259 avsnitt • Längd: 40 min • Veckovis: Onsdag
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023’s Best Tech Podcast by TMCnet.
Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea’s ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly.
Joe will be speaking with current leaders and experts in the IT and Cybersecurity fields discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent.
Whether you want to learn more about the latest hacking techniques, or navigate how to become a CISO, stay up to date with discussions and insight from the experts.
The podcast 401 Access Denied is created by Delinea. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
In the latest episode of 401 Access Denied, host Joseph Carson and cybersecurity expert Frank Vukovits examine 2024’s top cybersecurity trends and what lies ahead. They discuss evolving ransomware tactics, AI's dual role in defense and attack, the skills gap, and quantum computing's threat to encryption. Key topics include cloud security, AI governance, identity protection, and data privacy regulations, offering insights and strategies to navigate the rapidly changing cybersecurity landscape. Don’t miss their expert predictions for 2025 and actionable takeaways.
Listen in for:
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode of 401 Access Denied, host Joe Carson and cybersecurity expert Gal Diskin explore the evolving challenges of identity threats. They discuss how attackers compromise identities, the importance of phishing-resistant multi-factor authentication (MFA), and the need for continuous monitoring and detection.
The conversation highlights the criminal economy behind identity theft, the risks of security misconfigurations, and how AI is reshaping the landscape for both attackers and defenders. Listeners will learn actionable best practices to protect against identity threats and the importance of staying informed through collaboration within the cybersecurity community.
Key Takeaways:
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Join us as Joe Carson sits down with Craig Jones, a former director at INTERPOL’s Global Cybercrime Programme, to explore the ever-evolving world of cybercrime. With over 40 years in public service, Craig shares unique insights on how criminals have adapted to tech advancements and the immense challenges law enforcement faces in today’s digital landscape. Discover the crucial role INTERPOL plays in bridging global efforts and the pivotal lessons from ransomware attacks like WannaCry. Get ready for a fascinating conversation on what it takes to protect our digital world!
Key Takeaways:
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode of 401 Access Denied, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through conferences to enhance compliance and reduce risks.
Key Takeaways:
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
H&R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack surface, including 10,000 retail locations and a seasonal workforce, Joshua has developed effective strategies for building highly collaborative teams, gaining executive buy-in, and driving adoption for security best practices.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Executive managing hacker at IBM X Force, known as Evil Mog, is a specialist in authentication security research and passwords. He joins Joe to discuss modern methods for abstracting passwords away from human decision-making and moving them into the background for stronger security. The two discuss how strategies for password management vary depending on your compliance needs, dependencies of legacy systems, and goals for user experience. You’ll learn best practices for managing enterprise passwords and other shared secrets to reduce user fatigue and avoid credential theft.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised?” And, of course, “How much are we willing to invest to protect it?” In this episode, Nathan Wenzler, field CISO and advisor, shares his perspective on the meaning of “Security-by-Design.” More than guiding how you implement security tools or write code, he views it as a mindset shift to view your security program through a risk lens, not purely a technical lens. He and Joe share recommendations for a risk-based security strategy and communicating metrics in the language of the business. Tune in to learn how you can build the case for security investments and a program that’s going to be successful in the long term.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategies for setting permissions and entitlements that avoid excess privileges and ensure every access request isn’t based on exceptions. They discuss a crawl-walk-run approach to adopting emerging technologies that leverage data and context for access controls that adapt dynamically.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and policy enforcement. Tune in to understand the shift towards dynamic access, the limitations of role-based access, and how event time data can enhance control models. Don’t miss this deep dive into achieving zero-standing privilege and the future of identity and access management!
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platforms benefit customers by streamlining the user experience with a set of shared services and a common interface. Learn how platforms bring together multiple use cases so that people get the information they need with context, so they can collaborate more effectively and make better decisions.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea X: https://x.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and practical advice!
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms, and business applications. Authentication, authorization, and governance work together to protect the identity framework across them all. Frank Vukovits, chief security scientist at Delinea, joins Joe to break down how each of these elements contributes to effective identity security. An experienced auditor, Frank shares the importance of compliant user provisioning for critical business applications such as Oracle, SAP, Netsuite, and Microsoft Dynamics, especially as employees join, change roles, and ultimately leave an organization. You'll see why permissions in these systems must be carefully managed through authentication, authorization, and governance to shrink your attack surface, avoid toxic conflicts, and reduce the potential for fraud.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Discover the importance of accuracy, transparency, and explainability in AI systems, and the balance needed between protecting citizens and fostering innovation.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expert on technology and organized crime joins Joe to share what he’s learned about the motives and techniques cyberattackers use to conduct their crimes. Listen in to learn their secrets. This is more than the typical discussion of phishing, social engineering and malware, as Geoff and Joe dig into the intricacies of cryptocurrency, money laundering, and diversionary tactics. The more you know about emerging techniques, the more prepared you’ll be to prevent, detect, and combat them.
Rinsed: https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authentication, authorization, and continuous monitoring. Don’t miss their expert advice on protecting credentials and staying ahead of evolving security threats.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine—can transform your risk management practices. Dive into his expert insights on the critical role of a CISO, effective third-party risk management, and the power of compelling storytelling to win stakeholder support. Plus, learn why Brent champions risk reduction over compliance and how Estonia's cutting-edge cybersecurity methods can inspire seamless, secure interactions.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such as stealing secrets and abusing trusted relationships. His videos, demos, and training sessions are essential resources for IT security pros in cloud or hybrid organizations. Listen in as he shares his research on how cloud services are commonly misused and exploited and breaks down the latest strategies for maintaining a strong security posture.
Carlos' book: https://book.hacktricks.xyz/
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Evil Mog is the Chief Architect of IBM X-Force, IBM's Hacking Incident Response and Threat Intelligence division, and a renowned password security researcher. He studies the movements of access brokers across the criminal software supply chain and warns that credentials are being traded on the Dark Web for pennies on the dollar, stored in Github, and driving the growth of identity-based attacks. Meanwhile, shared passwords, reused passwords, legacy software, and the growth of AI applications makes effective authentication challenging. He and Joe discuss the latest research on the current state of passwords and how they’re evolving for layered authentication and authorization. You’ll learn how you can move manual password processes into the background and improve security through password managers, passkeys, MFA tokens, FIDO2 and other techniques. If you have questions about passwordless authentication, you’ll want to tune in.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Allan Friedman of the Cybersecurity and Infrastructure Security Agency (CISA) explains how creating a Software Bill of Materials (SBOM) for any application you build helps you improve quality control and proactively address your customers' security questions. You'll learn how to build SBOMs into your process and increase collaboration between vendors and buyers to improve the security of the global supply chain.
Connect with Allan:
Website: http://allan.friedmans.org/
LinkedIn: https://www.linkedin.com/in/allanafriedman/
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode, Joseph Carson interviews Art Gilliland, CEO of Delinea, about the challenges and trends in identity security. They discuss the shift in identity security from infrastructure-centric to security-centric, driven by the move to cloud and SaaS products. They highlight the importance of visibility and security controls in a decentralized infrastructure. The conversation also covers the concepts of authentication, authorization, and governance in identity security. They explore the future of digital wallets and federated identity, as well as the need for consolidation and convergence in authorization. The episode concludes with a call to prioritize identity as a security asset.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Joe Carson and Louis Zezeran explore why the ethos that drives gamers is so relevant for hackers. As they note, the culture and ideas attackers are using today often stem from the environment of retro gaming. Both groups use techniques such as reverse engineering, modifying signals, upscaling, and software emulation. Though most retro games simply want to improve their own experiences and keep playing the games they love, malicious hackers and criminal gangs are skirting restrictions and copyrights to stop sales. Joe and Louis share ideas on how gaming and hacking communities can learn from each other. Plus, their recollections of classic games will make you nostalgic for the early days of gaming and their recommendations for new games will get you reaching for the console.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
What do public sector organizations need to know about ransomware trends, identity-based attacks, and incident response? Hear from Dan Lohrmann, Field CISO for the public sector at Presidio and co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions. He and Joe discuss the reasons for ransomware’s decline in 2022 and subsequent acceleration in 2023, as threat agents leverage AI, social engineering, data exfiltration, and ransomware-as-a-service techniques. Dan shares the background of recent ransomware incidents that have impacted state, local, and educational organizations in Texas, Florida, and Michigan. You’ll get tactical recommendations on how to test your incident response plan with best practices for tabletop exercises and emergency communications.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
As founding chief executive of the UK National Cyber Security Centre (NCSC), Ciaran Martin sits at the intersection of national security, law, and politics. In this episode, he and Joe discuss how the UK NCSC took on the challenge of understanding security concerns and best practices from the private sector and translating them into effective crisis communications and policy changes. They share stories of cyber threats and attacks on critical infrastructure, and the impact these incidents have on citizens financially, physically, and psychologically. You’ll get a look at what it took to update the UK’s cybersecurity posture, including understanding the severity of different types of cyberattacks and data breaches, incident response, and threat intelligence, to improve the country’s cyber resilience.
Connect with Ciaran:
Twitter: @ciaranmartinoxf
LinkedIn: https://ie.linkedin.com/in/martinciaran
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
As a virtual CISO and cybersecurity consultant, Gideon Rasmussen helps new CISOs and organizations that are bringing on a CISO for the first time build a program architecture, conduct budgetary assessments, and translate cybersecurity into business impact the board understands. Gideon and Joe discuss the importance of consistent process execution, QA, and automation to help teams avoid things slipping through the cracks and experiencing “compliance jitter.” They dig into the latest update for the NIST Cybersecurity Framework, and share ways to use risk assessments and incident response exercises to improve cyber resilience. If you’ve got an upcoming board presentation and need to communicate risk to guide decisions, this episode has advice to help.
Connect with Gideon:
Website: https://www.gideonrasmussen.com/
LinkedIn: https://www.linkedin.com/in/gideonrasmussen/
Twitter: https://twitter.com/gideonras
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Meet Tanel Sepp, Ambassador at Large for Cyber Diplomacy at Ministry of Foreign Affairs of Estonia. He talks with Joe about navigating Estonia’s security strategy as the country emerged from 2007 cyberattacks to become an international leader for digital governance, banking, and media. Learn about the latest advancements in cyber law, public-private partnerships, and multi-national bodies that are coordinating cybersecurity thought leadership and response activities.
Tanel on X(Twitter): @tanel_sepp
Tanel on LinkedIn: linkedin.com/in/tanel-sepp-79b89226b
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Cyber criminals love to take advantage of human behavior, which is why social engineering remains a top attack vector. Hear how James McQuiggan, Security Awareness Advocate for KnowBe4, helps people make smarter security decisions, with training for all levels, phishing assessments, and mitigating controls. In this episode, James and Joe discuss emerging techniques driven by sophisticated, generative AI, and strategies you can employ to educate users and reduce risk of cyberattacks both at work and at home.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
In this episode, Joseph Carson interviews Mikko Hypponen, a renowned cybersecurity expert, about notable cybersecurity events of 2023, including the rise of ransomware attacks and the success of cybercrime unicorns. They discuss specific cases such as the MGM Grand and Caesar's Palace attacks, as well as the Vastaamo incident in Finland. The conversation also touches on the growing threat of supply chain attacks and recommendations for combatting the coming surge of AI-driven attacks. They explore the potential battle between good AI and bad AI, with the rise of deep fake scams and the automation of malware campaigns.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Join the candid conversation between Joseph Carson and cybersecurity advisor Klaus Agnoletti on living and working with ADHD. Klaus shares his personal story of being diagnosed later in life and the strategies he uses to succeed, including adapting his work style and environment to match his needs. This thought-provoking discussion emphasizes the importance of embracing neurodiversity in the workplace and the benefits of bringing your whole self to your career.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations and emerging AI considerations are having an impact. Don't miss this engaging dialogue to learn how the next generation of builders and breakers can take the lead and collaborate for better security.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Steven Ursillo, Partner in the Risk & Accounting Advisory Services Practice and Leader of the Cybersecurity Group at Cherry Bekaert, joins Joe Carson to talk about meeting the challenges of costly, time-consuming compliance requirements. They discuss the nuances of cybersecurity frameworks like NIST CSF and ISO 27001, industry regulations like PCI, HIPAA, and SOX, and the differences between SOC1 and SOC2 examinations. Steven shares recommendations for scoping compliance programs and preparing for audits without breaking the bank or burning out your team. He offers advice on navigating the complexity of compliance based on your risk tolerance and strategies for using technology to make evidence collection and report building more efficient. Looking to the future, Steven and Joe dive into evolving compliance requirements for third-party risk and emerging concerns like Artificial Intelligence. If you’re preparing for an audit or looking to improve your compliance program, you’ll want to tune in.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Jason Haddix, CISO and Hacker in Charge at BuddoBot, joins Joe to discuss his journey from hacking to penetration testing and ultimately taking on cybersecurity leadership roles. You’ll see how starting as an offensive practitioner provides valuable exposure, and hones your abilities to report and present results and provide defensive and remediation advice. They share tips for leadership, including prioritization, communicating the business impact of security, and developing a strategy to align with business goals. Whether you're just starting out in cybersecurity or looking to advance your career, you’ll learn practical guidance you can put into action right away.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Dive into the fascinating world of hacking. Sick.Codes gives you a glimpse into hacker culture, including the importance of collaboration and knowledge sharing. You’ll also learn how hackers identifying vulnerabilities impacts the growing “right-to-repair” legislative movement that seeks to make it easier and cheaper for consumers to fix products by requiring manufacturers to share information. This episode is packed with advice on tools and strategies for IT and security pros looking to uncover vulnerabilities, reverse engineer threats, and try their hand at ethical hacking. Will you heed the call to get involved with the hacker community?
