Episodes
Creating the dark web: How the TOR browser was invented.
What software do radical techno-libertarians,
Hacking a Nation: Alejandro Caceres’ Bold Attack on North Korea
From childhood hacking experiments to
Mastering the Role of CISO: Advice from Todd Fitzgerald
What are the essential principles
Decoding Cyber Resilience: Insights from Absolute Security’s Christy Wyatt
On this episode of Secure
A Perfect Fit: Using risk to get the right sized security with Christopher Hodson.
Is ‘Security Theater’ plaguing your
Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family
How safe is your digital
Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy
Join host Justin Beals as
Reputation as a risk: Understanding the security threat of harmful narratives.
In this gripping episode of
Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches
The Secure Talk podcast, hosted
Mastering Cyber Shadows: Alex Cox’s Take On LockBit’s Resilience And The Role Of Threat Intelligence
This Secure Talk podcast interviews
Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses
Secure Talk invited CEO and
The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity
In this Secure Talk episode
HealthTech, GAMP and 23andMe: A conversation with Stephen Farrell, security leader in Life Sciences.
How do you secure critical
Secure Talk has a new host, Measuring Security and the impact of AI on Security certification
In this episode, Mark hands
Self-Sovereign Identities, Zero-Knowledge Credentials, and AI Digital Assistants
Chris Were is the Co-Founder
Multi-Chain NFT Trading, with Lasha Antadze Founder of Rarify Labs
Lasha Antadze is the Founder
How to Implement an Effective Cloud Risk Management Strategy
Eric Kedrosky, CISO at Sonrai
2023 OpenText Cybersecurity Threat Report & Recommendations
Grayson Milbourne is the Security
Democratizing Data with Tim Tutt, CEO & Co-Founder of Night Shift Development
Tim Tutt is the CEO
How Software Developers use Red Teaming & White Box Audits to Improve Security and More!
In this episode I talk
Building Autonomy & Trust in Distributed Engineering Teams
Nickolas Means is Vice President
Preventing Cyber Attacks Across the Software Supply Chain
Neatsun Ziv is the Co-Founder
Cybersecurity Solutions for the Federal Government
Steve Orrin, Federal Chief Technology
Using Open Source Linux-based Software for Identity Management
Kevin Dominik Korte is the
Cyber Resilience, Disaster Recovery, & Backups via Managed Services
Sagi Brody co-founded Webair in
Data Security Posture Management vs. Cloud Security Posture Management & More!
Jonathan Roizin is the Co-Founder
Security & Compliance Issues with Collaboration Platforms such as Zoom, Teams, and Slack
Garth Landers, Director of Global
Security Awareness Training with Javvad Malik from KnowBe4
Javvad Malik is the Lead
Cybersecurity In and Out of the U.S. Military, with Stephen Semmelroth
Stephen Semmelroth is the Sr.
Modern Cyber Security Best Practices with George Gerchow, Chief Security Officer at Sumo Logic
As Sumo Logic’s Chief Security
Security Certifications as Sales Assets, with Justin Beals, CEO of Strike Graph
Justin Beals is the CEO
The Importance of a Comprehensive Network Asset Inventory with Huxley Barbee
Huxley Barbee is the Security
Blockchain Bridges and More with Collin O’Brien of Rubic
Collin O’Brien is the Marketing
Cybersecurity Focused Hardware Destruction, with John Shegerian
John Shegerian is the CEO
Cloud Security Governance, with Fausto Lendeborg, CEO of Secberus
Fausto Lendeborg, Co-Founder & CEO
How to Choose a VPN and More with Yegor Sak, Founder of Windscribe
Born in Belarus, raised in
CSIRTs, Attack Surface Management (ASM) 2.0 and more, with Dave Monnier of Team Cymru
Dave Monnier, Chief Evangelist at
Security Risks with Open Source Software, Steve Wilson, Chief Product Officer at Contrast Security
Steve Wilson, Chief Product Officer
How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud
Nick Lumsden, CTO and Co-Founder
Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro
Moshe Zioni, VP of Security
Protecting Personal Data, Podcasting, Privacy, and More with Adam Levin
Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack. He also shares some stories about his guests and also gives advice on how to protect your personal information.
Data Leak Prevention with Yasir Ali, CEO of Polymer
Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization’s operations.
Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.
Polymer
www.polymerhq.io/
Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security
Adrianus Warmenhoven, Defensive Strategist at Nord Security, shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some great books on cybersecurity.
