Cyber Security Interviews show

Cyber Security Interviews

Summary: There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Douglas A. Brush | Weekly Interviews w/ InfoSec Pros
  • Copyright: All Rights Reserved

Podcasts:

 045 – Kristinn Gudjonsson: You Don’t Want Analysts Spending All Their Time Extracting Data | File Type: audio/mpeg | Duration: 32:51

Kristinn Gudjonsson is a manager with the Detection & Response team at Google, where he has been for the last 6 1/2 years. Kristinn joined Google in 2011 as part of the incident response team, investigating and responding to security incidents, before making the move to management, where he now oversees the digital forensics and…

 044 – James Carder: Automate As Much As You Can | File Type: audio/mpeg | Duration: 37:56

James Carder is the CISO of LogRythm and brings more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity, and availability of information assets, oversees both threat and…

 043 – David Navetta: The Year Of the Phishing Attack | File Type: audio/mpeg | Duration: 45:47

David Navetta is a US co-chair of Norton Rose Fulbright’s Data Protection, Privacy and Cybersecurity practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as “breach coach” or is on the approved panel…

 042 – Jared Coseglia: Those Numbers Are Real | File Type: audio/mpeg | Duration: 43:01

Jared Michael Coseglia, founder and CEO of TRU Staffing Partners, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software…

 041 – Andrew Hay: Creative Solutions to Hard Problems | File Type: audio/mpeg | Duration: 36:09

Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder & Chief Technology Officer (CTO) for LEO Cyber Security, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision…

 #040 – Michelangelo Sidagni: One Size Doesn’t Fit All | File Type: audio/mpeg | Duration: 39:58

Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research, and operations for NopSec. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives. Michelangelo holds numerous professional certifications…

 #039 – James Tarala: What Does the Risk Really Look Like | File Type: audio/mpeg | Duration: 47:14

James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the SANS Institute, the Institute of Applied Network Security (IANS), and the Center for Internet Security for over 20 years. He has spoken at RSA for numerous years and has enjoyed the…

 #038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5 | File Type: audio/mpeg | Duration: 51:32

SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh…

 #037 – Johannes Ullrich: Solving That Puzzle In Your Network | File Type: audio/mpeg | Duration: 40:55

Dr. Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, he founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in…

 #036 – Jorge Orchilles: Offense Informs Defense | File Type: audio/mpeg | Duration: 46:54

Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter. Jorge has been involved in the Information Technology field since…

 #035 – David Kovar: Where Is the Best Application of Your Skill Set | File Type: audio/mpeg | Duration: 52:42

David Kovar is the President and founder of Kovar & Associates where he leads the development of URSA – Unmanned & Robotics Systems Analysis – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads…

 #034 – Harlan Carvey: You Have To Apply the Data To Your Theory | File Type: audio/mpeg | Duration: 1:00:56

Harlan Carvey is currently the Director of Intelligence Integration at Nuix. Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident…

 #033 – Perry Carpenter: Security Culture Management | File Type: audio/mpeg | Duration: 45:25

Perry Carpenter currently serves as Chief Evangelist and Strategy Officer for KnowBe4. Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at Gartner Research, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies. With a long career as a security professional and…

 #032 – Ryan Kalember: We’ve Moved From Mass Surveillance to Targeted Attacks | File Type: audio/mpeg | Duration: 52:05

Ryan Kalember has over 15-years of experience in the information security industry. Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully…

 #031 – Jobert Abma: All Bugs Are Shallow | File Type: audio/mpeg | Duration: 49:57

Jobert Abma is a co-founder and technical lead at HackerOne, one of the leading bug bounty service platforms. He is an avid hacker, developer and advocate for transparent and safe vulnerability disclosure. He and co-founder Michiel Prins have been named one of Forbes 30 under 30 for 2017 in tech. As a hacker himself, Jobert has…

Comments

Login or signup comment.