Player FM - Internet Radio Done Right
Checked 4d ago
تمت الإضافة منذ twenty-six أسبوع
المحتوى المقدم من Cybersecurity Mentors. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cybersecurity Mentors أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Cybersecurity Mentors Podcast
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3594482
المحتوى المقدم من Cybersecurity Mentors. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cybersecurity Mentors أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
25 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3594482
المحتوى المقدم من Cybersecurity Mentors. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cybersecurity Mentors أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
25 حلقات
كل الحلقات
×![Artwork](/static/images/128pixel.png)
1 Tools and Skills to Master as a Security Analyst - Part 2 52:37
52:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب52:37![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
This episode focuses on essential skills and tools for aspiring cybersecurity analysts, including network monitoring, incident response, and phishing defense. The conversation emphasizes the importance of practical experience and understanding the fundamentals to successfully navigate careers in cybersecurity. • Importance of network monitoring in identifying suspicious activities • Understanding networking fundamentals for cybersecurity roles • Tools for capturing and analyzing network traffic • Steps to effectively manage and respond to security incidents • Strategies for identifying and mitigating phishing threats • Role of simulations and drills in training for real-world incidents • Need for hands-on experience to enhance cybersecurity skills • Insights into preparing employees against phishing attacks • Importance of documentation in incident response • How to differentiate oneself in a competitive job market Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Tools and Skills to Master as a Security Analyst - Part 1 55:05
55:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب55:05![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
This episode is part one of two that focuses on essential tools and skills for aspiring security analysts. In this episode we discuss SIEM tools, vulnerability management, and endpoint protection. Check out the link for the resources. • Importance of SIEM tools for analyzing log data • Vulnerability management as a critical cybersecurity hygiene practice • Regular vulnerability scans and prioritizing remediation efforts • The evolution of endpoint protection and current threats • Real-world implications of failing to manage vulnerabilities • Practical tips and resources for gaining hands-on experience • Encouragement for community engagement and shared learning Link to resources Mentorship - sign up for a free session Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 From Marine to Mandiant with Ryan Rath 1:12:37
1:12:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:12:37![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Ryan Rath shares his journey from the military to a significant role in cybersecurity with Mandiant, discussing the challenges faced during the transition. Key topics include the importance of networking, the evolving skill sets required, and the ethical responsibilities of cybersecurity professionals, highlighting the need for mentorship and continuous learning. • Ryan's military background and transition to cybersecurity • The significance of networking in career development • Challenges faced while applying for jobs in tech • Importance of practical experience over certifications • Skills needed within the cybersecurity landscape • Ethical considerations in handling technology • The role of mentorship and giving back to the community Mentorship - sign up for a free session Ryan Rath's LinkedIn Profile Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Hacking the Way Forward with Max Harley 1:07:53
1:07:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:07:53![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Max Harley's journey into cybersecurity began unexpectedly with a childhood passion for video games, which sparked a deeper interest in programming and security. His competitive spirit emerged through capture-the-flag competitions, leading him to impactful roles at SpecterOps and Prelude, emphasizing mentorship, networking, and continuous learning in crafting a successful cybersecurity career. • The spark of interest starting from video games and programming • Importance of competitions like Pico CTF and CCDC in developing skills • The role of mentorship and networking in career advancement • Experiences in red teaming and offensive security • Transitioning thoughts on proactive cybersecurity and evaluative metrics Mentorship - sign up for a free session Max Harley's LinkedIn Profile Max's talk at BSides Charleston 2024 Send us fan mail via text…
This episode features insights from two esteemed CISOs, Frank DePaola and Andrew Wilder, sharing their journeys into cybersecurity, the importance of mentorship, and essential leadership traits. They discuss the evolving role of a CISO, the need for business acumen, and the vital balance required between technical prowess and organizational needs. • Frank DePaola and Andrew Wilder share their unique career paths in cybersecurity • Importance of mentorship in career development and growth • Insights into balancing technical skills and business acumen for aspiring CISOs • Current challenges faced by CISOs in a rapidly evolving threat landscape • Tools and resources that help CISOs maintain organizational security • The personal rewards and sense of purpose found in the CISO role If you're looking for personalized mentorship, click the link below to sign up for a free consultation with us. During this session, we'll talk about your goals, your challenges, and how we can better help you. This may include reviewing resumes, career advice, and setting up action plans tailored for your needs. Mentorship - sign up for a free session Frank DePaola's LinkedIn Profile Andrew Wilder's LinkedIn Profile Send us fan mail via text…