CISO Best Practices & MDM Tips with Chaim Mazal CISO at Kandji
Chaim Mazal, SVP of Technology CISO at Kandji.io, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.
Geoff White, Investigative Journalist & Author
Geoff talks about how he does research for his books and how he finds information sources who are willing to talk. He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.
Automated Crypto Trading Tools with Gabriele Musella, CEO at Coinrule
Gabriele Musella, Co-Founder & CEO at Coinrule, talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading.
Preventing Phygital Attacks, Will Plummer, CSO at RaySecur
Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.
Identity & Access Management, Digital IDs & More with Sushil Madhukar of TechDemocracy
Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity & access management, security as a service, and best practices for prioritizing investments in cybersecurity.
SaaS Compliance Solutions with Justin Beals, Founder & CEO of Strike Graph
Justin Beals, Founder & CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.
Searchable Encryption Technology with Dan Draper, CEO & Founder of CipherStash
Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption. Dan also discusses some of the issues related to the gender gap in technology.
A Single Unified Cyber Security Solution, with Kiran Vangaveti, CEO of BluSapphire Technologies
Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies’ total cyber solution is able to replace many of the component based solutions. Kiran’s also shares his experience related to training for and participating in several marathons.
New Approaches for Application Security, with Jeff Williams Co-Founder of Contrast Security
Jeff Williams Co-Founder & CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS) for security applications.
Unlimited Decentralized Financial Markets with Eric Chen, CEO of Injective Labs
Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science.
Crypto Mining Hardware with Mason Jappa, CEO of Blockware Solutions
Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.
Open Source Device Management with Mike McNeil, CEO of Fleet DM
Mike McNeil, CEO & Co-Founder of Fleet DM explains how open source endpoint security is beneficial, and talks about using osquery and ways to improve an organization’s security posture while measuring and reducing total cost of ownership (TCO).
DeFi, CeFi, Blockchain and more with Yubo Ruan, CEO of Parallel Finance
Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.
Security Automation with Eoin Hinchy, CEO of Tines
Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.
Decentralized Biometrics Infrastructure with Frances Zelazny, CEO of Anonybit
Frances Zelazny, Co-Founder & CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure.
Storage, Backup, & Recovery Best Practices with W. Curtis Preston a.k.a. “Mr. Backup”
W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva. On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery.
How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani
Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs. Haseeb also talks about Bitcoin ATMs and crypto wallets.
Bitcoin IRA’s Chris Kline
Chris Kline, COO & Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secure customer data and complies with various banking regulations related to security and data protection.
Data Loss Prevention (DLP) with Rohan Sathe, CTO & Co-Founder of Nightfall
Rohan Sathe, CTO & Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall’s unique approach to DLP. Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. Learn more at nightfall.ai.
Steve Ginty, Director of Threat Intelligence at RiskIQ
Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft. Learn more at www.riskiq.com.
Security Managed Services with James Fair, SVP of Technical Operations at Executech
James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and mentoring and motivation. Learn more at www.executech.com.
Harshil Parikh, CEO of TROMZO
Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously. Learn more at www.tromzo.com.
VPNs & More with Brad Hawkins, CEO of SaferNet
Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the “foundation” for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. Learn more at www.safernetvpn.com, safernetbusinessvpn.com, and ninjio.com/cybersecurity.
Philippe Humeau, CEO of CrowdSec
Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.
Maxime “Max” Lamothe-Brassard Founder of LimaCharlie
Maxime “Max” Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LImaCharlie is changing traditional thinking related to corporate cybersecurity solutions.
Rick Jordan, Founder & CEO of ReachOut Technology
Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more! Learn more at reachoutit.com, rickjordan.tv, and rickjordan.tv/liberty-lockdown.
Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management
Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel. For more info, please visit doppler.com.
Emil Sayegh, CEO of Ntirety
Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world. Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and “fathers of OpenStack,” having launched and led successful cloud computing and hosting businesses for HP and Rackspace.
Jonathan Moore, CTO of SpiderOak
Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security. Learn more at spideroak.com/home.
Dr. Chris Spencer on the Secure Use of Passpoint, Next Generation Hotspots, and Eavesdropping Teddy Bears!
Dr Spencer is the Chief Information Security Officer at Nomadix & GlobalReach.Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world’s largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.
Data Protection via File Level Encryption, Dimitri Nemirovsky, COO of Atakama
Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space. Learn more at www.atakama.com.
