Group 4 Created with Sketch.
 

Popular “Cybersecurity” Stations

Darknet Diaries Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Security Now (MP3) Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.

Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Smashing Security A helpful and hilarious take on the week's tech SNAFUs.

Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast…

Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones.

Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
Risky Business Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Hacking Humans Deception, influence, and social engineering in the world of cyber crime.
‎The CyberWire Daily The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

Popular “Cybersecurity” Playlists

Highlights: Cyber Security with Cairo Malet (#35) Highlights from STEAM Powered's conversation with Cairo Malet, Cyber Security GRC Specialist, and related topics. STEAM Powered

All “Cybersecurity” Audio


To start off this episode, our hosts go on a short chat about ChatGPT and how it can be useful for cybersecurity professionals and job hunters. They also highlight the difference between transitional and transformational tech.

Then, they get into the episode topic” id=”242KIXVoOjB” vid=”242KIXVoOjB” id-for-player=”242KIXVoOjB” link=”/listen/ep-94-ten-security-design-principles-sdp-242KIXVoOjB/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
EP 94: Ten Security Design Principles (SDP) https://www.yourcyberpath.com/94/

To start off this episode, our hosts go on a short chat about ChatGPT and how it can be useful for cybersecurity professionals and job hunters. They also highlight the difference between transitional and transformational tech.

Then, they get into the episode topic which is an introduction for a 10-part series that is going to come out in the following months which is Security Design Principles.

Kip mentions in the beginning how these design principles are not laws, but they are very important guardrails for the safety of any system, while Jason highlights that they are best practices that every organization should aim to implement to avoid future implications.

Defense in depth is like layering your protections, and it has become extremely important to do since the deperimeterization of our networks where we have devices all over the place, and not just in separate perimeters.

Security Design Principles are independent of technology. They are about strategies that can be applied to guide your work in many aspects.

Then, our hosts go over some simple examples of the Security Design Principles like Fail-safe Defaults and Least Privilege.

In the end, you must realize that when you plan for implementations ahead of time, it is always a huge time, money, and effort-saver for you and your organization.

What You’ll Learn

●    Is AI going to take over jobs?

●   What certifications mention Security Design Principles?

●   What is defense in depth?

●   What is the principle of fail-safe defaults?

Relevant Websites For This Episode

●   Saltzer and Schroeder's Design Principles

●   www.YourCyberPath.com
Episode 53: Fostering a Neurodiverse Cybersecurity Industry In episode 53 of Cybersecurity Where You Are, co-host Tony Sager is joined by Ron Gula, President and Co-Founder of Gula Tech Foundation. Together, they acknowledge Autism and Neurodiversity Awareness Month by discussing the need to create more opportunities in cybersecurity for neurodiverse individuals. They point out that there's no one way for all employers and supervisors to support employees with different abilities. It's up to the employers and supervisors to decide where those efforts fit into their culture and what each victory looks like.Attending RSA Conference 2023? Make sure you visit the main conference hall at 12:00 P.M. PT on Wednesday, April 26. At that time and place, Gula Tech Foundation will announce the four winners of its Spring 2023 grant campaign, "Expanding Opportunities in Cyber for the Neurodivergent." As part of the ceremony, you'll have a chance to speak with the winners about engaging neurodiverse individuals in your organization.ResourcesFollow Ron Gula on LinkedIn.Gula Tech FoundationEpisode 30: Solving Cybersecurity at Scale with NonprofitsEpisode 52: Back in the Buzz of RSA ConferenceTikTok: Influence Ops, Data Practices Threaten U.S. SecurityIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
Mitigating Risks from Unmonitored Communication Channels Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and supervise communications. This crackdown on non-compliant communications is the clearest indicator yet that regulators have lost patience with firms that still haven't addressed supervision and record-keeping risks that were exacerbated by the pandemic. In this episode, Garth Landers, Director of Global Product Marketing at Theta Lake, discusses how businesses can mitigate risks from unmonitored communication channels.Time Stamps02:20 — Please share some highlights of your professional journey with the listeners.05:10 — Different types of modern communication tools.12:05 — The 2022 Modern Communications Compliance and Security report(produced by Theta Lake) finds that unmonitored communication channels remain the biggest risk. What are these risks?21:19– What are some best practices in securing the different communication channels?28:47 — Do you think an organization would be well served if they had written guidelines of the do's and don'ts when using certain channels and making that document readily available to all organizational members?34:09 — It's about helping individuals do the right things so that the communication is secure, as compared to gotcha, you made a mistake, and you should have done better. Thoughts?36:51 — I emphasize the importance of creating and sustaining a high-performance information security culture. Only when you create that culture, that work ethic, securing communication channels is sustainable in the long run.40:43 — We are talking about a proactive approach driven by a change in the mind shift where the leaders are looking at this apparent challenge (securing communication channels) as a strategic opportunity.45:11 — Can you address the archival and retrieval challenges? 52:00 — If there were three or four takeaways that listeners should walk away with from today's discussion, what should they be?Memorable Garth Landers Quotes/Statements"Two-thirds of an organization believe that inside their organization, employees are using unmonitored communication channels.""Unmonitored communication channels pop up because, in many cases, organizations decide not to empower their employees, they give them a Zoom, or a Cisco WebEx or a Microsoft Teams, or a RingCentral, or a Slack, etc., but they don't fully enable them. They don't turn on chat, or they don't allow file sharing, polls, or whiteboards. This forces employees to adopt and use unmonitored communication channels.""From a process standpoint, don't take a top-down approach to implement modern collaboration platforms.""Research shows that, on average, at least four different unified/modern communication tools are being used by organizations.""Most end users are not engineered towards malfeasance and bad behavior, it's carelessness. And the greatest insider threat is that sort of carelessness, and lack of awareness.""Policy works best when it's not some sort of abstract reality that you pull out when a bad thing happens." "Technology is out there to get to that balance point of maximum productivity, productive IT but productive and efficient and compliant work as well." Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications: https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-t
Advance Guard Could Save You LBMC Shareholder Bill Dean and William Parks spend today’s episode discussing Advance Guard, a new service offering from LBMC's Security Technical Team. Learn how Advance Guard may help protect your organization's most valuable assets, save time on compliance audits, and give peace of mind about your current security stance.  Want to see Bill’s “Prescription”? Check out the link below: https://www.lbmc.com/wp-content/uploads/2023/01/AdvanceGuard-Sample-Schedule.pdf Questions for Bill? Find him here: [email protected]
Vendor Risk Management & Compliance in Healthcare Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast. Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM). He also discusses the latest threat landscape and provides some useful guidance for healthcare providers.

CORL Technologies
https://corltech.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
How Software Developers use Red Teaming & White Box Audits to Improve Security and More! In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming & White Box Audits to improve the security and competitiveness of their platforms. We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities.

RealVNC
https://www.linkedin.com/company/realvnc/
https://www.facebook.com/realvnc
https://twitter.com/realvnc
https://www.youtube.com/user/RealVNCLtd
https://www.reddit.com/r/realvnc/

Cure53
https://cure53.de

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

SIEMonster
https://sie” id=”AbeJSskiAc6″ vid=”AbeJSskiAc6″ id-for-player=”AbeJSskiAc6″ link=”/listen/dez-rock-ceo-of-siemonster-AbeJSskiAc6/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Dez Rock, CEO of SIEMonster Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity. She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories.

SIEMonster
https://siemonster.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
OT Security Marketing: Insights From the Plant Floor Kamil Karmali has over 15 years of experience in cross-functional team leadership, global sales leadership, talent development & executive consulting in OT cybersecurity services.  He is currently the Sr. Global Manager of OT Cybersecurity Consulting Services with Rockwell Automation, a leading global industrial automation company founded way back in 1903.
Episode 40: Legal Compliance in the Digital Age In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-changing law? One way is to focus on the fundamental principles related to privacy and cybersecurity. Here about these principles and more with special guest, Matti Neustadt who has a background as in-house counsel for some leading tech logos. She knows what it takes to be a privacy preacher and cybersecurity crusader while staying current and compliant. In short – she’s the ideal guide to this new legal frontier.To learn more about cybersecurity services, visit:https://www.highwirenetworks.com/services/managed-cybersecurity/
Ep. 60 – Cybersecurity of AI,& the Impact of a Bay Area Bank Collapse Bill and Greg discuss the security aspects of AI, the 'black box' of AI is vulnerable to being manipulated or polluted, or having biases that aren't evident to subjects., how a Bay Area bank collapse will impact cybersecurity, and Bill's visit to CERIAS' anniversary with Gene Spafford.
 
Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through ou” id=”6beMzudnYKo” vid=”6beMzudnYKo” id-for-player=”6beMzudnYKo” link=”/listen/take-five-57-cybersecurity-strategies-for-addressing-cyber-risk-retail-6beMzudnYKo/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Take Five #57 – Cybersecurity Strategies for Addressing Cyber Risk: Retail This episode was recorded on 3/22/2023
 
Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry experts.
 
Tune in to hear Fortinet Field CISOs, Courtney Radke and Troy Ament, talk about cybersecurity strategies for addressing cyber risk in retail, top of mind cyber threats, and how complexity is preventing organizations from putting in place proper cyber defense.
 
For more information about retail, visit our website, www.fortinet.com/retail
 
Get key findings from the 2H 2022 FortiGuard Labs Threat Report and learn how security professionals can protect their organizations: https://www.fortinet.com/blog/threat-research/fortiguard-labs-threat-report-key-findings-2h-2022?utm_source=social&utm_medium=linkedin-org&utm_campaign=sprinklr
 
Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through ou” id=”4iIdOKd5f0c” vid=”4iIdOKd5f0c” id-for-player=”4iIdOKd5f0c” link=”/listen/take-five-58-cybersecurity-strategies-for-addressing-cyber-risk-healthcare-4iIdOKd5f0c/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Take Five #58 – Cybersecurity Strategies for Addressing Cyber Risk: Healthcare This episode was recorded on 3/28/2023
 
Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry experts.
 
Tune in to hear Fortinet Field CISOs, Troy Ament and Courtney Radke talk cybersecurity strategies and addressing cyber risk in healthcare. They discuss the importance of cybersecurity in protecting patient safety, the risks of a ransomware attack, and how complexity is creating hurdles that prevent cyber defense in healthcare.
 
For more information about healthcare security, visit our website, www.fortinet.com/healthcare
 
Read key findings from the 2H 2022 FortiGuard Labs Threat Report to discover how security professionals can protect their organizations: https://www.fortinet.com/blog/threat-research/fortiguard-labs-threat-report-key-findings-2h-2022?utm_source=social&utm_medium=linkedin-org&utm_campaign=sprinklr
PCI Monthly Update: March News & Requirement 3 Stay up to date with the latest in PCI compliance. In this episode, William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest in PCI news, new restrictions around PAN data, and how to master Requirement 3 while preparing for PCI 4.0. Don't miss our upcoming webinar: "How to Reduce Your PCI Scope: Tips & Technology Your Organization Needs to Know" on Thursday, April 13 at 11am CT. Register Now! For any questions, feel free to reach out to us here: Kyle Hinterberg: [email protected] Andy Kerr: [email protected] William Parks: [email protected]
Episode 52: Back in the Buzz of RSA Conference In episode 52 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss RSA Conference 2023. Together, they point out that the annual conference is more than just a trade show. They use that lens to identify some tips and tricks that attendees can use to get the most out of their time there. Additionally, they discuss what themes and activities you can expect to see at RSA Conference 2023. Their conversation ends with a teaser of Sean's talk at the event.ResourcesA CISO's Best Friend: The PentesterEpisode 49: Artificial Intelligence and CybersecurityEpisode 48: 3 Trends to Watch in the Cybersecurity IndustryEpisode 34: A Survey of Hacking in HollywoodEpisode 30: Solving Cybersecurity at Scale with NonprofitsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

Kuderna Financial
https://www.k” id=”iN9awrYN7A” vid=”iN9awrYN7A” id-for-player=”iN9awrYN7A” link=”/listen/financial-security-in-chaotic-times-iN9awrYN7A/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Financial Security in Chaotic Times Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos. Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data.

Kuderna Financial
https://www.kudernafinancial.com/

The Kuderna Podcast
https://www.kudernafinancial.com/the-kuderna-podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle for the CyberWIDE Panel’s InfoSec Certification Soup to discuss careers, hiring,” id=”73caiVshkIL” vid=”73caiVshkIL” id-for-player=”73caiVshkIL” link=”/listen/ep-93-cyberwide-panel-levelup-infosec-certifications-soup-73caiVshkIL/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
EP 93: CyberWIDE Panel – LevelUp – InfoSec Certifications Soup https://www.yourcyberpath.com/93/

In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle for the CyberWIDE Panel’s InfoSec Certification Soup to discuss careers, hiring, resumes, and of course, certifications.

We begin the episode with a brief discussion of how Jason and Kip got into the world of cybersecurity, moving over to some valuable information about how you should go about starting your cyber career and how to know which career is fit for you.

Jason also shares an important tip, which is to always keep your resume short and only include your most important certifications relevant to the job posting. Hiring managers will usually spend 6 to 60 seconds looking at your resume, so keep it concise and to the point, 2 pages at most.

Then, Kip and Jason discuss their opinions on how important programming is for your cybersecurity career, mentioning that it might be very important for some roles while for other roles you might just need to know basic scripting.

In the end, Jason and Kip go over some viewer questions and discussions, like how important soft skills are, how to show up for the interview, and how to get a mentor – highlighting that being coachable is the most important thing as your attitude will affect how beneficial mentorship is going to be for you.

What You’ll Learn

●    How to know if you are fit for cybersecurity

●   Are all certifications valued equally?

●   Do you need programming skills to work in cybersecurity?

●   How important are your soft skills and getting mentored?

●   How is AI going to affect cybersecurity analyst jobs?



Relevant Websites For This Episode

●     AASLR: Tailor Your Resume to Get Noticed, with Kip Boyle

●     CTF Time

●     John Strand’s Antisyphon Training

●     Wild West Hackin’ Fest

●     SANS Cyber Diversity Academy

●     SANS VetSuccess Academy

●     Divergence Academy

●     Hack the Box

●     MetaCTF

●     SANS Holiday Hack Challenge



Connect with Kip

●     https://twitter.com/KipBoyle

●     https://www.linkedin.com/in/kipboyle/

●     Fire Doesn’t Innovate by Kip Boyle

 

Connect with Jason

●     https://twitter.com/JasonDion

●     https://www.linkedin.com/in/jasondion/

●     https://www.diontraining.com/home

 

YourCyberPath

●     https://www.yourcyberpath.com/

●     https://www.youtube.com/@YourCyberPath/streams

●     https://www.facebook.com/YourCyberPath/

 

Connect with ISSA and North Texas ISSA

●     https://www.issa.org/

●     https://www.linkedin.com/company/information-systems-security-association-issa-/

●     https://www.ntxissa.org/

●     <a href="https://www.linkedin.com/company/
The Endpoint Management Vulnerability Gap Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed.

Syxsense
https://www.syxsense.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

In” id=”3L8FdfflGco” vid=”3L8FdfflGco” id-for-player=”3L8FdfflGco” link=”/listen/how-to-optimize-cybersecurity-training-3L8FdfflGco/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
How to Optimize Cybersecurity Training Ganesh Krishnan is the Co-Founder and CEO of Anzenna. Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian. He also launched Avid Secure in 2017 which was acquired just 18 months later.

In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
Critical Device Security Strategies & Tools Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity. Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection.

Cyolo
https://cyolo.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
How Online Communities Can Facilitate Information Sharing to Solve IT & Security Challenges Joe Gross is the Director of Solutions Engineering at Graylog. Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities. Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models.

Graylog
https://www.graylog.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
The Evolution of Identity Standards and Identity Orchestration Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds.

In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity.

