Cyber Work
Episodes
Hacking since age six | Guest Nir Gaist
25 Nov 2019
Contributed by Lukas
Nir Gaist, Founder and CTO at Nyotron, and Cyber Work podcast host Chris Sienko, discuss Nir's cybersecurity journey (which started from hacking ...
2020 election cybersecurity strategies | Guest Bob Stevens
18 Nov 2019
Contributed by Lukas
Bob Stevens, VP of Americas at Lookout, and Cyber Work Podcast host Chris Sienko, discuss election cybersecurity strategies, tips and ramifications fo...
The ROI of security awareness training | Guest Michael Osterman and Lisa Plaggemmier
14 Nov 2019
Contributed by Lukas
Security awareness programs help organizations achieve the ultimate goal of fewer security incidents, but how do the benefits compare to the costs and...
Hyperspecialization in cybersecurity | Guest John Wheeler
11 Nov 2019
Contributed by Lukas
John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding. – St...
Insider tips from a cybersecurity CEO | Guest Scott Madsen
04 Nov 2019
Contributed by Lukas
Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of ...
How being hacked inspired a comic book series | Guest Gary Berman
28 Oct 2019
Contributed by Lukas
Gary Berman, creator of The Cyberhero Adventures: Defenders of the Digital Universe comic book series, and Cyber Work host Chris Sienko discuss Berman...
Privacy is shaping the future of cybersecurity careers: Are you ready? | Guest Byron Johnson
24 Oct 2019
Contributed by Lukas
Celebrate National Cybersecurity Awareness Month by learning about privacy with IAPP's Channel Sales Manager Byron Johnson — plus get 30 days o...
Networking, engineering and education | Guest Tia Hopkins
21 Oct 2019
Contributed by Lukas
Tia Hopkins, Vice President of Global Sales Engineering at eSentire, and Cyber Work host Chris Sienko discuss Hopkins' past in physical networkin...
Engineering, cybersecurity and changing careers | Guest Dave Farrow
14 Oct 2019
Contributed by Lukas
Dave Farrow discusses his unconventional career journey and the intersection of engineering and cybersecurity. – Start learning cybersecurity for fr...
Combating phishing, malware and hackers | Guest Atif Mushtaq
07 Oct 2019
Contributed by Lukas
Atif Mushtaq, founder and CEO of SlashNext, and Cyber Work host Chris Sienko discuss the current and future trends of web-based phishing and malware a...
30 days of free training! | Breaking into cybersecurity with CompTIA | Guest James Stanger
03 Oct 2019
Contributed by Lukas
Celebrate National Cybersecurity Awareness Month by learning how to start a cybersecurity career with CompTIA's Chief Technology Evangelist James...
The future of cybersecurity training: Subscription-based learning | Guest Jason Dion
30 Sep 2019
Contributed by Lukas
Jason Dion, a cybersecurity training leader and an Infosec Skills course author, and Cyber Work host Chris Sienko discuss subscription-based cybersecu...
Digital forensics, data analysis and data recovery | Guest Allan Buxton
23 Sep 2019
Contributed by Lukas
Allan Buxton, Director of Forensics at SECUREDATA, Inc., and Cyber Work host, Chris Sienko, discuss Allan's career journey, how digital forensics...
Alissa Knight talks API security, formjacking and hacking | Guest Alissa Knight
16 Sep 2019
Contributed by Lukas
Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcomin...
From hacker to lawyer: An expert in cybersecurity law | Guest Bradley Gross
09 Sep 2019
Contributed by Lukas
Bradley Gross, founder and president of Law Office of Bradley Gross and an expert in technology and digital law, discusses his career arc from hacker ...
Ask an expert: How to start and advance your cybersecurity career | Guest Keatron Evans
05 Sep 2019
Contributed by Lukas
Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, I...
The human element of cybersecurity careers | Guest Cheryl Kerrigan
02 Sep 2019
Contributed by Lukas
Cheryl Kerrigan, Vice President of People at BlueCat, discusses the importance of communication, soft skills and healthy employee cultures in modern c...
How to become a cybersecurity analyst | Guest Jonathan Butler
26 Aug 2019
Contributed by Lukas
Jonathan Butler, Professional Services & Security Analytics Manager at Distil Networks, discusses his security analyst journey, what someone shoul...
Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski
22 Aug 2019
Contributed by Lukas
Are phishing simulations pentesting for humans or training? What’s more effective with those folks who can’t stop themselves from clicking on ever...