Kathleen Booth, VP of Marketing at clean.io talks Digital Engagement Security & More!
Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more! Learn more at clean.io, www.clean.io and inboundsuccesspodcast.com.
Scott Schober, CEO of Berkeley Varitronics Systems
Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.For more information about Scott and BVS, please visit www.bvsystems.com.
Mahmoud Abdelkader, CEO and Co-Founder of Very Good Security
Mahmoud Abdelkader is the CEO and Co-Founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.
Bruce Dahlgren, Chief Executive Officer of MetricStream
Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure. Learn more about Metric Stream at www.metricstream.com and check out the Metric Streams GRC Summit at www.grc-summit.com/2021.
Dexter Caffey, CEO of Smart Eye Technology
Dexter Caffey, CEO of Smart Eye Technology explains how his company’s technology uses biometric security tools to protect documents and files from unauthorized viewers. Learn more at smarteyetechnology.com.
Michel Tricot, CEO of Airbyte
Michel is the CEO and Co-Founder of Airbyte. He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day. In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs & databases. After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months. Learn more at airbyte.io and check out https://www.youtube.com/watch?v=R-lB83nbA20.
Mark Testoni, CEO at SAP National Security Services (SAP NS2)
Mark Testoni, CEO at SAP National Security Services (SAP NS2) shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture. Learn more at https://www.youtube.com/watch?v=6CqwXShqsSc.
Dr. Eric Cole
Dr. Cole has a master’s degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security.
Hiram Machado, CEO of adaQuest on Identity Governance
Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).
Zaid Sabih Al Quraishi, CEO at zSecurity
Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as “Learn Ethical Hacking from Scratch,” some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com. Zaid’s courses can be found at www.udemy.com/user/zaidsabih and zsecurity.org/courses.
Jim Bowers, Security Architect for TBI
Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.
Self-Sovereign Identity with Alex Preukschat & Shannon Appelcline
Alex Preukschat & Shannon Appelcline co-authors of Self-Sovereign Identity;
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it’s important, and provide examples of practical applications for individuals and organizations. Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity;
Decentralized digital identity and verifiable credentials by using the following
coupon codes:
ssstsrt-489B
ssstsrt-9707
ssstsrt-7BF1
ssstsrt-2ACE
ssstsrt-089E
You can refer to this link: mng.bz/q98N
Kip Boyle, Founder and CEO of Cyber Risk Opportunities
Kip Boyle, founder and CEO of Cyber Risk Opportunities. Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force’s F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks. Learn more at www.cyberriskopportunities.com and www.firedoesntinnovate.com.
Bina Ramamurthy, Author of Blockchain in Action
Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action. Bina’s book can be found at www.manning.com/books/blockchain-…ction?query=block and Bina’s online blockchain courses can be found at www.coursera.org/specializations/blockchain.
Neil Madden, API Security in Action
Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.
Here’s the video.
https://studio.youtube.com/video/X9viEsqpgdM/edit
Neil’s book can be found here:
www.manning.com/books/api-security-in-action
Please use these coupon codes to receive a 30 percent discount.
apisecrf-7175
apisecrf-CC64
apisecrf-2FFC
apisecrf-41AE
apisecrf-42FE
Neil’s Twitter: @neilmaddog
Neil’s Blog: neilmadden.blog/
Julien Vehent on Securing DevOps
Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps. Julien’s book Securing DevOps can be found at www.manning.com/books/securing-devops.
Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast:
scdvprf-A9D5
scdvprf-CB81
scdvprf-0C8B
scdvprf-57E0
scdvprf-9DCB
These can be redeemed at: http://mng.bz/Qmre
For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20 here: http://mng.bz/zryB (good for two months)
Sedat Kapanoglu on the Importance of Breaking the Rules When Coding
Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo. Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.
Sedat’s book can be found here:
www.manning.com/books/street-coder
The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them
strsecr-0716
strsecr-029E
strsecr-34DB
strsecr-2304
strsecr-E12A
Sedat’s Twitter feed: @esesci
Laurentiu Spilca Explains Spring Security for Java Applications
Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security. Laurentiu’s book Spring Security in Action can be found at www.manning.com/books/spring-security-in-action. Check out Laurentiu’s YouTube channel at www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw.
Rois Ni Thuama, Heady of Cyber Governance at Red Sift
Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each. As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. For more info, please visit: ondmarc.redsift.com.
Privacy Law Update with Cecilia Jeong
Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk. Cecilia can be contacted at www.vedderprice.com/new-york.