More from Sick.Codes:
Website: https://t.co/KWPQPyNuYa
Github: https://github.com/sickcodes
X: https://twitter.com/sickcodes
LinkedIn: https://linkedin.com/in/sickcodes/
Mastodon: https://sick.social
YouTube: https://youtube.com/c/sickcodes
HackerOne: https://hackerone.com/sickcodes
BugCrowd: https://bugcrowd.com/sickcodes
Docker Hub: https://hub.docker.com/r/sickcodes
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Cybersecurity experts Joe Carson and Dara Gibson discuss the importance of viewing cybersecurity as a cross-functional problem rather than solely an IT issue. Boards are now requiring organizations to have cyber insurance in place, making it crucial for businesses to be prepared for these conversations. For those who are new to the topic or need a refresher, listen in to get Dara's recommendations on making sure your cyber insurance is protecting you and Joe's recommendations for having an offline response plan in case of an attack.
ABOUT DARA GIBSON
Dara Gibson is the Senior Manager for Cyber Insurability Services at Optiv, the cyber advisory and solutions leader. By blending innovative technologies, unique skill sets, and proven cyber strategies, she has created lasting partnerships with clients to protect shareholder value and corporate reputations. As a nationally recognized information security leader, she is responsible for designing cybersecurity awareness programs to foster expertise in relationship management with industry leading cyber insurance and legal providers for proactive and reactive cybersecurity capabilities. Prior to joining Optiv, Dara was an Alliance Manager having expertise in business development and marketing operations for cyber law firms and cyber insurance companies with specific attention to MSSP Services, Pre-Breach Consultation Services, Digital Forensics and Incident Response (DFIR) Services, and Post-Breach Consultation Services.
Dara on LinkedIn: https://www.linkedin.com/in/dara-gibson/
Twitter: DaraIsagenix
Optiv on LinkedIn: https://www.linkedin.com/company/optiv-inc/
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea
Hear how hackers target everything from airplanes to talking dolls. Pen testing expert Ken Munro discusses ways to close security gaps and protect embedded systems and connected devices.
Connect with Ken Munro:
Ken Munro on LinkedIn
Twitter: @TheKenMunroShow
Connect with Delinea:
This week Joe Carson is joined by Merike Kaeo as they discuss the dynamic role of the CISO within an organization. They dive deeper into the role and how it interacts with different areas of the business, and what specific assets need protection and within what frameworks. An episode not to be missed!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow us on Social!
In this episode we join host Joe Carson as he discusses state cybersecurity with Tonu Tammer of the Estonian National Cybersecurity Center. Tonu goes into the day-to-day operations of defending a country and its citizens from adversaries, as well as ransomware and DDOS attacks. Come along for an in-depth discussion with a cyber defender with years of experience in this exciting new episode!
Below are links referenced in the episode:
Reporting a cyber incident | RIA
Studies, analyses, overviews | RIA
Jump-start your cybersecurity career for FREE with Cybrary!
Follow us on Social!
From the first editing cuts to the design of the cover, join Joe Carson in speaking with expert book publisher Bill Pollock, as they break down the details on book editing. The journey from writing a first draft to publication can be wrought with challenges, but Bill walks through the process to bringing a cybersecurity book successfully to your audience.
Jump-start your cybersecurity career for FREE with Cybrary!
Follow us on Social!
Key Takeaways from the Verizon DBIR with Tony Goulding
Join host Joseph Carson and guest Tony Goulding as they break down the annual Verizon breach report. With over 16,000 incidents and more than 5,200 data breaches, there’s a lot to look at. Tony and Joe have some great takeaways from this critical annual report and share their expert insights on what’s new, what’s changed, and what we’re not doing so bad at (hint: MFA goes a long way!)
Jump-start your cybersecurity career for FREE with Cybrary!
Follow us on Social!
RSAC was the place to be for cybersecurity in 2023, and Joe Carson is joined by Bob Burns to talk all about it. From the sessions that really resonated to the incredible human connections and networking, join Joe and Bob to deconstruct this year’s most comprehensive conference. Were you at RSAC this year? Join us in the comments to let us know your favorite session!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow us on Social!
Everybody’s talking about it - the AI revolution is here. But given the rapid evolution in this field, it’s hard to keep up with the sweeping effects this technology is causing. Luckily, Joe Carson is joined by longtime AI expert Diana Kelley to shed light on all of these changes. She addresses the many misconceptions and media misrepresentations surrounding AI, breaks down the different forms of this technology, and emphasizes the need for a better understanding of AI's capabilities and limitations. They also discuss the ethical and legal implications that will only become more potent as AI continues to advance. Now is the best time to learn about AI, and this episode is a great place to start!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Diana!
~RSA
Follow us on Social!
In this eye-opening episode, dive into the captivating world of cybercrime and social engineering with our host, Joe Carson, and special guest Bryan Seely! Bryan, a keynote speaker and cybersecurity expert best known for his Secret Service exposé, discusses his journey from a young computer enthusiast to a renowned public speaker. Join them as they investigate the mindset and techniques used by hackers, such as the use of aliases to deceive and manipulate their targets, as well as the importance of responsible disclosure and changing cybersecurity laws.
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Bryan!
Follow us on Social!
Given the complex and evolving nature of security, how do different countries approach cyber strategy on a global scale? In this episode of 401 Access Denied, Joe Carson is joined by the one and only Thaddeus E. Grugq (“The Grugq”), who brings along decades of security research and operational security experience. They explore various countries' approaches to cyber operations, including the US, UK and EU, India, Russia, and China. The Grugq also touches on the importance of legal frameworks, cooperation between different government entities, and the dynamic relationships between intelligence groups and law enforcement agencies.
Jump-start your cybersecurity career for FREE with Cybrary!
Follow The Grugq!
Follow us on Social!
On paper, the board of a company should serve to protect the security of their business. But what functions are actually involved in that process? In this episode of 401 Access Denied, Joe Carson is joined by Delinea’s own CEO, Art Gilliland. Hear straight from the source what exactly goes into leading a company from the security practitioner’s perspective. This inside scoop will demystify what goes on in corporate board rooms, and the big decisions that trickle down through the rest of the company. Tune in to learn more from this unique vantage point!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Art!
Follow us on Social!
Did you know that May 4th is World Password Day? To celebrate, we invited top hacker Dustin Heywood (aka Evil Mog) to the 401 Access Denied Podcast to discuss the state of passwords! He and Joe Carson take a close look at where passwords currently stand in our rapidly evolving cyber climate, as well as what the future holds. Together, they answer the increasingly asked question, “Are passwords really dead?” Tune in to find out!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Evil Mog!
Follow us on Social!
Over the years, we’ve all seen a lot of the same cybersecurity-centric messaging. But realistically, how many of these talking points are still potent and relevant? Luckily, Joe Carson is joined by CISO and security consultant Dan Card to help answer that question! This humorous yet informative discussion takes a critical look at established “truths” in security to see if they still hold up. Tune in to learn about the communication disconnect between security practitioners and the average person.
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Dan!
Follow us on Social!
Does your business have the infrastructure, tools, and people to stay ahead of cyber attacks? In this episode of 401 Access Denied, Joe Carson is joined by the one and only cyber unicorn - Bryson Bort! When it comes to building a company with the necessary foundation to maximize security, Bryson has you covered. As the founder of organizations including SCYTHE and GRIMM Cyber, he comes with a wealth of knowledge on how to protect your business from the ground up with stronger purple teaming. Join the fun in this exciting conversation!
Jump-start your cybersecurity career for FREE with Cybrary!
Follow Bryson!
Follow us on Social!
How can programmers prevent breaches and bolster security from the root of their code? Joe Carson is joined by Mackenzie Jackson, a developer advocate for GitGuardian, who are leaders in helping keep secrets and credentials out of source code. Mackenzie explains the primary ways attackers are able to exploit these secrets, and how developers can defend against their attacks. These lessons are vital for overall security in all sectors, so don’t miss out on this episode!
Follow Mackenzie!
Follow us on Social!
Jump-start your cybersecurity career for FREE with Cybrary!
Through the first three episodes of our podcast mini-series with Patero, we’ve learned all about the opportunities and risks involved with quantum computing. In this fourth and final installment, Ron Lewis wraps up the discussion by answering the big question - what now? With a lot of uncertainty over our future with quantum, Ron takes a methodical and logical approach as to how we can best prepare ourselves for the inevitable shift that this technology will bring.
Discover Patero!
Learn more about the quantum threat!
See the research from NIST:
~NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Follow us on Social!!
Jump-start your cybersecurity career today with Cybrary!
As technology advances, how can governments and organizations keep up in order to maintain, secure, and legitimize elections? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with security engineer Christian Folini to discuss how diversifying tech is democratizing elections. Gain insight into the rise and impact of online voting, including the recent Estonian Prime Minister election where the predominant voting method was over the internet. You won’t want to miss this pertinent conversation!
Follow Christian!
Follow us on Social!
Jump-start your cybersecurity career for FREE with Cybrary!
The fields of technology and cybersecurity can be intimidating to jump into, especially for women and minorities. That didn’t stop Mari Galloway from carving out her own path full of successes. As the founder and CEO of Women’s Society of Cyberjutsu, Mari’s story is inspiring and a great example of how to overcome the odds in this domain.
Follow Mari!
Follow the Women's Society of Cyberjutsu!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
How have businesses adapted to the ever-evolving field of cybersecurity over the years? Join Joe Carson as he catches up with long-time friend Brian Honan for an entertaining and informative conversation. Brian’s decades of experience in IT, cybersecurity, consulting, and executive leadership offers a unique perspective full of wisdom and anecdotes. Newcomers and cyber experts alike won’t want to miss this engaging discussion!
Follow Brian!
Follow us on Social!
Jump-start your cybersecurity career for FREE at Cybrary!
In the third episode of our fascinating podcast miniseries on quantum computing, we are joined again by Ron Lewis, VP of Customer Success and Innovation at Patero, for an in-depth discussion on the intersection of quantum and cybersecurity! Ron applies everything we've learned about quantum thus far to recent breaches and security news. How can quantum technology bolster your defense-in-depth strategy, help mitigate cyber threats, and protect the integrity of your network? Tune in to start utilizing quantum to revolutionize your organization's security solutions!
Discover Patero!
Learn more about the quantum threat!
See the research from NIST:
~NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Have you ever wondered how cybersecurity policy gets created, updated, and enforced? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with Jen Ellis, founder of NextJenSecurity and board member of several major cybersecurity institutions including the UK Government, to discuss the ins and outs of cyber policy. Learn how entities, including governments, corporations, and individuals, interact with and are impacted by these policies. Jen is a leader in this space, so tune in and gain a lot of insight on this important topic!
Follow Jen!
Follow us on Social!
Jump-start your cybersecurity career for FREE at Cybrary!
In this episode of the Cybrary Podcast, we dive into the mission, vision, and future of Blacks in Cybersecurity (BIC) and how they're making waves in the industry. From the challenges they've faced to the opportunities they see, Michaela Barnett, CEO, and Arthur Pryor, Director of Operations, share their expertise and insights to help you navigate the cyber landscape. Plus, get the inside scoop on what to look out for and what advice to follow for anyone looking to break into the field by 2023. Tune in now for an electrifying episode you won't want to miss!
Discover Blacks in Cybersecurity!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
How can you establish a better security culture for your business and life? In this episode of the 401 Access Denied Podcast, Joe Carson sits down with “Serial CISO” (Motorola, AstraZeneca) and Security Analyst Paul Simmonds, CEO of the Global Identity Foundation, to discuss why Zero-Trust has only intensified at the height of an ever-evolving digital age. You won’t want to miss Paul’s philosophy on securing your identity and assets against any given entity, risk, or persona!
