- Cyber Life Podcast Ep.17 - Jiu Jitsu and Cyber Security with Yesenia Yser
Support this podcast at β https://redcircle.com/cyber-life/donations
Ask a Question Here: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
In this episode, Yesenia shares her wisdom about cybersecurity, how open-source projects can help your career, and how cybersecurity and Brazilian Jiu-Jitsu are similar. π₯
If you like these types of episodes where we interview experienced cybersecurity professionals, let us know in the comments.
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#Cybersecurity #OpenSource #BrazilianJiuJitsu #DigitalCommunity #learnandgrow
Support this podcast at β https://redcircle.com/cyber-life/donations35m | Nov 29, 2023 - Cyber Life Podcast Ep.16 - Archaeology and Cyber Security with Indiana Jones (Dr. Mike Brass)
In this episode, Dr. Mike Brass shares insight into how archaeology and cyber security have similar principles.
Enjoy the short clip from Indiana Jones and the Last Crusade at the start of this episode.
You can watch the clip over on YouTube.
https://www.youtube.com/@CyberLifeTV
Ask a Question Here: https://topmate.io/ken_underhill
Build your job interview skills with this short course.
https://cyberken23.gumroad.com/l/jbilol/youtube20
If you need cybersecurity training, here are some good resources below. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Support this podcast at β https://redcircle.com/cyber-life/donations24m | Nov 16, 2023 - Cyber Life Podcast Ep.15 - Building the Cyber Security Talent Pipeline with Chris Foulon, CISSP
In this episode, Chris Foulon shares his insight into how organizations can build cyber security π talent pipelines to fill their skill gaps.
Connect with Chris:
https://cpf-coaching.com/
https://www.linkedin.com/in/christophefoulon
Chris holds multiple industry certifications, like CISSP. He's a dedicated security practitioner who's passionate about helping businesses tackle their cybersecurity risks while minimizing friction, resulting in increased resiliency. Chris also focuses on securing people and processes, all with a solid understanding of the technology involved.
Chris is also the brains behind CPF-coaching.com, where he helps cybersecurity professionals enhance their leadership skills. He's an International best-selling author of "Hack the Cybersecurity Interview", a podcast host of Breaking into Cybersecurity, and a dedicated volunteer with organizations such as InfraGard, Security Tinkerers, the Whole Cyber Human Initiative, and Boots2Books.
Chris answers questions like these:
- How can organizations build a strong cybersecurity talent pipeline?
- What creative ways can organizations explore to bridge the cybersecurity talent gap?
- How can collaboration π€ between academia, industry, and professional organizations contribute to a more skilled and versatile cybersecurity workforce?
- How do organizations nurture existing cybersecurity professionals to help them grow π their careers?
Don't forget to hit that like button, subscribe to the channel for more insightful cyber security content, and ring the notification bell so you never miss an episode.
Ask a Question Here: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#cybersecurity #SecurityLeadership #infosec #collaboration #careergrowth #CultureBuilding
Support this podcast at β https://redcircle.com/cyber-life/donations19m | Nov 15, 2023 - Cyber Life Podcast Ep.14 - Traveling the World in Cyber Security with Hugh Shepherd
Get Help Here: https://topmate.io/ken_underhill
Hugh Shepherd has been living abroad for several years and shares how you too can build the travel lifestyle in your cybersecurity career.
Hugh will share:
1οΈβ£ Unique advantages of living abroad for tech professionals.
2οΈβ£ Balancing the demands of a tech career with the challenges and opportunities of expat life.
3οΈβ£ Staying updated on industry trends and developments, even when far from tech hubs.
4οΈβ£ Inspiring success stories from individuals who've leveraged living abroad to supercharge their tech careers.
5οΈβ£ Navigating cultural differences and communication challenges when working with international colleagues or clients.
6οΈβ£ Overcoming legal and logistical hurdles while living abroad, with valuable recommendations.
7οΈβ£ The competitive cybersecurity job market and strategies to petition for a remote position that allows you to live your dream abroad.
8οΈβ£ How personal and professional goals evolve as you embrace life in a foreign land.
And be sure to tune into a future episode where Hugh shares some of his favorite resources to help you get started living abroad.
