Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Cyber Work

Technology Business Education

Activity Overview

Episode publication activity over the past year

Episodes

Showing 301-392 of 392
«« ← Prev Page 4 of 4

Hacking since age six | Guest Nir Gaist

25 Nov 2019

Contributed by Lukas

Nir Gaist, Founder and CTO at Nyotron, and Cyber Work podcast host Chris Sienko, discuss Nir's cybersecurity journey (which started from hacking ...

2020 election cybersecurity strategies | Guest Bob Stevens

18 Nov 2019

Contributed by Lukas

Bob Stevens, VP of Americas at Lookout, and Cyber Work Podcast host Chris Sienko, discuss election cybersecurity strategies, tips and ramifications fo...

The ROI of security awareness training | Guest Michael Osterman and Lisa Plaggemmier

14 Nov 2019

Contributed by Lukas

Security awareness programs help organizations achieve the ultimate goal of fewer security incidents, but how do the benefits compare to the costs and...

Hyperspecialization in cybersecurity | Guest John Wheeler

11 Nov 2019

Contributed by Lukas

John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding. – St...

Insider tips from a cybersecurity CEO | Guest Scott Madsen

04 Nov 2019

Contributed by Lukas

Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of ...

How being hacked inspired a comic book series | Guest Gary Berman

28 Oct 2019

Contributed by Lukas

Gary Berman, creator of The Cyberhero Adventures: Defenders of the Digital Universe comic book series, and Cyber Work host Chris Sienko discuss Berman...

Privacy is shaping the future of cybersecurity careers: Are you ready? | Guest Byron Johnson

24 Oct 2019

Contributed by Lukas

Celebrate National Cybersecurity Awareness Month by learning about privacy with IAPP's Channel Sales Manager Byron Johnson — plus get 30 days o...

Networking, engineering and education | Guest Tia Hopkins

21 Oct 2019

Contributed by Lukas

Tia Hopkins, Vice President of Global Sales Engineering at eSentire, and Cyber Work host Chris Sienko discuss Hopkins' past in physical networkin...

Engineering, cybersecurity and changing careers | Guest Dave Farrow

14 Oct 2019

Contributed by Lukas

Dave Farrow discusses his unconventional career journey and the intersection of engineering and cybersecurity. – Start learning cybersecurity for fr...

Combating phishing, malware and hackers | Guest Atif Mushtaq

07 Oct 2019

Contributed by Lukas

Atif Mushtaq, founder and CEO of SlashNext, and Cyber Work host Chris Sienko discuss the current and future trends of web-based phishing and malware a...

30 days of free training! | Breaking into cybersecurity with CompTIA | Guest James Stanger

03 Oct 2019

Contributed by Lukas

Celebrate National Cybersecurity Awareness Month by learning how to start a cybersecurity career with CompTIA's Chief Technology Evangelist James...

The future of cybersecurity training: Subscription-based learning | Guest Jason Dion

30 Sep 2019

Contributed by Lukas

Jason Dion, a cybersecurity training leader and an Infosec Skills course author, and Cyber Work host Chris Sienko discuss subscription-based cybersecu...

Digital forensics, data analysis and data recovery | Guest Allan Buxton

23 Sep 2019

Contributed by Lukas

Allan Buxton, Director of Forensics at SECUREDATA, Inc., and Cyber Work host, Chris Sienko, discuss Allan's career journey, how digital forensics...

Alissa Knight talks API security, formjacking and hacking | Guest Alissa Knight

16 Sep 2019

Contributed by Lukas

Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcomin...

From hacker to lawyer: An expert in cybersecurity law | Guest Bradley Gross

09 Sep 2019

Contributed by Lukas

Bradley Gross, founder and president of Law Office of Bradley Gross and an expert in technology and digital law, discusses his career arc from hacker ...

Ask an expert: How to start and advance your cybersecurity career | Guest Keatron Evans

05 Sep 2019

Contributed by Lukas

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, I...

The human element of cybersecurity careers | Guest Cheryl Kerrigan

02 Sep 2019

Contributed by Lukas

Cheryl Kerrigan, Vice President of People at BlueCat, discusses the importance of communication, soft skills and healthy employee cultures in modern c...

How to become a cybersecurity analyst | Guest Jonathan Butler

26 Aug 2019

Contributed by Lukas

Jonathan Butler, Professional Services & Security Analytics Manager at Distil Networks, discusses his security analyst journey, what someone shoul...

Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski

22 Aug 2019

Contributed by Lukas

Are phishing simulations pentesting for humans or training? What’s more effective with those folks who can’t stop themselves from clicking on ever...

