Cyber Work show

Cyber Work

Summary: Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Join Now to Subscribe to this Podcast

Podcasts:

 CIS Top 20 Security Controls with Tony Sager | File Type: audio/mpeg | Duration: 58:09

Tony Sager, Center for Internet Security® Senior Vice President and Chief Evangelist, discusses the CIS Top 20 Security Controls, which are globally recognized best practices for securing your IT systems and data against the most pervasive attacks. View the webinar: https://www2.infosecinstitute.com/cis-20-podcast. Special offer for CyberSpeak with InfoSec Institute listeners: https://www.infosecinstitute.com/podcast.

 Growing the number of women in cybersecurity | File Type: audio/mpeg | Duration: 34:48

Olivia Rose, director of global executive risk solutions at Kudelski Security, discusses her career journey and gives some tips and advice to women who are considering entering the cybersecurity industry. Get infosec training: http://infosecinstitute.com/. Special offer for CyberSpeak with InfoSec Institute listeners: https://www.infosecinstitute.com/podcast.

 California Consumer Privacy Act: Are you prepared for 2020? | File Type: audio/mpeg | Duration: 59:29

Learn all about the California Consumer Privacy Act of 2018 with Jay Rodne, Privacy Director at Sentinel and former Washington State Representative, and Aaron Weller, VP of Strategy at Sentinel and Fellow of Information Privacy. The CCPA, which gives California residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020.  Get your free e-book, "California Consumer Privacy Act of 2018 — What you need to know": https://www2.infosecinstitute.com/ccpa-podcast-ebook. Special offer for CyberSpeak with InfoSec Institute listeners: https://www.infosecinstitute.com/podcast.

 Getting started in red teaming and offensive security | File Type: audio/mpeg | Duration: 26:02

Curtis Brazzell, managing security consultant at cybersecurity firm Pondurance, discusses the methodologies and day-to-day operations in Red Team operations. Become a Certified Red Team Operations Professional: https://www.infosecinstitute.com/courses/red-team-operations/. Special offer for CyberSpeak with InfoSec Institute listeners: https://www.infosecinstitute.com/podcast.

 How to become a chief information security officer | File Type: audio/mpeg | Duration: 34:46

Joshua Knight, cybersecurity business leader at Dimension Data, discusses his career journey as well as the steps you can take to move your career towards the path of a chief information security officer (CISO). Get infosec training: https://www.infosecinstitute.com/. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 Community cyber-attacks, simulations and cooperation | File Type: audio/mpeg | Duration: 36:35

Michael Figueroa, executive director of the Advanced Cyber Security Center (ACSC), talks about aspects of red team operations and, more specifically, the ACSC's first collaborative defense simulation — an event that brought together 20 member teams and 100 participants to explore the challenges that organizations face when responding to large-scale cyber-attacks and the opportunity to address those challenges through cooperation. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 How to launch a career in application security | File Type: audio/mpeg | Duration: 45:11

Dan Cornell, chief technology officer at Denim Group, discusses his career journey and some of the steps you can take to begin a career in Application Security (AppSec). Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 Red team operations: Attack and think like a criminal | File Type: audio/mpeg | Duration: 35:20

Discover what it's like to be a Red Team member in this rebroadcast of our webinar with senior security researcher and InfoSec Institute instructor Jeremy Martin. Martin and moderator Camille DuPuis dig into the mindset of an attacker and cover topics such as the job duties of a Red Team professional, frameworks and strategies for conducting Red Team assessments, how to get started and progress your offensive security career, and questions from live attendees. You can watch a video version of the webinar and download the webinar slides here: https://www2.infosecinstitute.com/red-team-operations-webinar. Learn more about becoming a Certified Red Team Operations Professional: https://www2.infosecinstitute.com/red-team-operations

 Career advice from McAfee’s lead scientist | File Type: audio/mpeg | Duration: 23:32

Christiaan Beek, lead scientist and senior principal engineer with McAfee, discusses his career path, the future of cybersecurity and the No More Ransom project. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 Cyber threat hunting: Identify and hunt down intruders | File Type: audio/mpeg | Duration: 38:14

Learn what it takes to be a modern-day threat hunter in this rebroadcast of our webinar with senior security researcher and InfoSec Institute instructor Jeremy Martin discusses. Moderator Camille DuPuis helps guide the discussion around the job duties of a Cyber Threat Hunting professional, frameworks and strategies for Cyber Threat Hunting, how to get started and progress your defensive security career, and live questions from live attendees. You can watch a video version of the webinar and download the webinar slides here: https://www2.infosecinstitute.com/cyber-threat-hunting-webinar. Learn about becoming a Certified Cyber Threat Hunting Professional: https://www2.infosecinstitute.com/cyber-threat-hunting.

 What’s it like to be a high-end red team member? | File Type: audio/mpeg | Duration: 23:48

David "Moose" Wolpoff, co-founder and CTO of nation-state caliber attack platform Randori, discusses a day in the life of a high-end Red Team Operations professional. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 DNS exploits, concerns and easy fixes | File Type: audio/mpeg | Duration: 31:12

Andrew Wertkin, CTO at BlueCat Networks, discusses a topic of great interest to many InfoSec students, DNS security, including pervasive DNS security concerns and easy fixes your security department can take advantage of right now. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 Malware removal and security tips with Malwarebytes | File Type: audio/mpeg | Duration: 27:03

Michael Sherwood, senior director of technician services at Malwarebytes, talks about Malwarebytes, the group's free malware removal forums and a few other malware-related topics. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

 10 proven security awareness tips from Osterman Research | File Type: audio/mpeg | Duration: 56:26

Michael Osterman, president and analyst at Osterman Research, shares security awareness tips and strategies that organizations can implement immediately. Lisa Plaggemier, chief evangelist at InfoSec Institute, joins in the discussion, which is moderated by InfoSec Institute's Camille DuPuis. A new study from Osterman Research shows while most companies have a security training and awareness program, the majority of teams running those programs have very low confidence in their effectiveness. In fact, just 45% of security professionals believe their users can recognize phishing attempts, largely because they feel their training is inadequate. Is your training program as effective as you’d like it to be? You can watch a video version of the webinar here: https://www2.infosecinstitute.com/osterman-webinar. Learn more about security awareness: https://www2.infosecinstitute.com/security-awareness.

 Drilling holes in ATMs, card skimming and other fraud | File Type: audio/mpeg | Duration: 34:13

Stan Engelbrecht, director of cyber security practice for D3 Security, discusses a scary topic that we've been hearing a lot about on the news: the practice of ATM fraud and the implications for other swipe- and chip-based technologies. Get free security awareness resources: https://www2.infosecinstitute.com/free-resources. Special offer for CyberSpeak with InfoSec Institute listeners!: https://www.infosecinstitute.com/podcast.

Comments

Login or signup comment.