Security Masterminds public
[search 0]
Mai Mult
Download the App!
show episodes
 
Artwork
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Loading …
show series
 
Send us a text Send us a text This is the extra part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Dave's Reponses: Connect with Dave Lewis email: gattaca@1password.com Website: https://www.liquidmatrix.org Twitter / …
  continue reading
 
Send us a text Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experience, spa…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Enjoy! Connect with Jack Rhysider DarkNet Diaries: https://darknetdiaries.com/ X: https://x.com/JackRhysider Connect with us Website: securitymasterm…
  continue reading
 
Send us a text Want to strengthen your advocacy for privacy protection and cybersecurity awareness? Get ready to hear the solution that will help you achieve this result and empower you to make a difference. Let's dive into it! Jack Rhysider's cybersecurity journey is sparked by a deep concern for data privacy and a desire to advocate for its prote…
  continue reading
 
Send us a text The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/ Designing Secure Software Book: https://a.co/d/07h5nQna Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.com James McQuig…
  continue reading
 
Send us a text Do you want to gain a deeper understanding of how PKI, AI, and cryptography are shaping software development? Our special guest is Loren Kohnfelder Loren Kohnfelder's journey into the world of AI and cybersecurity began with an early exposure to mainframe programming at the age of twelve. His fascination with software development gre…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Lee for not only his insights into cybersecurity, but a little bit of his personal life too! Enjoy! Connect with Dr. Lee Mangold LinkedIn: https://www.linkedin.com/in/leemangold/ Connect with us Website: securitymasterminds.buzzsprout.com …
  continue reading
 
Send us a text If you're feeling overwhelmed and stressed out about keeping up with new cybersecurity technologies, then you are not alone! The constant flood of new technologies and emerging threats can make it feel like you're falling behind, leaving you feeling exhausted and frustrated. It's time to find a way to cut through the overwhelm and st…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Jessica for not only her insights into cybersecurity, but a little bit of her personal life too! Connect with Dr. Jessica Barker, PhD, MBE LinkedIn: https://www.linkedin.com/in/jessica-barker/ Twitter: https://twitter.com/drjessicabarker D…
  continue reading
 
Send us a text Uncover the Unexpected: Discover the Surprising Key to Enhanced Security Culture. Are you ready to discover the game-changing element that's transforming the cybersecurity industry? Get ready to challenge your perceptions and dive into the human side of cybersecurity with an unexpected twist that's reshaping the landscape. Are you cu…
  continue reading
 
Send us a text Rachel Tobac, the CEO of Social Proof Security, takes us on a remarkable journey into the realm of cybersecurity and social engineering. Her introduction to the world of hacking came at Defcon, where she was initially hesitant to participate in a social engineering competition. Despite her lack of experience, Rachel's determination a…
  continue reading
 
Send us a text Get ready to challenge your assumptions about security awareness as Julie Haney, head of Human Centered Cybersecurity at NIST, reveals the hidden struggles and attitudes of security professionals and non-experts. Just when you think you understand the root causes of cybersecurity challenges, a shocking twist leaves everything in doub…
  continue reading
 
Send us a text Feeling the frustration of constantly battling memory-related vulnerabilities in your code? What if I told you there's an unexpected twist in the story that could change everything? Join me as we explore the captivating journey of transitioning to memory-safe languages in programming, and uncover the game-changing solution that await…
  continue reading
 
Send us a text Have you ever heard these myths about supply chain security, product security, and getting hired in cybersecurity? Myth #1: Supply chain security is not important unless you're a large organization. Myth #2: Product security is solely the responsibility of the manufacturer. Myth #3: Getting hired in cybersecurity requires a technical…
  continue reading
 
Send us a text Discover the untold dangers of AI in cybersecurity as expert Clint Bodungen uncovers the dark side of generative AI. Is our reliance on technology putting us at risk? Find out in this eye-opening discussion that will leave you questioning the future of cybersecurity. "Technology, as much as we need it, enables complacency. The techno…
  continue reading
 
Send us a text Discover the critical role of a Business Security Officer in aligning security with business goals. But what happens when this vital bridge between security and the organization finds themselves facing unexpected challenges? Find out in this intriguing episode of the Security Masterminds podcast. Nicole Dove, a cybersecurity expert w…
  continue reading
 
Send us a text Protecting data in the age of cyber threats, cybersecurity expert Ian Garrett ignites a battle against ignorance, as he harnesses the power of AI and zero trust to defend organizations of all sizes from the lurking dangers of the digital world. Today's guest is Ian Garrett, the CEO and co-founder of Phalanx. With a background in comp…
  continue reading
 
Send us a text Check us out on our new LinkedIn Page! - https://www.linkedin.com/company/security-masterminds-podcast/ Does this sound familiar? You've invested in threat intelligence data and spent countless hours analyzing it, yet you still feel vulnerable to cyber threats. Maybe you were told that having the data alone would be enough to protect…
  continue reading
 
Send us a text Check us out on our new LinkedIn Page! - https://www.linkedin.com/company/security-masterminds-podcast/ Are you struggling to raise cybersecurity awareness despite following the same old advice? Discover the power of storytelling and engagement in transforming cybersecurity training and arming your workforce against message fatigue a…
  continue reading
 