What’s it like being a cybersecurity risk analyst? | Guest John Bree

19 Aug 2019

Contributed by Lukas

John Bree, Neo Group Inc. Senior Vice President and Partner, discusses his risk analyst journey, what a day in the life of a risk analyst looks like a...

The importance of cybersecurity education | Guest Dave Hatter

12 Aug 2019

Contributed by Lukas

Dave Hatter, a cybersecurity consultant for over 25 years and a technology educator at Cincinnati State, discusses his security journey, the future of...

PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane

08 Aug 2019

Contributed by Lukas

Patrick Lane, CompTIA Director of Products discusses everything you need to know about CompTIA’s PenTest+ cert, including why CompTIA created the Pe...

Leveraging board governance for cybersecurity | Guest Michael Figueroa

05 Aug 2019

Contributed by Lukas

Michael Figueroa, President and Executive Director of the Advanced Cyber Security Center (ACSC), discusses the importance of leveraging board governan...

The dangers of role-based access control (RBAC) | Guest Balaji Parimi

29 Jul 2019

Contributed by Lukas

Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current problems with role-based access control and how access control is evolving...

Getting started in digital forensics | Guest Keatron Evans

25 Jul 2019

Contributed by Lukas

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence acros...

What does a vulnerability verification specialist do? | Guest Lauren McCaslin

22 Jul 2019

Contributed by Lukas

Lauren McCaslin, vulnerability verification team lead for the Threat Research Center at WhiteHat Security, discusses her path to becoming a vulnerabil...

Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight

15 Jul 2019

Contributed by Lukas

Alissa Knight, senior analyst at Aite Group, discusses her work penetration testing connected cars and the ups and downs of her security career, from ...

Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison

11 Jul 2019

Contributed by Lukas

The shortage of cybersecurity professionals has grown to nearly three million globally, with approximately 498,000 openings in North America. In addit...

Preventing and repairing security breaches | Guest John Torres

08 Jul 2019

Contributed by Lukas

John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations fro...

Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow

01 Jul 2019

Contributed by Lukas

Susan Morrow, head of research and development at Avoco Secure, returns to the podcast to discuss her 20 years in the security industry, how she lande...

DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin

24 Jun 2019

Contributed by Lukas

Andrew Wertkin, CTO of BlueCat Networks, returns to the podcast to discuss a new and hotly contested privacy technology called DNS over HTTPS (DoH), t...

Latest malware trends are bad news for business | Guest Adam Kujawa

17 Jun 2019

Contributed by Lukas

Malwarebytes Adam Kujawa discusses the latest malware tactics and techniques.– Start learning cybersecurity for free: https://www.infosecinstitute.c...

How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan

10 Jun 2019

Contributed by Lukas

Exabeam's Anu Yamunan discusses how data science and machine learning are being used in cybersecurity.– Start learning cybersecurity for free: ...

How to become an APT hunter with Carbon Black | Guest David Balcar

03 Jun 2019

Contributed by Lukas

Carbon Black's David Balcar discusses hunting advanced persistent threats (APTs).– Start learning cybersecurity for free: https://www.infosecin...

Fraud trends from the latest ThreatMetrix cybercrime report | Guest Rebekah Moody

27 May 2019

Contributed by Lukas

ThreatMetrix's Rebekah Moody discusses the latest fraud and cybercrime trends.– Start learning cybersecurity for free: https://www.infosecinsti...

Protecting customer data at contact centers | Guest Ben Rafferty

20 May 2019

Contributed by Lukas

Semafone's Ben Rafferty discusses fraud at contact centers.– Start learning cybersecurity for free: https://www.infosecinstitute.com/free– Vi...

Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan

09 May 2019

Contributed by Lukas

Kelly Sheridan, reporter and staff editor for Dark Reading, discusses her extensive research and reporting on the cybersecurity skills gap and offers ...

Benefits and challenges of securing your cloud data | Guest Andrew Howard

03 May 2019

Contributed by Lukas

Kudelski Security CTO Andrew Howard discusses securing your data in the cloud.– Start learning cybersecurity for free: https://www.infosecinstitute....

Focusing on users is the only way to improve cybersecurity | Guest Ben Johnson

26 Apr 2019

Contributed by Lukas

Ben Johnson, CTO and co-founder of Obsidian Security, discusses a variety of different topics around the umbrella theme of shifting cybersecurity prio...