What’s it like being a cybersecurity risk analyst? | Guest John Bree
19 Aug 2019
Contributed by Lukas
John Bree, Neo Group Inc. Senior Vice President and Partner, discusses his risk analyst journey, what a day in the life of a risk analyst looks like a...
The importance of cybersecurity education | Guest Dave Hatter
12 Aug 2019
Contributed by Lukas
Dave Hatter, a cybersecurity consultant for over 25 years and a technology educator at Cincinnati State, discusses his security journey, the future of...
PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane
08 Aug 2019
Contributed by Lukas
Patrick Lane, CompTIA Director of Products discusses everything you need to know about CompTIA’s PenTest+ cert, including why CompTIA created the Pe...
Leveraging board governance for cybersecurity | Guest Michael Figueroa
05 Aug 2019
Contributed by Lukas
Michael Figueroa, President and Executive Director of the Advanced Cyber Security Center (ACSC), discusses the importance of leveraging board governan...
The dangers of role-based access control (RBAC) | Guest Balaji Parimi
29 Jul 2019
Contributed by Lukas
Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current problems with role-based access control and how access control is evolving...
Getting started in digital forensics | Guest Keatron Evans
25 Jul 2019
Contributed by Lukas
Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence acros...
What does a vulnerability verification specialist do? | Guest Lauren McCaslin
22 Jul 2019
Contributed by Lukas
Lauren McCaslin, vulnerability verification team lead for the Threat Research Center at WhiteHat Security, discusses her path to becoming a vulnerabil...
Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight
15 Jul 2019
Contributed by Lukas
Alissa Knight, senior analyst at Aite Group, discusses her work penetration testing connected cars and the ups and downs of her security career, from ...
Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison
11 Jul 2019
Contributed by Lukas
The shortage of cybersecurity professionals has grown to nearly three million globally, with approximately 498,000 openings in North America. In addit...
Preventing and repairing security breaches | Guest John Torres
08 Jul 2019
Contributed by Lukas
John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations fro...
Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow
01 Jul 2019
Contributed by Lukas
Susan Morrow, head of research and development at Avoco Secure, returns to the podcast to discuss her 20 years in the security industry, how she lande...
DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin
24 Jun 2019
Contributed by Lukas
Andrew Wertkin, CTO of BlueCat Networks, returns to the podcast to discuss a new and hotly contested privacy technology called DNS over HTTPS (DoH), t...
Latest malware trends are bad news for business | Guest Adam Kujawa
17 Jun 2019
Contributed by Lukas
Malwarebytes Adam Kujawa discusses the latest malware tactics and techniques.– Start learning cybersecurity for free: https://www.infosecinstitute.c...
How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan
10 Jun 2019
Contributed by Lukas
Exabeam's Anu Yamunan discusses how data science and machine learning are being used in cybersecurity.– Start learning cybersecurity for free: ...
How to become an APT hunter with Carbon Black | Guest David Balcar
03 Jun 2019
Contributed by Lukas
Carbon Black's David Balcar discusses hunting advanced persistent threats (APTs).– Start learning cybersecurity for free: https://www.infosecin...
Fraud trends from the latest ThreatMetrix cybercrime report | Guest Rebekah Moody
27 May 2019
Contributed by Lukas
ThreatMetrix's Rebekah Moody discusses the latest fraud and cybercrime trends.– Start learning cybersecurity for free: https://www.infosecinsti...
Protecting customer data at contact centers | Guest Ben Rafferty
20 May 2019
Contributed by Lukas
Semafone's Ben Rafferty discusses fraud at contact centers.– Start learning cybersecurity for free: https://www.infosecinstitute.com/free– Vi...
Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan
09 May 2019
Contributed by Lukas
Kelly Sheridan, reporter and staff editor for Dark Reading, discusses her extensive research and reporting on the cybersecurity skills gap and offers ...
Benefits and challenges of securing your cloud data | Guest Andrew Howard
03 May 2019
Contributed by Lukas
Kudelski Security CTO Andrew Howard discusses securing your data in the cloud.– Start learning cybersecurity for free: https://www.infosecinstitute....
Focusing on users is the only way to improve cybersecurity | Guest Ben Johnson
26 Apr 2019
Contributed by Lukas
Ben Johnson, CTO and co-founder of Obsidian Security, discusses a variety of different topics around the umbrella theme of shifting cybersecurity prio...
Risk management and understanding what matters most | Guest Liz Mann
19 Apr 2019
Contributed by Lukas
EY's Liz Mann discusses risk management and her work building a diverse cybersecurity workforce.– Start learning cybersecurity for free: https:...
