Group 4 Created with Sketch.

Popular "Cybersecurity" Stations

Darknet Diaries Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Security Now (MP3) Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.

Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Smashing Security A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...
Winner of the "Best Security Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones.
Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
Risky Business Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Hacking Humans Deception, influence, and social engineering in the world of cyber crime.
‎The CyberWire Daily The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

Popular "Cybersecurity" Playlists

Highlights: Cyber Security with Cairo Malet (#35) Highlights from STEAM Powered's conversation with Cairo Malet, Cyber Security GRC Specialist, and related topics. STEAM Powered

All "Cybersecurity" Audio

Episode 36: Strong Elections are Cyber STRONG In episode 36 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Marci Andino, Sr. Director of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), and Trevor Timmons, EI-ISAC Executive Committee Chair and Chief Information Officer at Colorado Department of State. Together, they discuss Cyber STRONG, a campaign launched by the EI-ISAC that encourages election officials to take decisive and deliberate steps towards improving their cybersecurity posture. Cyber STRONG provides officials with actionable guidance that they can use to further protect the security and integrity of their elections.ResourcesFollow Marci and Trevor on LinkedInStrong Elections Are Cyber STRONG…Are You?The 2020 Elections Year in ReviewBest practices for election systems securityEpisode 20: The State of Election CybersecurityHow to Improve Election Technology Verification
#CISOThursdays: BreakingIntoCybersecurity w James McQuiggan 8.4.22 #CISOThursdays: BreakingIntoCybersecurity w James McQuiggan 8.4.22

https://www.linkedin.com/in/jmcquiggan

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new books:

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

https://www.amazon.com/dp/1801816638/



_________________________________________

About the hosts:   

Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://www.cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking into Cybersecurity w Dorota Kozlowska 8.5.22 Breaking into Cybersecurity w Dorota Kozlowska 8.5.22

Dorota Kozlowska linkedin: https://www.linkedin.com/in/dorota-kozlowska/

It’s a conversation about what they did before, why they pivoted into cyber, what was the process they went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com/dp/1801816638/
About the hosts:
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's  Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a  solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://www.cpf-coaching.com
Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://breakingintocybersecurity.sounder.fm/
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity
Preparing for the Future of Device Management With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping track of all of these devices, and ensuring that they are being used in a very secure manner, can be a challenging proposition. A recent survey finds organizations unprepared and overwhelmed with managing thousands or hundreds of thousands of these endpoint devices. Mike McNeill, CEO, Fleet Device Management, sheds light on some of these critical security issues and addresses questions such as: How does an organization manage its devices? Do they know if their devices are compliant and secure? Do they have ways to query them to learn more about their status in real-time? Mike also offers recommendations on how to prepare for the future of device management.Time Stamps01:28 -- Share with the listeners some highlights of your professional journey. 02:11 -- Let's talk about the motivation for the study.03:54 -- The study is fairly recent; it was started on February 25, 2022. It was conducted online via Pollfish using organic sampling. And when I look at the industry is represented. It's pretty comprehensive. You all didn't leave out any sector. Am I correct?04:52 -- Were you surprised by the survey findings relating to the state of device management?06:48 -- Talking about managing the devices and keeping track of the devices, I read here that only a quarter of the sample population said that their devices are fully enrolled and upgraded. You know, that's worrisome. Why do you think organizations would allow that to happen?07:54 -- So, if I'm understanding you correctly, the use of multiple operating systems and multiple platforms is part of the problem when it comes to tracking the devices, right?08:33 -- Another finding that got my attention is that one of the best practices is to have a good Bring-Your-Own-Device (BYOD) policy. And to be more specific, 32% said, having a documented BYOD policy is a crucial best practice for their MDM (mobile device management) strategy. Can you expand on this?09:57 -- BYOD, Bring Your Own devices, as an approach has its pros and cons. It was interesting to read that 32% of the respondents felt that having a documented BYOD policy is a crucial best practice for their MDM strategy. What are your thoughts?11:49-- Another best practice documented here is measuring point-in-time compliance across all devices. Share with the listeners what you mean by point-in-time compliance or real-time compliance across devices.13:56 -- How feasible is it to try and automate the patching process and thereby remove the responsibility (of patching) from the users?17:51 -- Another finding that I find interesting is that multi-factor authentication becoming a top priority for 2022. The reason I find it interesting is I would assume that by now, multi-factor authentication would be a standard. I wonder why the delay in the adoption of a security mechanism that is universally accepted to be a very robust protective measure. What are your thoughts?19:35 -- What were some unanticipated or unexpected findings?20:59 -- I think the extent to which security and IT teams can work together and appreciate the significance of each other's work would make the development and implementation process more effective and efficient. What do you think?23:12 -- What would you say to organizations interested in improving device management? How should they prepare themselves? 25:46 -- Going back to the report, where you're talking about preparing for the future of device management, you have several recommendations, one of which is to start managing containers. Can you expand on that? 28:21 -- Another recommendation in this report is to protect remote workers with zero trust, TLS, and multi-factor authentication. I'd like you to expand on this TLS when you suggest " move away from VPNs to granular proxies with TLS." Can you explain this? 30:38 -- Share some final thoughts with the listeners.Memorable Mike McNeill QuotesFor endpoint security and risk management overall, you are starting to see more security engineers and security operations roles live in the IT department, and you're starting to see more IT engineering roles effectively taking on security challenges. And I think there's an argument to be made that in a couple of years, we're gonna see blended IT and security departments. So they will not be all that distinct anymore, other than the risk management aspect and crunching the numbers.I think your success then comes down to, can we take inventory of what we have, a
Cyber Incident Reporting for Critical Infrastructure Act of 2022 In this podcast episode, FTI experts Brian Hale, Don Good, and Sara Sendek are joined by external guest Adam Griffin (Maynard Cooper) as the group discusses the Cyber Incident Reporting for Critical Infrastructure Act of 2022. The goal of the Act is for the federal government to develop a clearer picture of the threats facing the nation and how better to organize a collaborative response strategy to these attacks. During the discussion, the team delve into both legal and cybersecurity considerations and offer advice with regards to compliance.See omnystudio.com/listener for privacy information.
Cyber Incident Reporting for Critical Infrastructure Act of 2022 In this podcast episode, FTI experts Brian Hale, Don Good, and Sara Sendek are joined by external guest Adam Griffin (Maynard Cooper) as the group discusses the Cyber Incident Reporting for Critical Infrastructure Act of 2022. The goal of the Act is for the federal government to develop a clearer picture of the threats facing the nation and how better to organize a collaborative response strategy to these attacks. During the discussion, the team delve into both legal and cybersecurity considerations and offer advice with regards to compliance.See omnystudio.com/listener for privacy information.
Breaking into Cybersecurity: Luna Winchester 7.29.22 Breaking into Cybersecurity: Luna Winchester 7.29.22

https://www.linkedin.com/in/luna-winchester/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com/dp/1801816638
--------------------------------------------------------------------
About the hosts:
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

    Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
    Podcast: https://breakingintocybersecurity.sounder.fm/
    YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
    Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
    Twitter: https://twitter.com/BreakintoCyber
    Twitch: https://www.twitch.tv/breakingintocybersecurity
Episode 30: Riding the Cyber Trails with Cyber Rancher Allan Alford What do cybersecurity and ranching have in common? A bit of wrangling, a lot of bull and CISO Allan Alford, host of the Cyber Ranch podcast.Allan’s 20-year cybersecurity journey includes serving as CISO four different times in three industries and working with companies from 5 to 50,000 employees. He’s currently focused on getting ACTUAL value from your tech stack and adding a human perspective to cybersecurity.So, saddle up and settle in. In this episode of Cybersecurity Simplified, we’ll ride the cyber trails wherever Allan’s experience takes us.
Episode 46 - Eavesdropping, and the Bad News of Privacy & Security Diverging The Real CyberSecurity podcast talks suspected state-sponsored eavesdropping using equipment providers,  famous incidents involving tampered devices in embassies.Privacy and cybersecurity seem to be diverging and that has to stop.And how awesome the cybersecurity vibe in the US Northeast.
How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities. He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner.

https://www.tenacitycloud.com/
Breaking Into Cybersecurity: FCC's Alex Harrington talks Helpful Fed Sites - 7.27.2022 Breaking Into Cybersecurity: FCC's Alex Harrington talks Helpful Fed Sites - 7.27.2022
Federal Career Connection's Alex Harrington is back! Join Alex, a Certified Career Services Provider (CCSP) and Global Career Development Facilitator (GCDF), as he answers questions about helpful fed websites. Check out his blog on the same topic. https://federalcareerconnection.org/2022/05/06/from-helpful-to-not-helpful-a-rating-of-agency-career-sites/ 
Alex Harrington is the Program Director for Federal Career Connection. He is a Certified Career Services Provider (CCSP) and Global Career Development Facilitator (GCDF) and a member with the National Career Development Association. Throughout his federal service, Alex has gained extensive expertise in team building, workforce development, talent acquisition, and career coaching/mentoring.
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. 
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in. 
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires 
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com//dp/1801816638/ 
_________________________________________ 
About the hosts:    
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ 
Download a free copy of her book at magnetichiring.com/book 
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach. 
https://www.linkedin.com/in/christophefoulon/ 
Find out more about CPF-Coaching at https://cpf-coaching.com 
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
#CISOThursdays: Breaking Into Cybersecurity w Prof Roger White and Francois Arthanas 7.28.22 #CISOThursdays: BreakingIntoCybersecurity w Prof Roger White and Francois Arthanas 7.28.22 
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. 
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in. 
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires 
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com//dp/1801816638/ 
_________________________________________ 
About the hosts:    
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ 
Download a free copy of her book at magnetichiring.com/book 
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach. 
https://www.linkedin.com/in/christophefoulon/ 
Find out more about CPF-Coaching at https://cpf-coaching.com 
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Testing like hackers | S2E3 What does it mean to test like a hacker? Can a well-intentioned tester behave the same as a real cybercriminal?When you’re looking for a good security test, how can you tell the useful from the misleading?Our email accounts sit at the centre of our digital lives. We look at ways to bullet-proof your most important internet account.We discuss these questions, and more, with Frank Duff (ex-MITRE, now Tidal Cyber), Mike Sentonas (CrowdStrike) and Siggi Stefnisson (Avast).Security Life Hack from Daniel Cuthbert!(Full Show Notes available on our website.)
Breaking into Cybersecurity with Antonette Caldwell 7.22.22 Breaking into Cybersecurity with Antonette Caldwell 7.22.22

https://www.linkedin.com/in/antonettecaldwell/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new books:

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

https://www.amazon.com//dp/1801816638/

_________________________________________

About the hosts:   

Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
#CISOThursdays: Breaking into Cybersecurity with Rupa Parameswaran 7.21.22 #CISOThursdays: Breaking into Cybersecurity with Rupa Parameswaran 7.21.22 
https://www.linkedin.com/in/rupaparameswaran/ 
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. 
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in. 
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires 
Check out our new books: 
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI 
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career 
https://www.amazon.com//dp/1801816638/ 
_________________________________________ 
About the hosts:    
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ 
Download a free copy of her book at magnetichiring.com/book 
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach. 
https://www.linkedin.com/in/christophefoulon/ 
Find out more about CPF-Coaching at https://cpf-coaching.com 
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Is India ready for a Cyber War ? Pegasus Spyware and How Cybersecurity has evolved by Dr. Sandeep Shukla | S-3 | EP-03 | Cybersecurity Awareness by Yashashvi Dr. Sandeep Shukla is a HOD at IIT,Kanpur, one of the greatest minds of the country , he has got in depth knowledge in the domain of cybersecurity, he has talked about how cybersecurity has evolved in the last 20 years, what was the architecture of Pegasus, the current scenario of Indian Cyber Space and a lot more, Do listen the enitre podcast , it has got a lot to learn.
E45 - Cryptocurrency, and Quantum Crypto Bill and Greg discuss why even though blockchains have great inherent security, the businesses and applications that are using them for cryptocurrency are not. They then explore why we are planning now for Quantum Crypto, and what "Quantum Safe" means.
Episode 43 - Talking to the Board About CyberSec, and Halifax Bill files his report from his trip to Halifax, how not all cybersec issues are technology, how outsourcing is best as a balanced approach, and how the most complex cybersecurity conversations are actually the business ones.
Episode 42 - Talking to the Board About CyberSec, and Halifax Bill files his report from his trip to Halifax, how not all cybersec issues are technology, how outsourcing is best as a balanced approach, and how the most complex cybersecurity conversations are actually the business ones.
Episode 44 - RSA Conference After Action Report Bill gives a post event report on the RSA Conference.
Episode 42 - Ukraine, Stuxnet Details Revealed & Are Security Conferences Dead? Bill discusses the great Microsoft report on the revealed details of the cyberwar aspects of Ukraine & Russia war, and The Countdown to Zero Day book about Stuxnet. And Greg discusses why security conferences need to change.
EP 75: The Value of University Degrees in Cybersecurity https://www.yourcyberpath.com/podcast/75/

In this episode, Kip and Jason talk about the value of university degrees in the cybersecurity career. This topic does come up all the time in discussions or when people come up to Kip or Jason and ask them the same thing. And there really is no single answer that would fit everyone because a degree can either hurt or help, depending on the context.

Some people ask whether certifications are better than degrees and vice versa, or whether they need a degree or not. But it really depends on what job it is you are trying to get, which sector this job belongs to, and where in the world you are located. Some have even made the mistake of "over-degreeing" and have become the proverbial "guy with more degrees than a thermometer", which some hiring managers also avoid.

A prevailing frame of thought in the US, as well as in most countries, is that a college degree will be a "ticket" to get you places. In cybersecurity, this is not a true thing because no such guarantee exists. 

What You’ll Learn

●     Where is the value in a college degree

●     Where is a college degree important

●     What type of positions are important

●     Where do you hit a level that needs a degree to get to the next step

Relevant Websites For This Episode:

●     www.YourCyberPath.com

Other Relevant Episodes

●   Episode 55 – Which cybersecurity certifications should you get?

