World-changing ideas. For free. For everyone. Featuring the world’s most exciting public thinkers, innovators and changemakers, RSA talks bring people and ideas together to shape a better future for all.
…
continue reading
RSA Events Podcasts
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
1
RSA Conference 2025 Recap: Insights, Trends & Straight Talk from the Expo Floor & Events around town
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Insights, Trends & Straight Talk from the Expo Floor & Events around town. 00:00 ...coming up 00:22 introduction & agenda 03:03 who are you wearing? 06:28 sponsorship - Cybersecurity Growth Membership E-Learning & Community 08:08 hot topic - RSA Conference 2025…
…
continue reading
Ufi VocTech Trust and the RSA are delighted to unveil the recommendations of the Digital Badging Commission. Over the past 18 months, the Digital Badging Commission has brought together leading minds across education, technology, policy and employment to reimagine and define the essential steps required for digital badges and credentials to transfo…
…
continue reading
1
Championing Sustainable and Human-Friendly Security
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
Surviving Ransomware—and the Wilderness—with Zach Lewis
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Brought to you by: Check Point (www.checkpoint.com) Armis (www.armis.com) Guidepoint Security (www.guidepointsecurity.com) 🎙️ Episode Summary During The Professional CISO Show – St. Louis Tour Stop, Zach Lewis joins host David Malicoat to discuss his path from IT support to the executive suite, his experience navigating a real ransomware incident, …
…
continue reading
1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
continue reading
1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
continue reading
1
From GenAI Prompts to OAuth Phishing: The Hidden Browser Risks - with Tommy Perniciaro
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Episode Summary Recorded live at HOU.SEC.CON, The Professional CISO Show welcomes Tommy Perniciaro, Director of Solutions Architecture at LayerX, to explore why the browser has become the least-instrumented layer in the modern security stack — and how CISOs can finally gain visibility and control over it. David and Tommy discuss everything from mal…
…
continue reading
1
Cybersecurity Awareness Month: Staying Safe Online
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
…
continue reading
1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading
1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
continue reading
1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
continue reading
1
Magic, Mentalism, and the Modern CISO – with Gary Chan
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Episode Summary In this episode, host David Malicoat sits down in St. Louis, Missouri with Gary Chan, Chief Information Security Officer at SSM Health — and a professional Security Mentalist. Gary blends his background in cybersecurity, engineering, and mentalism to bring a refreshingly human and creative approach to leadership, awareness, and infl…
…
continue reading
1
The Human Operating System: A New Way to Think About Cyber Risk with Kate Goldman
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42Episode Summary In this episode, David Malicoat sits down with Kate Goldman, founder and CEO of Cybermaniacs, to challenge one of cybersecurity’s oldest assumptions — that humans are the weakest link. Kate argues it’s time for CISOs to rethink human risk, culture, and resilience in the modern organization. Together, David and Kate explore the emerg…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. Dive into our recap of Black Hat, DEF CON and BSides Las Vegas fr…
…
continue reading
1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading
1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading
Over 13% of 16-24-year-olds in the UK are now classified as NEET – not in education, employment or training – with a growing number also economically inactive and disengaged from the workforce altogether. This crisis is costing the UK economy billions in lost productivity and social support, while placing young people at greater risk of poor mental…
…
continue reading
By Professor Masako Kinishi, Derek Walker, Mete Coban MBE, Rachael Orr, Ben Sheppard, Carolyn Davidson
…
continue reading
1
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean Martin
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
…
continue reading
1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading
1
Joe Sullivan on Why Now Is the Best Time to Be in Cybersecurity
1:27:57
1:27:57
Play later
Play later
Lists
Like
Liked
1:27:57Episode Summary: Joe Sullivan returns to The Professional CISO Show for a wide-ranging discussion with host David Malicoat. Together, they unpack the Salesforce hack, SaaS application blind spots, identity and access management, AI noise versus real use cases, and how security teams must evolve. Joe also shares candid lessons from crisis leadership…
…
continue reading
1
Bridging the Gap: Cybersecurity and Accessibility
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21Organizations often spend a lot of time ensuring they're complying with cybersecurity standards and regulations, but often, accessibility standards are overlooked. Accessibility, in a sense, starts with compliance as well. However, cybersecurity vendors, platforms, and programs often don't know these standards exist, don't know the legal ramificati…
…
continue reading
With opportunities for digital connection at an all-time high, and loneliness now a public health concern, are we truly more connected – or just more networked? Join us in the RSA Great Room for a panel exploring whether technology is helping us form meaningful relationships or simply keeping us online. Journalist and founder of The Logging Off Clu…
…
continue reading
We’re delighted to welcome you to the 2025 RSA Spark Showcase – a month-long exhibition spotlighting the most outstanding ideas in response to RSA Spark’s purpose-led briefs. From reimagining community spaces to innovative solutions for social connection and wellbeing, the showcase captures the energy and potential of the next generation of problem…
