Cyber Work
Episodes
Disaster recovery plans for small businesses | Guest Eric Sugar
12 Jun 2023
Contributed by Lukas
ProServeIT President Eric Sugar discusses disaster recovery planning for small and medium businesses. This is an excellent add-on episode to our third...
Asset detection at home | Cyber Work Hacks
08 Jun 2023
Contributed by Lukas
Huxley Barbee, security evangelist at runZero, talks about the nuts and bolts of asset detection on a large scale, specifically around the U.S. federa...
The nuts and bolts of asset detection and asset mapping | Guest Huxley Barbee
05 Jun 2023
Contributed by Lukas
Tech evangelist Huxley Barbee from runZero talks about asset detection, and yes, just asset detection. Learn about the day-to-day work of asset detect...
The current state of crypto crime | Guest Lili Infante
22 May 2023
Contributed by Lukas
CAT Labs CEO and founder Lili Infante worked as a special agent for the U.S. Department of Justice for 10 years specializing in cryptocurrency’s use...
Is CompTIA’s Cloud+ certification right for you? | Cyber Work Hacks
11 May 2023
Contributed by Lukas
James Stanger, chief technology evangelist at CompTIA, discusses CompTIA's Cloud+ certification and why security professionals must consider addi...
Reframing cybersecurity automation and its uses | Guest Leonid Belkind
01 May 2023
Contributed by Lukas
Leonid Belkind is the chief technology officer (CTO) and co-founder of Torq, a no-code security automation platform. After asking him buckets of quest...
The fundamentals of GitHub | Cyber Work Hacks
27 Apr 2023
Contributed by Lukas
Jacob DePriest, GitHub’s VP, deputy chief security officer, talks about what GitHub is, how it works and what to do with it once you start to unde...
Changing careers to cybersecurity | Guest Dara Gibson
24 Apr 2023
Contributed by Lukas
Dara Gibson of Optiv and the Phoenix, Arizona, branch of Women in Cybersecurity has developed and managed cybersecurity services for five years. After...
Women Impact Tech’s work in the cybersecurity industry | Guest Paula Bratcher Ratliff
17 Apr 2023
Contributed by Lukas
Paula Bratcher Ratliff owns and is president of Women Impact Tech, an organization committed to bringing women and diverse professionals into cybersec...
Optimizing your digital forensics profile while job searching | Cyber Work Hacks
13 Apr 2023
Contributed by Lukas
Amber Schroader, CEO of Paraben, gives her best pieces of advice for the work of searching for a job in the field of digital forensics.0:00 - Get a jo...
Moving from “shift left” to “born left” | Guest David Melamed
03 Apr 2023
Contributed by Lukas
David Melamed of Jit brings us a new wrinkle in our ongoing series of developer security topics! Melamed says we should move beyond “shift left,” ...
Set up your cybersecurity practice lab | Cyber Work Hacks
30 Mar 2023
Contributed by Lukas
Paul Giorgi of XM Cyber, a man who told me his favorite way to learn new skills is to break things and put them back together, walked me through the b...
Overcoming burnout in cybersecurity and VMware’s XDR announcement | Guest Karen Worstell
27 Mar 2023
Contributed by Lukas
Karen Worstell is a 25-year veteran of the tech, IT and security space; she’s a senior cybersecurity strategist at VMware and a chaplain. This episo...
Understanding developer behavior can augment DevSecOps | Guest Nir Valtman
20 Mar 2023
Contributed by Lukas
Today on Cyber Work, Nir Valtman, CEO and co-founder of Arnica, discusses developer behavior-based security. In short, there are lots of ways that bac...
Cybersecurity team cohesion in remote settings | Cyber Work Hacks
16 Mar 2023
Contributed by Lukas
These days, keeping your security, IT or research team close now that more of us than ever work remotely is a challenge. How do you keep team bonds st...
CompTIA Data+ certification: Is it a good fit for your career? | Guest James Stanger
13 Mar 2023
Contributed by Lukas
James Stanger, chief technology evangelist at CompTIA, walks through their new Data+ certification. Infosec is proud to provide bootcamp and course tr...