Strata
https://www.strata.io/

Hexa
https://hexaorchestration.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
Implementing Secure and Fast Authentication Processes Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If developments like FIDO2, WebAuthn, and passkeys are to be the cornerstones of a passwordless future, then every application (not just Apple, Google, and Microsoft) needs an easy way to adopt these methods and weave them into current user authentication flows. Slavik Markovich, Co-founder and CEO, Descope, discusses current and future authentication trends and the importance of building a low-code/no-code passwordless authentication solution for app developers.Time Stamps02:52 — Slavic, share with us some background information, some highlights of your professional journey.04:19 — What are the pain points when it comes to authentication?09:55 — So Slavik, where are we headed in terms of the next stage or the next phase of evolution when it comes to more sophisticated authentication systems?16:01 — What is that low code, no code, passwordless authentication solution that would make it feasible for developers to focus on developing solutions and functionalities?25:00 — There are products in the market, open source or proprietary, that can help take away that additional pain or challenge of developing the authentication part of the solution. The developers can then focus on what they are good at, developing the product functionalities. Is that a fair, high-level representation of what you said?26:17 — So where are we with biometric authentication? Have we made more progress?33:53 — Are we further along in getting to that ideal goal where just compromising an account doesn't mean the end of the world or doesn't mean a major problem?36:55 — Please share some final thoughts.Memorable Slavik Markovich Quotes/Statements"If you have a token that you use to authenticate, that's pretty secure, it's very hard to phish it, and it's very hard to steal it.""A lot of effort is being made in creating authentication around who you are versus what you know. So using biometrics-based authentication is a big step in that direction." "Use of passkeys, which allow a secure and somewhat frictionless way of authenticating, without having to remember anything." [Note: "With passkeys, users can sign in to apps and websites with a biometric sensor (such as a fingerprint or facial recognition), PIN, or pattern, freeing them from having to remember and manage passwords"] (https://developers.google.com/identity/passkeys#)"Like everything in security, the devil is in the details.""There is an inherent tension between the security teams and the developers. You kind of try to solve it by bringing security into the development teams.""Security shouldn't become a bolt-on process but should be part of the architecture, design, review, and implementation.""Security doesn't sell your product. Eventually, features will sell your product.""Most developers are not security experts. So, if they implement authentication, there might be big holes that they cannot catch. Then, you end up with account compromises and stolen data from the application.""The biggest obstacle to biometric authentication is actually education.""The best password is no password."Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications: https://www.imd.org/ibyimd/magazine/preventing-s
Also known as Technical Navigator, Nitesh Singh is a cyber security professional. He is in this field from last 10 years. He has trained over 5000 students till now in both offline & online way. He has” id=”3GnaJ3Q2MXC” vid=”3GnaJ3Q2MXC” id-for-player=”3GnaJ3Q2MXC” link=”/listen/ethical-hacking-in-2023-s3-ep-10-cyber-cast-nitesh-singh-yashashvi-kumar-3GnaJ3Q2MXC/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Ethical Hacking in 2023 | S3: EP-10 | Cyber-Cast | Nitesh Singh | Yashashvi Kumar In this episode of , we talk about Ethical Hacking for Beginners , how to start bug bounty & more.
Also known as Technical Navigator, Nitesh Singh is a cyber security professional. He is in this field from last 10 years. He has trained over 5000 students till now in both offline & online way. He has been giving workshops & seminars in several colleges & schools right from his college days.
He also runs a youtube channel named Technical Navigator with more than 165k Subscribers, where he posts cyber security videos for everyone.
He is the Director of cyber security firm Metaxone Solution Pvt. Ltd. founded by him in 2015.
SOURCE- INTERNET

Connect with Mr.Nitesh Singh :-
https://technicalnavigator.in/  
https://www.instagram.com/technicalnavigator/
https://www.linkedin.com/in/technicalnavigator/


Follow us on –
https://www.linkedin.com/company/hacketh-in
https://www.instagram.com/hacketh.in/
Email- [email protected]
Proactive Resilient Approach to Cybersecurity It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and sustaining such an approach requires high commitment, preparedness, and discipline. Kriti Arora, Security Global Black Belt, Threat Intelligence and Enterprise Attack Surface Management, Microsoft, shares her experiences guiding clients to adopt an intelligence-driven proactive approach to thwarting attacks. She also shares her passion for the field and the satisfaction of training and serving as a cyberwarrior.Time Stamps00:48 — Before we get into the details of a proactive resilient approach to cybersecurity, how about sharing your professional journey? What got you into this field?03:58 — You described yourself as a first-generation cyberwarrior during our planning meeting. I found that quite intriguing. Please expand.06:54 — Can you shed some light on the different types of opportunities that a cybersecurity career can present to the first generation (of cyber warriors) or people trying to pivot from their existing careers into cybersecurity?11:14 — Kriti, share with us briefly about your role at Microsoft? At a generic level, could you share what you do at Microsoft with the listeners?15:16 — What is a proactive, resilient approach?18:08 — Why do organizations vary in their level of proactiveness? What are some reasons?21:10 — What are the five or six things one should do to get started on the path of proactiveness?27:43 — Maintaining a log of security intelligence received, and actions taken might be very useful, especially when an organization is trying to defend itself in a court of law. What are your thoughts?34:24 — Every organizational member has a role to play in securing the organization. Do you agree?36:28 — Asset prioritization and data retention strategies are key aspects of proactive cybersecurity governance. What are your thoughts?40:59 — What measures or metrics are useful in assessing proactive resilience?45:02 — Please share some final thoughts and key messages for our listeners.Memorable Kriti Arora Quotes/Statements"So, at one moment, you're fighting crimes, doing these investigations like a detective, and researching a problem to find a solution. At another time, you could be troubleshooting a typical problem and providing customer support services.""The adaptive quality of the field is what makes it thrilling. That's what excites us, the cyber warriors, who are trying to experiment, learn new things, and save the world with different techniques and tactics.""I consider a proactive approach to be intelligence-driven and holistic. It represents a mind shift on how cyber threats are thwarted.""In this proactive approach, we focus on indicators of attackers; we try to keep a watch on the entire network and its processes. It's a holistic approach. I would not call it a technique; I would call it a mind shift because you need that mind shift to understand proactiveness. It's like being alert, thinking about the worst-case scenario, trying to prevent it or be prepared to recover from it quickly.""It's very important to focus on the attack surfaces, whether internal or external. A full or 360 view of your attack surface is very important." "Successful implementation and sustenance of a proactive resilient approach depend on a high level of cybersecurity awareness and knowledge.""Organizations must strive to be both secure and productive." Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications: <a href="http
ChatGPT: What You Need to Know ChatGPT is making headlines worldwide and its impact is making a lot of business owners uncomfortable. What is ChatGPT? How will this tool change how you do business? Is ChatGPT a security risk? What to expect from ChatGPT4? William Parks interviews LBMC's Data Insights team members to discuss this controversial topic, dive into facts your organization needs to know, and explore probable scenarios that could happen with this level of Artificial Intelligence. Want more insights? Contact LBMC's Data Insights team: Jon Hilton, Shareholder ([email protected]) Will Son, Senior Manager ([email protected])
Radware: Understanding Supply Chain Attacks and Client Side Protection Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Supply chain attacks from the client sideTraditional WAF vs server protections vs client side protectionsDeployment experiences
How to Prevent Synthetic Identity Theft JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies.

ID.me
https://www.id.me/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
Becoming an Ethical Hacker Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach.
His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE.

In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester. He also shares some tips for business owners and consumers on how to improve their cybersecurity posture.

TCM Security
https://academy.tcm-sec.com/

Heath on Social Media:
LinkedIn – https://linkedin.com/in/heathadams
Twitter – https://twitter.com/thecybermentor
YouTube – https://www.youtube.com/c/thecybermentor
Twitch – https://twitch.tv/thecybermentor

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers.

In the beginning, Jason quickly describes password managers, their use cases and how they work, highlighting both the security and convenience as” id=”9pdE5gwSJxw” vid=”9pdE5gwSJxw” id-for-player=”9pdE5gwSJxw” link=”/listen/ep-92-password-managers-9pdE5gwSJxw/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
EP 92: Password Managers https://www.yourcyberpath.com/92/

In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers.

In the beginning, Jason quickly describes password managers, their use cases and how they work, highlighting both the security and convenience aspects of using a password manager.

Then, Kip goes over how to choose a password manager and what criteria you should consider when choosing the best software, emphasizing that attack resistance comes first, and all other criteria comes second to it.

