Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Defense Group Podcasts

show episodes
 
Artwork

51
Channel Security Secrets

Cyber Defense Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Founded in 1990 by Marc Lee, former Managing Director of FT Business Enterprises who established and ran the Financial Times global conference business, Cityforum has for many years been acknowledged as a major contributor to public policy debate. Cityforum comprises a small, trusted, fully independent group of experienced individuals, respected for their intellectual honesty, knowledge and extensive contacts across every level of the private, public and not-for-profit sectors, at home and a ...
  continue reading
 
Artwork
 
On Moody’s Talks - Behind the Bonds, hosts Tania Hall and Jeff Pruzan join analysts from Moody’s corporate finance group worldwide to discuss the market forces shaping credit across industries - from airlines to telecoms and everything in between. These forces include the uneven recovery from the coronavirus pandemic, digital transformation, cyber risk, climate-change imperatives and much more. Please join us as we connect the dots on corporate credit quality.
  continue reading
 
Artwork

1
CXO Voices

CXO REvolutionaries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
  continue reading
 
Loading …
show series
 
What if the single most important skill for success in cybersecurity sales wasn’t technical knowledge, but relentless curiosity? Get insider strategies from Jacob Friedman, Strategic Account Director at 3 Tree Tech, who shares how curiosity, mentorship, and trust are the keys to thriving in cybersecurity sales. You’ll discover how to navigate the v…
  continue reading
 
Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can act…
  continue reading
 
America’s military faces extraordinary threats — and when resources lag, missions can fail. Guest host Bradley Bowman is joined by Krista Auchenbach of CSIS to discuss her forthcoming report, alongside Rear Adm. (Ret.) Mark Montgomery, as they unpack how presidents convey orders, how the Pentagon manages risk, and how to avoid a dangerous ends-mean…
  continue reading
 
Imagine downloading a PDF Editor tool from the internet that works great...until nearly two months later, when it quietly steals your credentials. That’s the reality of “Tampered Chef,” a malvertising campaign that preyed on users searching for everyday software. In this episode, Nick Biasini explains how cybercriminals are investing in "malvertisi…
  continue reading
 
How do trusted advisors build credibility and deliver meaningful impact in IT and cybersecurity? In this episode of Channel Security Secrets, I sit down with Eric Ludwig, Co-Founder of RISE Technology Advisors, to explore the principles and practices that drive success in technology advisory services. Eric shares insights on the value of integrity,…
  continue reading
 
First documented case: AI inside the breach. Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads…
  continue reading
 
From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
  continue reading
 
On the 24th anniversary of the September 11, 2001 attacks, Cliff May sits down with Amb. Edmund Fitton-Brown, former British ambassador to Yemen and UN terrorism monitor, now a senior fellow at FDD, to assess what we’ve learned — and failed to learn — about global jihad. From Hamas leaders living lavishly in Qatar, the Houthis’ missile attacks, al …
  continue reading
 
With over 30 years of experience driving growth and innovation in the technology channel, Dan Gill has seen it all, and he’s sharing his playbook for success. In this episode of Channel Security Secrets, I sit down with Dan, CEO at Amplix, to explore his four pillars of growth and how they’re transforming the way trusted advisors succeed. From cust…
  continue reading
 
Your tools say “secure.” Your headers say “leaking.” In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Tr…
  continue reading
 
From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
  continue reading
 
For fifty years, the United Nations has waged a war on Israel—not with rockets or tanks, but with words: resolutions branding Zionism as racism, false charges of apartheid, fabricated famine, and now even cries of genocide. It’s a propaganda war that empowers Hamas and delegitimizes Israel on the world stage. On this episode of Foreign Podicy, host…
  continue reading
 
How can trusted advisors and channel leaders turn cybersecurity challenges into growth opportunities? In this episode of Channel Security Secrets, I sit down with Alex Ryals, Chief Information Security Officer at MicroAge, to explore actionable strategies for aligning sales, security, and continuous learning. Alex shares how matching sales skills w…
  continue reading
 
How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cisco, about the ten years she's spent in the Black Hat Network Operations Center (NOC). Explore the technical challenges of segmenting and monitoring a n…
  continue reading
 
Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
  continue reading
 
Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks? In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive dat…
  continue reading
 
The world’s most endangered democracies—Taiwan, South Korea, Israel, and Ukraine—face relentless threats from the Axis of Aggressors: Beijing, Pyongyang, Tehran, and Moscow. With Ukraine locked in an existential war, host Cliff May welcomes British historian Mark Galeotti, host of In Moscow’s Shadows, for an unflinching look at Russia’s ambitions, …
  continue reading
 
Take your cybersecurity knowledge to the next level with expert insights on how trusted advisors can confidently navigate security conversations and build lasting client relationships. In this episode of Channel Security Secrets, I sit down with Stephen Semmelroth, Vice President of Cloud Resilience at Avant Communications. Stephen breaks down the …
  continue reading
 
Zero Trust step 5A is where monitoring turns raw logs into decisive action. Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue. (00:00) -…
  continue reading
 
Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
  continue reading
 
Not every U.S. strategic partner is a democracy, but those receiving American aid should not trample such basic freedoms as religious liberty. Years ago in Egypt, Coptic Patriarch Pope Tawadros II told host Cliff May that discrimination was diminishing under President Sissi. Today, USCIRF reports show the opposite: systemic repression of religious …
  continue reading
 
Want to build stronger client relationships while navigating the complexities of modern cybersecurity? In this episode of Channel Security Secrets, I sit down with Stacey Horne, President at Stillwater Ecosystem, to talk about the human side of cybersecurity, trust, empathy, and communication. Stacey shares how humility and relationship-building ar…
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie is joined by Tyler Ramsbey, a penetration tester and content creator. Learn about Tyler's unique journey into cybersecurity, the importance of soft skills, and the value of teaching and content creation. Tyler shares insights on maintaining mental health, balancing family life, and his upcoming ven…
  continue reading
 
Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid. In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and ho…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode features Vince Crisler, a proven cybersecurity leader helping organizations modernize how they prepare for, defend against, and respond to threats. Celerium delivers advanced capabilities for real-time threat intelligence sharing, incident response support, and o…
  continue reading
 
In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
  continue reading
 
America’s edge in artificial intelligence may rest on one decision now facing Washington: whether to keep our most advanced chips out of Beijing’s hands. President Trump has moved to lift the export ban on Nvidia’s H20 processors—a move some warn could supercharge China’s AI ambitions and military power—arming the Chinese Communist Party for domina…
  continue reading
 
What does it really take to earn a customer's trust in today’s cybersecurity landscape? In this episode of Channel Security Secrets, I sit down with Tony Pietrocola, President at AgileBlue, to explore how a customer-obsessed mindset drives long-term success, not just in sales, but in lasting partnerships. Tony unpacks how Trusted Advisors can build…
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie is joined by Tim Shipp to discuss various aspects of cybersecurity, including the evolution of the field over the past 25 years, the importance of offensive security, and the challenges faced by both red and blue teams. Tim shares his extensive background in cybersecurity, touching on incident resp…
  continue reading
 
One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
  continue reading
 
Ready to demystify cybersecurity and lead stronger, smarter conversations with clients? In this episode of Channel Security Secrets, I sit down with Rick Mischka, Cybersecurity SME at AVANT Communications and former U.S. Army Special Forces professional. Rick brings a unique perspective on translating complex security concepts into business-aligned…
  continue reading
 
ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• …
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie is joined by Cathy Ullman, a principal technology architect in cybersecurity. Join us as we discuss Cathy's journey in the cybersecurity field, the evolution of security tools and threats, the importance of understanding offensive security, and the value of purple teaming. Cathy shares insights on …
  continue reading
 
What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
  continue reading
 
In 2005, Vladimir Putin said the fall of the Soviet Union was the “greatest political catastrophe of the 20th century.” As Sen. Mitch McConnell pointed out, that should have told us everything we needed to know about this ex-KGB lieutenant colonel. He made the remark at an event in the U.S. Senate discussing a new report on Putin’s war in Ukraine. …
  continue reading
 
Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s l…
  continue reading
 
Ready to unlock long-term success in the channel? In this episode of Channel Security Secrets, I sit down with Kameron Olsen, President at The Channel Advisors, to explore what it takes to thrive in today’s cybersecurity landscape. Kameron shares the critical mindset shifts needed to succeed, from adopting an ownership mentality to bridging the cyb…
  continue reading
 
🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Karthik Krishnan, Founder & CEO of Concentric.ai, dives into how their AI-powered data risk discovery platform is revolutionizing autonomous data security for enterprises. We explore how Concentric.ai he…
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie interviews Rob Allen, Chief Product Officer at ThreatLocker. Learn about the importance of proactive security measures, particularly in the context of ransomware prevention. Rob shares his journey to ThreatLocker and the company's unique approach of 'deny by default' in endpoint security. The conve…
  continue reading
 
Administrative accounts come with serious power – and serious power, comes with serious risk. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access. They explore: 1) Why admins are a high-v…
  continue reading
 
How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play