Sorry, Terminator fans, ChatGPT is not going to become Skynet | Guest Jack Nichelson
06 Mar 2023
Contributed by Lukas
Today on Cyber Work, my guest, Jack Nichelson, wants you to know something. AI is coming! But it’s not SkyNet; it’s not the rise of the machines. ...
Breaking down digital forensics certifications | Cyber Work Hacks
02 Mar 2023
Contributed by Lukas
Amber Schroader, CEO of Paraben, explains the different ways to pursue a career in digital forensics, like pursuing a college degree or studying towar...
A deep dive into GitHub's security strategy | Guest Jacob DePriest
27 Feb 2023
Contributed by Lukas
Jacob DePriest, the VP and deputy chief security Officer at GitHub, talks about development security. In 2021, GitHub significantly ramped up its secu...
Goodbye (ISC)² CAP, hello new CGRC certification | Cyber Work Hacks
16 Feb 2023
Contributed by Lukas
Learn more about the (ISC)² CGRC certification: https://resources.infosecinstitute.com/overview/cgrc/Enroll in a CGRC boot camp: https://www.infoseci...
Asset visibility and vulnerability detection | Guest Yossi Appleboum
13 Feb 2023
Contributed by Lukas
Yossi Appleboum, CEO of Sepio, talks about Cybersecurity and Infrastructure Security Agency (CISA)’s operational directive for non-military federal ...
How to set up a digital forensics lab | Cyber Work Hacks
02 Feb 2023
Contributed by Lukas
Infosec Skills author and Paraben founder and CEO Amber Schroader talks about how to quickly and inexpensively set up your own home digital forensics ...
Inside the Pentagon's new zero-trust policy | Guest Steve Judd
30 Jan 2023
Contributed by Lukas
Venafi solutions architect Steve Judd talks about the recent directive from the Pentagon that a zero-trust policy be implemented at the Department of ...
Biggest cybercrime trends heading into 2023 | Guest Paul Giorgi
23 Jan 2023
Contributed by Lukas
Paul Giorgi of XM Cyber helps us wrap up 2022 by discussing some of the most unusual and complex attack paths he and XM have seen in the past year. We...
ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks
19 Jan 2023
Contributed by Lukas
Infosec Skills author Leighton Johnson talks about major changes to CISM in 2022. CISM has shifted qualitatively from the “Manager” side of the ce...
How SOCs are changing: Location, remote work and more | Guest A.N. Ananth
16 Jan 2023
Contributed by Lukas
A.N. Ananth of Netsurion joins us to talk about the future of SOCs. Security operations centers used to look more like bunkers crowded with network tr...
The changing roles of red teaming | Guest Matt Lorentzen
09 Jan 2023
Contributed by Lukas
Cyberis’ Matt Lorentzen talks all things pentesting, red teaming, the changing roles that red teaming has in fine-tuning and interrogating modern se...
How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks
05 Jan 2023
Contributed by Lukas
Whether you’re studying for the CEH, CISSP, Pentest+, or even the Security+, there’s always one question about cryptography, and it’s easy to mi...
U.S. Cyber Games Season II: Behind the scenes with the head coach | Guest Ken Jenkins
12 Dec 2022
Contributed by Lukas
Returning guest Ken Jenkins stops by to talk about his work as the head coach of the US Cyber Games. If you’re intrigued by this emerging e-sport, y...
Connecting cloud security, data privacy and cybersecurity | Guest Ameesh Divatia
05 Dec 2022
Contributed by Lukas
Ameesh Divatia, CEO of Baffle, Inc., talks about data privacy, data security, cloud security and how a skillset in the middle of that triangle will be...
K-12 cybersecurity: Protecting schools from cyber threats | Guest Mike Wilkinson
21 Nov 2022
Contributed by Lukas
Michael Wilkinson leads the digital forensics and incident response team at Avertium. The team is dedicated to helping clients investigate and recover...
Behind the scenes of ransomware negotiation | Guest Tony Cook
14 Nov 2022
Contributed by Lukas
Tony Cook of GuidePoint Security knows a lot about threat intelligence and incident response. But he’s also used these skills while working in ranso...
CMMC has changed: Here's what you need to know | Guest Leighton Johnson
07 Nov 2022
Contributed by Lukas
Infosec instructor and 40-year cybersecurity veteran Leighton Johnson talks to us about all things CMMC. After last year’s attempted rollout, CMMC p...
