Episodes

Data Leak Prevention with Yasir Ali, CEO of Polymer

Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization’s operations.

Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.

Polymer
www.polymerhq.io/

CISO

CISO Best Practices & MDM Tips with Chaim Mazal CISO at Kandji

Chaim Mazal, SVP of Technology CISO at Kandji.io, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.

Lazarus Heist

Geoff White, Investigative Journalist & Author

Geoff talks about how he does research for his books and how he finds information sources who are willing to talk. He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.

Searchable Encryption Technology with Dan Draper, CEO & Founder of CipherStash

Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption. Dan also discusses some of the issues related to the gender gap in technology.

CEO of Tines

Security Automation with Eoin Hinchy, CEO of Tines

Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.

Druva

Storage, Backup, & Recovery Best Practices with W. Curtis Preston a.k.a. “Mr. Backup”

W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva. On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery.

How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani

Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs. Haseeb also talks about Bitcoin ATMs and crypto wallets.

Bitcoin IRA’s Chris Kline

Chris Kline, COO & Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secure customer data and complies with various banking regulations related to security and data protection.

Data Loss Prevention (DLP) with Rohan Sathe, CTO & Co-Founder of Nightfall

Rohan Sathe, CTO & Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall’s unique approach to DLP. Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. Learn more at nightfall.ai.

Steve Ginty, Director of Threat Intelligence at RiskIQ

Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft. Learn more at www.riskiq.com.

Harshil Parikh, CEO of TROMZO

Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously. Learn more at www.tromzo.com.

VPNs & More with Brad Hawkins, CEO of SaferNet

Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the “foundation” for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. Learn more at www.safernetvpn.com, safernetbusinessvpn.com, and ninjio.com/cybersecurity.

Philippe Humeau, CEO of CrowdSec

Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.

Maxime “Max” Lamothe-Brassard Founder of LimaCharlie

Maxime “Max” Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LImaCharlie is changing traditional thinking related to corporate cybersecurity solutions.

Rick Jordan, Founder & CEO of ReachOut Technology

Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more! Learn more at reachoutit.com, rickjordan.tv, and rickjordan.tv/liberty-lockdown.

Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management

Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel. For more info, please visit doppler.com.

Emil Sayegh, CEO of Ntirety

Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world. Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and “fathers of OpenStack,” having launched and led successful cloud computing and hosting businesses for HP and Rackspace.

Jonathan Moore, CTO of SpiderOak

Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security. Learn more at spideroak.com/home.

Dr. Chris Spencer on the Secure Use of Passpoint, Next Generation Hotspots, and Eavesdropping Teddy Bears!

Dr Spencer is the Chief Information Security Officer at Nomadix & GlobalReach.Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world’s largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.

Scott Schober, CEO of Berkeley Varitronics Systems

Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.For more information about Scott and BVS, please visit www.bvsystems.com.

Bruce Dahlgren, Chief Executive Officer of MetricStream

Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure. Learn more about Metric Stream at www.metricstream.com and check out the Metric Streams GRC Summit at www.grc-summit.com/2021.

Dexter Caffey, CEO of Smart Eye Technology

Dexter Caffey, CEO of Smart Eye Technology explains how his company’s technology uses biometric security tools to protect documents and files from unauthorized viewers. Learn more at smarteyetechnology.com.

Michel Tricot, CEO of Airbyte

Michel is the CEO and Co-Founder of Airbyte. He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day. In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs & databases. After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months. Learn more at airbyte.io and check out https://www.youtube.com/watch?v=R-lB83nbA20.

Mark Testoni, CEO at SAP National Security Services (SAP NS2)

Mark Testoni, CEO at SAP National Security Services (SAP NS2) shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture. Learn more at https://www.youtube.com/watch?v=6CqwXShqsSc.

Dr. Eric Cole

Dr. Cole has a master’s degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security.

Zaid Sabih Al Quraishi, CEO at zSecurity

Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as “Learn Ethical Hacking from Scratch,” some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com. Zaid’s courses can be found at www.udemy.com/user/zaidsabih and zsecurity.org/courses.

Jim Bowers, Security Architect for TBI

Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.