●   Episode 58 - How to Get Hired With No Experience

●   Episode 73 - Top Five Things That Will Separate You From Other Applicants
EP 74: Top Five Mistakes People Make When Negotiating https://www.yourcyberpath.com/74/

In this episode, the discussion between Kip and Jason is about the top five mistakes people are making when it comes to negotiating their pay. You need to know what mistakes to avoid when discussing your compensation because it can set you up for a bad experience and affect you for years.

When you start a new position, this is usually when you can take advantage of negotiating your salary. It is important to note that when it comes to annual raises, the likelihood of you receiving a high percentage pay raise isn’t likely. That is why negotiating your pay from the beginning is your best bet.

While June and July are traditionally not considered hiring season, in the US and Canada, this week’s topic is good preparation for the coming fall when hiring may start to pick back up and you are applying and negotiating your pay.

What You’ll Learn

●     Why salary information from publicly available sources are not reliable

●     Who should throw out the number first

●       Why you shouldn't tell your prospective employer your current salary

●       Why you should factor in the whole compensation package

●      Why you don’t immediately accept the first number thrown out

Relevant Websites For This Episode

●     www.YourCyberPath.com

Other Relevant Episodes

●    Episode 14 – Your Salary is Off-Limits

●    Episode 49 - Why Entry Level Jobs Aren’t Really Entry Level

●    Episode 57 - Best time of the year to get hired
Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories. He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security professionals can scale and have greater visibility of code commits.

Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises.

https://apiiro.com/
https://apiiro.com/secrets-insights-2022/

Secure Talk Podcast
shorturl.at/BJKL2
Global Security and Post Breach Management Best Practices "If you can plan for the zombie apocalypse, you can probably face just about anything," said Tim Callahan, Senior Vice President, and Global Chief Information Security Officer, Aflac during a talk in my Master's level class on cybersecurity readiness at Duke University. In this podcast, Tim describes the key elements of an effective crisis management framework and shares several best practices. Some of the highlights of a robust business resiliency and recovery posture include -- a) well thought-out and rehearsed plan that takes into consideration different scenarios; b) world-class forensics team; c) strong partnership with Legal, HR, Law Enforcement (local FBI and Secret Service), Department of Treasury, and independent agents; d) highly trained in-house teams focused on response and recovery; e) leveraging open-source and paid intelligence; f) CEO led strong commitment throughout the organization; g) honest and candid communication; h) rewards and incentive programs such as the Global Security Challenge Coin; and j) building a caring and empathetic work culture.Time Stamps00:49 -- Please share with listeners some highlights of your professional journey. Share with them how this journey of yours has shaped your views of cybersecurity, and cyber risk management.05:55 -- So, Tim, during your talk in my Master's level class on cybersecurity readiness at Duke University, you made a very poignant statement, you said, "if you can plan for the zombie apocalypse, you can probably face just about anything." Please share with the listeners the key elements of an effective crisis management framework and related best practices.11:15 -- As we all know, ransomware attacks are rampant, and many organizations are underprepared to deal with such attacks. Based on your experience, what advice do you have for your peers in other organizations?17:16 -- It's not good enough to just have backups, and that they're properly secured both offline and online. It is equally important to have read-only backups. Would you like to add anything to that? 19:45 -- Given the variety of ways in which the ransomware attackers put pressure on the organization, and the unfortunate reality, that it is hard to keep up with the evolving attacks and techniques, it must be a very unnerving feeling that if your organization gets attacked, if your organization gets compromised, the battle against the ransomware attackers is hard to win, because they have the data and you have to depend on them live up to their promise that if the ransom is paid, they won't share the stolen data, or they won't do anything more with it. That's a very difficult kind of situation, isn't it?24:56 -- I'd love to hear your reaction to some of the CPD (Commitment-Preparedness-Discipline) framework success factors. For instance, how does an organization create and sustain a We-Are-In-Together culture? What are some key elements of a best practice to do that?34:20 -- I was just speaking with another group before this discussion, and they were talking about how important empathy is when it comes to cybersecurity governance. And I'm sure you will agree that it plays a huge role. Because, unless you're empathetic to people making mistakes, even though they use their good judgment, they trained sincerely, but they can make mistakes. But as long as they're owning up to it, and enabling organizations to react quickly to the consequences of their mistakes, instead of punishing them, be encouraging, and maybe celebrate their candor and honesty. It has been done by some companies. So I'll let you speak to that as well. 38:59 -- We can end on that note unless you have any final thoughts, Tim. Memorable Tim Callahan Quotes"If you plan for the zombie apocalypse, you can handle just about anything.""You can't do a good job in post-recovery if you don't do a good job in the response process, and in those stages leading up to that.""I think it's very important that you exercise with different scenarios before the event happens. And you put yourself in continuous learning and improvement mode. When we generally have our exercise, we bring in third parties, we also call on law enforcement, our intelligence partners, intelligence we paid for, and intelligence through FS-ISAC (Financial Services Information Sharing and Analysis Center). All of these things help us prepare for different attack scenarios.""I mean, when employees enjoy coming to work, or enjoy their workplace, because of empathy, because of humor, because we care, obviously, they're going to do a better job, they're going to feel a sense of ownership to that company. It's
The State of Attack Surface Management With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report on the state of attack surface management (ASM) finds security teams drowning in a flood of legacy and ineffective tools with limited discovery capabilities. The need for ASM platforms with advanced digital asset detection capabilities is revealed in the survey findings. David Monnier, Team Cymru Fellow, sheds light on the latest ASM platform capabilities and discusses the implementation challenges and success factors.Time Stamps00:50 -- I'd like to take this opportunity to welcome David and have him share with all of us some highlights of his professional journey. 03:14 -- What was the motivation? What led to this very important study that y'all conducted?07:41 -- David, would you like to add anything to that from a methodology and participant demographic standpoint?09:52 -- The first finding that I'd like to talk about is "the biggest reason organizations implemented ASM is to increase the visibility of Shadow IT in the enterprise." I think this is a very significant finding. If you would expand on this and also describe what Shadow IT means?14:50 -- Over the years have ASM platform capabilities been enhanced to better monitor cloud-hosted assets? What's been the trend?19:17 -- Moving along to another interesting finding, which states that "23% of the respondents said that identification of rogue or unclassified assets is the most valuable capability that ASM has provided their organization." I guess my question here is, shouldn't this be obvious? Shouldn't that be what an ASM is supposed to be doing?20:56 -- What steps should an organization take, should the security analysts, the security professionals take, to ensure that their ASM platform is performing at a satisfactory level? 24:30 -- To what extent is AI being used to enhance the functionality, the capabilities, of these ASM platforms?27:48 -- So talking about the human component, and in this discussion, we have been talking about attack surfaces, more from a physical standpoint, devices, and so on, so forth. How about humans as attack surfaces, as very vulnerable attack surfaces? Are we doing better in terms of securing this very vulnerable attack surface? Can tools help us secure that attack surface? What are your thoughts?31:23 -- Is there anything that you'd like to address that you found interesting, or something that surprised you all?34:22 -- Is there a way of notifying multiple personnel just to make sure that the alerts don't go unheard? 36:43 -- So if you had to make recommendations to potential buyers, or investors of this ASM platform, what does it take to prepare the organization, so they can effectively use such a platform? 40:33 -- I'd like you to share some final thoughts.Memorable David Monnier Quotes"You have to approach the tool sets as, am I going to have a tool that's going to show me things I didn't know to know. And that, in my opinion, is the killer feature, way more important, in my opinion, is discovery, than the vulnerability management component.""If your tool can't tell you that your DNS hosting provider has a poor reputation, or that the IPs around your IP services are bad, if it's not able to show you these kinds of things, then it suggests that you are probably working with an antiquated tool. But frankly, let's use the word static. And if it is static, I think in the information age, that should be a huge red flag to you.""The number one compromised source is still stolen credentials. And the number one method for that is still some type of phishing, or some type of social engineering, so nothing seems to really be changing there.""We still work and live in a world where everything is kind of magic. And the majority of people who are relying on technology, still have absolutely no idea how it works, and therefore can't really spot things when they aren't correct, right."Frankly, there's only so much time in the day. And if you have to pick between defending the mothership or defending a rowboat out in the dock, you know, you're going to defend the mothership, hopefully. So your tool, if it's not aware of that, that's going to be a problem.""There are entities and organizations that carry adequate insurance to pay the fines for non-compliance because they wholly expect to be out of compliance because they consider the compliance component, a burden.""So my number one advice to anybody considering to go down the path of implementation of ASM is, one, be willing to do something that you find, but numbe
Protecting Personal Data, Podcasting, and More with Adam Levin Co-Host of the What the Hack Podcast Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack. He also shares some stories about his guests and also gives advice on how to protect your personal information.