How to become a Certified Ethical Hacker (CEH) | Guest Keatron Evans
15 Apr 2019
Contributed by Lukas
Infosec's Keatron Evans discusses ethical hacking careers and the Certified Ethical Hacker (CEH).– Start learning cybersecurity for free: https...
What does a director of fraud and identity do? | Guest Kimberly Sutherland
11 Apr 2019
Contributed by Lukas
Kimberly Sutherland of LexisNexis Risk Solutions discusses authentication and identity-proofing.– Start learning cybersecurity for free: https://www...
What’s it like to be a help desk manager? | Guest Gloria Milton
04 Apr 2019
Contributed by Lukas
Gloria Milton, help desk manager at itSynergy, discusses what it is like to be a help desk manager and her two decades of experience in the industry. ...
Saving lives with ICS and critical infrastructure security | Guest Emily Miller
28 Mar 2019
Contributed by Lukas
Emily Miller, director of national security and critical infrastructure programs at Mocana, discusses her passion for critical infrastructure security...
Creating a more diverse cybersecurity workforce | Guest Ruth Gomel-Kafri
22 Mar 2019
Contributed by Lukas
Ruth Gomel-Kafri, director of product design at the security policy company Tufin, discusses her work overseeing the company's product design gro...
Take control of your infosec career with CyberSeek | Guest Tim Herbert
15 Mar 2019
Contributed by Lukas
Tim Herbert, vice president of research and market intelligence for CyberSeek, joins us to discuss something we're very excited about at Infosec,...
VPNs and the ongoing battle for privacy | Guest Pete Zaborszky
08 Mar 2019
Contributed by Lukas
Pete Zaborszky, founder of BestVPN.com, discusses VPNs and online privacy.– Start learning cybersecurity for free: https://www.infosecinstitute.com/...
Where are All the Government Infosec Professionals? | Guest Gregory Garrett
02 Mar 2019
Contributed by Lukas
Gregory Garrett, head of U.S. and international cybersecurity for BDO, discusses the U.S. government's cybersecurity skills gap.– Start learnin...
The Business Impact of Cyber Risk | Guests David Kruse, Jeff McCollum and Justin Webb
26 Feb 2019
Contributed by Lukas
A panel of experts discusses how businesses are impacted by cyber risk.– Start learning cybersecurity for free: https://www.infosecinstitute.com/fre...
The Current State of Artificial Intelligence in Cybersecurity | Guest Eric Stevens
22 Feb 2019
Contributed by Lukas
Eric Stevens, vice president of engineering and principal architect at ProtectWise, discusses the current state of artificial intelligence in cybersec...
Closing the Cyber Skills Gap | Guest Kathleen Hyde
15 Feb 2019
Contributed by Lukas
Kathleen Hyde, chair of cybersecurity programs at Champlain College online, discusses a topic that's a big part of InfoSec Institute's initi...
CIS Top 20 Security Controls with Tony Sager | Guest Tony Sager
12 Feb 2019
Contributed by Lukas
Get insight into the CIS Top 20 Security Controls straight from the source, Center for Internet Security® Senior Vice President and Chief Evangelist ...
Growing the Number of Women in Cybersecurity | Guest Olivia Rose
08 Feb 2019
Contributed by Lukas
Olivia Rose, director of global executive risk solutions at Kudelski Security, gives advice to women who are considering entering the cybersecurity in...
California Consumer Privacy Act: Are You Prepared for 2020? | Guests Jay Rodne and Aaron Weller
05 Feb 2019
Contributed by Lukas
The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish or...
Getting Started in Red Teaming and Offensive Security | Guest Curtis Brazzell
01 Feb 2019
Contributed by Lukas
Get insight into what it takes to be a successful Red Team member in this chat with Curtis Brazzell, managing security consultant at Pondurance.– St...
How to Become a Chief Information Security Officer | Guest Joshua Knight
25 Jan 2019
Contributed by Lukas
Joshua Knight, cybersecurity business leader at Dimension Data, discusses his career journey as well as the steps you can take to move your career tow...
Community Cyber-Attacks, Simulations and Cooperation | Guest Michael Figueroa
19 Jan 2019
Contributed by Lukas
Michael Figueroa discusses the ACSC's first collaborative defense simulation and defending against community-level attacks.– Start learning cyb...
How to Launch a Career in Application Security | Guest Dan Cornell
11 Jan 2019
Contributed by Lukas
Learn about AppSec careers in this discussion with Dan Cornell, chief technology officer at Denim Group.– Start learning cybersecurity for free: htt...
