Episodi
-
CISO Circle 10 – Netflow and Security, Good in Theory, Poor in Practice
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
CISO Circle 09 – How IT Governance Can Help Your Business
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
Episodi mancanti?
-
CISO Circle 08 – The Ransomware Special
Ransomware is this decade's primary cyber threat to business. This is a quick primer on ransomware.
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
CISO Circle 07 – The Cryptocurrency & Blockchain Special
Is cryptocurrency really a shortcut to riches? Blockchain technology and cryptocurrency has been quite a hot topic in recent years. The podcast host Mike has a profound interest and has got an extensive experience in blockchain and cryptocurrency technology. He has been helping people understand cryptocurrency for years. In this episode he gives his perspective on the future of the technology.
Announcement – Show listeners get my book for FREE by signing up here:
https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Link
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
CISO Circle 06 – How to Start a Career in Cybersecurity
How to get in the cybersecurity field? With growing online services, data protection and security is very important. Cybersecurity experts play a crucial role in protecting the data.
Mike discusses a couple of points to help build a foundation or career in cybersecurity. Setting up realistic goals is very important for someone starting out in the field. Proper mindset determines success in the field of cybersecurity.
Announcement – Show listeners get my book for FREE by signing up here:
https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Link
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
CISO Circle 05 - Riskiest Technologies Sill In Use Today
In this episode the host Mike discusses three worst technologies used today. The very first technology being dial-up. It is still used in payment card industry, brick and motar retailers and fast-food chains. The reason for using dial up is negligence of current technology standards.
Second risky technology discussed is IoT based smart devices. These devices are quite vulnerable to attacks. Third one being cloud services.
Mike further discusses mishap stories about these risky technologies. Outdated technologies leading to severe business impact. He advices how to prevent these risky situations.
Announcement – Show listeners get my book for FREE by signing up here:
https://pallascybersecurity.com/cybersecurity-podcast-ciso-circle/If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Link
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform🔗LINKS🔗
🎧(Podcasts)
Breaker: https://www.breaker.audio/ciso-circle
Spotify: https://open.spotify.com/show/7aCtxsDVMHazqtMvjtEwPK
Anchor: https://anchor.fm/ciscocircle
Pocket Casts: https://pca.st/gx8rcjci
RadoPublic: https://radiopublic.com/ciso-circle-GyeL0E
RSS Feed: https://anchor.fm/s/57da71e8/podcast/rss
📱(Social Media)
Linktree: https://linktr.ee/mikeboutwell
Instagram: https://www.instagram.com/mikeboutwellofficial/
Twitter: https://twitter.com/MikeBoutwell4
LinkedIn: https://www.linkedin.com/in/mikeboutwell/📧(Collaboration/ inquiries): [email protected]
-
Have you ever been confused about, who to believe in vulnerability audit? Do you believe an unskilled security professional or your IT head?
In this episode the host Mike Boutwell, discusses his personal experience with vulnerability audit. The problems with vulnerability scanners, and require manual intervention. An inexperienced security employee can mislead the audit.
Feel free to share your suggestions at the email below.
Send your email at [email protected]
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Link
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform
Social Media
Linkedin - https://www.linkedin.com/in/mikeboutwell/
Twitter - https://twitter.com/MikeBoutwell4
Instagram - https://www.instagram.com/mikeboutwellofficial/
-
In this episode the host Mike Boutwell, discuses the topic of vCISO or virtual chief information security officer. CISO holds crucial cyber security role in an organization. They are held accountable for digital security. VCISO is outsourcing the CISO role to an online company or individual.
This episode further discusses the major issues with vCISO and why is it important to hire a CISO.
The solutions to hiring a CISO for your organization.
Feel free to share your suggestions at the email below.
Send your email at [email protected]
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Link
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform
Social Media
Linkedin - https://www.linkedin.com/in/mikeboutwell/
Twitter - https://twitter.com/MikeBoutwell4
Instagram - https://www.instagram.com/mikeboutwellofficial/
References
https://www.pcmag.com/news/women-utterly-destroy-men-in-social-engineering-competition
https://www.networkworld.com/article/2217868/only-5--all-women--of-135-pass-defcon-social-engineering-test.html
https://www.information-age.com/women-less-likely-be-hacked-men-research-reveals-123459583/
https://www.psychologytoday.com/us/blog/male-female/201910/women-s-advantages-in-social-cognition
https://www.kornferry.com/about-us/press/new-research-shows-women-are-better-at-using-soft-skills-crucial-for-effective-leadership
-
Which cyber security area, are women far superior to male counterparts? Cyber security is very important part of a system or organization. Inconsistency and reliability of human nature makes the security implementation difficult.
In this episode the host Mike Boutwell, talks about how women are superior to man in the area of social engineering. How you can train your staff based on this interesting dynamic.
Feel free to share your suggestions at the email below.
Send your email at [email protected]
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
Survey Linkhttps://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform
Social Media
Linkedin - https://www.linkedin.com/in/mikeboutwell/
Twitter - https://twitter.com/MikeBoutwell4
Instagram - https://www.instagram.com/mikeboutwellofficial/
References
https://www.pcmag.com/news/women-utterly-destroy-men-in-social-engineering-competition
https://www.networkworld.com/article/2217868/only-5--all-women--of-135-pass-defcon-social-engineering-test.html
https://www.information-age.com/women-less-likely-be-hacked-men-research-reveals-123459583/
https://www.psychologytoday.com/us/blog/male-female/201910/women-s-advantages-in-social-cognition
https://www.kornferry.com/about-us/press/new-research-shows-women-are-better-at-using-soft-skills-crucial-for-effective-leadership
-
Episode 1 – Introduction to Mike and CISO Circle
If you are a CISO, CIO, CSO, or other security executive, please share your current challenges by sending an email to [email protected] and I can address the challenge in a future episode. In addition, please take the time to fill out a short survey to help me create better content for you! The link is below.
https://docs.google.com/forms/d/e/1FAIpQLSfVq2bU_ahvCixlQyLTVZEBRz-ZVQaxZet6x28-M1Wl92eThg/viewform
Background
~15 years experience in IT engineering, architecture, cyber security, and leadership
Worked with a very wide range of technologies from:
Various web development languages Dial up (yes, dial up) LAN/WAN All Cisco Products Designed and wrote a DMVPN Phase 3 white paper before the documentation was published by Cisco Most likely the largest DMVPN Phase 3 deployment in the world Discovered a flaw in Cisco Nexus class switches (FEX) which led to a redesign of the FEXFirewalls
Palo Alto/ Checkpoint/ Cisco ASALoad Balancers
Over 1,000,000 lines of configuration with load balancers such as Cisco ACE and F5Owned a software development company where I lead the business side and the overall design requirements for the main product, which was later sold.
Consulted more than 50+ companies in the blockchain space on mostly cybersecurity matters
Oversaw several data centers in Europe and Africa, including leading business continuity and disaster recovery planning for
Worked mostly with financial institutions and fintech firms
Why I am doing this?
Small and Medium financial institutions own roughly 30% of the finance business Attacks on these firms could cause a cascading effect on the wider financial system Small and medium sized firms tend to not always have all the talent nor focus to deploy high quality solutions These firms also support small and medium sized businesses AKA mom and pop type businesses, which are a major force in employing people in the United StatesWho I want to reach?
Any cybersecurity or information security decision maker who is interested in learning more about the vast array of challenges and solutions that are availableWho I want to interview?
Any cybersecurity decision maker who would like to share their knowledge and experience and have a meaningful discussion about their perspectives and focus areas.Other possibilities
Anyone interested in cybersecurity as a hobby, general interest or future career path should like & subscribe to the channel. The more this channel and podcast grows, the more high-quality content I can share with you. Come be a part of this enthusiastic and growing community.Social Media
Linkedin - https://www.linkedin.com/in/mikeboutwell/
Twitter - https://twitter.com/MikeBoutwell4
Instagram - https://www.instagram.com/mikeboutwellofficial/