CISSP عمومي
[search 0]
أكثر
تنزيل التطبيق!
show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
أسبوعيا+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

Unsubscribe
Unsubscribe
شهريا
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
شهريا
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Unsubscribe
Unsubscribe
شهريا
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Digital Self-Defense is a podcast that explains the basics of cybersecurity and data protection in an accessible, user-friendly voice. DSD instructs listeners in understanding the basics of cybersecurity, dissects and explains significant current events relating to cybersecurity, and helps listeners learn how to keep themselves from hacks and threats. Hosted by cybersecurity professional Tim Honker (CISSP), Digital Self Defense avoids technical jargon at all costs and provides an overview ab ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Your Career On Target

InterCoast Colleges

Unsubscribe
Unsubscribe
شهريا
 
Vocational school is becoming a popular choice among graduates and others looking to pave a new career path, especially with the cost of college climbing. Furthering your education is always a great idea, so if you have your heart set on a particular occupation, check out a trade school first. You may be pleasantly surprised to find you can get your training in the trades or in healthcare faster, for a lot less money and still come out with a job.
  continue reading
 
Artwork

1
Blak Cyber

George McPherson

Unsubscribe
Unsubscribe
شهريا
 
"Securing Our Place In The Industry"​ The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry. Support this podcast: https://podcasters.spotify.com/pod/show/blakcyber/support
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
شهريا
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Send us a text Crack the code of security architecture and engineering with this episode of the CISSP Cyber Training Podcast! Ever wondered how different security models apply to real-world scenarios? We'll give you the insights and knowledge you need to discuss these models confidently with senior leaders and implement robust security controls. We…
  continue reading
 
In this episode, the hosts discuss the implications of AI in cybersecurity, focusing on a recent article about hackers planting false memories in ChatGPT to exfiltrate user data. They explore the mechanics of prompt injection attacks, the importance of user awareness regarding AI memory management, and the potential security risks associated with A…
  continue reading
 
In this episode, the hosts discuss Kaspersky's withdrawal from the US market and the subsequent transition to Ultra AV. They explore the implications of this change for users, including concerns about security and the importance of user awareness in cybersecurity. The conversation emphasizes the need for vigilance regarding email notifications and …
  continue reading
 
In this episode, the hosts discuss a significant Android malware incident that infected 11 million devices through the Google Play Store. They explore the implications of SDKs in app development, the differences in security measures between Google Play and the Apple App Store, and the global trends in smartphone usage. The conversation emphasizes t…
  continue reading
 
Send us a text What if your organization's security posture could withstand any cyber threat? This episode of the CISSP Cyber Training Podcast promises to equip you with actionable insights from CISSP Domain 3, emphasizing the critical principle of failing securely. We tackle the intricacies of separation of duties, zero trust, and the benefits of …
  continue reading
 
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr., Shannon Tynes, Chris Abacon, and Daniel Acevedo discuss a variety of topics ranging from sports updates, personal growth through business education, Halloween plans, and their latest gaming experiences. They also delve into their entrepreneurial ventures, includin…
  continue reading
 
Crypto Wars: The Ongoing Battle Between Privacy and Security Join Nathan from StationX as he delves into the history of the 'Crypto Wars,' a decades-long conflict over encryption between governments, technology companies, and privacy advocates. This episode covers major moments like the Clipper Chip controversy, the impact of the U.S. Patriot Act p…
  continue reading
 
Send us a text Ever wondered about the real difference between a data leak and a data breach? Join me, Sean Gerber, on the latest episode of the CISSP Cyber Training Podcast as we unpack the nuances between these two critical cybersecurity concepts. Learn how data leaks often result from human mistakes like weak passwords, while data breaches invol…
  continue reading
 
In this episode of 'Ask a CISSP', Ryan Williams interviews Dr. Eric Todd Hollis, a seasoned cybersecurity expert, and educator. They discuss Dr. Hollis's extensive military background, his transition into academia, and the importance of lifelong learning and mentorship in the cybersecurity field. Dr. Hollis shares insights about his consulting busi…
  continue reading
 
