Security All In
Summary: With each major data breach, the role of the Chief Information Security Officer becomes more complex and more crucial. Ditch whatever preconception you may have- these individuals manage risk on a daily basis, with one foot in the world of business and another in the world of cybersecurity. Who are these people, and how do they think? Conversations flow between personal and professional- the books we read, the music we listen to, our hobbies all tell a story about who we are as practitioners. Learn what makes CISOs tick, and how they’ve gone all in on security.
Tom talked with Sam about his path to CISO. As CISO for ServerCentral Turing Group (SCTG), Tom is responsible for security, governance, compliance, and maintaining a culture of security and IT Risk awareness across the entire organization. Many of his company’s clients are in regulated industries, have compliance requirements or simply take the security of their data seriously.
Dianna starts off Season 2 of Security All-in to chat with Sam about her career path from the medical field to security. Dianna discusses how her experiences in the computer and network security industry with a strong business development professional background have helped her achieve executive positions.
Dianna is an experienced Strategic Alliances Manager with a demonstrated history of working in the computer and network security industry. Skilled in Product Lifecycle Management, Project Management, Program Management, Sales, Go-to-market Strategy, and Channel Sales, she has a strong business development professional graduated from the University of the Pacific. Sam spoke with Dianna about her new role […]
Michael and Sam talk about the path from Mathematics to Astrophysics, to cybersecurity. How does one secure satellite transmission, when the technology of the time allows only for a trickle of information to come back down to earth? They further discuss how Michael got drawn into cybersecurity and what takes precedence when it comes to […]
Sam and Kevin chat about what it takes to be the first CISO in an organization that’s growing its security, where biology and security meet, and why IoT is such a funny term.
Chris recalls the time he built a Tandy computer with his grandfather, and how that got him on the path to security. He explains his passion for education, tells of his time in the military, and offers advice to up and coming security professionals.
Don Welch talks about the path from Army Special Operations IT to being CISO for Penn State University. Don also tells about starting the cybersecurity education program at West Point, and how being a CISO for a major university is almost like securing a small city.
Sam and Roland discuss their continued passion for security, and how that keeps them going on a day to day basis and the power they draw from looking at the big picture and thinking about what you’re trying to accomplish beyond protecting a company and solving problems.
Cecil and Sam talk about Cecil’s journey from the Phillipenes to Dallas, his love of the Dallas Cowboys, the Y2K panic, and pentesting in the early 2000’s
John and Sam talk about “War Games” and other inspirations in the life of a security professional, how working at Comcast was like “holding on to a flying plane”, and how hobbies like archery help to keep John focused.
Bill Dennings and Sam reminisce about their first meeting, Bill’s history in the Marines, what he’d learned, and how it ultimately led him to security
Sam and Anne Marie Z sit down for a conversation about the similarities between finance and security, diversity, and Anne Marie’s history as an MMA fighter.
Ari and Sam discuss the intricacies of working at the White House, and how cybersecurity is viewed in DC
Sam and Eddie reminisce about their early days in cybersecurity, the work they did after the RSA breach, and how Eddie’s theater background has served him in his security career.
Sam and Bob (former CISO of the CIA) alternate between the earliest days of infosec, when electromagnetic emanations were a huge concern, to how companies today deal with risk, and the simplicity of cyber hygiene