After that, our hosts discuss the different features of different password managers, why they utilize them, and the best ways to make sure you have great security and productivity online.

In the end, Jason makes some notes about paid versus free password managers and VPNs, and discusses the newest trend of passwordless authentication.



What You’ll Learn

●   What is a password manager?

●   How do you choose a password manager?

●   What is the difference between free password managers and paid ones?

●    What is passwordless authentication?

Relevant Websites For This Episode

●  https://1password.com/

●  https://bitwarden.com/

Other Relevant Episodes

●  Episode 40 – Security Awareness & Training

●  Episode 84 – The CIA Triad – The Basis of Cybersecurity (Confidentiality)
Episode 39: Trends in Network Security Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect these entities from lost or stolen data, networks being held hostage, etc. In today’s landscape, attacks are nearly an inevitability and even more so than in decades past.So, knowing how important it is to the functions of our society, what’s next for network security? Who better to ask than the expert who’s helped define the space since 1985? In this podcast, we speak with Ed Amoroso, CEO of TAG Cyber, a company that provides cybersecurity research and advisory “as a service.”To learn more about managed network security services, visit:https://www.highwirenetworks.com/services/managed-cybersecurity/To learn more about our Overwatch Cybersecurity Partner Program and how to become a security solutions provider, visit:https://www.highwirenetworks.com/cybersecurity-partners/

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our” id=”1Fr8Mcqsnd” vid=”1Fr8Mcqsnd” id-for-player=”1Fr8Mcqsnd” link=”/listen/take-five-56-cybersecurity-for-2023-and-beyond-higher-education-1Fr8Mcqsnd/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Take Five #56 – Cybersecurity for 2023 and Beyond: Higher Education This episode was recorded on 3/14/2023

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry experts.
 
Tune in to hear Fortinet Field CISOs, Bob Turner and Courtney Radke, talk about preparing for the year ahead for higher education. They discuss top-of-mind security challenges CISOs experienced last year, such as having reliable security tools and the latest cyber intelligence, as well as improving institutional resilience to cyber attacks. Learn the tools education CISOs and security leaders need to define an effective campus cybersecurity strategy.

Learn top-of-mind cybersecurity solutions CISOs should consider in 2023: https://www.fortinet.com/blog/ciso-collective/top-of-mind-cyber-solutions-to-consider-in-2023?utm_source=social&utm_medium=soundcloud-org&utm_campaign=sprinklr

Phinity Risk Solutions
https://www.phinityrisk.com/

The Secure Talk Cyber Security Podcas” id=”3szNaUtl9It” vid=”3szNaUtl9It” id-for-player=”3szNaUtl9It” link=”/listen/third-party-risk-management-tprm-with-lee-bristow-cto-of-phinity-risk-solutions-3szNaUtl9It/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.

Phinity Risk Solutions
https://www.phinityrisk.com/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/

Pulsar Security
https://www.pulsarsecurity.com/

The Secure Ta” id=”8WIpHadL4k8″ vid=”8WIpHadL4k8″ id-for-player=”8WIpHadL4k8″ link=”/listen/cybersecurity-breach-response-more-8WIpHadL4k8/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Cybersecurity Breach Response & More Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.

Pulsar Security
https://www.pulsarsecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/
Episode 51: Making a Roadmap for Your Cybersecurity Journey In episode 51 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss the strategic importance of using a roadmap to navigate your cybersecurity journey. Together, they point out that this journey is like many others. You need to know how to get packing, plan your route, hit the road, and take a snapshot of how far you've come and where you're going next. Sean and Tony identify some important considerations to keep in mind for each leg of your trip, and they note that the Center for Internet Security shares your journey and supports you along it.One of the ways it does this is through CIS SecureSuite. Members gain access to benefits, tools, and resources that help them, their clients, and their customers navigate the different stages of their respective cybersecurity journeys. Now through April 30, you can save up to 20% on a new CIS SecureSuite Membership using promo code CYBER2023. ResourcesWhy Your Organization Needs a Cybersecurity RoadmapEpisode 49: Artificial Intelligence and CybersecuritySeparating FUD from Practical for Post-Quantum CryptographyEpisode 47: How Security and Compliance Support Each OtherEpisode 22: CIS Behind the Veil: Log4jCIS SecureSuite® Promo TermsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
Ep. 59 – Cyber Security Framework (CSF) & Ransomware Update Bill updates us about the updates to the NIST CSF (Cyber Security Framework), and we talk about the state of ransomware.

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our” id=”6klFsOmM8Ab” vid=”6klFsOmM8Ab” id-for-player=”6klFsOmM8Ab” link=”/listen/take-five-55-cybersecurity-for-2023-and-beyond-retail-6klFsOmM8Ab/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Take Five #55 – Cybersecurity for 2023 and Beyond: Retail This episode was recorded on 3/8/2023

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry experts.

Tune in to hear Fortinet Field CISOs, Bob Turner and Courtney Radke, talk about preparing for the year ahead for retail. They discuss top of mind security challenges CISOs experienced last year, such as securing the business without disrupting the customer experience, as well as predicted challenges to keep in mind as 2023 progresses. Gain insight into the necessary solutions needed to prepare for the year ahead in retail.

Read our blog to learn top cybersecurity challenges CISOs should prepare for in 2023: https://www.fortinet.com/blog/ciso-collective/top-cybersecurity-challenges-for-cisos-to-address-in-2023
Part 2: Your Leads Suck, My Sales Rep Told Me So! Kevin Flint's mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he's spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.

In this episode, Nick talks about the importance of autonomy and trust in distributed e” id=”AIO2moRTawq” vid=”AIO2moRTawq” id-for-player=”AIO2moRTawq” link=”/listen/building-autonomy-trust-in-distributed-engineering-teams-AIO2moRTawq/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Building Autonomy & Trust in Distributed Engineering Teams Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces. Nick also co-hosts the Managing Up podcast.

In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams.

Sym
https://symops.com/

The Managing Up Podcast
https://www.managingup.show/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/
Our Guest, Mr.Lokesh Verma Sir Is A Military Veteran and information security professional with an extensive experience into the field of Security Opera” id=”54U74Y5Va6z” vid=”54U74Y5Va6z” id-for-player=”54U74Y5Va6z” link=”/listen/the-architecture-of-cybersecurity-ft-lokesh-verma-sir-s3-ep-09-cyber-cast-54U74Y5Va6z/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
The Architecture of Cybersecurity | ft. Lokesh Verma Sir | S3: EP-09 | Cyber-Cast | In this episode we talked about how Cyber Security has grown and emerged over the years and how Cyber Security is managed in the Corporate World.
Our Guest, Mr.Lokesh Verma Sir Is A Military Veteran and information security professional with an extensive experience into the field of Security Operations, Cyber Defense Capabilities, Threat Intelligence, threat Hunting, Project Management and Delivery. Also posing significant exposure into Vulnerability Management, Risk Management.

A creative mindset and strong legal prowess and business acumen to generate out of the box solutions that align with and solve complex business challenges, strengthen security, mitigate Risk, and encourage leadership to adopt effective measures.
His LinkedIn- https://www.linkedin.com/in/lokeshve/
Follow us on :
LinkedIn – https://www.linkedin.com/in/yashashvikumars/
Instagram – https://www.instagram.com/hacketh.in/

Haseeb Awan is the Founder & CEO at EFANI Secure Mobile. In this episode, we’ll hear about Haseeb’s cyber path, and we’ll explore some of the biggest mobile phone risks and what you can do about them.

In the beginning, Haseeb tells the story of how his phone numbe” id=”7xUwwIAD6LW” vid=”7xUwwIAD6LW” id-for-player=”7xUwwIAD6LW” link=”/listen/ep-91-mobile-device-security-with-haseeb-awan-7xUwwIAD6LW/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
EP 91: Mobile Device Security with Haseeb Awan https://www.yourcyberpath.com/91/

Haseeb Awan is the Founder & CEO at EFANI Secure Mobile. In this episode, we'll hear about Haseeb's cyber path, and we'll explore some of the biggest mobile phone risks and what you can do about them.