Get Help Here: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#travel #livingabroad #cybersecurity #cybersecuritycareer
Support this podcast at β https://redcircle.com/cyber-life/donations35m | Nov 8, 2023 - Cyber Life Podcast Ep.13 - The Human Layer in Cyber Security with Becky Gaylord
In this episode, Becky Gaylord talks about the "human layer" of cybersecurityβa realm often underestimated but important to protecting your digital world.
π‘ Here's what you can expect to learn:
Understand what the "human layer" of cybersecurity is and why addressing it is paramount in today's digital landscape.
Discover simple and effective ways to boost cybersecurity awareness, both personally and within organizations.
Find out how cybersecurity professionals can skillfully communicate the importance of security to non-technical stakeholders, ensuring everyone is on the same page.
...and much more!
Becky is a trusted advisor and collaborative leader with global experience and 20+ years in Information Security. A former investigative and financial reporter for The New York Times and Dow Jones, she has worked across domains and holds certifications that include CISSP, CRISC, CISM and CIPP/US.
Learn more at www.beckygaylord.com
Ask me a question here: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#cybersecurity #StaySafeOnline #digitalsecurity
#securityawareness #socialengineering #phishingattacks #insiderthreats #employeetraining #securityculture #securitychallenges
Support this podcast at β https://redcircle.com/cyber-life/donations23m | Nov 1, 2023 - Cyber Life Podcast Ep.12 - Cybersecurity in Mergers and Acquisitions with Shruti Kalsi
β¬β¬β¬ Ask me a question about your cybersecurity career β¬β¬β¬
Ask me a question here: https://topmate.io/ken_underhill
β¬β¬β¬ Episode Description β¬β¬β¬
Join Shruti Kalsi and I in this episode, where we dive into the world of Mergers and Acquisitions (M&A) and discover how cybersecurity plays a pivotal role, transforming the way organizations approach these complex business transactions.
Shruti has over 20 years of experience and has helped organizations save millions of dollars during M&A transactions through her cybersecurity wisdom.
β¬β¬β¬ Prepare for Your next Job Interview β¬β¬β¬
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
Limited time 20% discount because you support the YouTube channel.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
β¬β¬β¬ Learn Cyber Security Skills β¬β¬β¬
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links below for the training.
Learn Ethical Hacking skills from Haiku
https://get.haikuinc.io/crk0rg6li6qd
Learn GRC skills, Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#mergers #cybersecurity #cyber security
Support this podcast at β https://redcircle.com/cyber-life/donations17m | Oct 26, 2023 - Cyber Life Podcast Ep.11 - Identity & Identity Security & Zero Trust with Jeff Reich
In this episode, you will learn about Identity and Identity Security from Jeff Reich.
Jeff has has over 40 years of experience in what we now call cybersecurity.
π Jeff, currently serves as the Executive Director for the Identity Defined Security Alliance.
Learn more: https://www.idsalliance.org/
Don't forget to like, share, and subscribe to help more people learn from cybersecurity experts like Jeff.
Want to meet Jeff in person?
He will be speaking at TRUSTECH 2023 on 28-30 Nov Learn more at:
https://www.trustech-event.com/
π Jeff answers questions for you like:
1οΈβ£ What exactly is identity in the context of cybersecurity, and why is it so crucial in today's digital age?
2οΈβ£ Discover the latest trends in identity security that you should be keeping an eye on to stay ahead of the game.
3οΈβ£ Jeff will unveil strategies for organizations to implement robust Identity and Access Management (IAM) systems, providing a shield against emerging threats.
4οΈβ£ Biometrics - the future or a potential pitfall? Jeff will guide us through the advantages and disadvantages of relying on biometrics for identity verification.
5οΈβ£ Learn how organizations strike the delicate balance between identity security and protection against insider threats.
6οΈβ£ Dive into the world of Zero Trust strategy and explore how it seamlessly aligns with identity security best practices.
Ask me a question: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
#IdentitySecurity #Cybersecurity #DigitalIdentity #DataProtection #IdentityManagement #BlockchainSecurity #ZeroTrust #Biometrics #IAM #CloudSecurity #TechTrends
Support this podcast at β https://redcircle.com/cyber-life/donations31m | Oct 25, 2023 - Cyber Life Podcast Ep.10 - AI and Behavioral Science for Cybersecurity with Dustin Sachs
In this episode, award-winning cybersecurity professional and OT security expert Dustin Sachs breaks down how you can leverage artificial intelligence (AI) and behavioral science in your cybersecurity initiatives.