Red Team Operations: Attack and Think Like a Criminal | Guest Jeremy Martin
08 Jan 2019
Contributed by Lukas
Dig into the mindset of an attacker with senior security researcher Jeremy Martin.– Start learning cybersecurity for free: https://www.infosecinstit...
Career Advice from McAfee’s Lead Scientist | Guest Christiaan Beek
04 Jan 2019
Contributed by Lukas
McAfee's Christiaan Beek discusses his career path and the No More Ransom project.– Start learning cybersecurity for free: https://www.infoseci...
Cyber Threat Hunting: Identify and Hunt Down Intruders | Guest Jeremy Martin
02 Jan 2019
Contributed by Lukas
Learn what it takes to be a modern-day threat hunter with senior security researcher Jeremy Martin.– Start learning cybersecurity for free: https://...
What’s It Like to be a High-End Red Team Member? | Guest David "Moose" Wolpoff
28 Dec 2018
Contributed by Lukas
David "Moose" Wolpoff, CTO of Randori, gives a glimpse into the life of a Red Team Operations professional.– Start learning cybersecurity ...
DNS Exploits, Concerns and Easy Fixes | Guest Andrew Wertkin
21 Dec 2018
Contributed by Lukas
Andrew Wertkin, CTO at BlueCat Networks, discusses DNS security.– Start learning cybersecurity for free: https://www.infosecinstitute.com/free– Vi...
Malware Removal and Security Tips with Malwarebytes | Guest Michael Sherwood
14 Dec 2018
Contributed by Lukas
Michael Sherwood, senior director of technician services at Malwarebytes, talks malware.– Start learning cybersecurity for free: https://www.infosec...
10 Proven Security Awareness Tips From Osterman Research | Guest Michael Osterman
10 Dec 2018
Contributed by Lukas
Michael Osterman, president and analyst at Osterman Research, shares security awareness tips and strategies– Start learning cybersecurity for free: ...
Drilling Holes in ATMs, Card Skimming and Other Fraud | Guest Stan Engelbrecht
07 Dec 2018
Contributed by Lukas
Stan Engelbrecht, director of cyber security practice for D3 Security, discusses ATM fraud.– Start learning cybersecurity for free: https://www.info...
Are Third-Party Vendors Your Biggest Cybersecurity Risk? | Guest Fred Kneip
30 Nov 2018
Contributed by Lukas
Fred Kneip, CEO of CyberGRX, discusses the growth of risk from third-party vendors.– Start learning cybersecurity for free: https://www.infosecinsti...
Transform Your Organization with a Security Champion | Guest Jeff Williams
21 Nov 2018
Contributed by Lukas
OWASP co-founder Jeff Williams discusses how developing a Security Champion can make your organization more secure.– Start learning cybersecurity fo...
Securing the Internet-of-Things (IoT) | Guest Dr. Jared DeMott
16 Nov 2018
Contributed by Lukas
Dr. Jared DeMott, CEO and founder of VDA Labs, chats about the security risks associated with the Internet of Things (IoT).– Start learning cybersec...
Developing Security Champions within DevOps | Guest Ty Sbano
09 Nov 2018
Contributed by Lukas
Ty Sbano, head of security at Periscope Data, talks about building Security Champions in the world of DevOps.– Start learning cybersecurity for free...
How is Cybercrime Impacting the Financial Sector? | Guest Todd Weller
03 Nov 2018
Contributed by Lukas
Todd Weller, chief strategy officer at Bandura Systems, discusses cybercrime in the financial sector and how to build a security awareness program on ...
New Phishing Trends, Old Tactics and Security Awareness | Guest Pedram Amini
26 Oct 2018
Contributed by Lukas
Pedram Amini, creator of the Zero Day Initiative, talks about how phishing has changed — and stayed the same — over recent years.– Start learn...
Get Started in Cybersecurity: Beginner Tips, Certifications and Career Paths | Guest Keatron Evans
23 Oct 2018
Contributed by Lukas
Cybersecurity professional Keatron Evans shares tips for those looking to break into the industry or change careers.– Start learning cybersecurity f...
Armed Services, Social Engineering and Sensationalist Reporting | Guest Michel Huffaker
19 Oct 2018
Contributed by Lukas
Michel Huffaker, director of threat intelligence at ThreatQuotient, talks about cybersecurity issues facing the military.