In the beginning, Haseeb tells the story of how his phone number was compromised not once, not twice, but three times, with basically the same type of attack and how that forced him into cybersecurity.

Then, Kip and Haseeb go over some of the risks that mobile users can be a victim of and the ways your mobile number could be compromised from social engineering, bribery of account executives, to SIM swapping, and man-in-the-middle attacks.

In the end, Haseeb finishes off by discussing how cybersecurity is growing and that cyber risk is greater than ever and that more countries and organizations are building cyber armies.



What You’ll Learn

●    How did Haseeb get into Cybersecurity?

●   What is SIM swapping?

●    What is an IMSI catcher?

●    What is location tracking?

●    Who should worry about their mobile security?

Relevant Websites For This Episode

●   https://www.efani.com/

●   https://www.nsogroup.com/

●   https://www.amazon.com/This-They-Tell-World- Ends/dp/1635576059

●   https://www.linkedin.com/in/haseebawan/

Other Relevant Episodes

●   Episode 59 – Five things to know before you get into cybersecurity

●   Episode 78 – Current State of the Cybersecurity Industry with Deidre Diamond of CyberSN
Honeycomb: Measuring the Success of an Incident Response Program Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage and restoring normal business functionality as quickly as possible. A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their customers and stakeholders, but how specifically can the efficacy of an incident response program be assessed?In this episode of the EM360 Podcast, RedMonk analyst Kate Holterhoff spoke to Fred Hebert, Staff Site Reliability Engineer at Honeycomb, as they explore:Why some metrics are better than othersLessons we learn from fighting forest firesIncident response methodology
Michael Ndon on Linkedin https://www.linkedin.com/in/michael-a-ndon/

The Breaking into Cybersecurity Podcast Series: It’s a conversation about what you did before, why did you pivot in cyber, what was the process you went through Breaking” id=”3tEA0sTqZMv” vid=”3tEA0sTqZMv” id-for-player=”3tEA0sTqZMv” link=”/listen/breaking-into-cybersecurity-africa-series-with-michael-ndon-3tEA0sTqZMv/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity: Africa Series with Michael Ndon Breaking into Cybersecurity: Africa Series with Michael Ndon
Michael Ndon on Linkedin https://www.linkedin.com/in/michael-a-ndon/

The Breaking into Cybersecurity Podcast Series: It’s a conversation about what you did before, why did you pivot in cyber, what was the process you went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
Where to find the show:

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity

Check out our books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Confidence Staveley is Africa’s most celebrated female cybersecurity leader, talent developer, global speaker, and inclusion advocate. She has achieved numerous professional certifications and industry recognitions for her outstanding work. Confidence is an official member of the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs, and technology executives. Confidence’s superpower? A deep understanding of cyber security fused with great communication skills, enabling her to communicate cyber security best practices in a relatable and engaging way with no jargon, to audiences of all types. Little wonder she has been nicknamed “The Relatable CyberSecurity Leader”.
https://www.linkedin.com/in/confidencestaveley/
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Episode 50: The Best of Cybersecurity Where You Are In episode 50 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Randy Rose, Sr. Director of Security Operations & Intel for the MS-ISAC, and Kathleen Moriarty, Chief Technology Officer at CIS. Together, they celebrate Cybersecurity Where You Are reaching Episode 50. To mark this milestone, they look back on some of their favorite moments in the podcast's history. They also share how those moments tie back not only to the maturation of the podcast but also to CIS's ethos as a "platform for activism." (Thanks, Tony.)Thank you to all our listeners for helping us reach Episode 50. We couldn't have done it without you. More laughter and learning to come!ResourcesEpisode 11: Remote Attestation Helps Zero TrustEpisode 18: Top 5 Scariest MalwareEpisode 22: CIS Behind the Veil: Log4jEpisode 29: Conceptualizing Reasonableness for Risk AnalysisEpisode 44: A Zero Trust Framework Knows No EndIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
NYDFS Part 500 Cybersecurity Rules In this podcast episode, FTI Consulting experts Todd Renner and Adriana Villasenor are joined by Erez Liebermann, partner at Debevoise & Plimpton, to discuss the updates to the Part 500 cybersecurity rules from the New York Department of Financial Services (NYDFS). Together, the group debriefs the changes from a cybersecurity, communications, and legal perspective, and considers the broad implications of the regulation nationally and globally.See omnystudio.com/listener for privacy information.
NYDFS Part 500 Cybersecurity Rules In this podcast episode, FTI Consulting experts Todd Renner and Adriana Villasenor are joined by Erez Liebermann, partner at Debevoise & Plimpton, to discuss the updates to the Part 500 cybersecurity rules from the New York Department of Financial Services (NYDFS). Together, the group debriefs the changes from a cybersecurity, communications, and legal perspective, and considers the broad implications of the regulation nationally and globally.See omnystudio.com/listener for privacy information.
Part 1: Your Leads Suck, My Sales Rep Told Me So! Kevin Flint’s mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he’s spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.
Preventing Cyber Attacks Across the Software Supply Chain Neatsun Ziv is the Co-Founder and CEO of Ox Security, a company that helps other organizations to prevent attacks across their software supply chain. Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&R) framework.

Ox Security
https://www.ox.security/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/
The Challenges and Best Practices of Cyber Security in Emerging Markets “While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes and governance, the complexity of global supply chains, the need to remain low cost to attract investment, and the rapid adoption of technology without adequate cyber defenses.” Andre Keartland, Solutions Architect at Netsurit, Johannesburg, South Africa, speaks to these realities and offers guidance on managing cyber risks and implementing robust security solutions.Time Stamps00:49 — We have a lot to talk about. But let's first talk about your professional journey.04:05 — It would be beneficial if you shared with listeners what we mean by emerging markets. You could talk about that first before talking about the trends.07:20 — Bottom line, it is my hunch that the cybersecurity phenomenon doesn't discriminate, every country, whether they are part of the emerging block or the developed block, the experiences are kind of similar. What do you think? What are your reactions?09:54 — Research finds that risks to emerging markets arise from four areas: 1) the complexity of supply chains; 2) the need to remain low cost to attract investments; 3) the rapid spread of technology without adequate availability or awareness of training; and 4) weak regulations. Would you agree with these?15:46 — Andre, you're based in South Africa. Let's say some of the listeners might be interested in working or starting a venture there. As they evaluate the business scene, the pros and cons, how should they look at cyber security as a risk factor? What would be your message to them?20:57 — The initial bonding and acquaintance phase is challenging when establishing reliable outsourcing relationships. Andre, any thoughts on that?25:09 — What can organizations in the developed world learn from organizations managing cybersecurity in emerging markets? 32:05 — In developing markets, organizations are more alert, more hungry, and more motivated in putting in place the best possible cyber governance practices. So, the sharing of knowledge, the sharing of experiences can be hugely beneficial. Your thoughts?43:20 — I always like to give my guests the final word. So now is your time for some final thoughts.Memorable Andre Keartland Quotes/Statements"There might be a perception that developed markets aren't as much of a target, which makes them more of a target because it makes it appealing for the attackers.""There's even a trend of attackers doing proof of concept of the threats inside an emerging market before they go mainstream and try to attack Fortune 500 companies in North America.""Threats have no boundaries; once they get going, they affect everybody.""A low cost model often drives economies in the developing markets. That leads to a mentality and an approach where the organizations will then say, well, let's try and cut our costs as much as possible; let's invest in the core of our products, product development, building, the factory. Supporting functions, like cybersecurity, like governance, become de-prioritized.""What I recommend in general, when going into any emerging market, and as somebody who's now done business in many, many different countries, you need to take a view of the legislative framework. You need to understand whether the local legal system enforces things like copyright, intellectual property, and privacy laws; sometimes, those are not high priorities in emerging markets.""The best way to get your skills is to build your skills, get the people in the door, put in place training programs, put in place internships, put in learnerships, put in partnerships between organizations, but then take people, grow them up, and turn them into the cyber professionals that you're going to be needing a decade from now.""I always say every solution is not just put in place good tech, it's always technology, people and process. So put in the good tools, but also make sure that the people know how to work with it, people know what they have to do, when they have to do it, how they have to do it. And then have the processes that define the policies and the governance and the flow of what we have to do, the task assignments for everybody in that environment. And only if you have all of those covered are you actually going to have a good secure solution.""Organizations in emerging markets perhaps don't have such a strong culture and history of commitment to governance and supporting functions like cybersecurity."Connect wi
Episode 38: Operationalizing Cybersecurity with Mark Porter Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach.  To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address advanced and evolving cyberthreats.  Today on Cybersecurity Simplified, we’ll discuss why cybersecurity is as much a mindset as a toolset. Stay tuned to hear from our special guest – none other than High Wire Networks’ own CEO, Mark Porter.    Want to learn more about Managed Cybersecurity?  >>https://www.highwirenetworks.com/what-is-managed-cybersecurity/

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through ou” id=”3UkCl7IfBCP” vid=”3UkCl7IfBCP” id-for-player=”3UkCl7IfBCP” link=”/listen/take-five-54-cybersecurity-for-2023-and-beyond-high-tech-3UkCl7IfBCP/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Take Five #54 – Cybersecurity for 2023 and Beyond: High Tech This episode was recorded on 2/21/2023

Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry experts.

