Normal view
What’s it like to be a help desk manager? | Guest Gloria Milton
Gloria Milton, help desk manager at itSynergy, discusses what it is like to be a help desk manager and her two decades of experience in the industry.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Introduction to angr Part 3
What does a director of fraud and identity do? | Guest Kimberly Sutherland
Kimberly Sutherland of LexisNexis Risk Solutions discusses authentication and identity-proofing.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
How to become a Certified Ethical Hacker (CEH) | Guest Keatron Evans
Infosec's Keatron Evans discusses ethical hacking careers and the Certified Ethical Hacker (CEH).
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Risk management and understanding what matters most | Guest Liz Mann
EY's Liz Mann discusses risk management and her work building a diverse cybersecurity workforce.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Focusing on users is the only way to improve cybersecurity | Guest Ben Johnson
Ben Johnson, CTO and co-founder of Obsidian Security, discusses a variety of different topics around the umbrella theme of shifting cybersecurity priorities in the face of an evolving threat landscape.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Benefits and challenges of securing your cloud data | Guest Andrew Howard
Kudelski Security CTO Andrew Howard discusses securing your data in the cloud.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
- Infosec Resources
- Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan
Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan
Kelly Sheridan, reporter and staff editor for Dark Reading, discusses her extensive research and reporting on the cybersecurity skills gap and offers suggestions for employers and would-be cybersecurity experts to help close the gap.
Download our report, "3 steps employers can take to close the skills gap”: https://infosecinstitute.com/2019-industry-report.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Protecting customer data at contact centers | Guest Ben Rafferty
Semafone's Ben Rafferty discusses fraud at contact centers.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Fraud trends from the latest ThreatMetrix cybercrime report | Guest Rebekah Moody
ThreatMetrix's Rebekah Moody discusses the latest fraud and cybercrime trends.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
How to become an APT hunter with Carbon Black | Guest David Balcar
Carbon Black's David Balcar discusses hunting advanced persistent threats (APTs).
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Attacking and Defending Active Directory course review
- Infosec Resources
- How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan
How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan
Exabeam's Anu Yamunan discusses how data science and machine learning are being used in cybersecurity.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Latest malware trends are bad news for business | Guest Adam Kujawa
Malwarebytes Adam Kujawa discusses the latest malware tactics and techniques.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
- Infosec Resources
- DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin
DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin
Andrew Wertkin, CTO of BlueCat Networks, returns to the podcast to discuss a new and hotly contested privacy technology called DNS over HTTPS (DoH), the ethical and procedural issues around DoH, and how it may change the way infosec professionals work.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
- Infosec Resources
- Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow
Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow
Susan Morrow, head of research and development at Avoco Secure, returns to the podcast to discuss her 20 years in the security industry, how she landed a fortune 500 client working from her home, and the growing role of women in the industry.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Preventing and repairing security breaches | Guest John Torres
John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations from online and physical threats, and career paths for those looking to pursue a career in cybersecurity.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
- Infosec Resources
- Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison
Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison
The shortage of cybersecurity professionals has grown to nearly three million globally, with approximately 498,000 openings in North America. In addition, the half-life of technical skills has shrunk to approximately two years. Finding new cybersecurity workers and continually developing their skills is vital for organizations’ data security — and an opportunity for those beginning or progressing their infosec careers. This episode of the Cyber Work podcast is a rebroadcast of a webinar from April, and features Kathleen Hyde, the chair of cybersecurity programs at Champlain College Online, Scott Madsen, CEO at Cingo Solutions, and Henry Harrison, co-founder and CTO at Garrison.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
- Infosec Resources
- Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight
Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight
Alissa Knight, senior analyst at Aite Group, discusses her work penetration testing connected cars and the ups and downs of her security career, from getting arrested for hacking as a teenager to becoming a senior security analyst and her upcoming book on hacking modern vehicles.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
What does a vulnerability verification specialist do? | Guest Lauren McCaslin
Lauren McCaslin, vulnerability verification team lead for the Threat Research Center at WhiteHat Security, discusses her path to becoming a vulnerability verification specialist and what it's like to have a career focused on cybersecurity vulnerabilities.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Getting started in digital forensics | Guest Keatron Evans
Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. This episode of the Cyber Work podcast is a rebroadcast of a webinar featuring Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security. In this podcast, he discusses the difference between computer, mobile and network forensics, how a forensics certification can progress your career and digital forensics questions from live viewers.
If you want to watch Keatron's live demo on extracting evidence from the cloud, you can view it here: https://www.youtube.com/watch?v=3FDmtq55QoI.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
The dangers of role-based access control (RBAC) | Guest Balaji Parimi
Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current problems with role-based access control and how access control is evolving to become more secure. Join the fight against cybercrime: https://infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast
Leveraging board governance for cybersecurity | Guest Michael Figueroa
Michael Figueroa, President and Executive Director of the Advanced Cyber Security Center (ACSC), discusses the importance of leveraging board governance in cybersecurity initiatives. Join the fight against cybercrime: https://infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast
My (ongoing) path to cyber security.
- Infosec Resources
- PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane
PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane
Patrick Lane, CompTIA Director of Products discusses everything you need to know about CompTIA’s PenTest+ cert, including why CompTIA created the PenTest+ certification, how PenTest+ compares to certs like Certified Ethical Hacker (CEH), who should earn a PenTest+ certification and an overview of the PenTest+ exam. Join the fight against cybercrime: https://infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast. Learn more about the CompTIA PenTest+ cert with Infosec Skills: https://www.infosecinstitute.com/skills/learning-paths/comptia-pentest-certification/.
The importance of cybersecurity education | Guest Dave Hatter
Dave Hatter, a cybersecurity consultant for over 25 years and a technology educator at Cincinnati State, discusses his security journey, the future of cybersecurity education and the roles of certification in pursuing high level cybersecurity careers. Join us in the fight against cybercrime: https://www.infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast.
What’s it like being a cybersecurity risk analyst? | Guest John Bree
John Bree, Neo Group Inc. Senior Vice President and Partner, discusses his risk analyst journey, what a day in the life of a risk analyst looks like and insider tips on how to start out in security risk analytics. Join us in the fight against cybercrime: https://www.infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast.
- Infosec Resources
- Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski
Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski
Are phishing simulations pentesting for humans or training? What’s more effective with those folks who can’t stop themselves from clicking on everything: “name and shame” or a private, personal coaching session? How do you deal with phishing repeat offenders? Join Tory Dombrowski, an IT director known as "the diabolical one" for his phish testing schemes, and Lisa Plaggemier, chief evangelist for Infosec as they discuss if it's ever a good idea to terminate habitual clickers, how to protect your org from click-happy employees, and training techniques and escalation methods.
– Start learning cybersecurity for free: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast