Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cyber Security Consultant Podcasts
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
LegalFuel is the official Florida Bar Podcast. This monthly series is brought to you by The Practice Resource Center of The Florida Bar and will feature esteemed leaders in law discussing new and innovative topics. Its purpose is to help members of The Florida Bar as well as attorneys from other states run better practices and provide better legal services to their clients. Disclaimer: The views expressed by the participants of this program are their own and do not represent the views of, no ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
The Tech Leaders Podcast brings you candid conversations with established technology leaders, at some of the world's most incredible organisations. From the challenges of sustainable growth, through to continuous innovation and everything in-between. These are the behind-the-scenes stories and personal anecdotes of inspirational leaders at the forefront of the digital revolution.
…
continue reading
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Brief conversations with entrepreneurs, innovators, and company founders
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
…
continue reading
AI is changing how marketers measure campaigns and scale growth. In this episode of Backstory on Marketing and AI, we dive into attribution, frameworks, and customer acquisition. Discover how Wicked Reports uses first-party data to track real conversions. Learn why cold traffic measurement is critical for sustainable growth. Understand why ad platf…
…
continue reading

1
Unsecurity Episode 246: Practicing Policy
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14In this Friday edition of Unsecurity, Megan and Brad tackle Policy! They approach a topic commonly avoided with a consulting perspective, having real examples of policy benefits. Hear the full coversation, covering: - Standardizing programs, documentation, and access - The relationship between technology and policy development - Legal consideration…
…
continue reading
In this episode of the Backstory on Marketing and AI, Mark Donnigan, a virtual CMO, shares his insights into how AI is changing the marketing landscape for B2B startups. Mark discusses the importance of small teams using AI tools to scale quickly and efficiently. He dives into the role of AI in content generation, the future of marketing, and how b…
…
continue reading

1
CCT 279: Practice CISSP Questions - Security Models (Domain 3.2)
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the complex world of security models as we unpack Domain 3.2 of…
…
continue reading

1
#119: “There will be a shockwave of innovation in the next 5 years” - Chris Moore, European President at Veeva Systems
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27Join us this week for The Tech Leaders Podcast, where Gareth sits down with Chris Moore, European President at Veeva Systems. Chris talks about the impact AI will have on software development and data security, how technology has transformed the life sciences industry, and the long-term implications of Covid on drug development. On this episode, Ch…
…
continue reading

1
Ready or Not: CMMC 2.0 Final Rule is Here
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Send us a text In this episode, we break down the Department of Defense’s final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to integrate the Cybersecurity Maturity Model Certification (CMMC). We’ll cover what these new contractual obligations mean for contractors, including self-assessment reporting in SPRS, continuo…
…
continue reading
Sameer Narkar, CEO of Konnect Insights, discusses how AI is revolutionizing the marketing landscape. From social listening to competitive benchmarking, Sameer explains how AI tools are empowering brands to optimize their marketing strategies and customer experience. Discover how Konnect Insights helps brands securely analyze data from multiple chan…
…
continue reading

1
The Hidden Dangers of AD CS with Jake Hildreth, Principal Security Consultant at Semperis
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how Active Directory Certificate Services (AD CS) can quietly become the most fragile, and most dangerous, part of an enterprise’s identity infrastructure. Misunderstood, neglected, and often misconfigured, AD CS can …
…
continue reading
In this episode of The Backstory on Marketing and AI, we discuss how AI is reshaping the marketing landscape, particularly in market research. John Long of Thynk.ai provides insights on how businesses can leverage AI to drive growth, improve customer experience, and optimize sales processes. We dive into the practical applications of AI in lead gen…
…
continue reading

1
CCT 278: Security Models Demystified - CISSP Domain 3.2
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security models can be one of the most challenging concepts for CISSP can…
…
continue reading
This episode of The Backstory on Marketing and AI explores how AI enabled Market Research and influencer automation are reshaping marketing. Our guest from Stack Influence shares how micro and nano influencers outperform celebrities by creating authentic connections and driving higher conversions. We cover: Why micro and nano influencers deliver st…
…
continue reading
I have an incredible announcement to share! 👀 Before that though, let me share some of my history with you. Back in 2016, I started a side-business called TEKFused LLC focused on web design/hosting. Fast forward to 2022, I launched GRC Academy, and since then I’ve released 3 CMMC courses, released 50+ podcast episodes, and partnered with some amazi…
…
continue reading

1
CCT 277: Practice CISSP Questions - Data Security Controls (Domain 2.6)
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the multifaceted world of data security controls with Sean Gerb…
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore how AI enabled Market Research is reshaping project management and beyond. Most large projects today suffer from cost overruns and delays. AI is providing a solution by forecasting risks, automating reporting, and enabling smarter scheduling. From construction to utilities and data ce…
…
continue reading
AI is reshaping the marketing landscape. In this episode of The Backstory on Marketing and AI, we explore how AI enabled Market Research empowers companies to replace guesswork with clarity. Ground Control Research has developed Telemetry, a service that provides AI powered insights to guide strategy. From defining the right target market to refini…
…
continue reading

1
CCT 276: Data Lifecycle and the CISSP (Domain 2.4)
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv From insecure code causing breaches to proper data destruction, this epis…
…
continue reading
In this episode, Jon Gilham discusses how AI is changing the landscape of content marketing. He talks about Originality.ai, a tool that helps marketers detect AI-generated content, optimize readability, and ensure fact-checking. Jon shares insights into how marketers can use AI responsibly and avoid AI-generated spam in their content. From plagiari…
…
continue reading
AI and Marketing are reshaping how companies engage with customers. In this episode of the Backstory on Marketing and AI, we dive into how customer experience (CX) and AI-enabled Market Research create real-world business impact. Key topics include: Why personalization at scale is essential. How startups fail without product-market fit. The importa…
…
continue reading

1
CCT 275: CISSP Rapid Review (Domain 4) - Part 2
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The digital world has opened up unprecedented opportunities for scammers,…
…
continue reading

1
Unsecurity Episode 245: DEF CON Recap w/ Matt Dowd, Matt Findlay, Pinky Thompson
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at [email protected] and follow us for mo…
…
continue reading

1
#118: "AI tools help stimulate creativity, humans think beyond" - Stuart Whayman, President of Corporate Markets at Elsevier
49:15
49:15
Play later
Play later
Lists
Like
Liked
49:15Join us this week for The Tech Leaders Podcast, where Gareth sits down with Stuart Whayman, President of Corporate Markets at Elsevier, a part of RELX Group. They discuss how AI is revolutionising Research and Development, Elsevier-Reed’s shift from hardware to digital, and what the Red Arrows can teach us about leadership. Stuart also talks about …
…
continue reading

1
Is Your Insurance Broker Really On Your Side?
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Manufacturing insurance Wisconsin | Risk management consultant | USI Insurance Services | Business insurance broker advocacy Is your insurance broker truly advocating for you? In this episode of IT Unplugged, we sit down with Stephanie Lee, Senior Risk Management Consultant at USI Insurance Services, to discuss how manufacturers can tell if their i…
…
continue reading

1
When Change Becomes the Biggest Threat with Edward Amoroso, CEO of TAG Infosphere
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex infrastructures, Ed joins during a period of unprecedented change in the U.S. federal government, a moment he warns is ripe for cyberattacks. In this episode, Ed explains why rapid organizational shifts create …
…
continue reading

1
CCT 274: CISSP Rapid Review (Domain 4) - Part 1
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Network security is the cornerstone of modern cybersecurity, and understa…
…
continue reading

1
Running a Virtual Law Firm: How to Build Efficiency and Deliver Outstanding Client Service
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42Many attorneys have now been working fully virtual for years. During the pandemic most firms experimented with different levels of remote or hybrid work models. For some it worked well, and they continued, but other firms chose to return to the office. While supporters of remote work point to increased flexibility, autonomy, and efficiency, critics…
…
continue reading

1
CCT 273: Mastering CISSP Exam Questions - Five Challenging Scenarios
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Send us a text Check us out at: https://www.cisspcybertraining.com Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A catastrophic data loss incident involving South Yorkshire Police serves …
…
continue reading

1
Why PEOPLE SKILLS Are The KEY to Success in Tech Jobs
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40Meet Ben Marsh, M2 Technology's newest IT consultant! In this episode of IT Unplugged, we dive into Ben's unique career path from Dell software sales in Nashville to becoming a tech wizard serving Wisconsin businesses. What You'll Learn: How sales experience translates to better IT consulting and customer relationships Why Ninja RMM is a game-chang…
…
continue reading

1
Leading Through Uncertainty: A Crisis Playbook for Compliance Leaders with Satnam Lehal
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43In compliance, moments of uncertainty can define careers and reshape organizations. But what does it take to make sound judgments under intense pressure? How do you steer a team through a crisis without overpromising or losing trust? To explore these questions, our guest host and BCG senior executive Bernhard Gehra, is joined by senior compliance p…
…
continue reading

1
From stealing servers to saving lives: Working in red teaming | Jim Broome
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
…
continue reading

1
CCT 272: Confidentiality, Integrity, Availability, Authenticity, and Nonrepudiation (CISSP Domain 1.2)
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The core principles of cybersecurity aren't just theoretical concepts—the…
…
continue reading

1
CCT 271: Configuration Management (CISSP Domain 7.3)
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive deep into the critical world of configuration management with Sean G…
…
continue reading

