Episodit

  • CISO Circle 10 – Netflow and Security, Good in Theory, Poor in Practice

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    🔗LINKS🔗

    🎧(Podcasts)
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss

    📱(Social Media)
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • CISO Circle 09 – How IT Governance Can Help Your Business

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    🔗LINKS🔗

    🎧(Podcasts)  
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss

    📱(Social Media)  
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • Puuttuva jakso?

    Paina tästä ja päivitä feedi.

  • CISO Circle 08 – The Ransomware Special

    Ransomware is this decade's primary cyber threat to business. This is a quick primer on ransomware.

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    🔗LINKS🔗

    🎧(Podcasts)
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss

    📱(Social Media)
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • CISO Circle 07 – The Cryptocurrency & Blockchain Special

    Is cryptocurrency really a shortcut to riches? Blockchain technology and cryptocurrency has been quite a hot topic in recent years. The podcast host Mike has a profound interest and has got an extensive experience in blockchain and cryptocurrency technology. He has been helping people understand cryptocurrency for years. In this episode he gives his perspective on the future of the technology.

    Announcement – Show listeners get my book for FREE by signing up here:
    https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    Survey Link
    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    🔗LINKS🔗

    🎧(Podcasts)
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss

    📱(Social Media)
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • CISO Circle 06 – How to Start a Career in Cybersecurity

    How to get in the cybersecurity field? With growing online services, data protection and security is very important. Cybersecurity experts play a crucial role in protecting the data.

    Mike discusses a couple of points to help build a foundation or career in cybersecurity. Setting up realistic goals is very important for someone starting out in the field. Proper mindset determines success in the field of cybersecurity.


    Announcement – Show listeners get my book for FREE by signing up here:
    https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    Survey Link
    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    🔗LINKS🔗

    🎧(Podcasts)
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss 

    📱(Social Media)
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • CISO Circle 05 - Riskiest Technologies Sill In Use Today

    In this episode the host Mike discusses three worst technologies used today. The very first technology being dial-up. It is still used in payment card industry, brick and motar retailers and fast-food chains. The reason for using dial up is negligence of current technology standards.

    Second risky technology discussed is IoT based smart devices. These devices are quite vulnerable to attacks. Third one being cloud services.

    Mike further discusses mishap stories about these risky technologies. Outdated technologies leading to severe business impact. He advices how to prevent these risky situations.

    Announcement – Show listeners get my book for FREE by signing up here:
    https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    Survey Link
    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    🔗LINKS🔗

    🎧(Podcasts)
    Breaker: https://www.breaker.audio/ciso-circle
    Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
    Anchor: https://anchor.fm/ciscocircle
    Pocket Casts: https://pca.st/gx8rcjci
    RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
    RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss

    📱(Social Media)
    Linktree: https://linktr.ee/mikeboutwell
    Instagram: https://www.instagram.com/mikeboutwellofficial/
    Twitter: https://twitter.com/MikeBoutwell4
    LinkedIn: https://www.linkedin.com/in/mikeboutwell/

    📧(Collaboration/ inquiries):  [email protected]

  • Have you ever been confused about, who to believe in vulnerability audit? Do you believe an unskilled security professional or your IT head?

    In this episode the host Mike Boutwell, discusses his personal experience with vulnerability audit. The problems with vulnerability scanners, and require manual intervention. An inexperienced security employee can mislead the audit.

    Feel free to share your suggestions at the email below.

    Send your email at [email protected]

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    Survey Link

    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    Social Media

    Linkedin - https://www.linkedin.com/in/mikeboutwell/

    Twitter - https://twitter.com/MikeBoutwell4

    Instagram - https://www.instagram.com/mikeboutwellofficial/

  • In this episode the host Mike Boutwell, discuses the topic of vCISO or virtual chief information security officer. CISO holds crucial cyber security role in an organization. They are held accountable for digital security. VCISO is outsourcing the CISO role to an online company or individual.

    This episode further discusses the major issues with vCISO and why is it important to hire a CISO.

    The solutions to hiring a CISO for your organization.

    Feel free to share your suggestions at the email below.

