Episodes
-
Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity, the dangers of breaking trust in the global financial system, the emergence of states hiding behind ‘mercenary’ hacking groups and whether it’s appropriate to discuss whitelisting government-grade malware.
-
Principal and founding investor at Trident Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies and the cybersecurity talent shortage.
-
Missing episodes?
-
Chief Information Security officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world.
-
Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.
-
Senior Director of Security and Compliance at Vera Security (@VeraSecurity) Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.
-
Senior Director of Security and Compliance at Vera Security (@VeraSecurity) Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.
-
New Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.
-
Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.
-
Masha Sedova from Elevate Security argues that security awareness training should focus on “behavior change” and recommends the use of positive motivation.
-
Veteran security journalist Paul Roberts talks about his work covering security, the democratization of media, and IoT legislation.