What the Hack Podcast
https://podcasts.apple.com/us/podcast/id1571482669

Secure Talk Podcast
https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/
Are We Prepared? Victoria Beckman is the director of the Digital Crimes Unit (DCU) for the Americas at Microsoft. DCU is responsible for implementing strategies to disrupt cybercrime. In this episode of Cybersecurity Unplugged, Beckman discusses the downstream implications of countries dispersing and distributing operations and data assets, how Microsoft and the DCU unit are dealing with cyberattacks, and how preparation is key, on and off the battlefield.
How to Prevent Data Leaks Using a No-Code Platform with Yasir Ali, CEO of Polymer Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.

Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.

Polymer
www.polymerhq.io/

Secure Talk Podcast
https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/
Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity.

https://nordsecurity.com/

https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/
Episode 35: Remembering the Late Alan Paller In episode 35 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Bobbie Stempfley, Board Chair at the Center for Internet Security (CIS). Together, they remember the late Alan Paller, a CIS co-founder and former Board member. Each of them recalls when they first met Alan, and exchange stories of how his passion for bringing people together and solving big challenges helped change their lives, drive CIS's mission, and reshape the cybersecurity industry.ResourcesFollow Bobbie on LinkedInRemembering Alan Paller, CIS Co-Founder and Board MemberAt Long Last, CIS Will Be Back at RSA Conference in 2022CIS Controls Volunteer Spotlight: James and Kelli TaralaCIS Board of Directors
#CISOThursday - Breaking Into Cybersecurity w/ Evan Francen 7.14.22 #CISOThursday - Breaking Into Cybersecurity w/ Evan Francen 7.14.22 
https://www.linkedin.com/in/evanfrancen/ 
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. 
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in. 
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires 
Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com//dp/1801816638/ 
About the hosts:
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's  Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a  solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking into Cybersecurity: Bradley Ogle 7.15.22 Breaking into Cybersecurity: Bradley Ogle 7.15.22

https://www.linkedin.com/in/bradley-o-90101411a/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com//dp/1801816638/ 
_________________________________________

About the hosts:   

Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's  Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a  solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://breakingintocybersecurity.sounder.fm/
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Episode 29: Keeping Medical Networks Healthy with Good Cyber Hygiene If it isn't enough that hospitals have been overrun with Covid patients during the pandemic, they also have been targeted by cyber criminals. Many have even been forced to cancel vital medical services because their systems, software or networks are disabled. It's more important than ever for healthcare organizations to keep their networks healthy. In this episode of Cybersecurity Simplified, we will get a prescription for good cyber hygiene from our special guest, Sunila Thelma Levi, a healthcare technologies executive at Commonspirit Health.
Cyber Crimes in Metaverse, Digital Citizenship and How AI uses our data ft. Col (Dr.) Inderjeet Singh Col (Dr.) Inderjeet Singh is a Cyber-Security Specialist, notable industry speaker, an innovator, and an influencer with proven success in spearheading Strategic Information Security Initiatives with experience of more than 29+ year across wide spectrum of areas spanning cybersecurity operations leadership and influencing policy level decisions in multiple organizations .Throughout his career, he has parlayed his extensive background in security and a deep knowledge to help organizations build and implement strategic cybersecurity solutions.
In this episode he has share how cybercrime has also found it's way out in Metaverse, Where India stands in it's Cyberspace, Cyber Hygiene that we need to adopt and many more.
Do listen the episode till the end.
Digital Forensics & Incident Response with Lt. Col. Santosh Khadsare Sir || S-3 || EP- 01 Digital forensics and incident response (DFIR) is a specialized field focused on identifying, remediating, and investigating cyber security incidents. Digital forensics includes collecting, preserving, and analyzing forensic evidence to paint a full, detailed picture of events.
Mr. Santosh Khadsare is a highly experrienced , qualified and learned person in DFIR. Let's listen to him all about DFIR.
Day Zero Moshe Zioni, VP of security research at Apiiro has been researching security for over 20 years in multiple industries. In this episode of Cybersecurity Unplugged, Zioni discusses the downstream dependencies on other open source programs that are called by API, how organizations can best mitigate future ransomware attacks, specifically around supply chain and open source, and the difference between private and public repositories, giving the eight-times the number of exposed secrets in private repositories.
Hunting The Bad Guys Jonatan Khanashvili is a senior research lead at Hunters who spends every waking moment hunting bad actors in cyberspace. In this episode of Cybersecurity Unplugged, Khanashvili also discusses how Hunters is dealing with the big golden SAML attack and how the attack works, detection and hunting techniques used to find and identify the bad guys, a potential solution, and who is at risk of a SAML attack, even a cybersecurity expert.
Breaking into Cybersecurity with Apurv Tiwari (Robotics to Cyber) 02/25/22 Breaking into Cybersecurity with Apurv Tiwari (Robotics to Cyber) 02/25/22

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Breaking Into Cybersecurity Special on Misinformation: @Jon__Nichols 3/3/22 Breaking Into Cybersecurity Special on Misinformation: @Jon__Nichols 3/3/22

Jonathan Nichols - Threat Intelligence and Digital Misinformation. Former titles include: Chief Counter-Propaganda Analyst, United States Forces - Iraq
Featured in DARKNET DIARIES EP 65: PSYOP.
https://www.youtube.com/watch?v=rvSBOJ75AME&list=PLxCjAwkell2XRbfwHnAvplgLvybqllU8U


About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
#CISOThursdays​: Breaking Into Cybersecurity + Siva Inguva 03/03/22 #CISOThursdays​: Breaking Into Cybersecurity + Siva Inguva 03/03/22

It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Our guest today is Siva Inguva!

