1. EachPod

Cyber Work - Podcast

Cyber Work

Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Technology Education Careers Business How To Training
Update frequency
every 6 days
Average duration
39 minutes
Episodes
392
Years Active
2018 - 2025
Share to:
How to begin your own cybersecurity consulting business | Guest Kyle McNulty

How to begin your own cybersecurity consulting business | Guest Kyle McNulty

On today’s podcast, Kyle McNulty of Secure Ventures talks about interviewing the people behind the most up-and-coming cybersecurity startups. We discuss the best advice he’s received on the show, how…

00:38:36  |   Mon 29 Nov 2021
How to disrupt ransomware and cybercrime groups | Guest Adam Flatley

How to disrupt ransomware and cybercrime groups | Guest Adam Flatley

On today’s podcast, Adam Flatley of Redacted talks about 14 years spent with the NSA and working in global intelligence. He also delineates the process of disrupting ransomware and cybercrime groups …

00:39:46  |   Mon 22 Nov 2021
How to become a cyber threat researcher | Guest John Bambenek

How to become a cyber threat researcher | Guest John Bambenek

On today’s podcast, John Bambenek of Netenrich and Bambenek Consulting talks about threat research, intelligence analytics, why the same security problems are so evergreen and the importance of pitch…

00:50:15  |   Mon 15 Nov 2021
How to become a great cybersecurity leader and manager | Guest Cicero Chimbanda

How to become a great cybersecurity leader and manager | Guest Cicero Chimbanda

On today’s podcast, Cicero Chimbanda, Infosec Skills author and lecturer, discusses his cybersecurity leadership and management courses. We discuss the many paths of a cybersecurity leadership role, …

00:45:53  |   Mon 08 Nov 2021
Cybersecurity collaboration, team building and working as CEO | Guest Wendy Thomas

Cybersecurity collaboration, team building and working as CEO | Guest Wendy Thomas

On today’s podcast, Secureworks president and CEO Wendy Thomas talks about the company’s drive to provide innovative, best-in-class security solutions that sit at the heart of customers’ security ope…

00:34:32  |   Mon 01 Nov 2021
How to learn web application security | Guest Ted Harrington

How to learn web application security | Guest Ted Harrington

On today’s podcast, Infosec Skills author Ted Harrington talks about authoring a recent Infosec Skills learning path, “How To Do Application Security Right,” which is also the subtitle of his recent …

00:46:45  |   Mon 25 Oct 2021
How to become a secure coder | Guest Chrys Thorsen

How to become a secure coder | Guest Chrys Thorsen

On today’s podcast Infosec Skills author Chrys Thorsen talks about founding IT Without Borders, a humanitarian organization built to empower underserved communities through capacity building informat…

00:34:25  |   Mon 18 Oct 2021
Learning Linux is key to building your cybersecurity skills | Guest Jasmine Jackson

Learning Linux is key to building your cybersecurity skills | Guest Jasmine Jackson

On today’s podcast, Jasmine Jackson takes us through how you can get noticed on your resume, how Linux basics can set you up for learning other aspects of cybersecurity, and how capture the flag acti…

00:46:46  |   Mon 11 Oct 2021
Cryptography, encryption and building a secure photo app | Guest Alex Amiryan

Cryptography, encryption and building a secure photo app | Guest Alex Amiryan

Today's guest is Alex Amiryan, a software developer with over 18 years of experience specializing in cybersecurity and cryptography. Alex is the creator of the popular SafeCamera app, which was the p…

00:37:48  |   Mon 04 Oct 2021
Saving McDonald’s from a possible data breach | Guest Connor Greig

Saving McDonald’s from a possible data breach | Guest Connor Greig

This week we chat with Connor Greig of CreatorSphere (creatorsphere.co) about beginning a career in IT at age 17 when he joined Hewlett Packard as an applications engineer, but after just a few weeks…

01:01:15  |   Mon 27 Sep 2021
Inside the Security Yearbook: Industry trends, career advice and more! | Guest Richard Stiennon

Inside the Security Yearbook: Industry trends, career advice and more! | Guest Richard Stiennon

Security Yearbook creator Richard Stiennon joins today’s podcast to share his career journey. He talks about creating the first ISP in the Midwest in the ‘90s, the role of the Security Yearbook in te…

00:51:35  |   Mon 20 Sep 2021
Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live

Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live

Cybersecurity hiring managers, and the entire cybersecurity industry, can benefit from recruiting across a wide range of backgrounds and cultures, yet many organizations still struggle with meaningfu…

01:00:04  |   Mon 13 Sep 2021
Episode 200 extravaganza! Best of the Cyber Work Podcast (and $1,000 in prizes!)

Episode 200 extravaganza! Best of the Cyber Work Podcast (and $1,000 in prizes!)

PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the definitive report on the BAHAMUT threat group, is employed by HP. He is, in fact, employed by Blackberry. I sincerely a…

01:12:34  |   Mon 30 Aug 2021
How to excel at penetration testing | Guest Gemma Moore

How to excel at penetration testing | Guest Gemma Moore

Gemma Moore of Cyberis Limited talks about her incredible pentesting career and shares her advice for aspiring pentesters. She also discusses security as it regards the human cost of social engineeri…

00:55:39  |   Mon 23 Aug 2021
Becoming an ethical hacker with Offensive Security | Guest Ning Wang

Becoming an ethical hacker with Offensive Security | Guest Ning Wang

Ning Wang of Offensive Security talks to us about her role as CEO of Offensive Security. In her role she is responsible for the company culture, vision, strategy and execution. We talk about Wang’s c…

00:49:44  |   Mon 16 Aug 2021
Consumer protection careers: Fraud, identity theft and social engineering | Guest Adam Levin

Consumer protection careers: Fraud, identity theft and social engineering | Guest Adam Levin

Adam Levin of CyberScout talks to us about scams, identity theft and more across the cybersecurity industry from the 1970s until today. He also tells us about his podcast, What the Hack with Adam Lev…

00:53:56  |   Mon 09 Aug 2021
How to become a cybersecurity threat intelligence professional | Guest Neal Dennis

How to become a cybersecurity threat intelligence professional | Guest Neal Dennis

Neal Dennis of Cyware talks to us about building a collective defense via increased threat intelligence sharing in the global security community. Dennis has worked with customer success and clients, …

00:41:03  |   Mon 02 Aug 2021
Tips on entering blue teaming, red teaming or purple teaming | Guest Snehal Antani

Tips on entering blue teaming, red teaming or purple teaming | Guest Snehal Antani

Snehal Antani joins us from Horizon3.ai to talk about pentesting, red teaming and why not every vulnerability necessarily needs to be patched. He also shares some great advice for people entering the…

00:51:50  |   Mon 26 Jul 2021
CMMC is coming: Here's what cybersecurity professionals need to know | Guest Frank Smith

CMMC is coming: Here's what cybersecurity professionals need to know | Guest Frank Smith

Frank Smith joins us from Ntiva to talk about the new Cybersecurity Maturity Model Certification (CMMC), organizations achieving Level 1 and Level 3 maturity levels, and why CMMC is so important for …

00:41:03  |   Mon 19 Jul 2021
Red teaming: The fun, and the fundamentals | Cyber Work Live

Red teaming: The fun, and the fundamentals | Cyber Work Live

Learn what it’s like to do good by being bad. The idea of breaking into a company, by hook or by crook, attracts all sorts of would-be secret agents. But what is red teaming really like as a job? Wha…

01:04:20  |   Mon 12 Jul 2021
Disclaimer: The podcast and artwork embedded on this page are the property of Infosec. This content is not affiliated with or endorsed by eachpod.com.