Cybersecurity public speaking techniques | Guest Lisa Tetrault
24 Oct 2022
Contributed by Lukas
Lisa Tetrault of Arctic Wolf talks about the adhesives that hold cybersecurity together: communication, collaboration and strong teamwork. First, Tetr...
Digital identity and cybersecurity are inseparable | Guest Susan Morrow
17 Oct 2022
Contributed by Lukas
Susan Morrow returns for her fourth time on the Cyber Work Podcast and the first since 2019. Morrow, simply put, is plugged into every aspect of digit...
Bad data privacy protocols can become an identity fraud disaster | Guest Stephen Cavey
10 Oct 2022
Contributed by Lukas
Stephen Cavey, co-founder and chief evangelist of Ground Labs, talks about the jagged jigsaw puzzle of data collection, data privacy and the dozens —...
Privacy and international business | Guest Noriswadi Ismail
03 Oct 2022
Contributed by Lukas
Noriswadi Ismail of Breakwater Solutions and the Humanising 2030 campaign joins us to talk about privacy as it pertains to international business, cyb...
Attack surface managers and the state of attack surfaces | Guest Dave Monnier
26 Sep 2022
Contributed by Lukas
Dave Monnier of Team Cymru talks about the state of attack surfaces, the strengths and shortcomings of attack surface managers and why something we re...
The importance of API security and PII | Guest Giora Engel
19 Sep 2022
Contributed by Lukas
Today on Cyber Work, Giora Engel of NeoSec talks about securing APIs. Find out why APIs are the new network, why their very nature makes them vulnerab...
Corporate data breaches and security awareness training | Guest Mathieu Gorge
12 Sep 2022
Contributed by Lukas
Mathieu Gorge of VigiTrust talks about the Marriott Hotel data breach that happened back in June, including the facts of the event and why once-per-ye...
Overcoming challenges to build a cybersecurity career | Guest Dr. Chanel Suggs
29 Aug 2022
Contributed by Lukas
Today's Cyber Work Podcast features Dr. Chanel Suggs, the Duchess of Cybersecurity®. Dr. Suggs is a teacher, business owner and thought leader a...
What's it like to work in emergency response? | Guest Christopher Tarantino
22 Aug 2022
Contributed by Lukas
Learn all about emergency response — and the myriad techniques and skills that term implies — in today's episode featuring Christopher Tarant...
Securing operational technology: ICS, IoT, AI and more | Guest Francis Cianfrocca
15 Aug 2022
Contributed by Lukas
If you want to learn more about working with operational technology (OT) and internet-connected devices, then don't miss today's episode wit...
Cybersecurity project management: A peek behind the curtain | Cyber Work Live
08 Aug 2022
Contributed by Lukas
Last year, Cyber Work Live brought you into the world of cybersecurity project management — with tips for acquiring your skills, improving your resu...
OWASP Top 10: What cybersecurity professionals need to know | Guest John Wagnon
01 Aug 2022
Contributed by Lukas
On today's episode, our old pal John Wagnon, Infosec Skills author and keeper of the secrets of OWASP, joins me to talk about the big changes in ...
Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski
25 Jul 2022
Contributed by Lukas
Today on the Cyber Work Podcast, Mark Kapczynski of OneRep reminds us of an awful truth most people either don’t know or don’t like to think about...
Keeping your inbox safe: Real-life BEC attacks and email fraud careers | Guest John Wilson
18 Jul 2022
Contributed by Lukas
Today's episode is all about email fraud. John Wilson, head of the cyber intelligence division at Agari by HelpSystems, discusses Business Email ...
Cybersecurity has a marketing problem — and we're going to fix it | Guest Alyssa Miller
27 Jun 2022
Contributed by Lukas
On today's episode, we're breaking down phrases you've heard a million times: “security is everyone’s job,” “humans are the wea...
What does a secure coder do? | Cybersecurity Career Series
20 Jun 2022
Contributed by Lukas
Secure coders are responsible for developing and writing secure code in a way that protects against security vulnerabilities like bugs, defects and lo...