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity​ #breakingintocybersecurity ​​ #informationsecurity ​​ #JamesAzar ​#ChrisFoulon​ #ReneeSmall ​#InfoSecHires

Check out our book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://www.amazon.com/dp/1955976007
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Breaking into Cybersecurity w Chimeria Gonzalez (Military to Cyber Analyst) 3/11/2022 Breaking into Cybersecurity w Chimeria Gonzalez (Military to Cyber Analyst) 3/11/2022

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
#CISOThursdays​: Breaking Into Cybersecurity + Malcolm Harkins 03/31/2022 #CISOThursdays​: Breaking Into Cybersecurity + Malcolm Harkins 03/31/2022 

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
#CISOThursdays​: Breaking Into Cybersecurity + Sean Dillane 04/14/2022 #CISOThursdays​: Breaking Into Cybersecurity + Sean Dillane 04/14/2022
It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
#CISOThursday - Breaking into Cybersecurity - CFF Cyber Talent Week 2022 04.21.22 #CISOThursday - Breaking into Cybersecurity - CFF Cyber Talent Week 2022
 04.21.22
Cyber Future Foundations Cyber Talent Week 

Diana Burley https://www.linkedin.com/in/dianaburley/
Naomi Buckwalter https://www.linkedin.com/in/naomi-buckwalter/

It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
Special Edition - Breaking Into Cybersecurity: Ryan Leirvik 04/22/22 Breaking Into Cybersecurity: Ryan Leirvik 04/22/22

It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
Breaking into Cybersecurity with John Delacruz (Military Ops to Information Analyst) 04.22.22 Breaking into Cybersecurity with John Delacruz (Military Ops to Information Analyst) 04.22.22 1 PM ET



It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
#CISOThursday - Breaking into Cybersecurity: Michael Meis 4.28.22 #CISOThursday - Breaking into Cybersecurity: Michael Meis 4.28.22
Michael Meis https://www.linkedin.com/in/michaelmeis/
Naomi Buckwalter https://www.linkedin.com/in/naomi-buckwalter/
Jessica True https://www.linkedin.com/in/jessica-true-877a40218/
Elizabeth McConnaughey https://www.linkedin.com/in/emcconn/
It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
--------------------------
About the hosts:   Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's  Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a  solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Breaking Into Cybersecurity with Ebrima Ceesay 5.6.22 Breaking Into Cybersecurity with Ebrima Ceesay 5.6.22
https://www.linkedin.com/in/ebrima/
Shedding Light on the Mysticism of the Cybersecurity Talent Gap

It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
Breaking Into Cybersecurity: Dan Klein 6.24.22 Breaking Into Cybersecurity: Dan Klein 6.24.22

https://www.linkedin.com/in/dklein08/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
#CISOThursday - Breaking into Cybersecurity: AJ Yawn 7/7/22 #CISOThursday - Breaking into Cybersecurity: AJ Yawn 7/7/22
https://www.linkedin.com/in/ajyawn/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.



About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.



#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires



Check out our new books:
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
https://www.amazon.com//dp/1801816638/
_________________________________________

About the hosts:   

Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking into Cybersecurity with Sarah Race 7.8.22 Breaking into Cybersecurity with Sarah Race 7.8.22 
https://www.linkedin.com/in/sarah-race-904/ 
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. 
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in. 
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires 
Check out our new books: 
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI 
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career 
https://www.amazon.com//dp/1801816638/ 
_________________________________________ 
About the hosts:    
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ 
Download a free copy of her book at magnetichiring.com/book 
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach. 
https://www.linkedin.com/in/christophefoulon/ 
Find out more about CPF-Coaching at https://cpf-coaching.com 
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Episode 34: A Survey of Hacking in Hollywood In episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee, a senior security analyst and Core NetWars Tournament design lead for Counter Hack, look back at how Hollywood has portrayed hacking over the years. They cover long-standing crowd favorites like Hackers, Sneakers, and Mr. Robot along with some lesser-known gems. The overarching trend? Viewers are getting more computer-literate, so the way in which Hollywood portrays hacking is evolving in a way that not only satisfies audiences but also raises their awareness of cybersecurity. ResourcesFollow Chris on LinkedIn.Election Security Spotlight – Black, Gray, & White Hat HackersCIS Critical Security Control 18: Penetration TestingElection Security Spotlight – Social EngineeringHack the Human: End-User Training and Tips to Combat Social EngineeringMS-ISAC Security Primer – Spear Phishing
Censys: The World of Attack Surface Management Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective.The security of an enterprise's surface is paramount in the current era of cloud - but how can companies manage their cloud security posture management and tackle basic misconfigurations?In this episode of the EM360 Podcast, Chief Research Analyst at IT-Harvest Richard Stiennon speaks to David SooHoo, Director of Product Management at Censys, as the pair discuss: Attack surface management vs asset managementThe shift of the cloudZero-day attacks and how to mitigate them
Calamu: The Next Generation of Data Protection Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack.In this episode of the EM360 Podcast, Dr. Eric Cole, CEO and Founder at Secure Anchor Consulting speaks to Paul Lewis, CEO of Calamu, about:Today’s biggest threats to dataThe problem of data exfiltrationHow a data-first security approach provides next-generation protection
Rapid7: How to Swiftly Respond to Modern Cyber Threats In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available. With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats?In this episode of the EM360 podcast, Content Producer Matt Harris talks to Caitlin Condon, Vulnerability Research Manager at Rapid7, as they explore: How security teams can respond to threats more swiftly and effectivelyRemote working’s effect on company weakpointsHow enterprises can better understand and remediate high-priority threats
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. Using a variety of means both online and offline, unsuspecting users can be conned into compromising their security, releasing sensitive information or even transferring money. Secureworks Adversary Group, a security consulting department within Secureworks, walk-us through various social engineering scenarios used during their attack simulations.In the third episode of this three-part podcast with Secureworks, our host Dr Eric Cole the Founder and CEO of Secure Anchor Consulting will be talking with Ben Jacob, Technical Lead at Secureworks, about: Social engineering attack techniques and their lifecycleHow phishing, vishing, and spear-phishing impact industries from a social engineering standpointWhat can companies offer from a training and education standpoint to help mitigate these risksValue of XDR in detecting suspicious user behaviour
CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop security strategies and aid in identifying threats and opportunities. In the episode of the EM360 podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Caitlin Gruenberg Director, Risk Solutions Engineer at CyberGRX as the pair explore: Third-party cyber risk management vs self-assessmentsCyber risk intelligence in the wake of huge, high-profile breachesThe meaning of a true risk exchange
Sophos: The World of Cyber Insurance Cyber insurance helps to provide critical cover for those who need protection against digital threats.While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens.This includes the costs of investigating a cybercrime, recovering lost data and restoring of the systems. It can even recoup the loss of income, manage reputation, and notification costs if required to notify a third party.In this third episode of a three-part series with Sophos, Senior Director Nicholas Cramer talks to Dr Eric Cole CEO and Founder of Secure Anchor Consulting about:The current state of cyber insuranceDifficulty in getting policiesHow to better position your EDR and MDR
Darktrace: The Fast and Furious Nature of Cybersecurity The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents.Are IT teams capable of keeping up, or are we leading towards cyber doomsday?In this episode of the EM360 podcast, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Mariana Periera, Director of Email Security Products at Darktrace, to explore:How businesses can come back stronger following a threatThe email supply chain and how attackers are using legitimate credentials to attackCore capabilities and the importance of augmenting with AIThe true changing nature of cybersecurity
Anomali: Building a Secure Framework with XDR and MITRE ATTACK In this podcast, Chris Steffen, Research Director at Enterprise Management Associates (EMA), joins Mark Alba, Chief Product and Strategy Officer at Anomali, to explore the ins and outs of extended detection and response (XDR) and MITRE ATT&CK framework, including how it integrates with threat intelligence and enterprise security strategies.
Episode 22- Final Episode! Former Police Officer and IT Pro seeks dream job in cybersecurity In the final episode of this series, Joe and Larry discuss their new YouTube channel where all future episodes will be hosted. Please subscribe and follow us there!
https://www.youtube.com/channel/UCJsqpIC4GSpNwIWTvbSt2rQ
The advantage of moving to YouTube is that Joe will be able to share his computer screen with Larry to help him gain additional hands on training. 
In this episode, Joe talks to former police officer Doug Roberts. Like Larry, Doug is currently working in Information Technology but seeking a full time position as a Security Operations Center (SOC) Analyst. 
Doug has three college degrees including an associates degree in networking, a bachelor's degree, and a master's degree in Cybersecurity. Additionally, Doug has several cybersecurity certifications (Security+, CySA+, CSAP) and he is working towards the CISSP. Despite 6 years of IT experience, degrees and certifications, Doug has found it difficult to land his dream job in cybersecurity. Let's help him out!!  If you know a hiring manager or a company that may be hiring, Doug can be reached on LinkedIN (here).
FortinetLIVE #50 - Enabling Secure Work from Anywhere Join #Fortinet’s Peter Newton and Jonathan Nguyen-Duy for another episode of FortinetLIVE, where they discuss the current state of the work from anywhere reality and how it has evolved from a work from home environment, including timely strategies and challenges.
#CISOThursday - Breaking into Cybersecurity: Pete Strouse 6.29.22 #CISOThursday - Breaking into Cybersecurity: Pete Strouse 6.29.22