Ask me a question: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Support this podcast at β https://redcircle.com/cyber-life/donations29m | Oct 18, 2023 - Cyber Life Podcast Ep.9 - GRC Career Path with Abinash Jena - GRC Analyst Jobs
In this episode, Abinash will share his experience working in Governance, Risk, and Compliance (GRC) and answer the famous question on if you can really get a six-figure GRC job with no experience within 24 hours, like YouTube videos claim.
Ask me a question: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
GRC Analyst, Governance, Risk, and Compliance Analyst, GRC Analyst job description, GRC Analyst salary, GRC Analyst certification, GRC Analyst skills, GRC Analyst responsibilities, GRC Analyst interview questions, GRC Analyst career path, GRC Analyst training, GRC Analyst job openings, GRC Analyst qualifications, GRC Analyst job market, GRC Analyst roles and responsibilities, GRC Analyst certification programs, Entry-level GRC Analyst, Senior GRC Analyst, GRC Analyst job prospects, GRC Analyst certifications, GRC Analyst remote jobs
Support this podcast at β https://redcircle.com/cyber-life/donations25m | Oct 18, 2023 - Cyber Life Podcast Ep.8 - Cybersecurity Careers with Rob Blackwell
This episode is packed with value for your cybersecurity career.
Rob Blackwell, CISSP, CISM shares his wisdom around cybersecurity careers and how cybersecurity is everyone's responsibility in this episode.
Ask me a question: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Support this podcast at β https://redcircle.com/cyber-life/donations1h 2m | Oct 17, 2023 - Cyber Life Podcast Ep.7 - Program Management with Omar Sangurima
π Are you curious about how cybersecurity program management can help your business achieve its objectives?
Join Omar Sangurima in this episode as he explores the evolution of cybersecurity program management from a technical focus to a strategic business function.
Ask me a question: https://topmate.io/ken_underhill
πΌ If you're a cybersecurity professional struggling to secure funding for your programs, we've got you covered. Omar shares effective strategies for communicating the business value/ROI of your cybersecurity initiatives to stakeholders.
π‘ Resource limitations are a common obstacle, but don't let them hinder your cybersecurity program. Omar shares practical tips on prioritizing cybersecurity initiatives while judiciously managing your resources.
π And for those seeking funding for their cybersecurity initiatives, Omar reveals the key performance indicators (KPIs) that will make your proposal stand out. Learn how to demonstrate the effectiveness of your cybersecurity strategy and gain the support/money you need.
Ask me a question: https://topmate.io/ken_underhill
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Limited time 20% discount because you support the YouTube channel.
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills
https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Be sure to subscribe and hit that notification bell π for the latest Cyber Life episodes.
Program management, Project vs Program management, Program management best practices, Program management tools, Program management methodologies, Benefits realization in program management
Support this podcast at β https://redcircle.com/cyber-life/donations31m | Oct 11, 2023 - Cyber Life Podcast Ep.6 - Cloud Phishing Attacks with Ruchira Pokhriyal with the AWS Incident Response Team
Cloud Phishing Attacks are on the rise globally. In this episode, you will learn from cybersecurity and cloud security expert, Ruchira Pokhriyal.
Ask me a question here: https://topmate.io/ken_underhill
Ruchira is a member of Amazon AWS's incident response (IR) team, where she plays a crucial role in maintaining security. Her impressive background includes expertise in web app penetration testing, cloud security, incident response, and digital forensics.
Ruchira is a well-rounded professional in the cybersecurity π world and is frequently seen at various conferences advocating for diversity, equity, inclusion, and supporting the LGBTQ+ and Neurodivergent communities.
The information shared in this episode is for educational purposes only. The views expressed here are Ruchira's personal opinions and do not reflect her employer's or any affiliated communities' official stances.
Cloud phishing encompasses a range of attacks that target cloud services like Google Drive, Dropbox, and OneDrive, aiming to deceive users into revealing their credentials. These attacks often come in the form of phishing emails, complete with fake login pages and a sense of urgency.
One common attack Ruchira discusses in this episode is credential phishing. Attackers impersonate trusted cloud service providers, sending emails claiming that the user's account has been compromised and demanding immediate attention. These emails contain links to fake login pages that closely mimic the legitimate ones, leading unsuspecting users to share their sensitive data.