Breaking into IT: From First Job to Advanced Certs with CompTIA | Teresa Sears and Christine Tuttleman
16 Oct 2018
Contributed by Lukas
CompTIA subject matter experts discuss beginner IT jobs, skills and certifications
Midterm Elections, Hacking and Information Warfare | Guest John Dickson
12 Oct 2018
Contributed by Lukas
John Dickson, Principal at Denim Group, talks about cybersecurity issues related to the upcoming midterm elections.– Start learning cybersecurity fo...
Defending Against and Recovering from Ransomware | Guest Bill Siegel
05 Oct 2018
Contributed by Lukas
Bill Siegel, co-founder of ransomware-recovery company Coveware, discusses ransomware trends.– Start learning cybersecurity for free: https://www.in...
Turn the Tables on Your Attackers with Deception Technology | Guest Carolyn Crandall
28 Sep 2018
Contributed by Lukas
Chief deception officer Carolyn Crandall talks about using deception technology to trick attackers and protect organizations.– Start learning cybers...
CISSP Exam Changes: Tips to Pass the New CAT Format (and Free E-book) | Guest Ken Magee
25 Sep 2018
Contributed by Lukas
Learn everything you need to pass the new CISSP exam in this discussion with InfoSec Instructor Ken Magee.– Start learning cybersecurity for free: h...
Privacy and Anonymity in the Modern World | Guest Lance Cottrell
23 Sep 2018
Contributed by Lukas
Lance Cottrell of Ntrepid discusses the evolution of online privacy and anonymity.– Start learning cybersecurity for free: https://www.infosecinstit...
Healthcare’s Many Cybersecurity Challenges | Guest Lisa Hedges
16 Sep 2018
Contributed by Lukas
Lisa Hedges, content analyst at Software Advice, Gartner Digital Markets, talks about the many cybersecurity challenges facing the healthcare sector. ...
Cybersecurity Startups and Minority Representation | Guest Ron Gula
08 Sep 2018
Contributed by Lukas
Ron Gula, president of Gula Tech Adventures and co-founder of Tenable Network Security, talks about the evolution of cybersecurity and security awaren...
How to Become a Network Admin | Guest Elias Papatestas
01 Sep 2018
Contributed by Lukas
Learn about the path to becoming a network admin and what a potential career may entail in this discussion with Elias Papatestas, an Infosec Institute...
Post GDPR Best Practices | Guest Susan Morrow
27 Aug 2018
Contributed by Lukas
It's been three months since the EU's General Data Protection Regulation (GDPR) went into effect. Returning guest Susan Morrow and host Chri...
CRISC Roadmap: The Highest-Paying Certification | Guest Leighton Johnson
24 Aug 2018
Contributed by Lukas
Professionals with the Certified in Risk and Information Systems Control (CRISC) certification earn an average of $127,507 each year, making it the hi...
How to Become a Computer Forensics Investigator | Guest Amber Schroader
20 Aug 2018
Contributed by Lukas
Paraben CEO Amber Schroader discusses her path to becoming a computer forensics investigator and provides advice to those who may be considering compu...
Privacy Certifications Boosted by New Regulations | Guest Aaron Stevens
17 Aug 2018
Contributed by Lukas
California’s new privacy law will affect more than half a million U.S. companies when it goes into effect on January 1, 2020 — and that's jus...
The Problem with Passwords | Guest Susan Morrow
13 Aug 2018
Contributed by Lukas
Passwords remain at the heart of many cybersecurity issues, and this week we take a deep dive into the topic with Susan Morrow, who has worked in nume...
PMP Certification: Boost Your Career and Earn More Money | Guest Chris Danek
10 Aug 2018
Contributed by Lukas
Earning your PMP certification can increase your earnings by as much as 20 percent. A Project Management Professional (PMP) certification proves to em...
How to Become an Incident Responder | Guest Keatron Evans
06 Aug 2018
Contributed by Lukas
Learn about the path to becoming an incident responder and what a potential career may entail in this discussion with Keatron Evans, Infosec Institute...
The $9 Billion BEC Threat You Can’t Ignore | Guests Roger Sels and Jack Koziol
03 Aug 2018
Contributed by Lukas
Business email compromise (BEC) attacks are expected to cost businesses $9 billion by the end of 2018, according to Trend Micro estimates. In this dis...
How to Become a Security Architect | Guest Leighton Johnson
26 Jul 2018
Contributed by Lukas
Learn about the life of a security architect in this discussion with Leighton Johnson, the CTO and founder of ISFMT (Information Security Forensics Ma...