Download the guide: https://www.cisecurity.org/insights/white-papers/from-both-sides-a-parental-guide-to-protecting-your-childs-online-activity Are you a parent looking for guidance on how to keep kids safe online? Join us for a candid conversation with Sean Atkinson, CISO at the Center for Internet Security, and his daughter, Emma, as they discuss…
  continue reading
 
In this episode of the podcast, the hosts discuss the latest cybersecurity news, focusing on the implications of recent explosions in Lebanon and Syria. They explore the role of old technology in cyber threats, particularly in supply chain attacks, and emphasize the importance of risk management and due diligence in cybersecurity practices. The con…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss Craig Newmark's significant $100 million pledge towards cybersecurity, emphasizing the importance of both infrastructure protection and education. They express concerns about managing these funds and the need for greater awareness and training in cybersecurity practices. T…
  continue reading
 
In this episode, the hosts discuss the implications of generative AI on cybersecurity, highlighting the concerns of IT leaders regarding the security of AI applications. They explore the complexities of AI integration in organizations, the human element in cybersecurity risks, and the challenges faced by C-suite executives in making informed decisi…
  continue reading
 
🎧 The new episode of The Other Side of the Firewall is live! This week, we’re talking NFL heartbreaks, gaming frustrations with Madden 25, and Tokyo adventures. Whether you’re in cybersecurity or need a break, tune in and unwind with us! 🎙️🔥 LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Socials: Website - www.ramcyber.io Audio - https://podcasts.apple.com/…
  continue reading
 
Send us a text Ever wondered how a TI-84 calculator can be transformed into a powerful tool for ChatGPT? Join me, Sean Gerber, on this thrilling episode of the CISSP Cyber Training Podcast as we uncover this fascinating tale and explore the evolving landscape of data security. We'll dissect the crucial elements of Domain 2.6 of the CISSP exam, from…
  continue reading
 
Send us a text How can we effectively bridge the cybersecurity skills gap and protect sensitive data in the cloud? In this action-packed episode of the CISSP Cyber Training Podcast, we kick things off by analyzing insights from a recent UK international cyber skills conference. We discuss the UK's innovative initiatives to enhance cybersecurity edu…
  continue reading
 
In this collaborative episode of Cyber Coffee Hour and The Other Side of the Firewall, hosts Dr. Joseph J. Burt Miller Jr., Ryan Williams Sr., Alfredo B. Nash Jr., Shannon Tynes, and Daniel Acevedo discuss the recent acquisition of Recorded Future by Mastercard. They explore the significance of this acquisition in enhancing Mastercard's cybersecuri…
  continue reading
 
Rambo Attack: A New Threat to Air-Gapped Computers Discover the groundbreaking 'Rambo Attack,' a method to exfiltrate data from air-gapped computers via electromagnetic radiation from RAM. Nathan from StationX explains how malware manipulates RAM to emit radio signals, enabling nearby receivers to capture data without any direct connection. Learn a…
  continue reading
 
Send us a text Are you ready to uncover the secrets behind successful candidate screening and robust employment agreements in cybersecurity? Join us on this episode of the CISSP Cyber Training Podcast, where we promise to equip you with essential techniques to vet the right candidates for sensitive security roles. From structured interviews to beha…
  continue reading
 
Send us a text Can API gateways really be the ultimate shield against cyber threats? Prepare to uncover the secrets of API security as we dissect CISSP Domain 8.5 in this episode of the CISSP Cyber Training Podcast. We'll walk you through practice questions that decode the most common API vulnerabilities and why denial of service isn't always the p…
  continue reading
 
In this podcast, we dive deep into the NIS2 Directive and why it’s crucial for the future of cyber security. Whether you’re in the EU, the US, or part of the global supply chain, this directive impacts you. With NIS2 set to take effect on October 17th, 2024, it expands the original NIS directive to cover a broader range of sectors, including cloud …
  continue reading
 
Links from the episode: https://405d.hhs.gov/ Discover the latest trends and threats in healthcare cybersecurity. This episode explores the real-world impact of cyberattacks on patient care, the vulnerabilities of medical devices, and the strategies organizations can implement to protect their sensitive data. Request a Quote for a PCI Audit ► https…
  continue reading
 