Self-Sovereign Identity with Alex Preukschat & Shannon Appelcline

Alex Preukschat & Shannon Appelcline co-authors of Self-Sovereign Identity;
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it’s important, and provide examples of practical applications for individuals and organizations. Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity;

Decentralized digital identity and verifiable credentials by using the following
coupon codes:

ssstsrt-489B
ssstsrt-9707
ssstsrt-7BF1
ssstsrt-2ACE
ssstsrt-089E

You can refer to this link: mng.bz/q98N

Kip Boyle, Founder and CEO of Cyber Risk Opportunities

Kip Boyle, founder and CEO of Cyber Risk Opportunities. Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force’s F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks. Learn more at www.cyberriskopportunities.com and www.firedoesntinnovate.com.

Bina Ramamurthy, Author of Blockchain in Action

Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action. Bina’s book can be found at www.manning.com/books/blockchain-…ction?query=block and Bina’s online blockchain courses can be found at www.coursera.org/specializations/blockchain.

Neil Madden, API Security in Action

Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.

Here’s the video.
https://studio.youtube.com/video/X9viEsqpgdM/edit

Neil’s book can be found here:
www.manning.com/books/api-security-in-action

Please use these coupon codes to receive a 30 percent discount.
apisecrf-7175
apisecrf-CC64
apisecrf-2FFC
apisecrf-41AE
apisecrf-42FE

Neil’s Twitter: @neilmaddog
Neil’s Blog: neilmadden.blog/

Julien Vehent on Securing DevOps

Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps. Julien’s book Securing DevOps can be found at www.manning.com/books/securing-devops.

Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast:
scdvprf-A9D5
scdvprf-CB81
scdvprf-0C8B
scdvprf-57E0
scdvprf-9DCB

These can be redeemed at: http://mng.bz/Qmre

For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20 here: http://mng.bz/zryB (good for two months)

Sedat Kapanoglu on the Importance of Breaking the Rules When Coding

Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo. Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.

Sedat’s book can be found here:
www.manning.com/books/street-coder

The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them

strsecr-0716
strsecr-029E
strsecr-34DB
strsecr-2304
strsecr-E12A

Sedat’s Twitter feed: @esesci

Laurentiu Spilca Explains Spring Security for Java Applications

Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security. Laurentiu’s book Spring Security in Action can be found at www.manning.com/books/spring-security-in-action. Check out Laurentiu’s YouTube channel at www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw.

Rois Ni Thuama, Heady of Cyber Governance at Red Sift

Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each. As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. For more info, please visit: ondmarc.redsift.com.

Privacy Law Update with Cecilia Jeong

Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk. Cecilia can be contacted at www.vedderprice.com/new-york.

Paul Clayson, CEO of Agile PQ

Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.

Thomas Kranz, Author of Making Sense of Cybersecurity

Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.

tomkranz.com/
www.siliconbunny.com/

Manning Publications has provided Secure Talk with five free copies of the e-book Making Sense of Cyber Security.

scrmcs-D9FB
scrmcs-707E
scrmcs-9E82
scrmcs-F6C2
scrmcs-4701

Please use this link to access: mng.bz/0ZPN

Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site

Coupon: podsectalk20

You can refer to this link: mng.bz/zryB

Cyber Security Education w/Gabriel Friedlander, CEO of Wizer

Gabriel “Gabby” Friedlander talks about the importance of cyber security education for individuals and company employees. Gabby also introduces the Wizer platform and shares his thoughts on effective training programs. For more information on Wizer’s training programs please visit www.wizer-training.com.

Productivity & Security with Microsoft Teams

Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.

Jonathon Hiroshi Rossi, CEO of Saya University

Jonathan Hiroshi Rossi, CEO & Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats. Learn more at www.sayauniversity.com.

Windows Autopilot with Christophe Koehl

Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.

Edward Walton Discusses Shadow IT

Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.

Cecilia Jeong, Privacy Attorney

Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson & Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.

Hiram Machado, adaQuest CEO

adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.

Interview with Rudolph Araujo from Awake Security

VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake’s technology helps organizations to prevent, detect, and respond to non-malware “living off the land” attacks.

Cyber Insurance

Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it’s important, how it’s used, and gives examples of how it can help companies that have been cyber attacked. (This is part 2 of a 2 part podcast.)

Office 365 Secure Score & Security Tune-Up

Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.

How to Get a Cybersecurity Job!

Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!

Interview with Cybersecurity Consultant & Station X CEO Nathan House

Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.

Security Architect Matt Soseman

Microsoft’s Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. Matt’s blog can be found at: blogs.technet.microsoft.com/skypehybridguy.

Where do I Start?

In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!

Threat Detection & Protection

In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.

Data Protection

Hiram Machado and Mark Shriner discuss the importance of data protection and the tools, techniques, and processes used to protect an organization’s data.