She also talks about the CloudFormation Stack Phishing attack, which specifically targets AWS CloudFormation users. In this attack, the bad guys send emails impersonating AWS, tricking users into clicking malicious links that compromise their AWS CloudFormation resources.
Ruchira delves into Cloud Billing Phishing emails as well. These emails pose as billing departments of cloud service providers, creating a sense of urgency by claiming issues with your payment details. Users are directed to fake billing portals, where they unwittingly enter their payment information, providing attackers with sensitive data.
To protect against these attacks, Ruchira recommends several best practices. These include educating users about phishing attacks, verifying sender email addresses, avoiding clicking on suspicious links, enabling multi-factor authentication, and implementing email filtering and anti-phishing tools.
In this episode, you'll learn some prevention strategies and security best practices to fortify your cloud defenses. Whether you're an individual or an organization, this episode will empower you to take action and protect your digital assets.
π’ Hit that "Subscribe" button and ring the notification bell to stay updated on the latest Cyber Life podcast episodes, where I interview some of the top cybersecurity experts in the world.
And be sure to share this episode with your colleagues, friends, and family because together, we can build a safer digital world.
Ask me a question here: https://topmate.io/ken_underhill
In less than one hour, build confidence for your next job interview. Limited time 20% discount because you support the YouTube channel.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.
Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Cloud phishing attacks, Phishing in cloud computing, Cloud email phishing, Cloud phishing prevention, Cloud security breaches, Cloud account phishing, Protecting against cloud phishing, Cloud credential phishing, Cloud data security, Cloud cybersecurity threats, Cloud-based email scams, Multi-factor authentication for cloud, Cloud billing phishing, CloudFormation Stack phishing, Detecting cloud phishing attempts, Cloud phishing awareness, Secure cloud data from phishing, Cloud service provider phishing, Cloud phishing best practices, Cloud phishing statistics
Support this podcast at β https://redcircle.com/cyber-life/donations34m | Oct 4, 2023 - Cyber Life Podcast Ep.5 - π Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner π
π Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner
In this episode, we sit down with the world renowned Chris Hetner, a global expert in the material impact of cybersecurity risk.
Chris has a wealth of experience and has advised both the SEC (that's the Security Exchange Commission, for the uninitiated) and the National Association of Corporate Directors, making him an authority in the field.
π In the rapidly evolving cybersecurity landscape, we dive into the world of cybersecurity risk assessments, financial implications, and strategies to navigate emerging cyber threats. π
π With the SEC's recent (July 2023) ruling mandating publicly traded companies to report material impact within a mere four business days, Chris offers invaluable insights into compliance, risk mitigation, and the changing face of cybersecurity risk management. π
π Highlights of our Conversation π
- Understanding the Financial Impact of Cyber Attacks
- The Role of Enterprise Risk Management in Quantifying Costs
- Strategies for Properly Managing and Communicating Cybersecurity Investments
- Real-world Examples of Cyber Risk Management
- The Emergence of AI in Cyberattacks and How to Defend Against Them
- The Implications of Supply Chain Attacks
Join us for this thought-provoking discussion that could shape your organization's approach to cybersecurity and risk management.
Whether you're a seasoned security professional or just diving into cybersecurity, you won't want to miss this eye-opening conversation with Chris Hetner.
Do you need more help?
Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.
Limited time 20% discount because you support the YouTube channel.
https://cyberken23.gumroad.com/l/jbilol/youtube20
Schedule a mock job interview call with me at this link.
https://topmate.io/ken_underhill/411153
If you need cybersecurity training, here are some good resources.
Please note that I earn a small affiliate commission if you sign up through these links below for the training.