Follow Paul!!
Check out the Global Identity Foundation!
~https://www.globalidentityfoundation.org/
Check out these blogs from the Global Identity Foundation!
Follow us on Social!
Jump-start your cybersecurity career for FREE at Cybrary!
In part 2 of our Quantum-focused series, the Cybrary Podcast welcomes back Ron Lewis, VP of Customer Success and Innovation at Patero. We've explored how quantum computing impacts cybersecurity professionals as both a threat to encryption and as a machine learning tool. In this episode, Ron shares his deep wealth of knowledge on the "Q's of Quantum" and the history of the field of study around Quantum Random Number Generation (QRNG).
Discover Patero!
Learn more about the quantum threat!
See the research from NIST:
~NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Who knew that casual livestream ethical hacking could lead to a full-time content creation career? The one-and-only Ben Sadeghipour aka NahamSec takes us down memory lane from the time he studied computer science and digital marketing in college to the moment he saw a promising future in bug bounty hunting. Get into the livestream hacker's mindset in this fun conversation about mentorship and community building in the cybersecurity space!
Follow NahamSec!
Consider Donating to the The Leukemia & Lymphoma Society® (LLS)
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
What were the biggest cybersecurity trends of 2022, and which types of threats do experts predict we should prepare for in 2023? Dan Lohrmann, Field CISO with Presidio, returns to the 401 Access Denied Podcast to provide a consolidated perspective on all the trends from an eventful year. From the war in Ukraine to the rise in cyber mercenary attacks, hacktivism, cloud hacks, and deepfakes, we're welcoming 2023 with a careful review of all the most memorable topics!
Read Dan's article on "The Top 23 Security Predictions for 2023"
~The Top 23 Security Predictions for 2023 Part 1
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Could an AI chatbot like ChatGPT help you co-author the next great cyberpunk novel? Or craft a phishing email and generate sock puppets - for ethical hacking research, of course! Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity. Keep the conversation going as we explore how AI tools can impact productivity, learning, skill shortages, and more.
Check out the podcast on Youtube to watch Will, Matt, and Marc demo ChatGPT.
Explore ChatGPT in Cybrary's FREE challenge activity!
Read all about the potential impact of A.I. chatbots on the cybersecurity world!
Learn more about OpenAI on their website!
See How OpenAI became an AWS Certified Cloud Practitioner!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Cloud services have made it easier for users to stay connected and access resources from anywhere. But how can we reduce the security risks resulting from on-premises-to-cloud infrastructure migration? Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!
Follow Carlos! (and join his Discord community!)
Check out Carlos' latest book on cloud hack tricks
Learn more about Carlos's priviledge escalation tool
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Cybersecurity needs dynamic minds to keep up with ever-evolving threats. How can managers foster an inclusive workforce that celebrates diversity of thought? Scott Gibson, Chief Strategy Officer at Melwood, discusses how a "double empathetic" approach can help security leaders improve sourcing best practices and meet their employees where they're at. Hear more about the steps that neurodivergent people can take to build their career-ready skills and succeed in cybersecurity.
Learn more about Melwood and the abilIT program!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Ethical hackers are motivated to make society safer, but how can they ensure that they are following the law? This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency. In the first episode of our Quantum and Cyber podcast series with Patero, you'll learn all about how to differentiate Shor's algorithm from Grover's, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.
Discover Patero!
Learn more about the quantum threat!
See the research from NIST:
~NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
The art of hacking is often synonymous with high-profile cybercrime. But how can the cybersecurity and penetration testing community help more crafty hackers go from breaking bad to breaking good? Phil Wylie, author of "The Pentester Blueprint," joins Joe Carson and Chloé Messdaghi to discuss innovative ways of fostering a safe, supportive, and rewarding culture among ethical hackers. We explore how effective mentorship, gamified bug bounty challenges, and free training opportunities can positively impact cybersecurity job recruitment and satisfaction.
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Some threat actor groups pursue state-sponsored espionage, and others conduct financially-motivated cyberattacks. APT41, also known as Double Dragon, happens to do both! Our adversary emulator and self-described Chief Thief, Matt Mullins, teams up with defensive security freelancer, Chris Daywalt, to discuss their latest threat actor campaign emulating APT41. Get caught up in the cat-and-mouse game between red and blue teamers in this conversation on reducing risk, enhancing alerts, and exploring realistic simulations!
Start the Double Trouble with Double Dragon Threat Actor Campaign to detect TTPs leveraged by real-world threat actor group, APT41!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
When threat actors target enterprise security environments, they often seek to compromise the accounts with the most privileged access. How can organizations minimize security risks in a world where remote account access is growing? George Eapen, Group Chief Information Officer at Petrofac, discusses important strategies for reducing risk and increasing resilience in the face of threats like ransomware attacks. Learn more about how layered security controls, privileged access management, and employee training can foster a positive organizational security culture.
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Interested in switching your career to cybersecurity, but don't know where to start? Need to brush up on your cyber basics? In this episode of the Cybrary Podcast, we are joined by our very own course managers Sara Faradji and Jenn Barnabee. Jenn goes into detail on the making of her new Entry-Level Cybersecurity Training (ELCT) course that is intended for absolute beginners with no prior knowledge of the industry! Get the inside scoop on how you can gain the foundational knowledge to take the next step towards your cybersecurity career or goals.
Check out Jenn's Entry-Level Cybersecurity Training course at Cybrary!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Feeling fatigued from all the fear and uncertainty surrounding cybersecurity news? Take a breather in this engaging podcast conversation with Ian Murphy, founder of CyberOff and affectionately known as "The Monty Python of Cyber"! Join in the fun as Ian breaks down the complexities of cybersecurity to focus on the value of human impact, bravery, and connectedness in this dynamic field.
Check out CyberOff!
Connect with Ian!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
Have you ever thought about pursuing a cybersecurity career, but you don't imagine yourself as a "tech person"? Tennisha Martin, founder and Executive Director of Black Girls Hack, discusses strategies for both front and backdoor entrances into the dynamic world of cybersecurity. Learn how to take advantage of networking, resume review, and hands-on training opportunities so that you can see yourself in cyber!
Join Black Girls Hack!
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
With the state of cybersecurity in constant flux, how can security teams better prepare both their organizations and society for the challenges ahead? Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world.
Follow us on Social!!
Jump-start your cybersecurity career for FREE at Cybrary!
A skill shortage is pervading the cybersecurity industry. But what is the root cause of the problem, and how can employers fill more job roles? Dave Kennedy, CEO and founder of TrustedSec, and Chloé Messdaghi, Chief Impact Officer at Cybrary, discuss hiring and training best practices in the security world. Learn how you can break into the cybersecurity field from any educational or technical background!
Follow Dave Kennedy!
Follow us on Social!!
Jump-start your cybersecurity career today at Cybrary!
With ransomware, supply-chain attacks, and other organized cybercrime incidents on the rise, what can we do to better protect society? Philipp Amann, Head of Strategy at the European Cybercrime Centre (EC3), invites us to his world of cyber law enforcement and analysis. Learn more about the evolution of cyberattacks and cybercriminal investigations. Hear how you can join government agencies in the fight against new and pervasive threats.
Follow Philipp!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
When it comes to vulnerability disclosure, there can be a lot of unknowns. What is the first step in safely reporting? How can global bug bounty hunters better understand the specialized legalese in disclosure policies? Casey Ellis, founder and CTO of Bugcrowd and Co-founder of Disclose.io, addresses the importance of standardizing vulnerability disclosure policy language. Join in the de-villainization of ethical hackers with Casey and the Cybrary team at Black Hat!
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
At the onset of the 2022 war in Ukraine, how did the wiper malware attacks deployed by Russia impact civilians? To what extent does cyberwarfare coincide with information warfare in the context of the Russo-Ukrainian War? In part 2 of our conversation with Chris Kubecka, CEO of HypaSec, we discuss the importance of open-source intelligence and community support amidst global conflict.
Connect with Chris Kubecka!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
How did Tracy Z. Maleeff (aka InfoSecSherpa) pivot from a library science job into a cybersecurity research career? What first steps can other liberal arts majors take on their potential path toward the information security field? Find your niche in the security world with Tracy's tips on leveraging diverse skill sets to help solve complex security problems.
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
With the Great Resignation looming, what can security leaders do to empower their teams? How does effective training help shatter glass ceilings? Lance James, CEO of Unit 221B, shares his methodology for boosting team confidence and capability.
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
A distressing escape from a nation at the outbreak of war. A race to the border filled with sharp turns, sleepless nights, and evasion from mercenary groups. This is the true story of cyberwarfare expert Chris Kubecka's exodus from Ukraine in early 2022. Follow Chris down the winding Ukrainian backroads in part 1 of her perilous story.
Connect with Chris Kubecka!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Cybrary has been hard at work building a custom lab experience designed to prepare your security teams to succeed. Get the inside scoop on Cybrary's SOC Analyst Assessment from Senior Product Manager Ned Hinman. Learn how you evaluate your team's skill development with a high-fidelity, immersive assessment.
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
With thousands of new vulnerabilities discovered each year, how can security teams prioritize which ones to mitigate? John Hammond, acclaimed content creator and Senior Security Researcher at Huntress, explains key factors determining a vulnerability's potential impact. Join John behind the scenes at the RSA conference as he discusses threat actor mindsets, community engagement, and the ethics of hacking.
Connect with John!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
What is your ideal password management experience? Pamela Dingle, Director of Identity Standards at Microsoft, chats with us during the 2022 RSA conference about forward-thinking identity management strategies from the perspectives of consumers, businesses, and government entities. Hear Pamela's take on how authentication, standardization, and decentralization efforts are changing the way that we think about digital identity.
Connect with Pamela!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
With companies migrating to cloud environments amidst a continued influx of remote and hybrid workspaces, it's essential to keep your data secure. Nick Lumsden, co-founder and CTO of Tenacity Cloud, helps organizations to improve their foundational AWS cloud security. In a world where you can quickly make software changes, how can you maintain asset visibility and ensure compliance? Listen to Nick's insights on cost-effective cloud security management best practices.
Connect with Nick!
Check out Tenacity Cloud
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
When the next zero-day vulnerability hits, how can your security team prepare to detect and respond to the latest threats? In what ways can your organization reduce risk in a dynamic threat landscape? Our Cybrary Threat Intelligence Group (CTIG) is here to jumpstart the conversation on grounding your security training and decision-making on actionable research. Hear our CTIG experts, Ryan English and Matt Mullins, discuss the latest intel on the Follina vulnerability (CVE-2022-30190), the ZuoRAT report from Black Lotus Labs, and evolving tactics from initial access brokers like Prophet Spider.
Take Matt’s training course on the Follina vulnerability: ~https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/
Enroll in our Spinning a Web Shell for Initial Access course to detect behaviors of real-world initial access brokers: ~https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/
Check out the report on ZuoRat from the Cybray Threat Intelligence Group (CTIG): ~https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
As our threat landscape evolves and remote work opportunities continue to grow in popularity, it's important that security leaders enhance their future-proofing strategies. How can organizations cultivate human-centered approaches to prioritizing risks and developing proactive incident response plans? Robert Burns, Chief Security Officer of the Thales Cloud Protection and Licensing division, sits down with the 401 Access Denied team to discuss these strategies and other key takeaways from the June 2022 BSIDES and RSA conferences.
Connect with Bob!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Security conference season is back in full swing, and Cybrary is here to bring you all the highlights! Our Senior Product Manager, Ned Hinman, shares key takeaways from the Infosecurity Europe Conference in June of 2022. Hear what security leaders organizations like ISC2 are saying about strategies for bridging skills gaps, attracting new talent, and approaching cybersecurity as a psychological challenge.
Read the Psychology of Intelligence Analysis
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Living in the Information Age means that we have a wide world of knowledge and networks at our fingertips, but where do we find that balance between enlightenment and exhaustion? If you're weary from doomscrolling and tired of putting bandaids on burnout, you'll want to hear what Chloé Messdaghi has to say about maintaining sanity in the security industry. Join Chloé as she kicks off her latest gig as the co-host of the 401 Access Denied podcast, where she will share insights on prioritizing mental health support and positive leadership in cybersecurity.
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
As cybersecurity teams become more advanced, adversaries get craftier. That's why Cybrary's blue teamer Owen Dubiel and red teamer Matt Mullins joined forces to develop purple team training campaigns based on real-world threats. Their latest campaign explores how threat actors like FIN10 extort organizations by threatening to expose their stolen data publicly. Hear all about how Owen and Matt created training exercises to help you improve your situational awareness and detection strategies.
Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.
Enroll now in our new Exfiltration and Extortion Campaign!
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year's report. Get the experts' advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.
Read all about it in Verizon's 2022 Data Breach Investigations Report!
Follow us on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
Acclaimed cybersecurity power player Chloé Messdaghi is making big moves in her new role as Cybrary's Head of Impact. In this episode of the Cybrary podcast, she discusses commonsense approaches to minimizing bias and cultivating inclusivity in the security industry. How can organizations mitigate not only dynamic cyber risks, but also the revolving door of employee turnover? What can effective leaders do to prioritize the value of security teams and invest in their continued growth? Listen to Chloé's advice on developing a human-centered perspective in security management and workplace culture.
Follow Cybrary on Social!
Jump-start your cybersecurity career with Cybrary!
Jump-start your cybersecurity career for FREE with Cybrary!
Where can organizations find specialized candidates for millions of unfilled security jobs? How can the right approach to training help increase employee retention and close the notorious cybersecurity skills gap? Kevin Hanes, CEO of Cybrary, shares why investing in people is a vital part of reducing risk. Learn how you can effectively prioritize diversity in the hiring process and support the growth of people who value the continuous educational journey that is cybersecurity.
Follow us on Social!
Jump-start your cybersecurity career for FREE with Cybrary!
How can purple teaming benefit your organization? When red teamers like Matt Mullins collaborate with blue teamers like Owen Dubiel, you know you'll get a thorough and cost-effective assessment of your security environment. Listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their new Cybrary course campaign where you'll learn real-world adversary techniques before enhancing detections.
Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries!
Follow Cybrary on Social!!
Jump-start your cybersecurity career for FREE with Cybrary!
How does the hacker of all trades, Fredrik Alexandersson (aka STÖK), take the time to learn new things, design sustainable fashion, and connect with a growing social media community? Hear how you can satisfy your curiosity with the ultimate work-life balance. Follow STÖK down the bug bounty career path that influenced his cybersecurity career journey and inspired his creative pursuits.
Follow STÖK on all platforms!
Follow us on Social!
Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity work experiences informed their Ransomware for Financial Gain course series modeled after FIN7's techniques. Follow each part of their attack scenario that lets you emulate adversaries before enhancing your detections to reduce your risk of being the next ransomware victim.
Why choose between the red and blue teams when you can do both?
Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries!
Follow Cybrary on Social!!
Just in time for World Password Day, this podcast episode is all about password cracking and the solutions to securing your secrets. Four-time DEF CON Black Badge winner and Chief Architect of IBM X-Force, Dustin Heywood, shares essential tips for easy password management. And if you're into ethical hacking, listen to Dustin's advice on which tools, hardware baselines, technique variations, and intellectual abilities will give you the advantage you need to start cracking.
Follow Dustin on Social!
Follow us on Social!!
Ready to get hands-on with Cybrary's ten bite-sized OWASP Top 10 courses? Legendary instructor and penetration tester, Clint Kehr, shares what you can expect in his scenario-based training courses that prepare you to exploit real-world web application vulnerabilities. Hear what's new in the 2021 OWASP Top Ten List, including category revisions, position ranking adjustments, and a whole lot of freshly-mapped CWEs. Plus, learn how Clint and the CyDefe team worked to bring you custom lab exercises that challenge you to think like a pen tester.
Enroll in all of Clint's phenomenal OWASP Top 10: 2021 courses!
~A01:2021 - Broken Access Control
~A02:2021 - Cryptographic Failures
~A05:2021 - Security Misconfiguration
~A06:2021 - Vulnerable and Outdated Components
~A07:2021 - Identification and Authentication Failures
~A08:2021 - Software and Data Integrity Failures
~A09:2021 - Security Logging and Monitoring Failures
~A10:2021 - Server-Side Request Forgery (SSRF)
Follow Cybrary on Social!!
In a world where cybersecurity is no longer just an IT issue, it is more important than ever to assess the human, technical, and physical security aspects of any organization. Bringing responsible awareness to this triad, FC (aka Freaky Clown) and his team at Cygenta are reimagining the role of penetration testing in fostering sustainable cyber resilience. Hear the tricks that FC has learned on the job while (ethically!) robbing banks to identify physical security weaknesses, enhancing the comprehensive value of pen tests, and developing cybersecurity training exercises for people of all ages.
Learn more about FC's company!
Follow us on Social!!
The Okta security breach has gained considerable attention since the company's public disclosure of the attack on March 22nd, 2022. As debates continue on the timeliness and effectiveness of the organization's response, we at Cybrary want to elevate the discourse on how to foster smart, sustainable, and empathetic approaches to cybersecurity risk management. On this episode of the Cybrary Podcast, listen to the thoughtful advice of Cybrary's CEO, Kevin Hanes, and Senior Director of Content, Will Carlson, as they discuss how all organizational stakeholders can align on incident response strategies.
Follow Cybrary on Social!!
In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.
Check out Carlos' book: https://book.hacktricks.xyz/
Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop
Join Carlos' Discord community: https://discord.gg/hRep4RUj7f
Follow Carlos on Twitter: https://twitter.com/carlospolopm
Connect with Delinea:
As cybersecurity teams seek to enhance their defenses in the wake of worldwide ransomware attacks and the spread of wiper malware in Ukraine, what predictions can we make about the evolution of global information wars? Acclaimed security leader and Field CISO at Presidio, Dan Lohrmann, discusses emerging trends in cyber insurance, cyber incident reporting, and incident response planning. Learn more about the potential impact of the Shields Up advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Amidst growing risk and uncertainty, hear Dan's advice on how you can develop best practices for training and preparing your security team.
Connect with Dan!
Check out Dan's Book:
~Cyber Mayday and the Day After
Read Dan's Blog Post on Cyber Insurance:
~Where Next for Government in the Cyber Insurance Market?
Read More on Cybersecurity and the Invasion of Ukraine:
~What the Newly Signed US Cyber-Incident Law Means for Security
~‘For the first time in history anyone can join a war’: Volunteers join Russia-Ukraine cyber fight
Follow us on Social!!
During unprecedented times when cyber and kinetic military actions coalesce, what can we learn about the evolving nature of warfare? Mike McLellan and Rafe Pilling join us from the Counter Threat Unit at Secureworks to discuss the latest cyberattacks in Ukraine. What is distinctive about these emergent types of wiper malware, and how can we better discern the objectives of threat actors? Get advice from the security research experts about how your organization can enhance defenses and incident response planning in the face of new threats.
Read more about this subject in our blog post:
~Cyberwarfare: Evolution and Impact on the Russia-Ukraine Conflict
Check out Cybrary Now!!!
Follow Cybrary on Social!!
In just the first half of 2021, the financial industry saw a 1,318% in ransomware attacks. How can knowledge of ransomware gangs' encryption strategies help employees at every level of an organization to develop stronger incident response plans? Paula Januszkiewicz, acclaimed security leader, pen tester, and CQURE CEO, offers practical guidance on inclusive approaches to security awareness training. As the threat landscape evolves alongside new technological innovations, questions emerge about how we need to rethink password protection, privilege access, and at-home security. Enjoy this thought-provoking conversation about the value of curiosity and teamwork in forward-thinking security strategy development.
Connect with Paula!
Follow us on Social!!
Come on over to the dark side with Matt Mullins, the red teamer and penetration tester who is here to help you think like an adversary. Cybrary Course Manager Jenn Barnabee talks with Matt about his Cybrary courses that teach you how to exploit and mitigate the latest critical vulnerabilities, including Log4j, HiveNightmare, and more. Considering a path forward in offensive security? Then you'll love hearing about how Matt's career aspirations evolved from Buddhism studies to the "Help Desk Farm" to penetration testing. From zen to ZAP, he has a lot to share about taking risks and learning new tools!
Enroll now in Matt's Cybrary courses!
~CVE Series: Log4j (CVE-2021-44228)
~CVE Series: HiveNightmare (CVE-2021-36934)
~CVE Series: InstallerFileTakeOver (CVE-2021-41379)
~CVE Series: MSHTML Vulnerability (CVE-2021-40444)
~Cybrary's MITRE ATT&CK TTP Course: SSH Authorized Keys
Check out Cybrary Now!!!
Follow Cybrary on Social!!
How can we improve the security of life-saving medical, communications, and transportation devices? What hands-on skills do we need in order to design more trustworthy hardware? In this episode of 401 Access Denied, InfoSec veterans Beau Woods and Paulino Calderon discuss key tips from their informative book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things." If you enjoy working with your hands and breaking things, then you'll want to hear Beau and Paulino's tips for how to kick off a dynamic, fulfilling career in IoT security. Learn more about why accessibility and collaboration are essential to improving the way that humans interact with, trust, and benefit from technological devices.
Check out Beau and Paulino's book!
Connect with Beau and Paulino on social media
Join the IoT Village Discord server
~#practical-iot-hacking Channel
Follow us on Social!!
Ready to defend your organization against the widespread PolicyKit vulnerability that experts are comparing to the Log4j flaw? In this episode of the Cybrary Podcast, Raymond Evans, CEO of CyDefe Labs, discusses his latest Cybrary course on Polkit CVE-2021-4034. By exploiting this flaw, just how easy is it to gain root access on a target system? What can we learn from this vulnerability about the value of penetration testers and open-source software? Find out in this podcast and in Ray's course!
Enroll now in Ray's newest course!
~CVE Series: Polkit (CVE-2021-4034)
Learn more about Cybrary's partnership with CyDefe:
~https://www.cybrary.it/catalog/vendor/cydefe/
Follow CyDefe Labs on Social Media!
Check out Cybrary Now!!!
Follow Cybrary on Social!!
Whether you’re new to cybersecurity or a longtime security professional, one of your best opportunities to network is at conferences. In this fun-filled episode of 401 Access Denied, seasoned conference-goers, Joe Carson and HillBilly Hit Squad’s vCISO (aka “Chief Geek”), Chris Roberts, share their insights on how to make the most of networking events. What clothes should you pack? How can you best plan your daily schedule so that you maximize productivity and have time to socialize? And, most importantly, where in the world can you find the best whiskey? Cheers to a new year filled with engaging, informative cybersecurity events!
Connect with Chris on social media!
Follow us on Social!!
The next revolution in quantum computing and technologies is happening now, but how exactly will these growing innovations affect our lives? Dr. Maksym Sich, CEO of the groundbreaking quantum photonics startup, Aegiq, discusses how quantum will impact our medical, communications, and financial industries. Addressing the myth that quantum computing will break all our encryption keys, Maksym elaborates on quantum communications, post-quantum cryptography, and efforts to develop sustainable solutions with security by design. Be ahead of the curve in knowing how we will want to upgrade our systems to improve efficiency, data privacy, and more!
Learn more about Maksym's startup, Aegiq:
For more information on Quantum Computing:
~Quantum Technologies - Blackett Review
~Quantum Comms Hub, "What does QKD mean for the Economy?"
~Report from the QED-C, "Guide to a Quantum Safe Organization"
~Downloadable Report from the QED-C
Check out Cybrary Now!!!
Follow Cybrary on Social!!
Everyone is talking about malware these days, but what new developments and trends are we seeing in malware attacks? This week’s featured guest is Shyam Sundar Ramaswami—Senior Research Scientist at Cisco by day, and the Batman of Hacking by night. So how does cybersecurity’s Bruce Wayne propose that we strengthen our incident response plans against emerging malware threats? What’s really happening when we click that inconspicuous link in the “Delivery Address Confirmation Needed” email? Find out the answers to these questions from the ethical hacker hero who’s here to help you save the world from cyberattacks!
Read Shyam's Book!
~"It's Your Digital Life" - https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041
Check out Shyam’s TED Talks
~Can a Couch Potato Save the Digital World? | Shyam Sundar Ramaswami | TEDxIIITBangalore - https://youtu.be/VEDF8bQPOeY
~Cyber Security - The Responsibility | Shyam Sundar Ramaswami | TEDxBITSathy - https://youtu.be/D4wJMjDhUBw
Follow Shyam on social media!
Follow us on Social!!
How did Cybrary instructor Corey Holzer go from being the IT help desk person for the World Wrestling Federation to becoming a PhD-holding Information Security Manager? In this episode of the Cybrary podcast, please enjoy Corey’s fascinating stories of nearly colliding with the Undertaker, losing his internet connection during the CRISC exam, and developing essential problem-solving skills as a cybersecurity professional. Get a behind-the-scenes look at Corey’s newest course, Linux Hardening—out now on the Cybrary platform!
Connect with Corey:
Check out Cybrary Now!!!
Follow Cybrary on Social!!