https://www.linkedin.com/in/pete-strouse-mba-phr-b2193b42/

Are you a CISO and interested in sharing your story or insights on attracting and retaining cybersecurity talent and other topics of the week on the Breaking Into Cybersecurity hashtag#CISOThursdays? Let us know.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
--------------------
About the hosts:
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking Into Cybersecurity: Svetlomir Balevski 7.1.22 Breaking Into Cybersecurity: Svetlomir Balevski 7.1.22
https://www.linkedin.com/in/svetlomir-balevski-a366767/
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts:
Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking Into Cybersecurity + Federal Career Connection: Resume + Interview Tips 6.29.22 Breaking Into Cybersecurity + Federal Career Connection: Resume + Interview Tips 6.29.22

We are excited to have Federal Career Connection back for another discussion on breaking into federal careers! Today's guest is Tim Lo who will discuss resume and interviewing tips.


https://www.linkedin.com/in/timothyclo/


Tim Lo is from Fishkill, New York and went to school at Carnegie Mellon in Pittsburgh for both his undergraduate and master's degrees. Tim has over a decade of experience in business strategy and process improvement. He has worked for several top-tier international consulting firms and has been involved in the hiring of many new team members. He volunteers as a mentor to many recent grads and moonlights as a serial entrepreneur. Tim is a PARW/CC certified resume writer and professional career coach.



It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI

_________________________________________

About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/

Download a free copy of her book at magnetichiring.com/book

Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.

https://www.linkedin.com/in/christophefoulon/

Find out more about CPF-Coaching at https://cpf-coaching.com

- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
See It In The Eyes - Ransomware Attack Case Study Seeing it on the news and stories from friends is one thing but when facing it for real is another one. Join me to this special case study and learn not to repeat mistakes. The Cybersecurityinsider Yigal Behar - Host podcast@thecybersecurityinsider.com www.2Secure.biz
Firewall speeds and VPN risks | S2E2 Is your firewall as fast as you think?What does XDR mean and how does it work?Do you need a personal VPN?We talk to Brian Monkman (NetSecOPEN), Chad Skipper (VMware), Luis Corrons (Avast) and Daniel Cuthbert.Security Life Hack from Dennis Batchelder (AppEsteem)!(Full Show Notes available on our website.)
Episode 28: Take Managed Security to a Higher Level with SOAR Cybercriminals are escalating their attacks. What can you do? Take managed security to a higher level with SOAR - Security Orchestration, Automation and Response. In this episode of Cybersecurity Simplified, learn how SOAR can reach into IT environments and stop cyberthreats in progress, reduce mean time to repair and minimize the impact of cyberattacks.
Cryptocurrency Bloodbath Richard Bird is the chief product officer for SecZetta. Bird is a multi time C level executive in both the corporate and startup worlds and is internationally recognized for his expert insights, work and views on cybersecurity data privacy, digital consumer rights and identity centric security. He's also a senior fellow with the CyberTheory Zero Trust Institute.
Breaking Into Cybersecurity: Dan Klein 6.24.22 Breaking Into Cybersecurity: Dan Klein 6.24.22
https://www.linkedin.com/in/dklein08/
It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
#3 - Threat Intelligence for FSI | DORA This episode was recorded live on 06/28/22

Tune in as Joe Robertson and Ricardo Ferreira, from the Fortinet Office of the CISO, talk with Jonas Walker, Security Strategist at FortiGuard Labs, about threat intelligence in light of the European Union Digital Operational Resilience Act regulation.
 
Listen in to learn more about how DORA encourages financial organizations to share threat intelligence, how you can use it to protect your organization, and how Fortinet can help.

Learn More: https://www.fortinet.com/blog/industry-trends/financial-institutions-navigate-digital-operational-resilience-act
Episode 33" The Shift-Left of IoT Security to Vendors In episode 33 of Cybersecurity Where You Are, co-host Sean Atkinson and Ben Carter, IoT Specialist for CIS’s Chief Technology Officer, discuss the need to secure IoT devices at the vendor level. This is impossible without taking a high-level view and ensuring that all protocols used by IoT devices and vendors are taken into account. Only by ensuring security by design can organizations in healthcare, manufacturing, government, and other sectors accomplish security at scale for IoT management – all while preserving interoperability between their connected devices.ResourcesFollow Ben Carter on LinkedInCIS Controls v8 Internet of Things Companion Guide6 Simple Tips for Securing IoT DevicesSmart Devices, Smart Users – How to Stay Secure in an IoT World“Internet of Things” Needs to be More Secure
EP 73: Top Five Things That Will Separate You From Other Applicants https://www.yourcyberpath.com/73/

In this episode, the discussion between Kip and Jason is about the top five things that will make you stand out from other applicants. These tips will definitely help you get ahead of the pack and have an edge in your job application.