Tune in to hear Fortinet Field CISOs, Michael Brown and John Jacobs talk about preparing for the year ahead for High Tech. They will break down what exactly a technology-first customer is, the challenges they are experiencing as well as changes they expect to see in 2023, and tools to combat these challenges.

Read our blog to learn top cybersecurity challenges CISOs should prepare for in 2023: https://www.fortinet.com/blog/ciso-collective/top-cybersecurity-challenges-for-cisos-to-address-in-2023
Episode 37: What is Cyber Warranty and Why it’s a Hidden Gem Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about technology partners who sell security solutions? What protections do they have?Those are great questions for our guest, Kirsten Bay, co-founder and CEO of Cysurance. Her company offers Cysurance-as-a-Service, which bundles protections into the managed security solutions partners sell.Stay tuned for we explore the brave new world of cyberwarranties.Want to learn more about cyber insurance? Check out our blog debunking the myths of cyber insurance.>>https://www.highwirenetworks.com/debunking-myths-about-cyber-insurance/ To learn more about our Overwatch Cybersecurity Partner Program and how to become a security solutions provider, visit:>>https://www.highwirenetworks.com/cybersecurity-partners/ #cyberinsurance #cybersecurityinsurance #whatiscyberinsurance
Full attack chain testing | S2E9 A presentation special from the AVAR conference in Singapore, December 2022!What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches, with their pros and cons?Security Life Hack from Simon Edwards (SE Labs)!(Full Show Notes available on our website.)Download the annual report now, for free (no registration).Website | Subscribe | Twitter
Security Training for Software Development Teams Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software. Laura shares best practices related to cyber security education, content development and delivery, and secure software development.

SafeStack Academy
https://safestack.io/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/

Thank you for listening to the Secure Talk Cyber Security Podcast!
Webinars 3.0: The Cybersecurity Marketer's Checklist Mary Owen is the VP of marketing and demand generation at KnowBe4, who joins us today to discuss where webinars fit in with her content marketing and demand generation strategy.
Transcript li” id=”1bLGP5izZCi” vid=”1bLGP5izZCi” id-for-player=”1bLGP5izZCi” link=”/listen/leadership-series-maril-vernon-video-1bLGP5izZCi/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership series – Maril Vernon – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”78TpZrW7d8U” vid=”78TpZrW7d8U” id-for-player=”78TpZrW7d8U” link=”/listen/leadership-series-sameer-sait-video-78TpZrW7d8U/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Sameer Sait – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message

We will learn about concerns with different IAM implementations and Tariq’s 3 secrets to IAM.
Tariq Shaikh on Linkedin https://www.linkedin.com/in/shaikhtariq/
It’s a conversation about what they did before, why they pivot” id=”97mkSNYRxby” vid=”97mkSNYRxby” id-for-player=”97mkSNYRxby” link=”/listen/breaking-into-cybersecurity-iam-the-breach-vector-97mkSNYRxby/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity – IAM the Breach Vector Breaking into CyberSecurity w Tariq Shaikh discussing IAM the Threat Vector

We will learn about concerns with different IAM implementations and Tariq's 3 secrets to IAM.
Tariq Shaikh on Linkedin https://www.linkedin.com/in/shaikhtariq/
It’s a conversation about what they did before, why they pivoted into cyber, what was the process they went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com/dp/1801816638/



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message

We will learn about concerns with different IAM implementations and Tariq’s 3 secrets to IAM.
Tariq Shaikh on Linkedin https://www.linkedin.com/in/shaikhtariq/
It’s a conversation about what they did before, why they pivot” id=”4p4dzFtHPPR” vid=”4p4dzFtHPPR” id-for-player=”4p4dzFtHPPR” link=”/listen/breaking-into-cybersecurity-iam-the-threat-vector-4p4dzFtHPPR/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into CyberSecurity – IAM the Threat Vector Breaking into CyberSecurity w Tariq Shaikh discussing IAM the Threat Vector

We will learn about concerns with different IAM implementations and Tariq's 3 secrets to IAM.
Tariq Shaikh on Linkedin https://www.linkedin.com/in/shaikhtariq/
It’s a conversation about what they did before, why they pivoted into cyber, what was the process they went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com/dp/1801816638/



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”1Q882NDVsmF” vid=”1Q882NDVsmF” id-for-player=”1Q882NDVsmF” link=”/listen/leadership-series-omkhar-arasaratnam-video-1Q882NDVsmF/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Omkhar Arasaratnam – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”9OkI6acb3tj” vid=”9OkI6acb3tj” id-for-player=”9OkI6acb3tj” link=”/listen/leadership-series-andy-ellis-video-9OkI6acb3tj/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Andy Ellis – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”49wra8XT5zU” vid=”49wra8XT5zU” id-for-player=”49wra8XT5zU” link=”/listen/leadership-series-ira-winkler-video-49wra8XT5zU/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ira Winkler – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”4qekeSmLtW6″ vid=”4qekeSmLtW6″ id-for-player=”4qekeSmLtW6″ link=”/listen/leadership-series-alexandre-sieira-video-4qekeSmLtW6/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Alexandre Sieira – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”CaRGMTvViF” vid=”CaRGMTvViF” id-for-player=”CaRGMTvViF” link=”/listen/leadership-series-carraig-stanwyck-video-CaRGMTvViF/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Carraig Stanwyck – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”6KtXj3nRKNK” vid=”6KtXj3nRKNK” id-for-player=”6KtXj3nRKNK” link=”/listen/leadership-series-ricardo-bastos-video-6KtXj3nRKNK/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ricardo Bastos – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”2gGqATfuS7″ vid=”2gGqATfuS7″ id-for-player=”2gGqATfuS7″ link=”/listen/leadership-series-kerry-hazelton-video-2gGqATfuS7/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Kerry Hazelton – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”9ADHzg3rBM0″ vid=”9ADHzg3rBM0″ id-for-player=”9ADHzg3rBM0″ link=”/listen/leadership-series-duane-gran-video-9ADHzg3rBM0/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Duane Gran – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”2jtHyxVwM14″ vid=”2jtHyxVwM14″ id-for-player=”2jtHyxVwM14″ link=”/listen/leadership-series-ryan-sahadeo-video-2jtHyxVwM14/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ryan Sahadeo – Video A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”AC0OtTZP7dp” vid=”AC0OtTZP7dp” id-for-player=”AC0OtTZP7dp” link=”/listen/leadership-series-maril-vernon-AC0OtTZP7dp/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership series – Maril Vernon A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”59qyefPebEw” vid=”59qyefPebEw” id-for-player=”59qyefPebEw” link=”/listen/leadership-series-sameer-sait-59qyefPebEw/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Sameer Sait A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”8gfvkbzoSlF” vid=”8gfvkbzoSlF” id-for-player=”8gfvkbzoSlF” link=”/listen/leadership-series-omkhar-arasaratnam-8gfvkbzoSlF/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Omkhar Arasaratnam A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”1JLvHx95nzy” vid=”1JLvHx95nzy” id-for-player=”1JLvHx95nzy” link=”/listen/leadership-series-alexandre-sieira-1JLvHx95nzy/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Alexandre Sieira A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”90jVBnPY5wt” vid=”90jVBnPY5wt” id-for-player=”90jVBnPY5wt” link=”/listen/leadership-series-ricardo-bastos-90jVBnPY5wt/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ricardo Bastos A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”7O9JsPeC45J” vid=”7O9JsPeC45J” id-for-player=”7O9JsPeC45J” link=”/listen/leadership-series-kerry-hazelton-7O9JsPeC45J/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Kerry Hazelton A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”AXkHla6iJSB” vid=”AXkHla6iJSB” id-for-player=”AXkHla6iJSB” link=”/listen/leadership-series-duane-gran-AXkHla6iJSB/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Duane Gran A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”23aeHCMNte3″ vid=”23aeHCMNte3″ id-for-player=”23aeHCMNte3″ link=”/listen/leadership-series-ryan-sahadeo-23aeHCMNte3/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ryan Sahadeo A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a success” id=”5AbGdn4PDVS” vid=”5AbGdn4PDVS” id-for-player=”5AbGdn4PDVS” link=”/listen/leadership-series-carraig-stanwyck-5AbGdn4PDVS/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Series – Carraig Stanwyck Breaking into Cybersecurity Leadership Series – Carraig Stanwyck
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer
Check out our books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We ” id=”7vhkvTjwGfp” vid=”7vhkvTjwGfp” id-for-player=”7vhkvTjwGfp” link=”/listen/bcis-leadership-series-carraig-stanwyck-7vhkvTjwGfp/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Series – Carraig Stanwyck BCIS Leadership Series – Carraig Stanwyck 5.27.22
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer
Check out our books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity






Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Emily on Linkedin – https://www.linkedin.com/in/emily-harris-cissp-7903/
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different lea” id=”2vbxGCDxOIg” vid=”2vbxGCDxOIg” id-for-player=”2vbxGCDxOIg” link=”/listen/leadership-series-emily-harris-2vbxGCDxOIg/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Series – Emily Harris Breaking into Cybersecurity Leadership Series – Emily Harris
Emily on Linkedin – https://www.linkedin.com/in/emily-harris-cissp-7903/
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer
Check out our books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader.



Send in a v” id=”AQ2JDxiBKT7″ vid=”AQ2JDxiBKT7″ id-for-player=”AQ2JDxiBKT7″ link=”/listen/leadership-series-emily-harris-video-AQ2JDxiBKT7/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Emily Harris – Video Leadership Series – Emily Harris
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader.



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”8goFqnp7lOe” vid=”8goFqnp7lOe” id-for-player=”8goFqnp7lOe” link=”/listen/leadership-series-andy-ellis-8goFqnp7lOe/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Andy Ellis A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Transcript li” id=”3OEzb9zevVU” vid=”3OEzb9zevVU” id-for-player=”3OEzb9zevVU” link=”/listen/leadership-series-ira-winkler-3OEzb9zevVU/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Leadership Series – Ira Winkler A new podcast focused on what it takes to become a Senior Leader in Cybersecurity through interviews of senior leaders in different areas of cybersecurity. Focuses on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Transcript link



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Joshua Bregler Linkedin Profile https://www.linkedin.com/in/breglercissp/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders” id=”9r9Gh5c8Oc0″ vid=”9r9Gh5c8Oc0″ id-for-player=”9r9Gh5c8Oc0″ link=”/listen/breaking-into-cybersecurity-leadership-joshua-bregler-9r9Gh5c8Oc0/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Joshua Bregler Breaking into Cybersecurity Leadership Joshua Bregler
Joshua Bregler Linkedin Profile https://www.linkedin.com/in/breglercissp/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Steve Zalewski Linkedin Profile https://www.linkedin.com/in/szalewski/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecuri” id=”3hVDqwFAtSW” vid=”3hVDqwFAtSW” id-for-player=”3hVDqwFAtSW” link=”/listen/breaking-into-cybersecurity-leadership-steve-zalewski-3hVDqwFAtSW/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership – Steve Zalewski Breaking into Cybersecurity Leadership – Steve Zalewski Breaking into Cybersecurity Leadership – Steve Zalewski
Steve Zalewski Linkedin Profile https://www.linkedin.com/in/szalewski/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity





Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Steve Zalewski Linkedin Profile https://www.linkedin.com/in/szalewski/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders ” id=”1SPXdWi1hUZ” vid=”1SPXdWi1hUZ” id-for-player=”1SPXdWi1hUZ” link=”/listen/breaking-into-cybersecurity-leadership-steve-zalewski-1SPXdWi1hUZ/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership – Steve Zalewski Breaking into Cybersecurity Leadership – Steve Zalewski
Steve Zalewski Linkedin Profile https://www.linkedin.com/in/szalewski/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Clint Kehr Linkedin Profile https://www.linkedin.com/in/clint-kehr-678745187/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leade” id=”uwrhTxlYXc” vid=”uwrhTxlYXc” id-for-player=”uwrhTxlYXc” link=”/listen/breaking-into-cybersecurity-leadership-clint-kehr-uwrhTxlYXc/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Clint Kehr Breaking into Cybersecurity Leadership Clint Kehr
Clint Kehr Linkedin Profile https://www.linkedin.com/in/clint-kehr-678745187/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Clint Kehr Linkedin Profile https://www.linkedin.com/in/clint-kehr-678745187/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders” id=”9PlNONK2nMo” vid=”9PlNONK2nMo” id-for-player=”9PlNONK2nMo” link=”/listen/breaking-into-cybersecurity-leadership-clint-kehr-9PlNONK2nMo/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Clint Kehr Breaking into Cybersecurity Leadership Clint Kehr
Clint Kehr Linkedin Profile https://www.linkedin.com/in/clint-kehr-678745187/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Keyaan Williams Linkedin Profile https://www.linkedin.com/in/keyaan/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders i” id=”VPXOEgWAkv” vid=”VPXOEgWAkv” id-for-player=”VPXOEgWAkv” link=”/listen/breaking-into-cybersecurity-leadership-keyaan-williams-VPXOEgWAkv/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Keyaan Williams Breaking into Cybersecurity Leadership Keyaan Williams
Keyaan Williams Linkedin Profile https://www.linkedin.com/in/keyaan/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Keyaan Williams Linkedin Profile https://www.linkedin.com/in/keyaan/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in ” id=”5lwgI2UY3ZK” vid=”5lwgI2UY3ZK” id-for-player=”5lwgI2UY3ZK” link=”/listen/breaking-into-cybersecurity-leadership-keyaan-williams-5lwgI2UY3ZK/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Keyaan Williams Breaking into Cybersecurity Leadership Keyaan Williams
Keyaan Williams Linkedin Profile https://www.linkedin.com/in/keyaan/
Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Tariq Shaikh LinkedIn Profile https://www.linkedin.com/in/shaikhtariq/
Transcription Link


Check out our new books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity ” id=”15k8AdIxj7D” vid=”15k8AdIxj7D” id-for-player=”15k8AdIxj7D” link=”/listen/breaking-into-cybersecurity_-iam-the-breach-vector-15k8AdIxj7D/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity_ IAM the breach vector Breaking into Cybersecurity_ IAM the breach vector
Tariq Shaikh LinkedIn Profile https://www.linkedin.com/in/shaikhtariq/
Transcription Link


Check out our new books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Tariq Shaikh LinkedIn Profile https://www.linkedin.com/in/shaikhtariq/
Transcription Link
Get access to Breaking Into Cybersecurity: Leadership Series and bonus content before the rest of the listeners and support a great podcast helping to get mo” id=”qZm510MP0i” vid=”qZm510MP0i” id-for-player=”qZm510MP0i” link=”/listen/breaking-into-cybersecurity_-iam-the-breach-vector-qZm510MP0i/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity_ IAM the breach vector Breaking into Cybersecurity_ IAM the breach vector
Tariq Shaikh LinkedIn Profile https://www.linkedin.com/in/shaikhtariq/
Transcription Link
Get access to Breaking Into Cybersecurity: Leadership Series and bonus content before the rest of the listeners and support a great podcast helping to get more people breaking into cybersecurity.
https://anchor.fm/breakingintocybersecurity/subscribe
Check out our new books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message

Aaron on LinkedIn https://www.linkedin.com/in/aaronwaynebrown/
Transcription Link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybers” id=”5Nj45flsI84″ vid=”5Nj45flsI84″ id-for-player=”5Nj45flsI84″ link=”/listen/breaking-into-cybersecurity-leadership-aaron-brown-5Nj45flsI84/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership – Aaron Brown Breaking into Cybersecurity Leadership – Aaron Brown

Aaron on LinkedIn https://www.linkedin.com/in/aaronwaynebrown/
Transcription Link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader.