The 2007 cyberattacks on Estonia culminated into a watershed moment in global cybersecurity awareness. Jaak Tarien, Director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, discusses the geopolitical concerns of cybercrime. Ransomware attacks can have a significant economic impact, but how are cybercrime operations also indicative of a breach of sovereignty? To best approach this question, Jaak emphasizes the importance of the CCDCOE's legal scholarship, such as the Tallinn Manual, among other efforts that foster transparent multinational cybersecurity communications, research, and training.
Check out the following resources for more information on the CCDCOE:
~Official CCDCOE Website: https://ccdcoe.org/
~Tallinn Manual: https://ccdcoe.org/research/tallinn-manual/
~Locked Shields 2021: https://youtu.be/oHmVjwKi1P8
Follow Joe on Twitter!
Follow us on Social!!
2021 has been quite a year for all of us, but what have we accomplished and learned in the cybersecurity field? We have certainly had to adjust to a global remote work culture and step up our security strategies to take on new challenges involving more specialized cybercrime. Art Gilliland, CEO of ThycoticCentrify, joins our host, Joseph Carson, to reflect on key lessons learned and predictions for 2022. Will Zero Trust become a security norm like Defense in Depth? How could governments get more involved in cryptocurrency regulation efforts? Enjoy this engaging discussion before we kick off the new year!
Connect with Art!
Follow Joe on Twitter!
Follow us on Social!!
Welcome back to the Cybrary Podcast, and happy holidays! Whether you are celebrating with family and friends, or simply enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.
As 2021 comes to a close and we look back at all we accomplished this year, despite the circumstances, we raise a glass to you and cheers for making it this far.
Thank you for joining us each week to learn something new and continuing to share this journey with us. With your constant support each week, we were able to acheive more than ever before, and the podcast continues to grow in ways we never expected! We can’t help but feel excited for what new opportunities will present themselves in 2022. So, mark you calendars, and stick with us for brand new episodes of the Cybrary Podcast, starting January 19th!
If you or someone you know would like to be a guest on the Cybrary Podcast or 401 Access Denied, email us at [email protected]. On behalf of Cybrary, thanks for another great year - and we will see you in 2022!
Check out Cybrary Now!!!
Follow Cybrary on Social!!
Could online gaming be the key to bridging the cybersecurity skills gap? Is enumeration more than a scanner's sport? Ian Austin, Head of Content Innovation at Hack The Box, tackles these questions as he explains why cybersecurity training should be less about checking the boxes and more about thinking outside the box. Hear Ian's thoughts on the global reach of gamified security education and the significance of "purple-minded" cybersecurity initiatives that bring red and blue teams together.
Connect with Ian Austin!
Follow Joe on Twitter!
Follow us on Social!!
Ready to make a career transition from the military to IT? How can veterans effectively communicate transferrable skills that stand out in the competitive cybersecurity industry? Cybrary Insider Pro Community Manager, Tim Ramirez, shares how he started a new career path after serving 12 years in the U.S. Air Force. Learn about how he began a 3-year IT master's program with no IT experience, managed his expectations on the job market, and finally passed the CISSP exam.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Connect with Tim!
Check out Cybrary Now!!!
Follow Cybrary on Social!!
When it comes to incident response, “Your plan is worthless, but your planning is priceless.” These wise words from JC Vega, CISO at Devo, highlight the critical difference between having an incident response plan and being incident response ready. In this episode of the 401 podcast, JC explains how unpredictable, engaging simulations can be a game-changer in building an organization’s resilience against critical cyberattacks like ransomware. Find out how your simulation-based training can effectively help your entire organization to build trust and get actively involved in cybersecurity preparedness.
Connect with JC!
Follow Joe on Twitter!
Follow us on Social!!
What does it take to be a cyber threat intelligence analyst? How can cyber threat intelligence or CTI training be applied in real-world strategic defense planning and risk management assessment? Cybrary Course Manager Jennifer Barnabee returns to the Cybrary Podcast with two guests from MITRE to discuss the value of CTI teams and their research. Jackie Lasky, Senior Cybersecurity Engineer, and Amy Robertson, Cyber Operations Lead, break down the ways that cyber threat intelligence is used to produce actionable defensive recommendations to any organization. Learn more about why it’s more important than ever for CTI teams to have diverse contributors with both technical and non-technical skillsets.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Cybrary on Social!!
If the security industry is booming, what does this mean for the state of cybersecurity and for humanity at large? Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products. Follow Quentyn's advice to make your organization not only more cyber-aware, but also resilient.
Connect with Quentyn!
Follow Joe on Twitter!
Follow us on Social!!
How can you build smarter cyber defense strategies that reduce your organization's risk against the threats you care about most? Let the subject-matter experts at MITRE teach you how to disrupt the adversary by employing a threat-informed defense approach. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Enroll now in our FREE MITRE ATT&CK Defender courses!
~MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training
~MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
~MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Cybersecurity is a growing, expansive industry that transcends the fields of technology and even security. How can organizations leverage the critical work of data scientists not only for machine learning automation, but also for diversifying threat detection strategies? In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence, machine learning, and deep learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.
Connect with Jon and Kevin on Linkedin!
Follow Joe on Twitter
Follow us on Social!!
Think you've got what it takes to replicate the real-world cyber attacks of threat actors like FIN7? Learn how ethical hackers are putting their skills to the test in MITRE ATT&CK TTP-based adversary emulations. In this episode of the Cybrary Podcast, Cybrary Course Manager Jennifer Barnabee chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you're managing a red team or just getting into ethical hacking, you'll want to hear this discussion about the value of emulating adversaries and simulating malware. Stay tuned for Michael's upcoming MITRE adversary threat emulation course--only on Cybrary!
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Dave on Social Media!
Follow Joe on Twitter
Follow us on Social!!
You've got the technicals skills, but how do you explain them to someone? Knowing how to communicate about technology to different audiences is a crucial part of cybersecurity career development. Listen to Chief Cybrary Mentor, Mark Nibert, share his advice on how to tackle your public speaking fears, know when that email should be a meeting, and ask the right questions as you expand your network.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Connect with Mark!
Mark's Reading List
~"The Ghost in the Wires" by Kevin Mitnick and William L. Simon
~"Talk Like TED" by Carmine Gallo
~"Executive Presence" by Sylvia Ann Hewlett
Follow Thor on Twitter!
Follow Cybrary on Social!!
X-Force Red Hacker Dustin Heywood aka EvilMog joins us during the first week of Cybersecurity Awareness Month to share how to be cyber smart with your passwords. He shares critical steps for protecting passwords and some insight into his world of password hacking.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Dustin on Social Media!
Follow Joe on Twitter
Follow us on Social!!
How do you get a cybersecurity job without experience, and how do you gain experience without a job? Our new Cybrary instructor, IT security manager Nick Marentic, delves into this classic chicken-and-egg problem as he shares insightful career advice. Learn how you can break into cybersecurity from any field, as well as hear what it's like to work in an IT management role.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Connect with Nick!
Follow Thor on Twitter!
Follow Cybrary on Social!!
How do we accurately measure and minimize cybersecurity risks? How does cyber insurance fit into the risk management process? Joseph Carson, Chief Security Scientist at Thycotic, discusses these questions and more with members of the Resilience cyber insurance company, including Ann Irvine, Chief Data Scientist, and Kevin McGowan, VP of Cyber Underwriting. Learn about how insurance companies like Resilience work with organizations to find the best solutions to offset critical risks.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
When your instructor is the legendary Kelly Handerhan, you know you're going to pass the CISSP exam and actually enjoy studying for it. As humans become more technical, Kelly humanizes the technical world so that you can better relate to the subject matter.
In this episode of the Cybrary Podcast, Kelly shares what's new in the updated CISSP exam and offers tips for how you can prepare. Hear more of her timeless stories in her new and improved CISSP course on the Cybrary platform!
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Cybrary on Social!!
If you've ever closed your garage door or checked your home security camera with a mobile app, then you've relied on a technical communication network of virtual Information Technology and physical Operational Technology devices. This synthesis of IT and OT provides convenient ways for you to secure your home, but your assets are at risk when malicious actors exploit those networks. In this episode of 401 Access Denied, listen to host Joseph Carson, Chief Security Scientist at Thycotic, talk with cybersecurity executives, Jon Ramsey and Juan Espinosa, about the significance of OT risk management and mitigation. Learn how security managers can work with designers, vendors, and compliance officers to prioritize investment in OT security.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Meet our newest Cybrary instructor, Owen Dubiel! Interested in a cybersecurity career, but don't know what to expect? In this episode of the Cybrary podcast, Owen shares what he wishes every intern knew about life in the defensive security space. Using his expertise as an Information Security Engineer, Owen is eager to design Cybrary courses that give entry-level security workers a competitive edge. Learn how he balances his time as an engineer, analyst, and content creator. Plus, hear what a cybersecurity expert really thinks about the accuracy of Mr. Robot and "IT guy" tropes.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Connect with Owen!
Follow Thor on Twitter!
Follow us on Social!!
401 Access Denied Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller
In this episode of 401 Access Denied, we're joined by Dragos VP of Services and R&D, Ben Miller to discuss how securing critical infrastructure has changed over the past 10 years, including the convergence of OT and IT, the increase in ransomware attacks, and the need for critical visibility into industrial control systems (ICS).
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Ben and Dragos on Twitter
Follow Joe on Twitter
Follow us on Social!!
Ever wondered what it was really like to be a hacker? Is there more to Dark Web policing than meets the eye? Ethical hacker and Cybrary instructor Clint Kehr tells the story of his law enforcement career transition from the streets to the web. Gain insights from the conversation on "failing up," networking, and mentoring in the cybersecurity industry.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Check out Clint's Course on Cybrary
Connect with Clint
Follow Thor on Twitter!
Follow us on Social!!
In this episode, Joseph Carson and Jonathan Meyers discuss the 2021 Verizon Data Breach Investigations Report and its findings. We cover how the threat landscape has changed in the past year and why there's been an increase in the number of cyberattacks. Hear what the experts say you can do to balance security and productivity. Plus, the top-cited causes of data breaches.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
~https://twitter.com/joe_carson
Follow us on Social!!
How did Meg West go from a political science degree to an incident response manager career in 3 years? Listen to her story of perseverance and her advice for any of you who want to jump into the dynamic cybersecurity field. We debunk the biggest myths about security work, uncover what it’s really like to be a “woman in tech,” and discuss her growing virality on YouTube as “Cybersecurity Meg.”
Follow Cybersec Meg on Social!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode, Joe Vest joins the 401 Access Denied team to discuss red teaming and pen testing operations and fundamentals. Joe is the author of the original SANS SEC 564 Red Teaming and Threat Emulation course, former technical lead for a DoD red team, and co-author of Red Team Development & Operations. Joe walks us through how to build and run a professional red team, along with the common pitfalls and obstacles most organizations face.
Check out Joe's book here: https://redteam.guide/
Follow Joe Vest on Twitter: @joevest
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode, Cybrary's Mike Gruen and Jonathan Meyers sit down with Travis Good and Ryan Rich, co-founders of Haekka, a Security Awareness training company that lives directly in Slack. Travis and Ryan discuss their history in security and ways to keep security training up-to-date with the ever-changing digital landscape.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of Metasploit: The Penetration Testers Guide joins the 401 team to talk about penetration testing. We uncover invaluable lessons from a master in the industry.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcasts, Cybrary's Jonathan Meyers, along with Michael Weigand and Josh Lospinoso from Shift5, are joined by Dr. TJ O'Connor to discuss their shared experience of army cyber defense exercises. Dr. OConnor also touches on his journey in cybersecurity education and explains his current role as the Cybersecurity Program Chair at Florida Tech, which includes participating in FITSEC defensive and offensive competitions.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Recent events confirm that the US’s critical infrastructure and supply chain are very vulnerable to ransomware attacks. What more can and should be done to keep them safe from ransomware? As NATO and the White House announce steps to crack down on bad actors, will it move the needle at all? Dan Lohrmann, CSO of Security Mentor, and formerly of State of Michigan and the NSA, joins the 401 team to discuss.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
As the first season of Go For It comes to an end, Sarah shares her experience with overcoming mental obstacles such as depression and finding hope amidst an uncertain time. Sarah explains the importance of "thinking everything is rigged in your favor" when your faith is being tested by a difficult, and sometimes abusive, working environment.
On this episode of the Cybrary Podcast, Jann Yogman continues the conversation on Mimecast's Security Awareness Training. Jann shares his journey as one of the writers for the training show, including his experience in brainstorm sessions and favorite moments on the set. If the last Cybrary Podcast left you curious about the production process, this podcast episode is for you!