Send us a text Check us out on our new LinkedIn Page! - https://www.linkedin.com/company/security-masterminds-podcast/ Are you tired of the same old ineffective methods for GRC optimization and AI integration for cybersecurity? Do you feel like no matter what you do, you can't seem to get the results you need? Come join us in this episode to learn …
  continue reading
 
Send us a text Check out our new LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/ Joanna Burkey's imparts her wisdom to help other professionals develop a successful cybersecurity program, emphasizing the importance of thought diversity and exposure to all aspects of the business. What other advice does she have to of…
  continue reading
 
Send us a text In this episode, Alex Panaretos bravely confronts the irony of trying to protect against what we don't know, challenging us to take an active role in building trust and security for organizations with a compassionate and humorous approach. "You have to humanize yourself above the rest of the corporate noise. What are you saying that …
  continue reading
 
Send us a text Loved this episode? Please leave us a review and rating on your favorite podcast platform! After leaving the CPA industry and becoming a computer trainer, Roger worked his way into the cybersecurity industry, Roger Grimes, a data-driven evangelist, is determined to protect organizations from malicious social engineering attacks, but …
  continue reading
 
Send us a text In cybersecurity, one way to protect the organization is similar to Sun Tzu's Art of War, and to know the enemy. One way to protect yourself in cybersecurity is to have a healthy work/life balance. "I think this is the best industry on the planet. I have always felt that I believe the opportunity for all people who want to work here …
  continue reading
 
Send us a text After 20 years in the same role at Canon, Quentyn Taylor knows a thing or two about what it takes to be a successful CISO; in this episode, he shares his insights on the importance of technical skills, business skills, and storytelling to make the role of CSO one You will learn the role of the CISO in communicating with the Board of …
  continue reading
 
Send us a text In this episode of Security Masterminds, Tanya Janca shares her insights on application security, OWASP, and her community, "We Hack Purple." "I would say software developers are more interested in security than they ever have been before they're being pushed that way, but I think a lot of them are just becoming interested in it." Ta…
  continue reading
 
Send us a text You know about Blockchain, but do you really about blockchain? Then this episode is for you! You will learn: 1. The potential for blockchain technology to create a more secure world. 2. The misconceptions about blockchain technology. 3. The auditing and validation process for blockchain technology. 4. The four foundations of blockcha…
  continue reading
 
Send us a text Everyday organizations are constantly managing risk and as cybersecurity professionals, there's a struggle to get the board to understand that risk. Our guest today shares his insights of his 5 pillars of security framework to increase the effectiveness of the risk conversation to the board and engaging them to reduce risk and secure…
  continue reading
 
Send us a text Episode Summary Jenny Radcliffe, a social engineer and known as the People Hacker, was recently inducted into the Infosecurity Europe Hall of Fame. Jenny is also an award winning podcast host and a conference speaker where she provides knowledge, expertise and insights on security, education and awareness to people around the world. …
  continue reading
 
Send us a text Episode Summary Technology is everywhere in society these days from our communication, shopping, and commerce capabilities. Whether email, online purchases, or using the blockchain, it amounts to large amounts of data being collected about people. All of this data, while easy to store, is also harder to manage and protect. As users, …
  continue reading
 
Send us a text With current events, there is a strong focus on the critical infrastructure sector that provide fuel, water and electricity to our homes and office buildings. In today's episode we hear from Spencer Wilcox, who is a cybersecurity leader at a large power utility working to ensure that power is always available and protected against cy…
  continue reading
 
Send us a Text Message. Storytelling is a powerful medium to help get messages across and one feature is the ability to deliver humor into the story. In today's episode we interview Jim Shields, an author, actor, director and now cybersecurity expert. Jim is the director of the popular KnowBe4 video series, The Inside Man. He discusses with our hos…
  continue reading
 
Send us a text In this week's episode, we speak with industry veteran and self-described recovering CISO Thom Langford. We discuss how Thom got into cybersecurity and became a CISO. Whether a CISO needs to be technical or not, and what differentiates a conventional CISO from a virtual CISO. Thom also explained the benefits of storytelling, the use …
  continue reading
 
Send us a text This months guest is KnowBe4's SVP Content Strategy & Evangelist for Africa and founder of Popcorn training, Anna Collard. In this episode, Anna shares what it means to be creative and how creativity can benefit cyber security - especially when it comes to delivering content. Being a female CEO and founder of a company can also be ch…
  continue reading
 
Send us a text The Security Masterminds second guest is KnowBe4's Chief Research Officer Kai Roer, who founded CLTRe in 2015 to accurately answer the question, "how do you measure Security Culture?" In this episode, Kai explains what got him interested in Culture and what we can all learn from it. In addition to understanding how we can measure our…
  continue reading
 
Send us a text The Security Masterminds podcast’s first guest is KnowBe4’s SVP of Emerging Tech Insights Dr. Lydia Kostopoulos, who became interested in the cybersecurity space after experiencing 9/11 as a freshman in college. After that, she decided to pursue her educational studies in cybersecurity. During this podcast, Dr. Kostopoulos explores t…
  continue reading
 
Loading …

Ghid rapid de referință