…
continue reading
1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading
1
The East Midlands’ future starts here
1:06:05
1:06:05
Play later
Play later
Lists
Like
Liked
1:06:05With a population of 2 million people and a strategic location at the heart of the UK, the national growth story must include a prosperous East Midlands. Join us at RSA House as we set out the recommendations in the final report of the East Midlands Inclusive Growth Commission, a bold, region-wide economic plan commissioned by Mayor Claire Ward and…
…
continue reading
As we face the challenges of climate change, inequality, and environmental degradation, we know that simply sustaining is not enough. To achieve this, we need a radical reimagining of our current systems – from economic and political to food and energy. And we need a new collective story for humanity. One that celebrates our fundamental interconnec…
…
continue reading
1
Intro to Building a Security Blueprint for Agents: Where to Start
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
…
continue reading
1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading
1
Responsible AI or Responsible Marketing? A CISO’s Take
47:30
47:30
Play later
Play later
Lists
Like
Liked
47:30"I get it. I need to stop banging on the table. This will be fixed in future episodes. Sorry for the poor sound experience." - David Get your Responsible AI Vendor Due Diligence Checklist here: https://webforms.pipedrive.com/f/ccV6a7kFIWKZpodmLcDbBhKhYnVU5N81A2tM20DGC8gepc0UtzfcqYaHXfzBi8gzuz Episode Summary: In this episode of The Professional CIS…
…
continue reading
1
AI in Application Security: Why False Positives Still Overwhelm Teams Despite the Hype | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 1 | A Musing On the Future of Cybersecurity with Sean ...
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
…
continue reading
1
From Gatekeeper to Growth Partner: How Modern CISOs Build Trust, Drive Innovation, and Shape AI-Enabled Business Security | A Conversation with Legendary CISO, Andy Ellis | Redefining CyberSecurity with ...
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
…
continue reading
1
AI Adoption vs. Security Reality — Insights from GPSEC STL
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) Episode Summary: AI isn’t just hype anymore — it’s transforming the way enterprises operate. At GPSEC St. Louis, David Malicoat sits down with Felix Simmons, Principal Security Architect at GuidePoint Security, to cut through the noise around AI adoption, risk, an…
…
continue reading
1
When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by ...
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
…
continue reading
1
EP82: Lessons from CISO XC DFW: Leadership, Risk & Real-World Security
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04Summary: Recorded live at CISO XC DFW, this episode of The Professional CISO Show features three powerful conversations from leaders shaping the future of cybersecurity. First, Sonya Wickel shares her 24-year career journey from IT generalist to CISO & CIO, offering insights on fourth-party risk, the value of empathy in leadership, and the importan…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. 00:00 ...coming up 00:13 introduction & agenda 05:21 who are you …
…
continue reading
1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading
1
Roadmap - July 2025 Preview and Platform Update
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Our first roadmap walkthrough of what has been developed on the Cybersecurity Growth platform and what is planned. 00:00 introduction 00:16 our development approach 03:08 sponsorship - Cybersecurity Growth Membership E-Learning & Community 03:54 what's been rel…
…
continue reading
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
…
continue reading
1
Let's talk Scattered Spider and How to Protect Your Organization
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Let's chat about real-world cyber attacks. Let's share some stories together. Let's learn and grow together. 00:00 introduction & agenda 00:54 who are you wearing? 06:55 sponsorship - Cybersecurity Growth Membership E-Learning & Community 07:44 Scattered Spider…
…
continue reading
Join us in London, Osaka and online for the second event in our global partnership with the UK at Expo 2025. The UK has a rich history of advancing women’s rights. In 1918, the Representation of the People Act granted voting rights to women over 30, with equal suffrage achieved in 1928. From the Equal Pay Act of 1970 to the Equality Act of 2010, tr…
…
continue reading
1
From Data Governance to AI Security: Kristi Cook on Building Resilient Teams
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46Sponsors AIM Security (www.aim.security) Guidepoint Security (www.guidepointsecurity.com) Kristi Cook, Head of Cybersecurity at Peabody Energy, joins David Malicoat live from GPSEC St. Louis — with AIM Security as our midday sponsor — to discuss how she’s leading her team through AI adoption, data governance, and talent development. From leveraging…
…
continue reading
1
Start with Story: What the RSAC Program Committee Wants to Hear About Today’s SOC Challenges
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
…
continue reading
New course, Practical Uses of Secure Controls Framework. A 1 hour course covering how to leverage frameworks to build robust security, compliance and privacy programs. This includes implementing capability maturity models, integrating the NIST Cybersecurity Framework, and how to get buy-in from your business executives. This course has video, writt…
…
continue reading
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading
1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading
1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading
1
Your Cybersecurity Growth platform update for the week of May 5, 2025.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
…
continue reading