RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
RSA Conference Podcasts
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
The ThreatReal Podcast covers Information Security news, events, and trends in cybersecurity with a technical focus. Join hosts Matt Scheurer and Micah K. Brown as they dig deep into the threats impacting enterprise environments and home networks. Discussion topics around threats include the actors, the hunting, the intelligence, the modeling, and more! Visit us online at https://threatreel.com
…
continue reading
1
RSA Conference 2025 Recap: Insights, Trends & Straight Talk from the Expo Floor & Events around town
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Insights, Trends & Straight Talk from the Expo Floor & Events around town. 00:00 ...coming up 00:22 introduction & agenda 03:03 who are you wearing? 06:28 sponsorship - Cybersecurity Growth Membership E-Learning & Community 08:08 hot topic - RSA Conference 2025…
…
continue reading
1
Cyber at the Top: Defining Strength─Building a Resilient Incident Response Capability
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
…
continue reading
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This …
…
continue reading
1
How Microsoft Is Redefining Global Cyber Defense
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea to discuss her unexpected journey into cybersecurity, Microsoft’s evolving approach to combating global cybercrime, and the importance of collaboration across the private and public sectors. She reflects on …
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
1
Championing Sustainable and Human-Friendly Security
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
continue reading
1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
continue reading
1
The Power of Converged Security in a Connected World
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19Darren Kane, Chief Security Officer at NBN, Australia’s national broadband network joins Ann on this week's episode of Afternoon Cyber Tea to shares insights from his unique journey through law enforcement, financial enforcement, and corporate security, and how those experiences shaped his leadership of a converged security organization that unites…
…
continue reading
1
Cybersecurity Awareness Month: Staying Safe Online
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
…
continue reading
1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading
1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
continue reading
1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
continue reading
1
From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Frank X. Shaw, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communic…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. Dive into our recap of Black Hat, DEF CON and BSides Las Vegas fr…
…
continue reading
1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading
1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading
1
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean Martin
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
…
continue reading
1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading
1
Bridging the Gap: Cybersecurity and Accessibility
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21Organizations often spend a lot of time ensuring they're complying with cybersecurity standards and regulations, but often, accessibility standards are overlooked. Accessibility, in a sense, starts with compliance as well. However, cybersecurity vendors, platforms, and programs often don't know these standards exist, don't know the legal ramificati…
…
continue reading
1
Lessons from the Frontlines of Industrial Security
37:55
37:55
Play later
Play later
Lists
Like
Liked
37:55Volker Wagner, Chief Information Security Officer at BASF, joins Ann on this week's episode of Afternoon Cyber Tea to talk shop on what it really takes to defend one of the world’s largest chemical companies. From his early days in auditing to leading global cyber for high-stakes industrial and research environments, Volker shares battle-tested ins…
…
continue reading
1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading
Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by r…
…
continue reading
1
Intro to Building a Security Blueprint for Agents: Where to Start
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
…
continue reading
1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading
1
AI in Application Security: Why False Positives Still Overwhelm Teams Despite the Hype | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 1 | A Musing On the Future of Cybersecurity with Sean ...
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
…
continue reading
1
From Bottlenecks to Breakthroughs: Aligning Legal and Security Teams
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Erez Liebermann, partner at Debevoise & Plimpton and a leading voice in cybersecurity and data privacy joins Ann on this week's episode of Afternoon Cyber Tea. Together, they unpack how legal and security teams can act as strategic partners, aligning regulatory compliance with business priorities while preparing for and responding to incidents. Ere…
…
continue reading
1
From Gatekeeper to Growth Partner: How Modern CISOs Build Trust, Drive Innovation, and Shape AI-Enabled Business Security | A Conversation with Legendary CISO, Andy Ellis | Redefining CyberSecurity with ...
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
…
continue reading
1
The Psychology of Speaking Up with Amy Edmondson
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Amy Edmondson, Harvard Business School professor and psychological safety pioneer joins Ann on this week's episode of Afternoon Cyber Tea. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure…
…
continue reading
1
When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by ...
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. 00:00 ...coming up 00:13 introduction & agenda 05:21 who are you …
…
continue reading
1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading
1
Roadmap - July 2025 Preview and Platform Update
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Our first roadmap walkthrough of what has been developed on the Cybersecurity Growth platform and what is planned. 00:00 introduction 00:16 our development approach 03:08 sponsorship - Cybersecurity Growth Membership E-Learning & Community 03:54 what's been rel…
…
continue reading
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
…
continue reading
1
Let's talk Scattered Spider and How to Protect Your Organization
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Let's chat about real-world cyber attacks. Let's share some stories together. Let's learn and grow together. 00:00 introduction & agenda 00:54 who are you wearing? 06:55 sponsorship - Cybersecurity Growth Membership E-Learning & Community 07:44 Scattered Spider…
…
continue reading
1
Start with Story: What the RSAC Program Committee Wants to Hear About Today’s SOC Challenges
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
…
continue reading
1
Nasrin Rezai on the Frontlines of Cybersecurity
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
…
continue reading
New course, Practical Uses of Secure Controls Framework. A 1 hour course covering how to leverage frameworks to build robust security, compliance and privacy programs. This includes implementing capability maturity models, integrating the NIST Cybersecurity Framework, and how to get buy-in from your business executives. This course has video, writt…
…
continue reading
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading
1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading
1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading
1
Your Cybersecurity Growth platform update for the week of May 5, 2025.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading
1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading
1
Common Vulnerability Scoring System: Unpacking What's New in Version Four
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
…
continue reading
Us hiring cybersecurity managers, review and critique the resumes of our audience, live on air. * Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cy…
…
continue reading
1
This Week In Cyber & Resume Workshop #2
1:17:07
1:17:07
Play later
Play later
Lists
Like
Liked
1:17:07Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. 00:00 ...coming up 00:26 introduction 01:16 new CISO training course 02:00 agenda 03:00 who are you wearing? 08:17 sponsorship - Cybersecurity Growth Consulting and Services 09:19 this week in cyber 09:42 Fake Cloudflare Verification Results in LummaStealer Tro…
…
continue reading
1
Hiring for the Present Is Hurting the Future of Cybersecurity: Why “Entry-Level” Rarely Means Entry | A Conversation with John Salomon | Redefining CyberSecurity with Sean Martin
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38⬥GUEST⬥ John Salomon, Board Member, Cybersecurity Advisors Network (CyAN) | On LinkedIn: https://www.linkedin.com/in/johnsalomon/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecur…
…
continue reading
1
Season 3 Finale: Top Insights, Hacks, and Lessons from the Frontlines of AI Security
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Send us a text To close out Season 3, we’re revisiting the standout insights, wildest vulnerabilities, and most practical lessons shared by 20+ AI practitioners, researchers, and industry leaders shaping the future of AI security. If you're building, breaking, or defending AI/ML systems, this is your must-listen roundup. Full transcript, video, and…
…
continue reading