Cybersecurity jobs: How to better apply, get hired and fill open roles | Guest Diana Kelley
13 Jun 2022
Contributed by Lukas
Diana Kelley returns to the show to discuss her work as a board member of the Cyber Future Foundation and the goings-on at this year’s Cyber Talent ...
Ethical user data collection and machine learning | Guest Ché Wijesinghe
06 Jun 2022
Contributed by Lukas
Today on Cyber Work Ché Wijesinghe of Cape Privacy talks about the safe and ethical collection of user data when creating machine learning or predict...
Working as a privacy manager | Cybersecurity Career Series
23 May 2022
Contributed by Lukas
A Privacy Manager is responsible for the development, creation, maintenance and enforcement of the privacy policies and procedures of an organization....
What does a cybersecurity beginner do? | Cybersecurity Career Series
16 May 2022
Contributed by Lukas
Just getting started? This role is for you!The Cybersecurity Beginner role focuses on the foundational skills and knowledge that will allow anyone t...
What does an ICS security practitioner do? | Cybersecurity Career Series
09 May 2022
Contributed by Lukas
Industrial control system (ICS) security practitioners are responsible for securing mission-critical SCADA and ICS information systems. They are respo...
A public discussion about privacy careers: Training, certification and experience | Cyber Work Live
02 May 2022
Contributed by Lukas
Join Infosec Skills authors Chris Stevens, John Bandler and Ralph O’Brien as they discuss the intersection of privacy and cybersecurity. They’ll h...
What does a security engineer do? | Cybersecurity Career Series
25 Apr 2022
Contributed by Lukas
Security engineers are responsible for implementing, and continuously monitoring security controls that protect computer assets, networks and organiza...
What does an information risk analyst do? | Cybersecurity Career Series
18 Apr 2022
Contributed by Lukas
Information risk analysts conduct objective, fact-based risk assessments on existing and new systems and technologies, and communicate findings to all...
The importance of cyber threat research | Guest Moshe Zioni
11 Apr 2022
Contributed by Lukas
Moshe Zioni of Apiiro talks about threat research and how to properly report discovered code vulnerabilities. We discuss the ways that vulnerabilities...
Security awareness and social engineering psychology | Guest Dr. Erik Huffman
04 Apr 2022
Contributed by Lukas
TEDx speaker, security researcher, host of the podcast MiC Club and all-around expert on security awareness and social engineering, Dr. Erik Huffman, ...
Better cybersecurity practices for journalists | Guest Marcus Fowler
28 Mar 2022
Contributed by Lukas
Marcus Fowler, senior vice president of strategic engagement and threats at DarkTrace, talks about attack vectors currently facing embedded journalist...
What makes a good cyber range? | Guest Justin Pelletier
21 Mar 2022
Contributed by Lukas
Justin Pelletier is the director of the cyber range program at the ESL Global Cybersecurity Institute at the Rochester Institute of Technology. Infose...
Cybersecurity and all things privacy | Guest Chris Stevens
14 Mar 2022
Contributed by Lukas
Today's podcast highlights implementation privacy, policy privacy and all things privacy with privacy expert and Infosec Skills author and instru...
Working in DevOps | Guest Steve Pereira
07 Mar 2022
Contributed by Lukas
Steve Pereira of Visible Value Stream Consulting discusses DevOps, SecOps, DevSecOps and his own lifelong love of streamlining projects. You’ll hear...
Working as a digital forensics analyst | Cybersecurity Career Series
03 Mar 2022
Contributed by Lukas
Digital forensics analysts collect, analyze and interpret digital evidence to reconstruct potential criminal events and/or aid in preventing unauthori...
Three foundational cybersecurity certifications | Guest Mike Meyers
28 Feb 2022
Contributed by Lukas
Infosec Skills author Mike Meyers of Total Seminars joins me to discuss three foundational certifications that will start you on just about any path y...
What does a security architect do? | Cybersecurity Career Series
21 Feb 2022
Contributed by Lukas
Security Architects are responsible for planning, designing, testing, implementing and maintaining an organization's computer and network securit...
Data backup in ransomware situations | Guest Curtis Preston, aka “Mr. Backup”
14 Feb 2022
Contributed by Lukas
Curtis Preston, aka “Mr. Backup,” has been in the backup and recovery space since 1993. He’s written four books, hosts a podcast called “Resto...