Learn Ethical Hacking skills
https://get.haikuinc.io/crk0rg6li6qd
Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.
https://www.stationx.net/cyberlife
Don't forget to like, share, and subscribe for more insights from some of the top cybersecurity experts. π
#Cybersecurity #RiskManagement #SEC #EnterpriseRisk #AIinCyberattacks #SupplyChainAttacks #CybersecurityExperts #CybersecurityStrategies #BusinessResilience #ChrisHetner #CybersecurityDiscussion #CybersecurityInsights
Cybersecurity risk assessment, Data breach consequences, Financial impact of cyber attacks, Cybersecurity incident response, Risk mitigation strategies, Cost of data breaches, Business continuity after a cyber attack, Regulatory fines for data breaches, Cybersecurity risk management, Insurance for cyber attacks, Reputation damage from cyber incidents, Cybersecurity ROI (Return on Investment), Cybersecurity compliance costs, Cybersecurity breach recovery, Customer data protection, Legal liabilities in cyber incidents, Supply chain cyber risks, Insider threats to organizations, Ransomware impact on businesses, Cybersecurity incident reporting
Support this podcast at β https://redcircle.com/cyber-life/donations20m | Sep 27, 2023 - Cyber Life Podcast Ep.4 - Big Mac Attack - Cybersecurity and Food Safety with Kristin Demoranville
In this episode, we dive into the crucial relationship between food safety and cybersecurity with Kristin Demoranville.Β Β
It's important to recognize that the food industry encompasses everything from agriculture and food production to distribution and beyond.
This combination of cybersecurity with food safety ensures not only the protection of digital assets but also the safety and security of the food supply chain from production to delivery.
One of the key takeaways from our conversation is the importance of awareness and education. We need to make cybersecurity an integral part of the food protection culture. Just as we've learned to stop, drop, and roll in case of fire, we should aim for a similarly straightforward and universally understood approach to food safety and cybersecurity.Β Β
Kristin has a new podcast called Bites & Bytes Podcast launching soon that you can listen to at the link below.Β
https://www.anzensage.com/BitesandBytesPodcastΒ
*Disclaimer: I may earn a few dollars from affiliate links in this description.
Learn Cybersecurity skills by playing in the Haiku game.
https://get.haikuinc.io/crk0rg6li6qd
If your team needs cybersecurity-skill training, StationX offers a robust catalog of cybersecurity training.Β Β
Learn more here: https://www.stationx.net/cyberlife
Cybersecurity in food industry, Food safety breaches, Cyber threats to food supply, Secure food supply chain, Food safety data protection, Cybersecurity for food processing, Food safety risk assessment, IoT in food safety, Cybersecurity for agricultural systems, Food safety traceability, Blockchain for food security, Food safety and digitalization, Cyber-physical food safety, Food safety incident response, Threats to food safety systems, Food supply chain resilience, Cybersecurity for food distribution, Food safety compliance and cyber risks, Data privacy in food safety, Food safety audit cybersecurity
Support this podcast at β https://redcircle.com/cyber-life/donations32m | Sep 20, 2023 - Cyber Life Podcast Ep.3 - The CISO role with Charles Payne
In this episode, we interview Charles Payne, a seasoned CISO with over 20 years of experience. He shares his insights on what it takes to be successful in this critical role, and offers advice to anyone who aspires to become a CISO.
*Disclaimer: I may earn a few dollars from affiliate links in this description.
Learn Cybersecurity skills by playing in the Haiku game.
https://get.haikuinc.io/crk0rg6li6qd
Charles explains that the CISO is responsible for protecting an organization's data and systems from cyberattacks. This requires a deep understanding of both technical and business aspects of security.
CISOs must also be able to communicate effectively with both technical and non-technical stakeholders.
Charles also shares some of the key qualities that make a successful CISO, including technical expertise, business acumen, leadership skills, and the ability to communicate effectively.
No role in cybersecurity is without its challenges, so Charles shares common challenges of the CISO role and offers advice on how to overcome them.
If you're interested in a career as a CISO, this episode is a must-listen.
Learn more about the Horizon Summit Cybersecurity Conference in Hawaii and register here:
https://web.cvent.com/event/c281260c-6cc5-4f3e-ba94-aebb10c65b6c/summary
Click the link to learn more about the Haiku gamified learning.
https://get.haikuinc.io/crk0rg6li6qd
CISO responsibilities, CISO qualifications, CISO best practices, CISO career path, CISO skills, CISO cybersecurity strategy CISO risk management, CISO data protection, CISO compliance, CISO incident response, CISO governance
Support this podcast at β https://redcircle.com/cyber-life/donations31m | Sep 13, 2023 - Cyber Life Podcast Ep.2 - Building a Resilient Cloud Architecture with Katoria Henry
In this episode, Katoria Henry, a multi-award winning cloud security and technical resilience expert, discusses the importance of building a resilient cloud architecture.