Risk management and understanding what matters most | Guest Liz Mann

19 Apr 2019

Contributed by Lukas

EY's Liz Mann discusses risk management and her work building a diverse cybersecurity workforce.– Start learning cybersecurity for free: https:...

How to become a Certified Ethical Hacker (CEH) | Guest Keatron Evans

15 Apr 2019

Contributed by Lukas

Infosec's Keatron Evans discusses ethical hacking careers and the Certified Ethical Hacker (CEH).– Start learning cybersecurity for free: https...

What does a director of fraud and identity do? | Guest Kimberly Sutherland

11 Apr 2019

Contributed by Lukas

Kimberly Sutherland of LexisNexis Risk Solutions discusses authentication and identity-proofing.– Start learning cybersecurity for free: https://www...

What’s it like to be a help desk manager? | Guest Gloria Milton

04 Apr 2019

Contributed by Lukas

Gloria Milton, help desk manager at itSynergy, discusses what it is like to be a help desk manager and her two decades of experience in the industry. ...

Saving lives with ICS and critical infrastructure security | Guest Emily Miller

28 Mar 2019

Contributed by Lukas

Emily Miller, director of national security and critical infrastructure programs at Mocana, discusses her passion for critical infrastructure security...

Creating a more diverse cybersecurity workforce | Guest Ruth Gomel-Kafri

22 Mar 2019

Contributed by Lukas

Ruth Gomel-Kafri, director of product design at the security policy company Tufin, discusses her work overseeing the company's product design gro...

Take control of your infosec career with CyberSeek | Guest Tim Herbert

15 Mar 2019

Contributed by Lukas

Tim Herbert, vice president of research and market intelligence for CyberSeek, joins us to discuss something we're very excited about at Infosec,...

VPNs and the ongoing battle for privacy | Guest Pete Zaborszky

08 Mar 2019

Contributed by Lukas

Pete Zaborszky, founder of BestVPN.com, discusses VPNs and online privacy.– Start learning cybersecurity for free: https://www.infosecinstitute.com/...

Where are All the Government Infosec Professionals? | Guest Gregory Garrett

02 Mar 2019

Contributed by Lukas

Gregory Garrett, head of U.S. and international cybersecurity for BDO, discusses the U.S. government's cybersecurity skills gap.– Start learnin...

The Business Impact of Cyber Risk | Guests David Kruse, Jeff McCollum and Justin Webb

26 Feb 2019

Contributed by Lukas

A panel of experts discusses how businesses are impacted by cyber risk.– Start learning cybersecurity for free: https://www.infosecinstitute.com/fre...

The Current State of Artificial Intelligence in Cybersecurity | Guest Eric Stevens

22 Feb 2019

Contributed by Lukas

Eric Stevens, vice president of engineering and principal architect at ProtectWise, discusses the current state of artificial intelligence in cybersec...

Closing the Cyber Skills Gap | Guest Kathleen Hyde

15 Feb 2019

Contributed by Lukas

Kathleen Hyde, chair of cybersecurity programs at Champlain College online, discusses a topic that's a big part of InfoSec Institute's initi...

CIS Top 20 Security Controls with Tony Sager | Guest Tony Sager

12 Feb 2019

Contributed by Lukas

Get insight into the CIS Top 20 Security Controls straight from the source, Center for Internet Security® Senior Vice President and Chief Evangelist ...

Growing the Number of Women in Cybersecurity | Guest Olivia Rose

08 Feb 2019

Contributed by Lukas

Olivia Rose, director of global executive risk solutions at Kudelski Security, gives advice to women who are considering entering the cybersecurity in...

California Consumer Privacy Act: Are You Prepared for 2020? | Guests Jay Rodne and Aaron Weller

05 Feb 2019

Contributed by Lukas

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish or...

Getting Started in Red Teaming and Offensive Security | Guest Curtis Brazzell

01 Feb 2019

Contributed by Lukas

Get insight into what it takes to be a successful Red Team member in this chat with Curtis Brazzell, managing security consultant at Pondurance.– St...

How to Become a Chief Information Security Officer | Guest Joshua Knight

25 Jan 2019

Contributed by Lukas

Joshua Knight, cybersecurity business leader at Dimension Data, discusses his career journey as well as the steps you can take to move your career tow...

Community Cyber-Attacks, Simulations and Cooperation | Guest Michael Figueroa

19 Jan 2019

Contributed by Lukas

Michael Figueroa discusses the ACSC's first collaborative defense simulation and defending against community-level attacks.– Start learning cyb...