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
There are a lot of myths about what pen testing or red-teaming really are. DJ Fuller, CEO of Pathfynder joins us today to share what companies should expect when they engage a third-party to help them with cyber security and how to establish a good incident response program. Get the low down on the common mistakes that organizations make when hiring a third-party service or choosing to move forward internally.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of Go For it, Jonathan Alboum joins Sarah to discuss his journey in security, ranging from his former CIO of USDA position to his current work in the government as the Federal CTO of Service Now. Sarah and Jonathan talk about the importance of leaping into new opportunities and ways on handling career transitions.
In this episode of the Cybrary Podcast Drew Freed, the face behind Mimecast's iconic Human Error character, discusses being approached at his bartending gig for the role as well as his journey within the security education space. Get to know Drew's acting experience, hobbies, favorite movies, and his most memorable moments on the Mimecast set. Want to know how Human Error got his iconic costume? Ever wondered what it's like to get tackled by the Melbourne Rebels rugby team? We discuss it all on the Cybrary Podcast.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
After the four zero-day vulnerabilities were discovered, the FBI also proactively removed backdoors on numerous private Exchange servers. Was that overreach or the right thing to do? On today's episode, we're joined by Josh Lospinoso, CEO and co-founder of Shift5 and former U.S. Army cyber officer, to discuss law enforcement in cyber security.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast, Mike Gruen, the CISO at Cybrary, sits down with Bella Trenkova, the Founder of Ardigent Consulting, which offers Agile and DevSecOps services and coaching. Mike and Bella discuss the importance of and the common misconceptions about DevSecOps. They do a deep dive into the nuances of investing in DevSecOps for any company as well as transitioning into a DevSecOps team.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of 401 Access Denied, we are joined by Ondrej Krehel, CEO and Founder of LIFARS, to discuss Digital Forensics, Incident Response, Ransomware Mitigation, and Cyber Resiliency. Do you know your risks and how to respond if targeted by hackers? We discuss how to be resilient on both a personal and organizational level.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
On this week's episode, Sarah sits down with Kerry Wekelo, the COO of Actualize Consulting, to discuss the power of gratitude for career development. Using her personal work experience and leadership development expertise, Kerry shares her techniques on nourishing gratitude on a daily basis in order to grow your professional mindset.
In this week’s episode of The Cybrary Podcast we are speaking with Nick Moy, renowned Cybrary Instructor and VP of Security Engineering for a mortgage firm. Nick discusses how he began his cyber journey and the courses he teaches on Cybrary.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Nick on Twitter and YouTube
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
It’s the special anniversary edition of the 401 Access Denied podcast! In honor of our 1-year anniversary and more than 16,000 listens, Joe and Mike want to take you behind the scenes and introduce you to everyone who works on the podcast and brings it to you biweekly. Listeners, thank you for hanging out with us for 1 magical year. We want to hear your thoughts here. What topics or guest stars matter to you?
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
What gives you energy? We’re not talking about “what motivates you”, we’re diving into what gives you the energy to work, live, and experience life with intent. If you could have 3x the amount of energy as you do now, what would you do with it? Today’s episode explores the virtuous cycle of energy and how to set yourself up for success every day.
Welcome to episode 59 of the Cybrary Podcast. This week’s guest, Cindy Chan-Leonor, Co-founder of CyberDEI, joins us from California to discuss imposter syndrome, her journey into cybersecurity, and why finding a community to connect with is vital to your success.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Mike and Joe dig into the topic of cyber insurance with the folks from Resilience Insurance – Kevin McGowan, VP of Cyber Underwriting and Michael Phillips, Head of Claims. As cyber laws are changing and cyber criminals are continually getting better and more creative in their approach, cybercrimes are becoming more commonplace. We discuss what you need to know when selecting cyber insurance for your organization to help minimize disruption and ease the aftermath of a cyber incident.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
On this week’s episode, Sarah welcomes Sharon Chi to uncover how to “avoid mental constipation” and react with purpose. Do you find yourself always going, but never pausing to take a breath to hear your own thoughts and reflect on your life, goals, and intentions? How do find the energy and motivation to grow and keep moving forward? Get ready to listen and think about your driving force and how to be intentional in thought and action.
If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at [email protected].
On this episode, we welcome Mike Behrmann, Director of Security at Blumira to talk with Cybrary’s Director of Content, Will Carlson, about Workforce Development. Continuous professional development is an expectation at many growing companies today, but is it being made a priority? As Will and Mike discuss the moving target known as Cybersecurity, they delve into resume and job interview expectations, how to set goals that align with your cybersecurity journey, and the importance of cross training while finding your specialization.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Special guest Ted Harrington joins Joe and Mike today to discuss application security – how to be more secure, what AppSec myths to reconsider, and how to change mentalities at your organization. Ted is Executive Partner at Independent Security Evaluators and author of Hackable: How To Do Application Security Right.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Do you ever wonder how some people get ahead so fast? Well, you can’t reach the next level with the same level of thinking as now. When you’re surrounded by sameness, how do you grow? In this episode of Go For It, Sarah dives into being intentional and thoughtful, and ways to create an environment optimized for the growth of you and those around you.
If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at [email protected].
It’s Episode 57 of the Cybrary Podcast and we welcome Tina Kuhn, President of Cybercore Technologies, to talk about supply chains.
With attacks as recent as SolarWinds and future attacks that will inevitably occur, Mike and Tina discuss everything from counterfeit equipment and hardware tampering, to the state of critical infrastructure and how to evaluate products for optimal security.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In your cyber security journey, you’ve probably heard of a massive number of cyber security tools, many of them free. It can be tricky to figure out where to start and which tool is worth your time. In this podcast, Joe and Mike discuss the free cyber security tools in their arsenal and the significant value they’ve provided over the years.
Did we miss your favorite free tool? Write to Joe and Mike here.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Welcome back to Go For It with Sarah Moffat. Joining us for episode 2, is Charity Carney, VP of Security and Compliance at InVita Healthcare Technologies. Throughout her career, Charity had many less than positive experiences, but she shares her journey of finding what motivated her to go for it and leave a toxic work environment for her dream job. We hope her story can inspire you to GO FOR IT and find your driving force to courageously achieve your goals.
If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at [email protected].
On this episode of the Cybrary Podcast, we welcome back Base Operations, introducing Scott Money, the VP of Engineering. Everyone knows Google, but Mike, Jonathan, and Scott throwback to the days of Lycos, before PHP, server side scripting, cookies, and SSL. What launched Google into becoming the leading name in search engines around the world, and what advancements were pivotal in the success and failures of companies since the 1990’s? Scott dives into the role Base Operations plays in data gathering, and how people and companies today can benefit from and are impacted by the wealth of information on the internet.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Ransomware attacks have exploded in frequency and severity in recent months. Joe and Mike are joined by guest Dan Lohrmann, currently Chief Strategist & CSO at Security Mentor, and formerly of the NSA, Lockheed Martin, and CISO for State of Michigan. Discussion revolves around concrete steps we can all take today to reduce attacks, minimize damage, and decide if cyber insurance is really worth it.
Resources:
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Welcome to the first episode of Go For It with Sarah Moffat, and happy International Women’s Day! We’re exited to introduce Sarah, the President and Founder of LeadingLadies.co, as she shares her story and inspiration to go for it, every day. From her part-time work through high school and college, to the experiences that taught her how to run operations for large businesses, Sarah shares how she discovered her Ah-Ha moment and how people can find theirs.
If you have a topic you’d like Sarah to discuss, email us at [email protected]
Calling all engineers! This week on the Cybrary Podcast, we welcome Zachary Ozer from ClubHouse. From one VP of Engineering to another, Mike and Zach talk all things development, product planning, and how to help junior and senior engineers be more effective and enjoy their jobs. Zach also offers key insights into how people at ClubHouse further their initiatives and how to parse through and implement customer feedback into product development.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Casey Ellis, Founder & CTO of Bugcrowd and Katie Moussouris, Founder & CEO of Luta Security discuss vulnerability disclosure programs with Mike and Joe today. Developing a disclosure program can be so complex that many organizations don’t create one at all. So we asked - what processes should companies put in place to be sure they provide vulnerability information safely and in a usable way? Our guests today share the best practice steps that companies should take to prepare.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Joining the Cybrary Podcast this week is Jeff Capone, CEO & Co-founder of SecureCircle. In this episode, Jeff, Mike and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
“Protecting data wherever it lives” is at the forefront of the long debated question: Is your data secure? The apps you use, the websites you visit, the Zoom calls you're on - there is so much personal and business information availble, but who makes the decisions about data handling and security? Jonathan and Mike welcome Patrick Walsh, CEO of IronCore Labs, to discuss transparent data encryption, data access and privacy, security in-depth, and how companies today are facing these challenges.
View more episodes about encryption:
Ep. 24 | Encrption & Backdoors part 1 -https://youtu.be/5t4ZBQ9bGfg
Ep. 25 | Encrption & Backdoors part 2 - https://youtu.be/T0csMZBdNsM Learn more about IronCore Labs here: https://ironcorelabs.com
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Have you wondered what’s involved in venture capital fund raising? In this episode of the Cybrary Podcast, we welcome Les Craig, Co-founder of RedOwl Analytics and current Partner at Next Frontier Capital. From their years of experience in Cybersecurity, Les, Mike, and Jonathan talk about the successes and pitfalls of starting businesses, what founders should understand about venture capital firms when seeking funding, and the importance of building connections and forming trusted relationships.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Joe and Mike talk to Jessica Barker, Co-CEO of Cygenta and author of Confident Cyber Security and the recently released Cybersecurity ABC’s. Jessica breaks down the psychology behind cyber criminals and why we frequently blame the employees on the front lines of attacks. Plus, why companies need to stop telling employees to be constantly alert. Get a copy of Confident Cyber Security here: https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
This week on the Cybrary Podcast, we welcome Caleb Woods. Caleb is the CEO of Rolemodel Software, a company specializing in building internal tools for their customers. Speaking with Mike Gruen and Thomas Horlacher from Cybrary, Caleb discusses the work his company is doing as well as their Craftsmanship Academy, a way for those new to the engineering space to apply their skills and learn on the job skills through hands on development training and real world projects.
You can learn more about the Craftsmanship Academy by going to their site https://www.craftsmanshipacademy.com/ They are accepting applications now through the end of February 2021.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
The 401 Access Denied team discusses the latest findings from the recent Sunburst supply chain attack that targeted thousands of SolarWinds customers – quite possibly the largest supply chain attack in history. We cover what’s been learned from the investigation so far and how we can apply those lessons to prevent being victims of future attacks. Joe and Mike are joined by Terence Jackson, CISO at Thycotic and Jonathan Meyers, Principal Infrastructure Engineer and Head of IT at Cybrary.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
It’s episode 50 of The Cybrary Podcast and we’re talking about Ransomeware! What is it, where does it come from, and how do you prevent an attack? Greg Edwards, CEO and Founder of CryptoStopper, goes in depth into his experiences in the MSP space and how ransomware attacks served as the catalyst to starting his own company. Plus, hear Mike and Jonathan’s views on Advanced Persistent Threats and the importance of patch management in the cloud and on prim.
Interested in detecting and stopping ransomware? Check out Greg's company, CryptoStopper to learn more: https://www.getcryptostopper.com/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
This week we welcome back Chloe Messdaghi, VP of Strategy at Point3 Security, to talk about Point3's new Talent Screening service which creates a more effective and efficient process for evaluating, hiring, and onboarding new employees. In this episode, Chloe shares her experiences in the InfoSec hiring process to reveal common stereotypes preventing applicants from reaching the interview stage, and how organizations can implement an unbiased system for pre-interview screening.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Do better builders make better breakers? Jonathan Meyers, Josh Lospinoso, and Philip Wylie share their views and experiences with the game changers in cybersecurity over the last 20 years, and how it’s helped and hindered people trying to enter the space. In this episode, they cover everything from rapid iteration and continuous learning, to the value of certifications and how to gain the right experience to move forward.
Check out Phil's new book, "The Pentester Blueprint: Starting your Career as an Ethical Hacker" to learn more about your potential as an ethical hacker.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In 2014 Jessikka Aro was a journalist reporting on the start of the Russo-Ukrainian War when she became aware of a group of Russian citizens who were being paid to promote pro-Russia propaganda. Jessikka joins us today to discuss the influence trolls had on public opinion, as well as how she outed them and became a victim of the trolls herself. And most importantly, we discuss how the Russian disinformation campaign is still working successfully in 2021 to control the narrative worldwide.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Joe Carson from Thycotic and Mike Gruen from Cybrary share how they stay up-to-date with security news through podcasts, blogs, and events. They plug their favorite experts who give honest and direct news, sometimes even with a touch of comedy.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Welcome back to the Cybrary Podcast, and Happy Holidays!