Welcome to the kickoff of Season 2 of the Cybersecurity Mentors Podcast ! This season begins with an exciting collaboration with the Simply Cyber Media Group, bringing you inspiring personal journeys and emphasizing the transformative power of mentorship in cybersecurity. In this episode, John and Steve open up about their career paths, share their aspirations, and provide practical advice for anyone looking to build and grow a career in this dynamic field. We'll also dive into what this podcast is all about and reveal some of the exciting plans we have in store for this season! • Introduction of the hosts and podcast vision • John’s journey from IT support to CISO • Steve's experience starting from an intern to deputy CISO • Emphasizing mentorship and real-world experience • Importance of networking and soft skills alongside technical skills • Sneak peek into Season Two and future topics • Call for listener engagement and community connection Send us fan mail via text…
In this episode, we recap season one. We talk about lessons learned during our first season of the podcast, each of our favorite episodes, the top downloaded episodes of the year, reveal the countries that listen to us the most, and tease our season two plans for 2025, including exciting new collaborations that are in the works. You can connect with us and leave us feedback in the following ways: Sign up for our newsletter . Join us on Discord at Cybersecurity Mentors Podcast . Check out our YouTube channel and leave us a comment. Follow our LinkedIn page. Or use the texting feature below to send us a one-way fan mail. Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Interview with Dave Kennedy: The Obstacle is the Way 58:58
58:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب58:58![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Join us for an exhilarating episode as cybersecurity pioneer Dave Kennedy, co-founder of TrustedSec and Binary Defense, shares his incredible journey from a curious kid in Cleveland to a leader in the cybersecurity industry. Discover how Dave transformed his passion for technology from dismantling toys to building computers, and how iconic films like "Back to the Future 2" and "Hackers" inspired his career path. Dave takes us through his time in military intelligence with the Marines, where he honed his skills in cyber warfare and forensics, leading to a successful transition into the private sector. Dave's story is more than just a career path; it's a testament to the power of mentorship, community, and helping others. Get a sneak peek into the unique atmosphere at TrustedSec, complete with a Back to the Future movie artifacts and a TARDIS from Doctor Who. Listen as Dave emphasizes the importance of building strong relationships and fostering collaboration to implement effective security programs, sharing invaluable insights into overcoming the experience gap faced by new graduates entering the cybersecurity field. This episode is packed with inspiring anecdotes and practical advice for anyone passionate about cybersecurity. Whether it's starting a successful company, creating community initiatives like DerbyCon, or navigating the challenges of a demanding industry, Dave's commitment to innovation and passion for nurturing young talent shine through. Don't miss out on this opportunity to learn from one of the field's most influential figures and discover how emerging technologies like AI and machine learning are shaping the future of cybersecurity. Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Simply Cyber Con '24 - Storytelling Skills to Level Up Your Cybersecurity Career 43:16
43:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:16![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In this episode John shares an upcoming talk that he gave at the Simply Cyber Con '24 in Charleston, SC. Title: From Technical to Tactical: Storytelling Skills to Level Up Your Cybersecurity Career Description: In the fast-paced and complex world of cybersecurity, technical expertise alone isn't enough to stand out. What if you could turn your experiences into compelling stories that not only capture attention but also propel your career forward? Drawing on the transformative principles from Matthew Dicks' acclaimed book Storyworthy, this talk will explore how cybersecurity professionals can harness the power of storytelling to connect with peers, present to leadership, and advance their careers. We'll dive into key concepts like "The Five-Second Moment" and "Homework for Life," and show how these techniques can be applied to your cybersecurity journey. Whether you're looking to improve your networking, make a lasting impression in interviews, or establish yourself as a thought leader, mastering the art of storytelling is your secret weapon. Join me to learn how to craft narratives that not only resonate but also elevate your professional trajectory in cybersecurity. Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 The Recruiter’s Playbook: How to Navigate Cybersecurity Jobs with Joe Hudson 58:47
58:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب58:47![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In this episode we sit down with Joe Hudson, Director of Growth at TCM Security, to discuss the challenges and opportunities in cybersecurity job hunting. With experience on both sides of the cybersecurity job market, Joe shares his personal journey from teaching to recruiting, and ultimately into cybersecurity. He provides actionable advice for job seekers, from the importance of networking to decoding job descriptions, as well as tips on working with recruiters and preparing for interviews. Key Takeaways: Joe’s unique path from a teaching career to a successful role in cybersecurity. The role of mentorship and networking in breaking into cybersecurity. How to approach recruiters and build lasting professional relationships. Strategies for applying to cybersecurity jobs, including navigating job descriptions and identifying red flags. Preparing for interviews and the importance of standing out with authenticity. Joe’s insights on the evolving cybersecurity landscape and what it takes to thrive in this field. Connect with Joe Hudson: LinkedIn: Joe Hudson Email: jhudson@tcm-sec.com Join Our Community: Discord: Cybersecurity Mentors Podcast Community LinkedIn: Cybersecurity Mentors Podcast Newsletter Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Be Yoda, Not Luke - Mastering Emotional Intelligence in Cybersecurity with Adam Anderson 53:53
53:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب53:53![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In this episode, we have an insightful conversation with Adam Anderson, a seasoned cybersecurity professional, entrepreneur, and author. Adam shares his journey from a technical "keyboard warrior" to realizing the power of emotional intelligence (EIQ) in building a successful cybersecurity career. We discuss the critical differences between IQ and EIQ, how emotional intelligence can be your secret weapon for career growth, and why you should strive to be Yoda rather than Luke Skywalker in the workplace. Tune in to discover actionable tips on how to improve your EIQ and leverage it to stand out in the cybersecurity field. Key Takeaways : Emotional Intelligence is Essential in Cybersecurity : It's not just about having the right answer; it’s about delivering it effectively so others understand, accept, and can act on it. Be Yoda, Not Luke : Focus on advising and guiding rather than being the hero who takes on everything alone. Developing EIQ Takes Time : Like technical skills, emotional intelligence requires practice and patience. Start with small exercises like asking better questions and practicing active listening. Servant Leadership Can Be Practiced at Any Level : Regardless of your position, you can lead effectively by serving the needs of others and asking insightful questions. Storytelling is a Powerful Tool : Learning to tell good stories can enhance your emotional intelligence and help you make complex technical topics relatable. Quotes : "The reason we want to be Yoda and not Luke is that we don't own the responsibility for defeating the Empire—we own the responsibility of providing the intelligence, wisdom, and advice to those who do." "Your ability to tell and craft good stories is directly proportional to your emotional intelligence." Practical Tips : Record Yourself : Practice explaining a concept and watch the recording to observe areas for improvement in communication. Elevator Pitch : Create concise explanations for technical topics, and remember to use relatable stories. Ask Questions in Interviews : Use interviews to understand team dynamics and signal your interest in contributing positively to the organization's goals. Resources Mentioned : Book : Psychological Security: How to Use Psychology to Produce Better Security Results by Adam Anderson Online Lecture : Adam's lecture on emotional intelligence and its importance in cybersecurity. Connect with Adam : LinkedIn: [ Adam Anderson’s LinkedIn Profile ] Send us fan mail via text…
In this episode we do a live coaching call with Grant Adams. Grant was one of the original interns who worked with us and took a hiatus from security to go on an adventure across the United States. He's now looking for advice to get back into security. We talk about his goals, give him advice on next steps, and do a deep dive into his resume. Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Women at the Frontline: Melissa and Kelly’s Cybersecurity Journey 52:05
52:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب52:05![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In this episode we interview Melissa and Kelly, who began their journey with us as interns and are now forging exciting careers in cybersecurity. Join our community by subscribing to our newsletter packed with tips and guidance to empower your journey. Send us fan mail via text
![Artwork](/static/images/128pixel.png)
1 Networking is King: Your Path to Success in Cybersecurity 52:26
52:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب52:26![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In this episode, we dive into actionable strategies for networking with cybersecurity professionals to land your dream job. From leveraging local security conferences to connecting with industry practitioners and engaging in online communities, we cover essential tips to help you build valuable relationships in the cybersecurity field. Whether you're new to the industry or looking to advance your career, this episode offers practical advice to enhance your networking efforts and open doors to new opportunities. Tune in and start building your cybersecurity network today! Click here for the checklist and templates mentioned in this episode. Send us fan mail via text…
![Artwork](/static/images/128pixel.png)
1 Are Cybersecurity Bootcamps Worth It in 2024? 1:09:49
1:09:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:09:49![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Are cybersecurity bootcamps worth it in 2024 to start your career in cybersecurity? We may have a controversial take on this topic. Tune in to find out what we have to say. Contact us to sign up for your free 30-minute mentor session, or if you'd like a copy of the spreadsheet where we break down the options we describe in the episode. Check out the YouTube link for the video version of this episode. Send us fan mail via text…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.