How to Launch a Career in Application Security | Guest Dan Cornell

11 Jan 2019

Contributed by Lukas

Learn about AppSec careers in this discussion with Dan Cornell, chief technology officer at Denim Group.– Start learning cybersecurity for free: htt...

Red Team Operations: Attack and Think Like a Criminal | Guest Jeremy Martin

08 Jan 2019

Contributed by Lukas

Dig into the mindset of an attacker with senior security researcher Jeremy Martin.– Start learning cybersecurity for free: https://www.infosecinstit...

Career Advice from McAfee’s Lead Scientist | Guest Christiaan Beek

04 Jan 2019

Contributed by Lukas

McAfee's Christiaan Beek discusses his career path and the No More Ransom project.– Start learning cybersecurity for free: https://www.infoseci...

Cyber Threat Hunting: Identify and Hunt Down Intruders | Guest Jeremy Martin

02 Jan 2019

Contributed by Lukas

Learn what it takes to be a modern-day threat hunter with senior security researcher Jeremy Martin.– Start learning cybersecurity for free: https://...

What’s It Like to be a High-End Red Team Member? | Guest David "Moose" Wolpoff

28 Dec 2018

Contributed by Lukas

David "Moose" Wolpoff, CTO of Randori, gives a glimpse into the life of a Red Team Operations professional.– Start learning cybersecurity ...

DNS Exploits, Concerns and Easy Fixes | Guest Andrew Wertkin

21 Dec 2018

Contributed by Lukas

Andrew Wertkin, CTO at BlueCat Networks, discusses DNS security.– Start learning cybersecurity for free: https://www.infosecinstitute.com/free– Vi...

Malware Removal and Security Tips with Malwarebytes | Guest Michael Sherwood

14 Dec 2018

Contributed by Lukas

Michael Sherwood, senior director of technician services at Malwarebytes, talks malware.– Start learning cybersecurity for free: https://www.infosec...

10 Proven Security Awareness Tips From Osterman Research | Guest Michael Osterman

10 Dec 2018

Contributed by Lukas

Michael Osterman, president and analyst at Osterman Research, shares security awareness tips and strategies– Start learning cybersecurity for free: ...

Drilling Holes in ATMs, Card Skimming and Other Fraud | Guest Stan Engelbrecht

07 Dec 2018

Contributed by Lukas

Stan Engelbrecht, director of cyber security practice for D3 Security, discusses ATM fraud.– Start learning cybersecurity for free: https://www.info...

Are Third-Party Vendors Your Biggest Cybersecurity Risk? | Guest Fred Kneip

30 Nov 2018

Contributed by Lukas

Fred Kneip, CEO of CyberGRX, discusses the growth of risk from third-party vendors.– Start learning cybersecurity for free: https://www.infosecinsti...

Transform Your Organization with a Security Champion | Guest Jeff Williams

21 Nov 2018

Contributed by Lukas

OWASP co-founder Jeff Williams discusses how developing a Security Champion can make your organization more secure.– Start learning cybersecurity fo...

Securing the Internet-of-Things (IoT) | Guest Dr. Jared DeMott

16 Nov 2018

Contributed by Lukas

Dr. Jared DeMott, CEO and founder of VDA Labs, chats about the security risks associated with the Internet of Things (IoT).– Start learning cybersec...

Developing Security Champions within DevOps | Guest Ty Sbano

09 Nov 2018

Contributed by Lukas

Ty Sbano, head of security at Periscope Data, talks about building Security Champions in the world of DevOps.– Start learning cybersecurity for free...

How is Cybercrime Impacting the Financial Sector? | Guest Todd Weller

03 Nov 2018

Contributed by Lukas

Todd Weller, chief strategy officer at Bandura Systems, discusses cybercrime in the financial sector and how to build a security awareness program on ...

New Phishing Trends, Old Tactics and Security Awareness | Guest Pedram Amini

26 Oct 2018

Contributed by Lukas

Pedram Amini, creator of the Zero Day Initiative, talks about how  phishing has changed — and stayed the same — over recent years.– Start learn...

Get Started in Cybersecurity: Beginner Tips, Certifications and Career Paths | Guest Keatron Evans

23 Oct 2018

Contributed by Lukas

Cybersecurity professional Keatron Evans shares tips for those looking to break into the industry or change careers.– Start learning cybersecurity f...

Armed Services, Social Engineering and Sensationalist Reporting | Guest Michel Huffaker

19 Oct 2018

Contributed by Lukas

Michel Huffaker, director of threat intelligence at ThreatQuotient, talks about cybersecurity issues facing the military.

