Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CISSP Podcasts

show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Digital Self-Defense is a podcast that explains the basics of cybersecurity and data protection in an accessible, user-friendly voice. DSD instructs listeners in understanding the basics of cybersecurity, dissects and explains significant current events relating to cybersecurity, and helps listeners learn how to keep themselves from hacks and threats. Hosted by cybersecurity professional Tim Honker (CISSP), Digital Self Defense avoids technical jargon at all costs and provides an overview ab ...
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Network security is the cornerstone of modern cybersecurity, and understa…
  continue reading
 
Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at [email protected] and follow us for mo…
  continue reading
 
⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
  continue reading
 
In this episode, the hosts discuss the intersection of gaming and cybersecurity, focusing on the rise of cheating in video games and its implications for cybersecurity practices. They explore the economic aspects of cheating, the legal ramifications for developers, and the importance of third-party risk management. The conversation also touches on …
  continue reading
 
SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A catastrophic data loss incident involving South Yorkshire Police serves …
  continue reading
 
In this episode of the podcast, the hosts discuss various topics related to cybersecurity, including the rise of deepfake technology and its implications for fraud, recent law enforcement actions against ransomware groups, and the importance of cybersecurity guidance for operational technology. They also share personal updates and reflections on th…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The core principles of cybersecurity aren't just theoretical concepts—the…
  continue reading
 
The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
  continue reading
 
At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive deep into the critical world of configuration management with Sean G…
  continue reading
 
We're back! Pen Tester and Team Ambush member Morgan Trust walks us through his journey into the cybersecurity field. With a can-do approach, Morgan discusses how he has developed professionally, expanding his expertise across public speaking and competitive hacking. His presentation, "The New Era of Deception: AI, Deep Fakes, and The Dark Web" has…
  continue reading
 
Send us a text A sophisticated banking network breach using tiny Raspberry Pi devices sets the stage for our comprehensive examination of CISSP Domain 3 Security Architecture fundamentals. The attack—which gave hackers persistent remote access to ATM systems—demonstrates how physical security failures can lead to devastating network compromises, pe…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on the implications of AI in vishing attacks, the vulnerabilities in Microsoft Exchange servers, and the ongoing debate about ransomware payments in the public sector. They emphasize the importance of cyber hygiene, patch management, and the ne…
  continue reading
 
Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
  continue reading
 
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
  continue reading
 
Send us a text We begin by exploring foundational security principles that drive effective system design. Threat modeling emerges as a proactive approach for identifying vulnerabilities before implementation, while least privilege ensures users have only the access they absolutely need. Defense in depth creates those crucial security layers that pr…
  continue reading
 
In this episode, Ryan Williams Sr. and Allen Westley discuss the evolving landscape of cybersecurity, focusing on mind privacy, cognitive security, and the implications of AI in both personal and professional contexts. They explore the risks associated with data aggregation and inference, the balance between innovation and security in government, a…
  continue reading
 
In this episode, the hosts discuss various topics in cybersecurity, including China's accusations against the U.S. regarding cyberattacks, the implications of zero-day vulnerabilities, the Minnesota National Guard's cybersecurity response, and the ongoing controversies surrounding the TikTok ban. The conversation highlights the complexities of cybe…
  continue reading
 
Send us a text The cybersecurity landscape grows more complex each day, especially when it comes to protecting critical infrastructure. In this essential episode of the CISSP Cyber Training Podcast, Sean Gerber breaks down Domain 2 of the CISSP certification - a vital area representing approximately 10% of the exam questions that every security pro…
  continue reading
 
🎙️ The CISO Signal | S1E2 — The SolarWinds Hack: How 18,000 Orgs Were Compromised One trusted software update. Thousands of victims. A breach that changed the cybersecurity landscape forever. In this episode, we investigate the SolarWinds supply chain attack, a nation-state cyber operation that exposed the deep fragility of the modern software ecos…
  continue reading
 
Attorney Heidi Fessler is this week's guest! Practicing law for 35 years and specializing in cybersecurity, Heidi walks us through the right time to engage legal, navigating incident response, distinctions between general and cyber counsel, and cyber law. Thoughts on Unsecurity? Contact us at [email protected] and follow us for more! LinkedIn…
  continue reading
 
In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Securing SaaS environments and mastering security assessment techniques a…
  continue reading
 
⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A shocking cybersecurity case recently hit the headlines—a 50-year-old IT…
  continue reading
 
The CISO Signal | S1E1: DEAD IN THE WATER | How Sandworm Crippled Maersk — The $10 Billion Breach In this premiere episode of The CISO Signal, we uncover the chilling true cybercrime story of the NotPetya attack — a weaponized piece of malware launched by the Russian state-backed hacking group Sandworm, which brought Maersk, the world’s largest shi…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape is rapidly evolving, and AI stands at the for…
  continue reading
 
