulnerabilities in critical infrastructure. The conversat…
  continue reading
 
Send us a text Cybersecurity incidents aren't a matter of if, but when. Are you prepared to respond effectively? Sean Gerber takes us through the complete incident response lifecycle, breaking down the seven essential phases every security professional must master. From developing comprehensive response plans to conducting effective post-incident a…
  continue reading
 
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from their weekly activities, movie and television series reviews, personal updates, and upcoming movie anticipations. They share insights on recent films they've watched, including 'Back in Action' and 'One of …
  continue reading
 
The United States is on the brink of an electrician shortage that could impact the economy and the rapid growth of AI technologies. In this 3-minute video, we explore the critical warnings from industry leaders, including BlackRock CEO Larry Fink, about the pressing need for skilled electricians, especially as AI-driven data centers surge in power …
  continue reading
 
Send us a text The collision of artificial intelligence and cybersecurity takes center stage in this episode as we explore how Agentic AI is revolutionizing Security Operations Centers. Moving beyond simple assistant AI or co-pilots, this new generation of autonomous systems proactively investigates alerts, follows structured playbooks, and perform…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the implications of agentic AI in cybersecurity. They explore the differences between traditional AI and agentic AI, the potential risks associated with autonomous systems, and the importance of human oversight. The conversation delves into the future of AI in various sectors, including h…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on phishing attacks that utilize URL shorteners and QR codes, especially during tax season. They emphasize the importance of user awareness and the need for effective cybersecurity training to combat these threats. The conversation also touches…
  continue reading
 
Rose Wang is the COO of Bluesky Social, bringing a wealth of experience in tech, entrepreneurship, and sustainability. Previously, she was Head of Customer Experience at AI platform Forethought and the CEO/co-founder of Chirps, a sustainable cricket protein food company. On The Menu: 1. Builds a new social web where no single entity controls conten…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss recent cybersecurity attacks on Australia's largest pension funds, analyzing the implications of these breaches and the government's response. They discuss the financial impact of the attacks, the strategies being implemented to enhance cybe…
  continue reading
 
Send us a text Digital signatures are coming to AI models as cybersecurity evolves to meet emerging threats. Google's collaboration with NVIDIA and HiddenLayer demonstrates how traditional security controls must adapt to protect machine learning systems vulnerable to new forms of tampering and exploitation. This essential evolution mirrors the broa…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Chris Abacon, and Daniel Acevedo discuss a variety of topics ranging from cybersecurity news to personal updates, including conference experiences, entertainment choices, and family life. They share insights on certifications, gaming preferences, and the challenges …
  continue reading
 
Send us a text Cybersecurity professionals know that mastering identity and access management concepts is essential for CISSP certification success. This deep dive into Domain 5.2 tackles fifteen carefully crafted questions covering everything from just-in-time provisioning to federated identity systems and session security. We begin by examining t…
  continue reading
 
In this Leanpub Podcast episode, Len Epp interviews Nicolas Brown, author of Real World Agility: Backed by evidence, built for results.Nicolas shares his unique path from the Royal Mail to working in e-commerce, financial services, and eventually as a sought-after agility and product consultant. He explains his evidence-based approach to agile coac…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Chris Abacon, and Daniel Acevedo discuss the latest cybersecurity news, focusing on a phishing attack that targeted security expert Troy Hunt. They explore the implications of such attacks, the human vulnerabilities that can lead to breaches, and the importance of b…
  continue reading
 
Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec or Youtube: https://youtube.com/c/BDSPodcast join the Discord: https://bit.ly/brakesecDiscord https://arxiv.org/abs/2302.14172 - EPSS whitepaper https://www.linkedin.com/posts/jayjacobs1_epss-threatintel-vulnerabiltymanagement-activity-7308146548767404032-RubN https://www.first.org/epss/…
  continue reading
 
In this episode, the hosts discuss the alarming rise of sophisticated phishing attacks, particularly focusing on a new phishing-as-a-service (PhaaS) platform, Morphing Meerkat, that utilizes DNS and mail exchange records to create realistic fake login pages for over 114 brands. They emphasize the importance of vigilance and best practices in cybers…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss a significant cybersecurity incident involving a leak on the Signal messaging platform. They explore the implications of this leak, particularly in relation to military standards and accountability. The conversation dives into the misuse of technology in secure communicati…
  continue reading
 
Send us a text Identity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing identification and authentication systems that protect your most valuable assets. Starting wi…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from movie and TV show reviews to cultural commentary on tourism and taxation issues. They share personal experiences, including a recent staycation and gaming achievements, while also touching on t…
  continue reading
 
Send us a text Cybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remote code simply by having users click malicious links. Though initially targeting Russian or…
  continue reading
 
In this Leanpub podcast episode, co-founder Len Epp interviews Isaak Tsalicoglou, author of Northwind Elixir Traders: Learn Elixir and database modeling with Ecto and SQLite, all in one project. They discuss Isaak’s professional background in digital transformation, how a conversation with a friend sparked his obsession with functional programming,…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss the recent acquisition of Pokemon Go, by Saudi Arabia. They delve into the implications of this acquisition on data privacy, the selective outrage surrounding data ownership, and the broader concerns regarding global data privacy laws. The conversation highlights the hypoc…
  continue reading
 
In this episode, the hosts discuss the evolving landscape of cybersecurity, focusing on Hong Kong's new cybersecurity law aimed at safeguarding key facilities. They explore the implications of this law, the global trend towards stricter cybersecurity regulations, and the U.S. perspective on international cybersecurity threats. The conversation high…
  continue reading
 
⬥GUEST⬥ Ken Huang, Co-Chair, AI Safety Working Groups at Cloud Security Alliance | On LinkedIn: https://www.linkedin.com/in/kenhuang8/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this e…
  continue reading
 
Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec Join the Discord! https://bit.ly/brakesecDiscord Questions and topics: (please feel free to update or make comments for clarifications) * https://techoreon.com/http-flaw-in-apple-passwords-left-iphones-vulnerable/ * https://darkmarc.substack.com/p/attackers-dont-need-exploits-when * http…
  continue reading
 
Retired US Air Force cybersecurity expert, Chris Hannifin, finds himself at the center of a potential economic espionage scandal in San Antonio, Texas. His company, DefendIT Services, is under suspected of being a front for the selling of sensitive information to foreign state actors, and brokers. Hannifin's previous employment at companies handlin…
  continue reading
 
Send us a text The unexpected convergence of consumer technology and warfare takes center stage as Sean Gruber explores how Chinese e-commerce giants now sell drone accessories that transform $300 toys into semi-autonomous weapons. This eye-opening discussion reveals how modern drones with AI guidance modules and fiber optic tethers mirror strategi…
  continue reading
 
Article: US teachers’ union says hackers stole sensitive personal data on over 500,000 members https://techcrunch.com/2025/03/19/us-teachers-union-says-hackers-stole-sensitive-personal-data-on-over-500000-members/?fbclid=IwZXh0bgNhZW0CMTAAAR3rPZEGWCJmue72EMeyZMfQTOhAXMC4ydOXW1WBYzF285xzlOggdYVrjJM_aem_iaRfgO6u7MZgw7tQEYRLiA&guccounter=1 Please LIST…
  continue reading
 
Loading …
Listen to this show while you explore
Play