The conversation discusses the inevitability of cybersecurity breaches and the need for a new approach to cybersecurity. The article mentioned in the discussion highlights the importance of cyber resilience and proactive measures to mitigate risks. The panelists also discuss the significance of partnerships and collaboration between different depar…
  continue reading
 
In this episode, the team discusses an article about hackers stealing from other hackers using a fake OnlyFans tool. Hackers target each other by distributing malware that steals information and credentials. The team finds it amusing that hackers are turning on each other and highlights the importance of being cautious when downloading and implemen…
  continue reading
 
The White House Cyber czar has launched a hiring sprint to fill 3,000 cybersecurity positions in the federal government before the end of the fiscal year. The government recognizes the increasing need for cybersecurity professionals and has allocated billions of dollars to address hiring shortfalls. However, there are challenges in attracting talen…
  continue reading
 
Send us a text Want to stay ahead in the rapidly evolving world of IT? Join Sean Gerber on the CISSP Cyber Training Podcast as he discusses the essential skills you need to thrive in this dynamic field. You'll get a personal peek into Sean's consulting career and his family business ventures before diving into the nuts and bolts of Domain 8.5 with …
  continue reading
 
In this episode, the hosts discuss their week and various topics, including playing video games, watching TV shows, and building computers. They also mention a TV show called Extreme Love, where people have unusual relationships with objects. The hosts share their experiences and interests, such as playing Call of Duty, watching Game of Thrones, an…
  continue reading
 
Send us a text Unlock the secrets to safeguarding your organization's most sensitive data and enhance your cybersecurity acumen. Join us on the CISSP Cyber Training Podcast as I, Sean Gerber, break down the critical importance of managing secrets within popular collaboration tools like Slack, Jira, and Confluence. Discover practical methods such as…
  continue reading
 
In this episode, host Nathan House introduces the critical concept of Zero Trust Architecture. He breaks down what it means, why it’s more relevant than ever, and how it challenges traditional security models. Nathan explains the core principles of Zero Trust: verify everything, least privilege access, and assume breach. Discover why the “castle an…
  continue reading
 
⚠️ Content Warning: The following episode discusses AI-generated deepfakes and explicit images of children, which may be sensitive or disturbing for some readers. The conversation discusses the issue of non-consensual AI deepfake child images and the legal challenges surrounding it. The laws in Pennsylvania do not currently address deepfakes, which…
  continue reading
 
The conversation discusses the importance of small businesses bolstering their cybersecurity with actionable AI. It highlights the increasing use of AI by hackers and the need for small businesses to step up their game. The conversation explores how AI is being weaponized for phishing emails and voice calling, making it easier to trick people. It a…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad and Megan recap Blackhat. They also discuss a zero-click exploit involving a Windows TCP IP flaw and backdoor Bitsloth exploits. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About …
  continue reading
 
In this episode, the hosts discuss a news article about Kentucky inmates hacking prison-issued devices to steal credits. The inmates found a way to trick the system into believing they had more credits than they actually had, allowing them to use services and make phone calls. The company responsible for the devices, Securus, had previously experie…
  continue reading
 
In this episode, the hosts discuss their week and share what they've been watching and playing. They talk about work, inspections, and the new Madden game. They also mention the Untold series on Netflix and the murder of Steve McNair. The conversation shifts to kung fu movies and the game Black Myth Wukong. They briefly mention the TV show Warrior …
  continue reading
 
In this episode, we dive into Behavioral Health with InterCoast Colleges. If you’re passionate about making a difference in people’s lives and considering a rewarding career in Behavioral Health, this episode is for you! We explore InterCoast’s comprehensive and fully online Behavioral Health Assistant Training Program, which is perfect for those n…
  continue reading
 
Send us a text What if AI could be your company's best asset—and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’ll also navig…
  continue reading
 
Join Sean Ardizzone and Nathan House as they delve into the world of OSCP certification. In this episode, they discuss strategies for mastering hacking skills, overcoming challenges in OSCP, and the importance of practical exercises. They also explore the realities of penetration testing as a career, the differences between red teaming and pen test…
  continue reading
 