1
Unsecurity Episode 244: Journey to Pen Testing w/ Morgan Trust
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48We're back! Pen Tester and Team Ambush member Morgan Trust walks us through his journey into the cybersecurity field. With a can-do approach, Morgan discusses how he has developed professionally, expanding his expertise across public speaking and competitive hacking. His presentation, "The New Era of Deception: AI, Deep Fakes, and The Dark Web" has…
…
continue reading

1
Fraud in the Logistics Industry - Technology vs. Criminal Innovation
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Join Brandon as he sits down with Nick, Claims and Carrier Compliance Specialist at M2 Logistics, to explore the sophisticated world of freight fraud and how technology is being weaponized on both sides of this battle. In this episode, we dive deep into: How phishing attacks are targeting logistics brokers to steal credentials and post fraudulent l…
…
continue reading

1
#117: "ITAM is the first thing I do in a new company" - Renata Vincoletto, CISO at Civica
54:54
54:54
Play later
Play later
Lists
Like
Liked
54:54Join us this week for The Tech Leaders Podcast, where Gareth sits down with Renata Vincoletto, CISO at Civica. After facing a deeply shocking setback, Renata chose resilience over resentment. Inspired by her mentor, she pushed forward, rising through the ranks to ultimately lead cybersecurity strategy for Civica, working on high-stakes government a…
…
continue reading

1
Women in Technology: Breaking Barriers & Building Allies
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00Join Brandon from M2 Technology as he sits down with Kelly and Aslinn from Women in Technology Northeast Wisconsin to discuss the real challenges facing women in tech and the practical steps everyone can take to create more inclusive workplaces. Key Topics Covered: -Why "you can't be what you can't see" matters in tech careers -Practical allyship s…
…
continue reading

1
Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast David Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from …
…
continue reading

1
CCT 270: CISSP Rapid Review Exam Prep - Domain 3 (Part 2)
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A sophisticated banking network breach using tiny Raspberry Pi devices se…
…
continue reading

1
CCT 269: CISSP Rapid Review Exam Prep - Domain 3 (Part 1)
23:56
23:56
Play later
Play later
Lists
Like
Liked
23:56Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv We begin by exploring foundational security principles that drive effecti…
…
continue reading

1
CCT 268: CISSP Rapid Review Exam Prep - Domain 2
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape grows more complex each day, especially when …
…
continue reading

1
Early Succession Planning Protects Your Clients and Secures Your Future
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Succession planning is vital for any law firm, but it's about more than just retirement. It ensures business continuity through the expected transitions and the unexpected ones like incapacity, death, or disaster. For solo and small firms, it is critical to uninterrupted client service, while also maximizing firm value. In today’s episode hosts Chr…
…
continue reading

1
Unsecurity Episode 243: Cyber Counsel w/ Heidi Fessler
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48Attorney Heidi Fessler is this week's guest! Practicing law for 35 years and specializing in cybersecurity, Heidi walks us through the right time to engage legal, navigating incident response, distinctions between general and cyber counsel, and cyber law. Thoughts on Unsecurity? Contact us at [email protected] and follow us for more! LinkedIn…
…
continue reading

1
CCT 267: Practice CISSP Questions - Security Assessments, Account Management and Backup Verification (Domain 6.3)
23:22
23:22
Play later
Play later
Lists
Like
Liked
23:22Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Securing SaaS environments and mastering security assessment techniques a…
…
continue reading

1
Insider trading: From Analyst to FBI informant with Tom Hardin.
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Insider trading doesn’t always start with a grand plan. Sometimes it starts with a single decision made in isolation. In this episode, we talk to Tom Hardin, a former hedge fund analyst turned FBI informant, known in headlines as “Tipper X.” Tom opens up about his descent into insider trading, what it was like to wear a wire for the FBI and the per…
…
continue reading

1
Working in ransomware response, investigation and recovery | John Price
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Price of SubRosa joins today's Cyber Work Podcast to share insights from his unique career path spanning UK military counterintelligence, banking cybersecurity and foundi…
…
continue reading

1
CCT 266: Collect Security Process Data (CISSP Domain 6.3)
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A shocking cybersecurity case recently hit the headlines—a 50-year-old IT…
…
continue reading

1
Agentic AI: Impacting The Business of Law and the Future of Law Practice
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12The use of generative artificial intelligence by lawyers has shown enormous potential for efficiency, quality, and improved client service, but it also requires the careful consideration of ethics, data security, and an understanding of the degree of human supervision needed. Agentic AI is now emerging and could further transform the business of la…
…
continue reading

1
CCT 265: Practice CISSP Questions - Mastering the Questions (Domain 1)
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape is rapidly evolving, and AI stands at the for…
…
continue reading