    Send your email at [email protected]

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.  

    Survey Link

    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    Social Media

    Linkedin - https://www.linkedin.com/in/mikeboutwell/

    Twitter - https://twitter.com/MikeBoutwell4

    Instagram - https://www.instagram.com/mikeboutwellofficial/

    References

    https://www.pcmag.com/news/women-utterly-destroy-men-in-social-engineering-competition

    https://www.networkworld.com/article/2217868/only-5--all-women--of-135-pass-defcon-social-engineering-test.html

    https://www.information-age.com/women-less-likely-be-hacked-men-research-reveals-123459583/

    https://www.psychologytoday.com/us/blog/male-female/201910/women-s-advantages-in-social-cognition

    https://www.kornferry.com/about-us/press/new-research-shows-women-are-better-at-using-soft-skills-crucial-for-effective-leadership

  • Which cyber security area, are women far superior to male counterparts? Cyber security is very important part of a system or organization. Inconsistency and reliability of human nature makes the security implementation difficult.

    In this episode the host Mike Boutwell, talks about how women are superior to man in the area of social engineering. How you can train your staff based on this interesting dynamic.

    Feel free to share your suggestions at the email below.

    Send your email at [email protected]


    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    Survey Link

    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    Social Media

    Linkedin - https://www.linkedin.com/in/mikeboutwell/

    Twitter - https://twitter.com/MikeBoutwell4

    Instagram - https://www.instagram.com/mikeboutwellofficial/

    References

    https://www.pcmag.com/news/women-utterly-destroy-men-in-social-engineering-competition

    https://www.networkworld.com/article/2217868/only-5--all-women--of-135-pass-defcon-social-engineering-test.html

    https://www.information-age.com/women-less-likely-be-hacked-men-research-reveals-123459583/

    https://www.psychologytoday.com/us/blog/male-female/201910/women-s-advantages-in-social-cognition

    https://www.kornferry.com/about-us/press/new-research-shows-women-are-better-at-using-soft-skills-crucial-for-effective-leadership

  • Episode 1 – Introduction to Mike and CISO Circle

    If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode.  In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.

    https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform

    Background

    ~15 years experience in IT engineering, architecture, cyber security, and leadership

    Worked with a very wide range of technologies from:

    Various web development languages Dial up (yes, dial up) LAN/WAN All Cisco Products Designed and wrote a DMVPN Phase 3 white paper before the documentation was published by Cisco Most likely the largest DMVPN Phase 3 deployment in the world Discovered a flaw in Cisco Nexus class switches (FEX) which led to a redesign of the FEX

    Firewalls

    Palo Alto/ Checkpoint/ Cisco ASA

    Load Balancers

    Over 1,000,000 lines of configuration with load balancers such as Cisco ACE and F5

    Owned a software development company where I lead the business side and the overall design requirements for the main product, which was later sold.

    Consulted more than 50+ companies in the blockchain space on mostly cybersecurity matters

    Oversaw several data centers in Europe and Africa, including leading business continuity and disaster recovery planning for

    Worked mostly with financial institutions and fintech firms

    Why I am doing this?

    Small and Medium financial institutions own roughly 30% of the finance business Attacks on these firms could cause a cascading effect on the wider financial system Small and medium sized firms tend to not always have all the talent nor focus to deploy high quality solutions These firms also support small and medium sized businesses AKA mom and pop type businesses, which are a major force in employing people in the United States

    Who I want to reach?

    Any cybersecurity or information security decision maker who is interested in learning more about the vast array of challenges and solutions that are available

    Who I want to interview?

    Any cybersecurity decision maker who would like to share their knowledge and experience and have a meaningful discussion about their perspectives and focus areas.

    Other possibilities

    Anyone interested in cybersecurity as a hobby, general interest or future career path should like & subscribe to the channel. The more this channel and podcast grows, the more high-quality content I can share with you. Come be a part of this enthusiastic and growing community.

    Social Media

    Linkedin - https://www.linkedin.com/in/mikeboutwell/

    Twitter - https://twitter.com/MikeBoutwell4

    Instagram - https://www.instagram.com/mikeboutwellofficial/