Send us a text Unlock the secrets to mastering the CISSP exam and bolster your cybersecurity prowess with Sean Gerber in this action-packed episode of the CISSP Cyber Training Podcast! Ever wondered which assessment type is crucial for ensuring ISO 27001 compliance? Discover why internal audits are the gold standard. We'll also cover the key consid…
  continue reading
 
In this episode, Ryan Williams Sr. interviews Shauna Weatherly from FedSubK, a website that provides resources and guidance for small businesses navigating the federal procurement process. Shauna shares her background in federal procurement and her motivation for starting FedSubK. They discuss the challenges and complexities of government procureme…
  continue reading
 
Confused about PCI DSS compliance standards? This video breaks down each available SAQ type, including: SAQ-A, SAQ P2PE-HW, SAQ D for Service Providers, and the newly introduced SAQ SPoC for PCI DSS 4.0. Learn which one is right for your business based on your payment processing environment. Learn about: Different SAQ types for merchants Eligibilit…
  continue reading
 
The hosts discuss the use of facial recognition technology in stadiums to expedite entry and enhance the fan experience. They explore the potential privacy concerns and the balance between security and personal liberties. The conversation touches on the accuracy of facial recognition technology, the value of personal data, and the future of consume…
  continue reading
 
The conversation discusses a cybersecurity lawsuit filed against the Georgia Institute of Technology and Georgia Tech Research Corporation for alleged cybersecurity violations. The university was accused of submitting false results and not implementing the required system security plan for their networks. The discussion highlights the importance of…
  continue reading
 
In this episode, Ryan, Shannon, and Chris discuss their week and various topics, including their children's first week of school, video games they're playing, and TV shows they're watching. They also talk about the upcoming House of the Dragon series and their hopes for our favorite football teams. The conversation covers a range of themes, includi…
  continue reading
 
The FAA proposes new cybersecurity rules for airplanes to protect against intentional unauthorized electronic interactions that could create safety hazards. This is long overdue, as airplanes and other forms of mass transit have the potential to be used as weapons. The airline industry needs to take cybersecurity more seriously, especially with the…
  continue reading
 
🔐 Unlock your potential as a Cybersecurity Specialist with InterCoast Colleges! Dive into our detailed video on how to start your career in cybersecurity, exploring everything from academic requirements to key personal skills and technical proficiencies. Whether you're starting from scratch or looking to switch careers, our comprehensive guide will…
  continue reading
 
🔒 Unlock the Power of CISSP Certification | Cybersecurity Career Guide Are you a cybersecurity professional aiming to elevate your career? Discover the CISSP certification, a globally recognized credential that boosts your expertise and opens up incredible career opportunities and salary prospects. This video breaks down the benefits, eligibility, …
  continue reading
 
Send us a text Ever wondered how to ensure your organization's cybersecurity measures meet international standards? Join us for an action-packed episode as we unpack Domain 6.5 of the CISSP exam, exploring crucial assessments, tests, and audit strategies every cybersecurity professional should master. Learn the importance of choosing a consistent f…
  continue reading
 
Send us a text Can quantum computing break your encryption overnight? Discover the profound impact of this emerging technology on cybersecurity as we decode the recently introduced FIPS 203, 204, and 205 standards. Join me, Sean Gerber, on this week's electrifying episode of the CISSP Cyber Training Podcast to understand how the US government is pr…
  continue reading
 
The discussion revolves around the proposed CMMC 2.0 rule by the US Department of Defense (DoD) to enhance cybersecurity in the defense industrial base. The rule aims to improve contractor implementation of cybersecurity requirements and tighten regulations. The hosts express the need for stricter measures, especially for large companies with gover…
  continue reading
 
The podcast episode discusses the need for stronger encryption standards to protect against the threat of quantum computers. The Department of Defense and NIST are working on developing new encryption standards to safeguard sensitive information. IBM is leading the way in developing quantum-resistant encryption algorithms. The current administratio…
  continue reading
 
Loading …

دليل مرجعي سريع