It’s a conversation about what they did before, why they pivoted into cyber, what was the process they went through Breaking Into Cybersecurity Leadership, how you keep up, and advice/tips/tricks along the way.


About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are talking to experts in their fields and cyber gurus who share their experiences of helping others break in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new books:

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

https://www.amazon.com/dp/1801816638/
_________________________________________

About the hosts:

Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://www.cpf-coaching.com

– Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
– Podcast: https://anchor.fm/breakingintocybersecurity
– YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
– Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
– Twitter: https://twitter.com/BreakintoCyber
– Twitch: https://www.twitch.tv/breakingintocybersecurity



Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Gina King on Linkedin https://www.linkedin.com/in/ironginaking/
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecuri” id=”1nRzoYKFnxf” vid=”1nRzoYKFnxf” id-for-player=”1nRzoYKFnxf” link=”/listen/breaking-into-cybersecurity-leadership-gina-king-1nRzoYKFnxf/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership – Gina King Breaking into Cybersecurity Leadership – Gina King
Gina King on Linkedin https://www.linkedin.com/in/ironginaking/
Transcript link

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Gina King on Linkedin https://www.linkedin.com/in/ironginaking/
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurit” id=”PwJdG5G3wJ” vid=”PwJdG5G3wJ” id-for-player=”PwJdG5G3wJ” link=”/listen/breaking-into-cybersecurity-leadership-gina-king-PwJdG5G3wJ/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership – Gina King Breaking into Cybersecurity Leadership – Gina King
Gina King on Linkedin https://www.linkedin.com/in/ironginaking/
Transcript link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For this and other episodes, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Carlos on LinkedIn https://www.linkedin.com/in/carlosrodrigueza

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high” id=”6Me6kW4bK5T” vid=”6Me6kW4bK5T” id-for-player=”6Me6kW4bK5T” link=”/listen/breakingintocybersecurity-leadership-with-carlos-rodriguez-6Me6kW4bK5T/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking Into Cybersecurity Leadership with Carlos Rodriguez BreakingIntoCybersecurity Leadership with Carlos Rodriguez
Carlos on LinkedIn https://www.linkedin.com/in/carlosrodrigueza

The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.

For this and other episodes, subscribe to the following:

https://anchor.fm/breakingintocybersecurity/subscribe





Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Welcome to another episode of the Digital Risk Digest Live. We go live every Friday with industry leaders about digital threats, opportunities, and more. Curious about the intersection of busines” id=”6u6r0EvIBKk” vid=”6u6r0EvIBKk” id-for-player=”6u6r0EvIBKk” link=”/listen/the-digital-risk-digest-live-feat-christophe-foulon-6u6r0EvIBKk/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
The Digital Risk Digest Live Feat. Christophe Foulon The Digital Risk Digest Live Feat. Christophe Foulon By https://www.youtube.com/@valor-cybersecurity
Welcome to another episode of the Digital Risk Digest Live. We go live every Friday with industry leaders about digital threats, opportunities, and more. Curious about the intersection of business and technology? Tune in today! Let’s give Chris a massive welcome to the show!

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Greg Edwards LinkedIn Profile https://www.linkedin.com/in/gedwardswpd/
Transcription Text link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different le” id=”6txnLLSVaRZ” vid=”6txnLLSVaRZ” id-for-player=”6txnLLSVaRZ” link=”/listen/breaking-into-cybersecurity-leadership-with-greg-edwards-6txnLLSVaRZ/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership with Greg Edwards Breaking into Cybersecurity Leadership with Greg Edwards
Greg Edwards LinkedIn Profile https://www.linkedin.com/in/gedwardswpd/
Transcription Text link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For the Full Episode, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Joshua Bregler Linkedin Profile https://www.linkedin.com/in/breglercissp/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leade” id=”7yLftF27EKK” vid=”7yLftF27EKK” id-for-player=”7yLftF27EKK” link=”/listen/breaking-into-cybersecurity-leadership-joshua-bregler-7yLftF27EKK/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership Joshua Bregler Breaking into Cybersecurity Leadership Joshua Bregler
Joshua Bregler Linkedin Profile https://www.linkedin.com/in/breglercissp/

Transcription link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For the Full Episode, subscribe to:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Greg Edwards LinkedIn Profile https://www.linkedin.com/in/gedwardswpd/
Transcription Text link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different l” id=”2QKfFNSPp7N” vid=”2QKfFNSPp7N” id-for-player=”2QKfFNSPp7N” link=”/listen/breaking-into-cybersecurity-leadership-with-greg-edwards-2QKfFNSPp7N/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
Breaking into Cybersecurity Leadership with Greg Edwards Breaking into Cybersecurity Leadership with Greg Edwards
Greg Edwards LinkedIn Profile https://www.linkedin.com/in/gedwardswpd/
Transcription Text link
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
For the Full Episode, subscribe to the following:
https://anchor.fm/breakingintocybersecurity/subscribe
#cybersecurity #breakingintocybersecurity #informationsecurity #AdvanceYourCyberCareer #Leadership #Coaching
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity




Send in a voice message: https://anchor.fm/breakingintocybersecurity/message
Automating Data Discovery & Security Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space.

BigID
https://bigid.com/

The Secure Talk Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cyber Security Podcast!

In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetration tester and together they go through Chris’s background, how he got into bank” id=”8jOmGeqZOXj” vid=”8jOmGeqZOXj” id-for-player=”8jOmGeqZOXj” link=”/listen/ep-90-how-to-get-your-first-job-as-a-pentester-with-chris-horner-8jOmGeqZOXj/” is-authorized=”false” custom-styles=”margin: 0 24px 24px 0;”>
EP 90: How to Get Your First Job as a Pentester with Chris Horner https://www.yourcyberpath.com/90/

In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetration tester and together they go through Chris's background, how he got into banking and why he made the switch to Cybersecurity.

Chris discusses his transition story and how it's not the cliche zero to hero in 90 days, explaining that it took him a long time to transition where he is today, highlighting that his networking experience and soft skills were a huge aid on his job hunting journey.

Jason then shares his opinion on Chris's journey highlighting many important parts, like how to deal with time limitations during your studies and how to choose the right path to start you Cyber career.

Chris then shares his experience with the eJPT certification exam and how he was able to pass it, giving us examples of the training he used and how he prepared for it.

Then Chris and Jason go over Chris's Job responsibilities and how he goes about every one of them, what he enjoys, what he finds tedious and what parts of the job he finds challenging.

In the end Jason and Chris discuss the hiring process from two different perspectives, the hiring manager perspective and the applicant perspective discussing the different challenges that both people go through.

What You’ll Learn

●    How important are soft skills for someone in the cybersecurity industry?

●   How to choose the right certifications to start your pentesting career?

●   What is the eJPT test like?

●    What is it like working as a Pentester?

●    How long does it take to get your first Job in Pentesting?

●    How to fight self doubt and continue your cyber career journey?

Relevant Websites For This Episode

●    https://www.offensive-security.com/labs/

●    https://www.vulnhub.com/

●    https://ctftime.org/

●  https://www.linkedin.com/ in/chrismhorner/

●  https://www.diontraining.com/courses

Other Relevant Episodes

●   Episode 82 – From Truck Driver to Cybersecurity Analyst with Mike Hillman

●  Episode 79 – Mid-Career Transition Success Story with Steve McMichael

●  Episode 76 – Which Certification Roadmap Or Path Should I Use?
Load More