Paul Clayson, CEO of Agile PQ
Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.
Thomas Kranz, Author of Making Sense of Cybersecurity
Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.
tomkranz.com/
www.siliconbunny.com/
Manning Publications has provided Secure Talk with five free copies of the e-book Making Sense of Cyber Security.
scrmcs-D9FB
scrmcs-707E
scrmcs-9E82
scrmcs-F6C2
scrmcs-4701
Please use this link to access: mng.bz/0ZPN
Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site
Coupon: podsectalk20
You can refer to this link: mng.bz/zryB
The Ins and Outs of Azure Sentinel with Microsoft’s Edward Walton
Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft’s SIEM Azure Sentinel.
Kip Boyle Shares Advice on How Best to Find a Cybersecurity Job and “Your Cyber Path”
Kip Boyle, Virtual CISO, author of “Fire Doesn’t Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.
Learn more at anchor.fm/yourcyberpath
www.yourcyberpath.com/pdf.
Cyber Security Education w/Gabriel Friedlander, CEO of Wizer
Gabriel “Gabby” Friedlander talks about the importance of cyber security education for individuals and company employees. Gabby also introduces the Wizer platform and shares his thoughts on effective training programs. For more information on Wizer’s training programs please visit www.wizer-training.com.
Greg Edwards, CEO of CryptoStopper on Malware Attack Detection & Prevention
CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks. Learn more at www.getcryptostopper.com.
Hiram Machado, CEO of adaQuest on the Value of Network Scans
adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.
Paul Katzoff, CEO of WhiteCanyon Software
Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon’s solutions work.
Productivity & Security with Microsoft Teams
Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.
Jonathon Hiroshi Rossi, CEO of Saya University
Jonathan Hiroshi Rossi, CEO & Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats. Learn more at www.sayauniversity.com.
João Couto, Director of Operations adaQuest Brazil
João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.
Windows Autopilot with Christophe Koehl
Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.
The Rise of the Virtual CISO, with Hiram Machado
adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.
Richard Lewis, Best Practices for Security Minded Organizations & Application Security Development
Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.
Edward Walton Discusses Shadow IT
Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.
Cecilia Jeong, Privacy Attorney
Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson & Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.
Andrea Fisher, Global Cyber Defense Specialist at Microsoft
Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.
Hiram Machado, adaQuest CEO
adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.
Andrea Fisher Provides an Overview of Windows 10
Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.
Plurilock CEO Ian Paterson Talks About Post Login Authentication
Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.
Matt Soseman Talks About Developments with MFA, Conditional Access, Windows Hello and More!
Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.
Interview with Rudolph Araujo from Awake Security
VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake’s technology helps organizations to prevent, detect, and respond to non-malware “living off the land” attacks.
Interview with Trusona Founder & CEO, Ori Eisen
Trusona Founder & CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona’s passwordless solutions.
Cyber Insurance
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it’s important, how it’s used, and gives examples of how it can help companies that have been cyber attacked. (This is part 2 of a 2 part podcast.)
Interview with Zaid Al-Quraishi, Ethical Hacker and Founder of zSecurity
Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking. Learn more at www.udemy.com/user/zaidsabih.
Office 365 Secure Score & Security Tune-Up
Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.
Multi-Factor Authentication (MFA), Conditional Access, & Passwords
Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!
A Review of GDPR, Cryptojacking, and More….
adaQuest CEO, Hiram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.
How to Get a Cybersecurity Job!
Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!
Interview with Cybersecurity Consultant & Station X CEO Nathan House
Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.
Cybersecurity with ISSA Puget Sound Chapter President Justin White
Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!
How to Successfully Integrate a Newly Acquired Company onto Your IT Platform
Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&A pre-acquisition and for post acquisition integration.
Security Architect Matt Soseman
Microsoft’s Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. Matt’s blog can be found at: blogs.technet.microsoft.com/skypehybridguy.
Paul Johnson Shares His Thoughts About Taking the CISSP Exam
Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.
GDPR – What is it? How to Prepare?
In this episode we talk with Hiram Machado about GDPR. We explain what is GDPR, why it is important, and how to prepare.
Where do I Start?
In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!
Threat Detection & Protection
In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.
Data Protection
Hiram Machado and Mark Shriner discuss the importance of data protection and the tools, techniques, and processes used to protect an organization’s data.
The Emerging Paradigm for IT Security
In this episode we compare the traditional “perimeter” approach to cybersecurity with the emerging approach the is entered on identity.