In your job hunting, you want to be an irresistible candidate from the hiring manager's perspective. These top five things will separate you from other applicants. These will make the hiring manager want to have you on their team.

What You’ll Learn

●     Why who you know matters

●     Why you need soft skills/people skills

●     Why it is important to have practical experience

●     Why solving real-world problems will help

●     Which technical skills/profiles will make you stand out

Relevant Websites For This Episode

●     www.YourCyberPath.com

●     www.DionTraining.com

Other Relevant Episodes

●     Episode 22 - Impress Us with Your Resume Skills Section

●     Episode 28 - Five Principles to Help You Get Your Dream Cybersecurity Job

●     Episode 66 - How to be Irresistible to Hiring Managers
Separating the Hype From the Reality Peter Bordow is the senior vice president, principal architect and head of quantum systems and emerging technology for information and cybersecurity at Wells Fargo Bank. Before Wells Fargo. Anything that Bordow tells us today is his personal opinion and not the opinion or official position of Wells Fargo Bank. In this episode of Cybersecurity Unplugged, Bordow discusses the quantum computing hype versus reality: His assessment of our quantum program's current state and more.
How to Tackle Burnout in Cybersecurity Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of dollars in losses due to human error. Thomas Kinsella, Co-Founder & Chief Operating Officer at Tines discusses at length the challenges faced by SOC team members and makes actionable recommendations on how to decrease burnouts, increase retention, and create a better work environment for the security analysts.Time Stamps01:26 -- So, before we get into the Voice of the SOC Analyst report details, Thomas, I'd like to give you this opportunity to provide some highlights of your professional journey.03:54 -- What led to the study. What's the purpose of the study? 06:39 -- Would you like to add anything about the methodology for the study?08:53 -- So would you say that it's mostly mid-market organizations that you all were able to tap into?09:18 -- Let's go through each one of the findings. The first one says 71% of the analysts experience some level of burnout. This could be due to the fact that 69% are understaffed, and 60% have seen increased workloads over the past year. Was this surprising to y'all?11:27 -- Referring to another finding which states that 64% say they are likely to switch jobs in the next year. So the turnover is going to be very high. What do you recommend organizations do to deal with this challenge?14:05 -- Why hasn't this automation aspect been addressed yet?19:39 -- When organizations make the decision of investing in an automation platform, what does it take to make the implementation a truly successful experience?22:19 -- What do you think about job rotation and job enrichment? Is that done well enough to make make it a little more interesting for the staff?24:52 -- So, talking about job rotation job enrichment. Yeah, I think this creates a great opportunity for an organization to get the security people outside their comfort zone, and expose them to other company operations. And also get people from the other business operations and bring them into the SOC center. Does that gel with you?34:29 -- One of the first actionable takeaways from the SOC report is -- "improving time spent on reporting." What do you mean? Because I would think that you want to reduce the time that is spent, the manual hours that is spent in delivering different types of reports. Can you clarify?36:49 -- Moving on to the second recommendation, which is: "making triage, enjoyable," how do you do that? And if you could clarify for the audience, what do you mean by triage?41:36 -- So moving on to the third recommended takeaway or actionable item, which is -- "increasing retention by measuring and minimizing burnout." Can you expand on that?47:53 -- Let's talk about the fourth actionable takeaway -- it's time for no-code automation. What does that mean?50:49 --Do you have any final words for the listeners?Memorable Thomas Kinsella Quotes"It seems to me they (SOC team members) enjoy the work, they feel respected, but that you're just spending their time shifting from screen to screen investigating alerts that are not high enough fidelity.""People (SOC team members) don't mind working hard if they feel like they're adding a ton of value and feeling like they're productive.""Purchasing a tool is often equivalent to purchasing weights, or purchasing an exercise bike, they actually just look good in the corner unless you're prepared to use them.""If you generate some challenges, and get people thinking creatively, and get people digging deeper, they remember the parts about security they really love.""Shame is the exact opposite of what we should be doing in security, we have to be encouraging people to report and knowing that people are gonna make mistakes. That's why we have defense in depth."Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer"
#CISOThursday - Breaking into Cybersecurity: Professor Roger Whyte 6.16.22 #CISOThursday - Breaking into Cybersecurity: Professor Roger Whyte 6.16.22
https://www.linkedin.com/in/rogerwhytenyc/
It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.
Are you a CISO and interested in sharing your story or insights on attracting and retaining cybersecurity talent and other topics of the week on the Breaking Into Cybersecurity #CISOThursdays? Let us know.
About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.
#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires
Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
_________________________________________
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com
- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
- Podcast: https://anchor.fm/breakingintocybersecurity
- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
- Twitter: https://twitter.com/BreakintoCyber
- Twitch: https://www.twitch.tv/breakingintocybersecurity
Breaking into Cybersecurity: Tiffany L 6.17.22 Breaking into Cybersecurity: Tiffany L 6.17.22

https://www.linkedin.com/in/tiffanyl112358/

It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.

About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.

#cybersecurity #breakingintocybersecurity #informationsecurity #JamesAzar #ChrisFoulon #ReneeSmall #InfoSecHires

Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI
----------------------------
About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/
Download a free copy of her book at magnetichiring.com/book
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
https://www.linkedin.com/in/christophefoulon/
Find out more about CPF-Coaching at https://cpf-coaching.com

Website: https://www.cyberhubpodcast.com/breakingintocybersecurity
Podcast: https://anchor.fm/breakingintocybersecurity
YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/
Twitter: https://twitter.com/BreakintoCyber
Twitch: https://www.twitch.tv/breakingintocybersecurity
The Nature of Application Code Rui Ribeiro is the CEO and founder of Jscrambler, a bootstrap global business that serves over 43,000 customers worldwide. In this episode of Cybersecurity Unplugged, Ribeiro discusses marketing material in website and application code and how his product works to identify corrupt code, the nature of polymorphic and how Jscrambler deals with it, and how the ever expanding threat landscape impacts Jscrambler.
CISO Best Practices and MDM Tips with Chaim Mazal, CISO at Kandji Chaim Mazal, SVP of Technology & CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.

www.kandji.io

www.securetalkpodcast.com
71 - Encrypted email and Web 3.0 with Gareth Harte of Telios Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet.
This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg
gareth@corp.telios.io
https://discord.gg/xaHkmga9
https://www.linkedin.com/in/gareth-harte
https://telios.io
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
#2 - Risk Management for FSI | DORA This episode was recorded on: 05/24/2022

In this podcast, Joe Robertson and Ricardo Ferreira, from the Fortinet Office of the CISO, together with Frederic Ballara, Enterprise Architect for Fortinet, talk about risk management, focusing on the DORA regulation and the sorts of activities and strategies that financial institutions are going to have to conform to.

Listen in to learn more about what kind of risk management framework is being required by DORA, what specific activities there are in DORA that FSIs must do and how can Fortinet help financial services companies fulfill these requirements.

Learn More: https://www.fortinet.com/blog/industry-trends/financial-institutions-navigate-digital-operational-resilience-act
FortinetLIVE #48 - Fortinet Ultimate Fabric Challenge This was recorded live on 05/16/2022

Tune in to a special edition of FortinetLIVE as #Fortinet’s Rob Rashotte sits down with the winners of our 2022 Ultimate Fabric Challenge Global Championship as they explain their winning strategies and experiences from #Accelerate22.