In this episode of The Other Side of the Firewall's Thursday episode, Ask a CISSP, Ryan Williams Sr. interviews Angela Diaz, an expert in risk management and fraud prevention. They discuss the importance of understanding the three lines of defense in risk management, the impact of fraud on individuals and organizations, and the career pathways avai…
  continue reading
 
⬥GUEST⬥ John Salomon, Board Member, Cybersecurity Advisors Network (CyAN) | On LinkedIn: https://www.linkedin.com/in/johnsalomon/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecur…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Looking to strengthen your organization's defenses against unauthorized a…
  continue reading
 
You hear it everywhere: the buzzing hot-topic, AI, lands on this week's episode with featured guest, Jim Wilt! Brad returns with Megan to hear from the AI Guy himself. With an introduction to AI in the 90s, Jim shares his expertise as a technologist and early adopter of the tool. Whether you have a place in tech, executive space, or creative, get k…
  continue reading
 
⬥GUEST⬥ Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Websit…
  continue reading
 
Send us a text Security vulnerabilities lurk in the most unexpected places – even in your home internet modem. Today we kick off with breaking news about a security flaw discovered in Cox modems that could potentially allow unauthorized access to run malicious commands on connected devices. While Cox reports fixing the issue within 24 hours, this r…
  continue reading
 
Youtube Video at: https://www.youtube.com/watch?v=yHPvGVfPgjI Jay Beale is a principal security consultant and CEO/CTO for InGuardians. He is the architect of multiple open source projects, including the Peirates attack tool for Kubernetes (in Kali Linux), the Bustakube CTF Kubernetes cluster, and Bastille Linux. Jay created and leads the Kubernete…
  continue reading
 
ABOUT THIS EPISODE: The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 3 featuring Christine Chasse RN, JD, MSN, NE-C, CIPPUS, AIGP. Christine recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of her insights. Christine is an Attorney with a focus on Regulatory and Compliance, and Da…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including a vulnerability in ServiceNow that allowed unauthorized data access, the implications of North American APTs attacking China using Exchange Zero Day exploits, and a significant security flaw in McDonal…
  continue reading
 
Send us a text The medieval castle with its moat, high walls, and sentries provides the perfect metaphor for modern cybersecurity. Just as each defensive element served a specific purpose in protecting the castle, today's information security requires multiple layers working in concert to safeguard digital assets. Shon Gerber opens this episode wit…
  continue reading
 
How can you approach your company's leadership to advocate for best security practices? Megan dives into a BIA (Business Impact Analysis) breakdown with triple guest features from FRSecure's Consulting Team. Mea Yang, Coral Morgan, and Kathryn Frickstad-Olson recall client trumphs and challenges they have witnessed with implementing BIAs. Whether y…
  continue reading
 
In this episode of The Other Side of the Firewall, Ryan Williams Sr. and Edgar Vanterpool discuss Edgar's unique journey from the automotive industry to becoming a Business Information Security Officer (BISO). They explore the skills required for the role, the importance of understanding business needs in cybersecurity, and the balance between tech…
  continue reading
 
Send us a text Microsoft recently released 137 security patches, with 14 critical vulnerabilities that could allow attackers to seize control of Windows systems with minimal user interaction. Among these, the Windows authentication negotiation flaw rated at 9.8 severity poses a significant threat to all current Windows versions. For security profes…
  continue reading
 
Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including training experiences, certifications, and adventures in New York City. They also dive into Ryan's book publishing journey and future plans, all while emphasizing the importance of cybersecurit…
  continue reading
 
Send us a text Ready to conquer CISSP Domain 1? This rapid review episode delivers essential knowledge on security and risk management fundamentals that form the cornerstone of information security practice. We begin with a timely discussion on preventing ransomware through exfiltration controls, noting the alarming shift where 90% of ransomware at…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
  continue reading
 
Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chie…
  continue reading
 
In this episode of the podcast, the hosts discuss critical cybersecurity questions that CISOs must address, the role of CISOs in business, and the impact of AI on cybersecurity practices. They emphasize the importance of understanding data classifications and the need for proactive threat anticipation. The conversation also highlights an upcoming i…
  continue reading
 
In this episode, the hosts discuss the latest cybersecurity news, focusing on Coinbase's involvement in recovering stolen cryptocurrency and the rise of pig butchering scams. They explore the tactics used by scammers, the implications of human trafficking in these schemes, and the importance of vigilance in the crypto space. The conversation emphas…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the latest cybersecurity news, focusing on the FBI's warning about two-factor authentication bypass attacks by a group called Scattered Spider. They explore the tactics used by this group, the implications for cybersecurity, a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play