Breaking into IT: From First Job to Advanced Certs with CompTIA | Teresa Sears and Christine Tuttleman

16 Oct 2018

Contributed by Lukas

CompTIA subject matter experts discuss beginner IT jobs, skills and certifications

Midterm Elections, Hacking and Information Warfare | Guest John Dickson

12 Oct 2018

Contributed by Lukas

John Dickson, Principal at Denim Group, talks about cybersecurity issues related to the upcoming midterm elections.– Start learning cybersecurity fo...

Defending Against and Recovering from Ransomware | Guest Bill Siegel

05 Oct 2018

Contributed by Lukas

Bill Siegel, co-founder of ransomware-recovery company Coveware, discusses ransomware trends.– Start learning cybersecurity for free: https://www.in...

Turn the Tables on Your Attackers with Deception Technology | Guest Carolyn Crandall

28 Sep 2018

Contributed by Lukas

Chief deception officer Carolyn Crandall talks about using deception technology to trick attackers and protect organizations.– Start learning cybers...

CISSP Exam Changes: Tips to Pass the New CAT Format (and Free E-book) | Guest Ken Magee

25 Sep 2018

Contributed by Lukas

Learn everything you need to pass the new CISSP exam in this discussion with InfoSec Instructor Ken Magee.– Start learning cybersecurity for free: h...

Privacy and Anonymity in the Modern World | Guest Lance Cottrell

23 Sep 2018

Contributed by Lukas

Lance Cottrell of Ntrepid discusses the evolution of online privacy and anonymity.– Start learning cybersecurity for free: https://www.infosecinstit...

Healthcare’s Many Cybersecurity Challenges | Guest Lisa Hedges

16 Sep 2018

Contributed by Lukas

Lisa Hedges, content analyst at Software Advice, Gartner Digital Markets, talks about the many cybersecurity challenges facing the healthcare sector. ...

Cybersecurity Startups and Minority Representation | Guest Ron Gula

08 Sep 2018

Contributed by Lukas

Ron Gula, president of Gula Tech Adventures and co-founder of Tenable Network Security, talks about the evolution of cybersecurity and security awaren...

How to Become a Network Admin | Guest Elias Papatestas

01 Sep 2018

Contributed by Lukas

Learn about the path to becoming a network admin and what a potential career may entail in this discussion with Elias Papatestas, an Infosec Institute...

Post GDPR Best Practices | Guest Susan Morrow

27 Aug 2018

Contributed by Lukas

It's been three months since the EU's General Data Protection Regulation (GDPR) went into effect. Returning guest Susan Morrow and host Chri...

CRISC Roadmap: The Highest-Paying Certification | Guest Leighton Johnson

24 Aug 2018

Contributed by Lukas

Professionals with the Certified in Risk and Information Systems Control (CRISC) certification earn an average of $127,507 each year, making it the hi...

How to Become a Computer Forensics Investigator | Guest Amber Schroader

20 Aug 2018

Contributed by Lukas

Paraben CEO Amber Schroader discusses her path to becoming a computer forensics investigator and provides advice to those who may be considering compu...

Privacy Certifications Boosted by New Regulations | Guest Aaron Stevens

17 Aug 2018

Contributed by Lukas

California’s new privacy law will affect more than half a million U.S. companies when it goes into effect on January 1, 2020 — and that's jus...

The Problem with Passwords | Guest Susan Morrow

13 Aug 2018

Contributed by Lukas

Passwords remain at the heart of many cybersecurity issues, and this week we take a deep dive into the topic with Susan Morrow, who has worked in nume...

PMP Certification: Boost Your Career and Earn More Money | Guest Chris Danek

10 Aug 2018

Contributed by Lukas

Earning your PMP certification can increase your earnings by as much as 20 percent. A Project Management Professional (PMP) certification proves to em...

How to Become an Incident Responder | Guest Keatron Evans

06 Aug 2018

Contributed by Lukas

Learn about the path to becoming an incident responder and what a potential career may entail in this discussion with Keatron Evans, Infosec Institute...

The $9 Billion BEC Threat You Can’t Ignore | Guests Roger Sels and Jack Koziol

03 Aug 2018

Contributed by Lukas

Business email compromise (BEC) attacks are expected to cost businesses $9 billion by the end of 2018, according to Trend Micro estimates. In this dis...

How to Become a Security Architect | Guest Leighton Johnson

26 Jul 2018

Contributed by Lukas

Learn about the life of a security architect in this discussion with Leighton Johnson, the CTO and founder of ISFMT (Information Security Forensics Ma...

«« ← Prev Page 4 of 4