Long-term cybersecurity career strategies | Guest Maxime Lamothe-Brassard
07 Feb 2022
Contributed by Lukas
Maxime Lamothe-Brassard, founder of LimaCharlie, has worked for Crowdstrike, Google X and Chronicle Security before starting his own company. This epi...
Avoiding hardware-based cybersecurity threats | Guest Jessica Amado
31 Jan 2022
Contributed by Lukas
Jessica Amado, head of cyber research at Sepio Systems, discusses hardware-based cybersecurity threats. We’ve all heard the USB in the parking lot t...
What does a cloud security engineer do? | Cybersecurity Career Series
27 Jan 2022
Contributed by Lukas
Cloud security engineers design, develop, manage and maintain a secure infrastructure leveraging cloud platform security technologies. They use techni...
Cybersecurity project management: Your career starts here | Cyber Work Live
24 Jan 2022
Contributed by Lukas
Are you great with details? Do you like juggling multiple projects at once? Is your organization system the topic of awed discussion between your co-w...
What does a SOC analyst do? | Cybersecurity Career Series
20 Jan 2022
Contributed by Lukas
Security operations center (SOC) analysts are responsible for analyzing and monitoring network traffic, threats and vulnerabilities within an organiza...
Top cybersecurity breaches of 2021 | Guest Keatron Evans
17 Jan 2022
Contributed by Lukas
Infosec’s Principal Security Researcher, instructor and cybersecurity renaissance man Keatron Evans returns to the show for the first in a series of...
What does a security manager do? | Cybersecurity Career Series
13 Jan 2022
Contributed by Lukas
Security managers develop security strategies that align with the organization's goals and objectives. In addition, they direct and monitor secur...
Predictions for cybersecurity in 2022 | Guest Andrew Howard
10 Jan 2022
Contributed by Lukas
Andrew Howard, CEO of Kudelski Security, returns to give us his cybersecurity predictions for 2022! How will cybersecurity protect the supply chain, w...
What does a penetration tester do? | Cybersecurity Career Series
06 Jan 2022
Contributed by Lukas
Penetration testers, or ethical hackers, are responsible for planning and performing authorized, simulated attacks within an organization’s informat...
Security risks facing streamers on Twitch and YouTube | Guest Roderick Jones
03 Jan 2022
Contributed by Lukas
Roderick Jones of Concentric talks about security risks facing content creators, influencers, gamers and streamers on Twitch, YouTube and elsewhere. O...
High-tech hacking tools and how to defend against them | Guest Bentsi Ben-Atar
20 Dec 2021
Contributed by Lukas
Bentsi Ben-Atar of Sepio Systems talks about some truly scary high-tech hacking weapons and techniques, from Raspberry Pis in your mouse or keyboard t...
How to work in cloud security | Guest Menachem Shafran
13 Dec 2021
Contributed by Lukas
On today’s podcast, Menachem Shafran of XM Cyber talks about cloud security. Menachem tells us about the work of project manager and product manager...
How to get started with bug bounties and finding vulnerabilities | Guest Casey Ellis
06 Dec 2021
Contributed by Lukas
On this week’s Cyber Work Podcast, BugCrowd and disclose.io! founder Casey Ellis discusses how to think like a cybercriminal, the crucial need for t...
How to begin your own cybersecurity consulting business | Guest Kyle McNulty
29 Nov 2021
Contributed by Lukas
On today’s podcast, Kyle McNulty of Secure Ventures talks about interviewing the people behind the most up-and-coming cybersecurity startups. We dis...
How to disrupt ransomware and cybercrime groups | Guest Adam Flatley
22 Nov 2021
Contributed by Lukas
On today’s podcast, Adam Flatley of Redacted talks about 14 years spent with the NSA and working in global intelligence. He also delineates the proc...
How to become a cyber threat researcher | Guest John Bambenek
15 Nov 2021
Contributed by Lukas
On today’s podcast, John Bambenek of Netenrich and Bambenek Consulting talks about threat research, intelligence analytics, why the same security pr...