Katoria covers the key concepts of cloud resilience, the challenges of building resilient cloud architectures, and best practices for overcoming these challenges.
Katoria also shares her personal experiences working with organizations to help them build resilient cloud architectures. She provides practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.
Whether you're a cloud architect, developer, or security professional, this video is essential viewing for anyone who wants to build resilient cloud applications.
Listen to this episode to learn:
- What is cloud resilience?
- The challenges of building resilient cloud architectures and how to overcome them.
- Practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.
Get a discount on StationX cybersecurity courses here: https://www.stationx.net/cyberlife
cloud resilience, microservices, cloud architecture, cloud security, data breaches, outages
Support this podcast at β https://redcircle.com/cyber-life/donations34m | Sep 6, 2023 - Cyber Life Podcast Ep.1 - Cloud Identity and Access Management (IAM) with Dr. KVN Rajesh
In this episode, we're diving into the realm of identity and access management in the cloud. Our guest is Dr. KVN Rajesh, a multi award-winning trainer focused on Microsoft Azure security.
With a PhD in deep learning and over 10,000 individuals trained, Dr. Rajesh is a cloud security expert you won't want to miss.
Dr. Rajesh explains the concept of identity and access management (IAM) and how it helps protect our digital resources.
Imagine your username as your digital ID and access as your role within the organization β all controlled through IAM. IAM helps protect critical data, data privacy, and ensures compliance.
Dr. Rajesh talks about creating and managing IAM users, from provisioning to authentication, authorization, lifecycle management, and continuous monitoring.
He then explores the power of IAM policies. These digital blueprints govern user permissions and actions, safeguarding the principle of least privilege. Dr. Rajesh sheds light on architecture best practices of these policies and their role in maintaining the balance between security and user experience.
As our episode focus pivots to cloud environments, Dr. Rajesh showcases the pivotal role of IAM in Microsoft Azure. You will learn how Azure IAM centralizes access control, leveraging Azure Active Directory and Role-Based Access Control (RBAC) for seamless user identity management.
Dr. Rajesh also addresses emerging trends shaping the future of IAM.
He discusses zero trust, AI integration, and blockchain-backed identity verification.
But every coin has two sides.
Dr. Rajesh shares some common pitfalls to avoid β from generic passwords to excessive privileges β and offers a roadmap for troubleshooting IAM issues.
Dr. Rajesh recommends a comprehensive IAM strategy to enforce granular permissions, track user activities, and ensure regulatory compliance.
In this ever-connected world, cloud-based IAM solutions come with scalability, centralized management, and seamless integration. Dr. Rajesh digs into common benefits and challenges with cloud IAM solutions, to help your organization identity "right fit" solutions.
Dr. Rajesh also emphasizes the urgency of implementing IAM best practices because of emerging threats and the reduced barrier to entry for cyber criminals.
Be sure to like and subscribe for more episodes of the ποΈ Cyber Life Podcast β where our guests share cybersecurity best practices.
If your team needs cybersecurity-skill training, StationX offers a robust catalog of training. Learn more here: https://www.stationx.net/cyberlife
Identity and access management (IAM), Access control, IAM solutions, User authentication, Role-based access control, Multifactor authentication, IAM best practices, Identity security, Access management tools, IAM implementation, Privileged access management, Single sign-on (SSO), Identity governance, Cloud IAM, Microsoft Azure IAM, Identity verification
Support this podcast at β https://redcircle.com/cyber-life/donations27m | Aug 30, 2023 - Episode 2 Hacking from a Van
In this episode, I'm joined by Zachary M. who built his own 5G van to live the dream life.
Support this podcast at β https://redcircle.com/cyber-life/donations44m | Sep 20, 2021 - Episode 6 Simply Cyber Guest Appearance
In this episode Gerry Auger and I discuss the need for cybersecurity skill-based training. Be sure to check out and subscribe to Gerry's Simply Cyber YouTube channel.
Support this podcast at β https://redcircle.com/cyber-life/donations1h 14m | Sep 5, 2021 - Ken Squared (K2)
You can't go wrong with 2 Kens in the room. Listen to this brief episode of my chat with Ken Mofford at Comcast.
Support this podcast at β https://redcircle.com/cyber-life/donations11m | Apr 14, 2021