Whether you celebrate Christmas, Hanukkah, Kwanza, or just enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.
As 2020 comes to a close, and we look back at the best (and worst) moments of the year, we raise a glass to you and cheers for making it this far. Thank you, for joining us each week to learn something new and share this journey with us. We appreciate your support and look forward to 2021, so stick with us to find out what episodes we have coming in January!
If you or someone you know would like to be a guest on the Cybrary Podcast, email us at [email protected]
The Cybrary Podcast will return in January 2021 for episode 48, so follow or subscribe to the podcast on your favorite streaming service to be notified when future episodes are available!
Happy New Year Cybrarians. Cybrary Out.
Joining us today is the National Cyber Security Policy Director for the Estonian Government, Raul Rikk. Raul shares lessons in how Estonia excels in the digitalization of government services and cyber defense strategies. We’ll discuss the 2007 coordinated Russian cyber-attacks against Estonia - how Estonia not only recovered from an attempt to isolate them from the rest of the world, but went on to develop one of the best emergency cyber defense operations in the world.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Mike Skelton, part of BugCrowd's Security Operation Team, joins Cybrary's Mike Gruen to breakdown the expectation and communication gap. Recruiting the right talent is hard enough when factoring in skills and experience, but the top concern according to Skelton is the lack of proper communication and expectation setting. In this episode, Skelton and Gruen deconstruct their experiences on hiring for their teams and being hired, and the critical role communicating your needs plays in setting realistic expectations for companies and prospective applicants.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Rob Shavell, Co-Founder of Abine (https://abine.com/), joins the Cybrary Podcast this week to talk everything PRIVACY. From Abine's products Blur and DeleteMe that specialize in data masking, privacy, and compliance, Rob and Mike talk GDPR, Data usage transparency, the "freemium tradeoffs", internet bifurcation, and so much more. Where do you stand on the topic?
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Most parents are struggling with where to draw the line with their children when it comes to technology. It’s designed to be addictive, so how do you teach your kids to understand the risks, set boundaries, and enforce them? And how do you make sure they protect their passwords and identities? Joe and Mike share the conversations they’ve had with their own kids and the parental controls they’ve put in place.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Everyone likes their privacy, but no one likes dealing with overly-complex security measures. This week we welcome Josh Lospinoso, Co-Founder of Shift5, and Matthew Dunlop, CISO at Under Armour as they shed light on the top growing competitive differentiator among consumers that market giants, like Apple, use to their advantage. Plus, an insider's POV on Operational Technology Hacking.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Time for an intermission! We're taking this week off, but tune in next Wednesday for our next episode featuring Josh Lospinoso from Shift5 and Matthew Dunlop from Under Armour.
Today, Joe, Mike, and special guest Josh Lospinoso dig into buzzwords like Quantum Computing, Machine Learning and AI. Are they worth all the hype? Should humanity be concerned about the cyber security risks associated with them? Josh is the CEO and co-founder of Shift5, where experts protect OT platforms like planes, trains and tanks against cyber attack.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Security is the name of the game, and Jared Ablon, CEO of HackEDU, is working with his team to bridge the gap between security and engineering. Security is a different type of defect and the better developers are at catching those defects, the better your product, services, developers, and security will be. As Mike Gruen of Cybrary points out, security and operations in an assembly line isn't scalable for organizations that want to grow, but with DevSecOps, having people skilled in areas of security, operations, and development can streamline the process and resources to create an overall better solution.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
“Living in your purpose,” as Sarah Moffat says, is a key driver in meeting your goals and being satisfied with what you do. In this episode of the Cybrary Podcast, Sarah from LeadingLadies.co and Thomas Horlacher from Cybrary discuss everything from leadership roles, effective leadership strategy, how to build and lead high-performance teams, and how to do it all while being a woman in male-dominant industries.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
The word "cyber" is a vague and misunderstood term for many people. Cyndi Gula, Managing Director and Co-Founder at Gula Tech Adventures, explains why there's a critical disconnect in people's understanding of what cyber means and how it actively impacts them every day. In this episode of The Cybrary Podcast, Cyndi, Jonathan, and Thomas dig deeper into what cyber really means to the individual, how to make cybersecurity more personal and relatable, and how renaming "cybersecurity" to "data care" could have a positive impact on future generations.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
The 401 Access Denied crew from Cybrary and Thycotic are joined today by special guest Steve Jacobs, Systems Architect for a large-scale ecological science program. We discuss data integrity and information security - hot topics for a program that collects over 5 billion ecological sensor readings per day from 81 field sites across the US to provide data to climate change scientists.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
The Cloud is a popular topic across Cybersecurity and IT teams, but many companies still struggle with understanding the full power, implication and impact that moving to a multi-cloud or hybrid-cloud environment can have. As a pioneer in the Cloud Governance space, Cloudtamer.io Co-Founders Brian Price and Joseph Spurrier join the Cybrary Podcast to dive into best practices and common pitfalls of moving to a cloud provider or switching cloud vendors.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Today's guest, Karen Gibson, Retired US Army Intelligence Officer knows that "to be a digital warrior means a commitment to continual lifetime training." Throughout her 33 years of military service she learned that building trust and a culture centered around offensive and defensive measures is critical to bridging the gap between Military Ops and Civilian Cyber Defenses in an increasingly digital environment.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
We continue delving into the topic of OT Security with special guest Josh Lospinoso, CEO and co-founder of Shift5. Shift5 experts protect OT platforms like planes, trains and tanks against cyber-attack. As former US Army cyber officer, Lospinoso wrote dozens of infosec tools, and built and taught the C++ course that US Cyber Command uses to teach its junior developers. We are excited to welcome him to the 401 Access Denied podcast to dive further into OT Security surrounding transportation.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
Throughout the episode, Gerald, Mike, and Jonathan talk about scaling up services for SaaS products, the importance of doubling-down on security awareness and engagement with a completely remote workforce, and experiences working off hours around the world for 24/7 monitored work roles.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this Episode of the Cybrary Podcast, tech startup Xmode reveals their early hurdles and mistakes in understanding the hidden value and risks behind location data collection. Joined by Xmode CEO Josh Anton and Mary Souther, Head of Cybersecurity Sales, Cybrary's Mike Gruen and Jonathan Meyers go back to 2008 in their discussion about Blackberry, Bluetooth technology, and Apple conspiracies. It's all in the name of smart device evolution!
Plus, hear the backstory of Xmode (previously DrunkMode) and what the precipice was for them to pivot from a safety solution for college students, to being "a living map for your life."
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the 401 Access Denied Podcast, Thycotic and Cybrary welcome special guest Chris Kubecka, the Founder and CEO of HypaSec, to talk about OT Security: what is it, why is it important, and what are the risks? Kubecka will share stories from her exploits in international cyber warfare incident management and what devices in our homes fall short on security.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, they discuss why adding additional security costs more and why its not included.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
"There's not enough cyber talent." "If I train my employees, they'll leave for better jobs." "We need to find a unicorn - only candidates with 30 years of AWS experience should apply." This episode of the Cybrary Podcast is packed with long-debated and controversial topics, from skill gaps in organizations, to upskilling employees, and even misconceptions from management on who should be hired.
Cybrary's Chief Product Officer, Trevor Halstead, and CEO, Ryan Corey sit down with Naomi Buckwalter, Director of Information Security & Privacy at Energage and Ron Gula, President and Co-Founder at Gula Tech Adventures to bring into view mind-blowing stats from Cybrary's newest survey report. Some big hitters touched on by our panelists are diversity (or the lack of it) in cybersecurity, having a skills growth mindset, using cybersecurity as a business enabler, and in a current/post-pandemic world, the criticality of IT and it's role in cybersecurity.
There is so much to unpack in this episode, so jump into the discussion. Download Cybrary's 2020 Skill Gap Research Report here: https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
How do you get the job you want in an efficient way? Renee Small (Cybersecurity Recruiter), Will Carlson (Director of Content Ops at Cybrary), Jon Brickey (SVP of Cybersecurity at Mastercard), and Ryan Corey (CEO at Cybrary) talk about one of the most controversial topics in Cybersecurity - breaking into the cybersecurity industry.
In this episode of the Cybrary Podcast, our panelists discuss everything from assessing your skills to why it's near impossible to get hired in cybersecurity despite the millions of open jobs. As current recruiter and co-host of the Breaking into Cybersecurity Podcast, Renee offers a hiring manager and recruiter perspective to why skills are a critical element for professionals today. Plus, Jon Brickey and Will Carlson weigh in on the Skills Gap vs. Talent Gap debate - Are they the same thing, and are there really not enough qualified people to fill all the jobs needed?
From misconceptions and the continuous search for industry "unicorns", this episode uncovers the secrets to why people can't get past the interview process, and what organizations need to do to keep up with the evolution of technology today. Here's a hint, it's based on aptitude and potential..."You can't train someone to be more curious or passionate, but you can develop their technical and soft skills." With technology engrained in everything we do, playing catch up won't sustain this industry. Tune into the discussion and get a copy of data points mentioned throughout the podcast from Cybrary's 2020 Skill Gap Research Report: https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Who better to discuss our favorite hacker movies with than David Scott Lewis, inspiration for the iconic film “War Games.”
Hollywood has a knack for influencing public opinion, and 37 years later, the movie is still credited for shaping society’s impression of hackers. We’ll get the background of the real story behind the movie and discuss the other hacker movies we love to watch over and over.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast we sit down with Dr. Ambareen Siraj, the founder of WiCyS - a non profit whose purpose is to bring women together in cybersecurity. Speaking with Amanda and Angel from the Cybrary team, Dr. Siraj goes through her history in cybersecurity and how WiCyS has helped open the doors for other women to get involved and learn about cybersecurity.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, Josh discusses an article he wrote about how the military is a bad place for hackers and what could be done about it.
Here is a link to his original article: https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Special guest Dan Lohrmann from Security Mentor and former advisor to the White House and Homeland Security joins Thycotic and Cybrary to talk election security. We cover topics from voting registration, mail-in voting, to in-person voting and even the fake news Americans will be bombarded with from now until election day. How do we - and more importantly, should we - feel confident in our election security?
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast we sit down with Kyle Hanslovan and Chris Bisnett, the CEO, Chief Architect and Co-Founders of Huntress Labs. Speaking with Ryan Corey and Mike Gruen from Cybrary, Kyle and Chris explain the early issues they ran into when starting Huntress Labs and the Windows 95 problems they are still solving.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Joseph Carson & Mike Gruen cover all things password today. Are all passwords created equally? As you attempt to balance usability vs security, what should you focus on more? We’ll learn why your children are now a target for hackers and if we can really dream of a password-less society someday.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast we sit down with Alex Matheson, the Senior Program Manager for Code42, and Ken Underhill, Cybrary's Master Instructor. Alex and Ken discuss what it's like to be an online instructor and the difficulties that come along with it.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of The Cybrary Podcast we sit down with Richard Hummel, the Manager of Threat Research at Arbor Networks - the Security Division of NetScout. Speaking with Mike Gruen, the CISO of Cybrary, Richard talks about DDoS attacks in the gaming industry and how IoT devices should scare everyone.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Welcome to part 2 of our international cyber warfare episode with special guest Josh Lospinoso. We continue with the discussion of zero-day vulnerabilities - including when to keep, use, and responsibly disclose them. In this episode, we’ll get into the ethical and legal challenges that need to be considered in cyber war operations.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast we sit down with Katelyn Ilkani, the CoFounder, President and CRO for Battleship (formerly known as Scopedive). Speaking with Ryan Corey, the CEO of Cybrary, Katelyn explains the mission of Battleship and how it was started. For more information on Battleship you can check them out here: https://battleshipsecurity.com/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Cindy Jones, the SR Product Security Specialist at Thermo Fisher and the President of BSides Las Vegas. CIndy explains how she got started with BSides and how the conferences come together.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Tim Winkler, the Founder and CEO of Hatch IT. Speaking with MIke Gruen, the CISO, and Katie Wandtke, the Head of People from Cybrary, Tim explains the mission of Hatch IT and how they are changing the recruiting space.
For more information on Hatch IT, visit https://www.hatchit.io/
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Join Joseph Carson from Thycotic, Mike Gruen from Cybrary and special guest Josh Lospinoso, former Cyber Officer of the US Army for part 1 of our 2-part episode on international cyber war. What does it take to recognize cyber misconduct as an act of war? How do we even attribute transgressions to the right players as modern technologies make cyber operations harder to detect and defend against?