How to become a great cybersecurity leader and manager | Guest Cicero Chimbanda
08 Nov 2021
Contributed by Lukas
On today’s podcast, Cicero Chimbanda, Infosec Skills author and lecturer, discusses his cybersecurity leadership and management courses. We discuss ...
Cybersecurity collaboration, team building and working as CEO | Guest Wendy Thomas
01 Nov 2021
Contributed by Lukas
On today’s podcast, Secureworks president and CEO Wendy Thomas talks about the company’s drive to provide innovative, best-in-class security solut...
How to learn web application security | Guest Ted Harrington
25 Oct 2021
Contributed by Lukas
On today’s podcast, Infosec Skills author Ted Harrington talks about authoring a recent Infosec Skills learning path, “How To Do Application Secur...
How to become a secure coder | Guest Chrys Thorsen
18 Oct 2021
Contributed by Lukas
On today’s podcast Infosec Skills author Chrys Thorsen talks about founding IT Without Borders, a humanitarian organization built to empower underse...
Learning Linux is key to building your cybersecurity skills | Guest Jasmine Jackson
11 Oct 2021
Contributed by Lukas
On today’s podcast, Jasmine Jackson takes us through how you can get noticed on your resume, how Linux basics can set you up for learning other aspe...
Cryptography, encryption and building a secure photo app | Guest Alex Amiryan
04 Oct 2021
Contributed by Lukas
Today's guest is Alex Amiryan, a software developer with over 18 years of experience specializing in cybersecurity and cryptography. Alex is the ...
Saving McDonald’s from a possible data breach | Guest Connor Greig
27 Sep 2021
Contributed by Lukas
This week we chat with Connor Greig of CreatorSphere (creatorsphere.co) about beginning a career in IT at age 17 when he joined Hewlett Packard as an ...
Inside the Security Yearbook: Industry trends, career advice and more! | Guest Richard Stiennon
20 Sep 2021
Contributed by Lukas
Security Yearbook creator Richard Stiennon joins today’s podcast to share his career journey. He talks about creating the first ISP in the Midwest i...
Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live
13 Sep 2021
Contributed by Lukas
Cybersecurity hiring managers, and the entire cybersecurity industry, can benefit from recruiting across a wide range of backgrounds and cultures, yet...
Episode 200 extravaganza! Best of the Cyber Work Podcast (and $1,000 in prizes!)
30 Aug 2021
Contributed by Lukas
PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the definitive report on the BAHAMUT threat group, is employed by HP. He i...
How to excel at penetration testing | Guest Gemma Moore
23 Aug 2021
Contributed by Lukas
Gemma Moore of Cyberis Limited talks about her incredible pentesting career and shares her advice for aspiring pentesters. She also discusses security...
Becoming an ethical hacker with Offensive Security | Guest Ning Wang
16 Aug 2021
Contributed by Lukas
Ning Wang of Offensive Security talks to us about her role as CEO of Offensive Security. In her role she is responsible for the company culture, visio...
Consumer protection careers: Fraud, identity theft and social engineering | Guest Adam Levin
09 Aug 2021
Contributed by Lukas
Adam Levin of CyberScout talks to us about scams, identity theft and more across the cybersecurity industry from the 1970s until today. He also tells ...
How to become a cybersecurity threat intelligence professional | Guest Neal Dennis
02 Aug 2021
Contributed by Lukas
Neal Dennis of Cyware talks to us about building a collective defense via increased threat intelligence sharing in the global security community. Denn...
Tips on entering blue teaming, red teaming or purple teaming | Guest Snehal Antani
26 Jul 2021
Contributed by Lukas
Snehal Antani joins us from Horizon3.ai to talk about pentesting, red teaming and why not every vulnerability necessarily needs to be patched. He also...
CMMC is coming: Here's what cybersecurity professionals need to know | Guest Frank Smith
19 Jul 2021
Contributed by Lukas
Frank Smith joins us from Ntiva to talk about the new Cybersecurity Maturity Model Certification (CMMC), organizations achieving Level 1 and Level 3 m...
Red teaming: The fun, and the fundamentals | Cyber Work Live
12 Jul 2021
Contributed by Lukas
Learn what it’s like to do good by being bad. The idea of breaking into a company, by hook or by crook, attracts all sorts of would-be secret agents...