Watch the recording on YouTube: https://youtu.be/QLr0ZMDkOKQ
#1 - The Global Impact of DORA on the Financial Sector This episode was recorded on: 05/24/2022

Recently, the Council of EU presidency and the European Parliament reached a provisional agreement on DORA, EU’s Digital Operational Resilience Act. It is expected to pass into law by each EU member state by the end of 2022.

In this podcast, Joe Robertson, and Ricardo Ferreira, from the Fortinet Office of the CISO, discuss the global impact that DORA will have on the financial sector, as well as on providers of services to the financial sector. Listen in to learn about the strategies for enhancing the resilience of financial institutions and how Fortinet is helping financial institutions navigate DORA, assisting in monitoring networks and mitigating cyberthreats and cyberattacks while optimizing cost and efficiency.

Learn more: https://www.fortinet.com/blog/industry-trends/financial-institutions-navigate-digital-operational-resilience-act
FortinetLIVE #49 - The Partner Opportunity with ZTNA This was recorded live on 5/25/2022

Join us for another episode of FortinetLIVE as Peter Newton and Liquid Networx’ Robert Short, discuss the partner opportunity with Zero Trust Network Access, the benefits of specializations and technical training, and the partnership between Fortinet and Liquid Networx.

Learn more about Zero Trust: https://www.fortinet.com/solutions/enterprise-midsize-business/network-access
How to Avoid ATM’s Fraud? ATM skimming or ATM skam is a process in which someone steals sensitive data from an ATM's magnetic stripe. For this reason, skimmers install the scanner in the ATM pocket. They also install a secret keypad on the ATM keypad. It stores a secret PIN that users enter to withdraw money from an ATM. By getting this useful information about the ATM card, they will be able to steal money from your account.
Therefore, modern banks use reliable, high-quality software that allows ATMs to function safely and minimize the possibility of hacking. One of these solutions is ATMeye.iQ by https://atmeye.com/, which provides real-time video monitoring of ATMs, has anti-skimming devices, facial recognition and various sensors.

If you familiarize yourself with the most popular ATM scams and try to use these tips, you will be able to avoid ATM scams:
1. Try to find an ATM in a safe place. This is how you put your safety first.
2. You must be aware of others around you. If you feel that someone near the ATM is behaving suspiciously, leave this machine and try to find another machine to withdraw money
3. Use caution when using ATMs. You must provide enough space for others to enter their PIN. You should stay at least two meters away from the ATM.
4. When entering your card and PIN into the ATM, try to stand as close to the ATM as possible. When entering your PIN, try to cover the keypad and make sure no one is watching you.
5. After the transaction is completed, try to discreetly deposit money and an ATM card before exiting the ATM.
If the transaction fails and the ATM does not return your card, please notify your bank immediately.
6. If you have problems with an ATM, you should not seek help from a stranger. In addition, you shouldn't let a stranger distract you at the ATM.
How to get a job in tech that you desire and continue to build your skills and experience In my book "Breaking the Cyber Code: A Game Changer That Prepares Our Workforce and Secures the Future" we talk about how to break into the tech industry and continue to build knowledge, skills, and experience to get the job of your dreams. Get an autographed copy of my book at https://sakinah-tanzil.square.site Listen and support!

---

Support this podcast: https://anchor.fm/sakinahtanzil/support
70 - Discovering and determining who owns your data Today we're discussing where our data lives, how can we find most of it and who controls your data.
This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA
Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States.
Brian J. Weiss
https://www.linkedin.com/in/brianjweiss/
https://www.itech-solutions.com/
00:00 - Intro
00:10 - Where is your data?
38:03 - It's 5 o'clock somewhere man
38:18 - We are Zero trust 44:12 - Crystal Reports
46:29 - Greatest podcast in the galaxy
46:40 - Get VAM'd with ITECH-Solutions.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
Escalate, Exfiltrate and Encrypt - Round 15 These will be quick. I dive into questions submitted from listeners and discuss articles and/or evolving incidents.
This episode is available on YouTube: https://www.youtube.com/watch?v=LzMXur-vnw0
This weeks questions;

Should I invest in products or process?
What threat that keeps you up at night?
You’ve had a couple episodes where guest discussed how few management agents are installed. Where are you on agent count and why?
Every major vendor is pushing EDR on us, should we do it?
With Kaseya buying datto what are your thoughts on the vendor consolidation in the MSP industry?

Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
64 - Inside Intel Security with Tom Garrison & Camille Morhardt Tom Garrison is Vice President and General Manager of Client Security Strategy & Initiatives at Intel Corporation  
Camille Morhadt is Director, Security Initiatives and Communications, Intel  
You can listen in on their podcast at https://cybersecurityinside.com/ 
This episode is available on YouTube: https://www.youtube.com/watch?v=iFDfcT7lqE8
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
66 - CrowdStrike XDR with Cameron Buriani Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.
With all of this enriched threat data filtered and condensed into a single console, XDR enables security teams to rapidly and efficiently hunt and eliminate security threats across multiple domains from one unified solution.
Cameron Buriani is a Sr. Solutions Architect at CrowdStrike.
This episode is available on YouTube: https://youtu.be/MOsiuzb3KBs
https://www.crowdstrike.com/products/endpoint-security/falcon-xdr/
If you'd like to find out more about CrowdStrike services you can get in touch with us via info@kontinuum.com

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
67 - CISA vs. Snake Oil Or at least that's my analysis of CISA Alert AA22-137A
It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.
This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI
In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]
Download the PDF version of this report (pdf, 430kb).

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
68 - Cybersecurity Round Table May 2022 On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity.
This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic
Check out the following podcasts.
Blackpoint Cyber
https://blackpointcyber.com/resources/podcast/
Recorded Future
https://therecord.media/podcast/
Matt Lee
https://www.youtube.com/c/CyberMattLee
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
69 - White House: Cyber activity not against Russia policy On this episode I'll share my thoughts on the recent White House announcement below.
This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE
WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine.
White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine.
https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
65 - Cybersecurity Reskilling with Max Shuftan, SANS Institute Max Shuftan is the Director, Mission Programs & Partnerships at the SANS Institute.
Max leads a business unit at SANS Institute focused on (1) growing the global cybersecurity talent pipeline and increasing Diversity, Equity, and Inclusion (DEI) in the cyber workforce, and (2) fostering a stronger cybersecurity workforce through technical skills training and certification plus security awareness training of the State, Local, and Education (SLED) community.
https://www.linkedin.com/in/maxwell-shuftan-3786b21a/
SANS Mission: https://www.sans.org/mission/
SANS Academies: https://www.sans.org/scholarship-academies/
SANS.edu undergraduate program: https://www.sans.edu/acs/
CyberStart America (high school program): https://www.cyberstartamerica.org/
Cyber FastTrack (college competition): https://www.cyber-fasttrack.org/
New to Cyber: https://www.sans.org/cybersecurity-careers/?msc=main-nav

---

Support this podcast: https://anchor.fm/amplifiedandintensified/support
Load More