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the cybrary podcast we sit down with Will Markow, the Managing Director for Burning Glass Technologies. Speaking with Leif Jackson, the VP of Content and Community at Cybrary, they discuss "Cyberseek," a website looking to close the cybersecurity talent gap with interactive tools and data.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Joseph Carson from Delinea is joined today by Emma Heffernan, one of the most recognized new cybersec professionals in the industry. She'll share her experience as a recent graduate turned Pentester and speaker as she navigates her way through various industry roles. Also, you'll hear ideas for learning new skills and sharing your expertise with others to further your industry knowledge.
In this episode of the Cybrary Podcast we sit down with Liz Wharton, the Chief of Staff for Scythe. In our conversation Liz goes over the intricacies of running the world's busiest airport from a Cyber perspective as well as what it's like to be on the frontline of a citywide ransomware attack that took place in Atlanta in March 2018.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.
Least Privilege has become a pervasive term in cyber security these days. But what does Least Privilege actually mean? How has Zero Trust transformed into building trust and adaptive security that helps employees do their jobs efficiently and securely? Join Joseph Carson, Chief Security Scientist from Thycotic and author of “Least Privilege for Dummies,” along with Mike Gruen from Cybrary as they dive into the topic of Least Privilege and how it can transform an organization with more automation.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary, and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode, we will hear from Arif Basha the Managing Principle at IAS Consulting, Steven Adair the President of Volexity and Tara Swaminatha Partner at Zero Day Law.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they deep dive into Verizon’s 2020 Data Breach Investigations Report. We’ll share the good news of what the industry has been doing well this year and we’ll also share the not-so-good news. Ransomware, malware, credential stuffing, employee cyber education, and much more will be discussed. Plus, we’ll give a rundown of the measures you should have in place to protect your organization against these threats starting today.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a conversaton about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Chuck Bubeck, the Executive Director of the Maryland Innovation Center, Kevin Crain, the CISO of the University of Maryland Medical System and John Ward, the Director of Global Safety and Security for Marriott.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a discussion about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Rebecca Weaver, the Director of SOC Operations at Ironnet Cybersecurity, Xavier Salinas, the VP of Threat Operations at Blackpoint, and Ernie Pritchard, the Director of Information Security at HealthSouth.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Matt Dunlop, the CISO of Under Armour, Jim Meyer, the Managing Director for Coordinated Response, and COL Tanya Estes, Professor at The United States Military Academy at West Point.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
As many countries around the world are reopening and people are going back to work, countless new challenges arise for both the employer and employee.
• How do businesses ensure employee safety without invading their privacy around health issues?
• How do businesses ensure that devices that have been used outside of their network for several months are now safe, especially as shift work means employees could be going in and out of the network repeatedly?
• And as workers, what new privacy issues should we worry about as we go back to shared desks and community spaces?
• Plus, is my company really doing thermal scans?!
Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they discuss these problems, and more.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this special episode of the Cybrary Podcast we bring you our COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
As many of us are job searching or looking for a break from our evening Netflix routines, it’s a good time to share our top 8 cyber security books that will help you learn new skills and techniques whether you are trying to break into the industry or prepare for the next level of your career. Understand the history of the industry and hone your core skill set with books that can influence your career. Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they share their favorite books that stand the test of time.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast, we sit down with LaToya Staten from Connected2Tech. LaToya uses the Cybrary platform to help employers and job seekers in filling the roles that are available. LaToya also works with middle and high school age students to help them gain experience in the IT and Cyber field and showing them what roles are available and how they can attain them.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
With World Password Day upon us, individuals of all backgrounds and varying levels of cybersecurity hygiene will be confronted with the same question - are my current personal (or corporate) security measures enough? Today's episode will take listeners through a journey of best practices, horror stories, debunked myths, visions of a passwordless future, misconceptions, and just how challenging it really is to crack them.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter
Follow us on Social!!
In this episode of the Cybrary Podcast, we sit down with Solene, the marketing director of Knogin, Cami Ragano, the Senior Director of Enterprise Marketing, Amanda Davi, the Director of Business Development and Danyelle Wilson, the Customer Success Manager all from Cybrary. Together, they discuss the importance of inclusion and diversity in tech, touching on crucial topics like the importance of women having access to mentorship opportunities and how individuals can help promote diversity in the workplace.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin and Ryan Corey, the CEO of Cybrary. Ken and Ryan discuss the importance of having a security-conscious company culture and how that needs to be something that is thought of early on and possibly rewarding the employees who emulate these ideals.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Cathryn Paine, the Director of Talent Management and Organizational Development for Anzu Partners. Speaking with Katie Wandtke, Cybrary's Head of People, they discuss the difficulties that poor communication can lead to and how creating and maintaining thoughtful business connections can always benefit you.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin, Solene, the marketing director of Knogin, and Katie Wandtke, the Head of People for Cybrary. We discussed how to engage and retain highly sought after talent in the tech field. I really enjoyed this episode and learning about how other companies and people view different benefits and perks differently.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin. Speaking with Thomas Horlacher, the Head of Creative Services, and Mike Gruen, the VP of Engineering at Cybrary, we discuss the importance of having a sustainable and long term cybersecurity strategy for your company. We also touch on breaches and what that can do to the image of a company.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of The Cybrary Podcast we hear from Scott Gibson, the Senior Vice President of People and Programs at Melwood. Speaking with Ryan Corey, the CEO of Cybrary, Scott goes into the amazing work that Melwood is doing for people of differing abilities and highlights their AbilIT Program that they have partnered with Cybrary on.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of The Cybrary Podcast we hear from Joe Carson, the Chief Security Scientist for Thycotic . Speaking with Mike Gruen, Cybrary's VP of Engineering, they talk about WFH best practices and the unique issues that arise when your family is home as well.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Evan Dornbush, the CEO of Point3 Security. Speaking with Cybrary's VP of Engineering Mike Gruen and Head of Infrastructure Jonathan Meyers, Evan explains how Point3 is using gamification to help people learn through CTF's and other hands on activities.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Uday Kamath the Chief Analytics Officer at Digital Reasoning, Jimmy Whitaker the Director of Applied Research (Audio) at Digital Reasoning and John Liu, the CEO of Intelluron. Speaking with Leif Jackson, Cybrary's VP of Content and Community, they discuss their book Deep Learning for NLP and Speech Recognition, which includes case studies and implementation of machine learning that are beneficial to both researchers and engineers alike.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Coronavirus has impacted the industry and describes some of the best security practices for companies to follow.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Saudi Aramco Hacks took place and what effect it has had on their business.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Welcome to the Fourth episode of The Cybrary Battle Royale Podcast Series, led by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Daniel Clemons, Founder of Shadow Dragon, Jon Brickey the Cybersecurity Evangelist and Senior VP of Mastercard, and Ron Gula the President and Co-Founder of Gula Tech Adventures. Brian leads this All-Star live discussion recorded during an event at RSA about Investing and ROI on a conference floor, and how building relationships and niche connections are more important.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with David Meltzer the CTO of Tripwire, and Tim Erlin the Vice President of Product Management and Strategy at Tripwire. Speaking with myself Thomas Horlacher the Head of Creative Services at Cybrary, David and Tim give me their thoughts on the talent gap in the Cybersecurity industry.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Welcome to the Third episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Jeff DeFrancesca the Director of Cybersecurity Services at Sayers, Joey Johnson the CISO Premise Health, and Mike Finkel the CEO of Sparksoft. Brian leads this All-Star live discussion recorded during an event at RSA about how skipping the showroom floor has become normal along with the expense of showing at a con and the importance of making sure you actually set up the tools that you're purchasing.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Grant McCracken the Senior Director of Program and Security Operations at Bugcrowd along with Michael Skelton the Global Head of Security Operations and Researcher Enablement at Bugcrowd. Speaking with myself Thomas Horlacher, the Head of Creative Services at Cybrary, we discuss the current talent gap in the industry and whether there is more of an opportunity gap.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Davis Hake the Co-Founder and VP of Business Development for Arceo. Speaking with myself, Thomas Horlacher the Head of Creative Services for Cybrary, Davis gives me his thoughts on the current talent gap facing the cybersecurity industry.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast we sit down with Chloe the VP of of Strategy for Point3 Security at Point3's Women Unite Over CTF Event at RSA2020. Chloe explains how Point3 started the Women Unite Over CTF event as a way to be more inclusive within the cybersecurity community, and how the skill levels of the event range from beginner to more advanced.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
Welcome to the first episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Chuck Bubeck the Executive Director of the Maryland Innovation Center, Stephen Zalewski the Deputy CISO of Levi's, and Brian McMahon the CEO of Bandura Cyber. Brian leads this All Star live discussion recoded during an event at RSA about what excites them about the conference and what they wish they would have seen on the showroom floor.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Saul Costa the founder and CEO of Next Tech. Speaking with Leif Jackson the VP of Content and Community for Cybrary Saul talks about what Next Tech is up to and which programming language he thinks you should learn first.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In This episode of The Cybrary Podcast we are happy to welcome Cybrarys new Advisory Board. The members include Chris Kubecka the CEO of HypaSec, Chris Hodson the CISO of Tanium, Vishal Gupta the Global CTO and SVP of Unisys, and Ed Amoroso the CEO of Tag Cyber. It was hard to contain all this knowledge in one show but we are glad to have them on the Cybrary Team!
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Mike Weigand the founder and CEO of Shift5. Speaking with Cybrarys head of infrastructure Jonathan Meyers and Joe Perry, Mike explains the mission of Shift5 and how they are working to secure commercial equipment. Mike and Jonathan also discuss their time at the United States Military Academy Westpoint.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Jonathan, the Head of Infrastructure for Cybrary and Evan Dornbush the Co-Founder and CEO of Point3 Security as they discuss how Point3 Security is using a gamified learning solution to help people and enterprises.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Vishal Gupta the Global CTO and Senior Vice President of Unisys and Stephen Boughner a Partner at NISP Law. Joined by Cybrarys VP of Content and Community Leif Jackson, they discuss how AI and Machine Learning are affecting the cybersecurity space.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Sam from our Content and Community Team we speak about what he is looking to get out of RSA.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In This episode of the Cybrary Podcast we sit down with Cory Siskind the CEO of Base Operations with Ryan Corey the CEO of Cybrary and Mike Gruen the CISO of Cybrary. Cory talks about Base Operations and how the company is working to help secure your global workforce.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Gunner, and Scott from the Cybrary Sales Team and Danyelle from Customer Success we speak about what each of them is looking forward to this year at RSA. As well as what a successful RSA looks like to them.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Jim Kowatch the founder and President of infosec learning, a virtual lab platform that has focused on the EDU space. Joined by Cybrarys CEO Ryan Corey and Chief Product Officer Trevor Halstead Jim explains how infosec learning got started in the education sector and the changes they are helping to make.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Cami and Amanda from Cybrary's Marketing and BizDev team we speak about what goes into planning a conference and the events that our team will be attending while at RSA.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Ryan Corey the Co-Founder and CEO of Cybrary as he speaks with Joe Loomis the Founder and CEO of Cybersponse as they discuss the IRC (Incident Response Consortium).
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Jeff Man, currently working as a Senior Information Security Consultant Jeff needs no introduction to those within the hacking community. Speaking with Cybrarys Head of Infrastructure Jonathan Meyers, Jeff takes us from how he got his start in cybersecurity to contributing to the book Tribe of Hackers Cybersecurity advice from the best hackers in the world, on sale now.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Casey Ellis the Founder and CTO of Bugcrowd. Speaking with Cybrarys VP of Engineering Mike Gruen, Casey explains how Bugcrowd is a community for creating feedback loops between people who think differently and how the term responsible disclosure got its name.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with John Czupak the CEO of ThreatQuotient. Speaking with Cybrary CEO Ralph Sita and Myself Thomas Horlacher the Head of Creative Services, John discusses being at Sourcefire during the creation of the SNORT technology and how now at Threatquotient they are working to help with the issue of Alert Fatigue for security teams.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we sit down with Chris Kubecka the owner and CEO of HypaSec. Chris is an author of multiple books on computer science and penetration testing and has given countless talks across the globe on the subject. Speaking with Cybrarys VP of Content and Community Leif Jackson, they talk about her newest book Hack the world with OSINT.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
In this episode of the Cybrary Podcast, we are happy to welcome Ron Gula. Joined by Cybrarys own CEO Ryan Corey and President Ralph Sita. Ron Gula is the co-founder and former CEO of Tenable who now runs Gula Tech Adventures, an investment firm that focuses on cyber companies including Cybrary.
Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
Follow Thor on Twitter!
Follow Cybrary on Social!!
En liten tjänst av I'm With Friends. Finns även på engelska.