1. EachPod

Cyber Work - Podcast

Cyber Work

Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Technology Education Careers Business How To Training
Update frequency
every 6 days
Average duration
39 minutes
Episodes
392
Years Active
2018 - 2025
Share to:
Asset visibility and vulnerability detection | Guest Yossi Appleboum

Asset visibility and vulnerability detection | Guest Yossi Appleboum

Yossi Appleboum, CEO of Sepio, talks about Cybersecurity and Infrastructure Security Agency (CISA)’s operational directive for non-military federal agencies to adopt a strict set of asset visibility …

00:45:20  |   Mon 13 Feb 2023
How to set up a digital forensics lab | Cyber Work Hacks

How to set up a digital forensics lab | Cyber Work Hacks

Infosec Skills author and Paraben founder and CEO Amber Schroader talks about how to quickly and inexpensively set up your own home digital forensics lab. 

0:00 - Creating your digital forensics lab
1:…

00:08:54  |   Thu 02 Feb 2023
Inside the Pentagon's new zero-trust policy | Guest Steve Judd

Inside the Pentagon's new zero-trust policy | Guest Steve Judd

Venafi solutions architect Steve Judd talks about the recent directive from the Pentagon that a zero-trust policy be implemented at the Department of Defense in the next four years. Is this a workabl…

00:40:53  |   Mon 30 Jan 2023
Biggest cybercrime trends heading into 2023 | Guest Paul Giorgi

Biggest cybercrime trends heading into 2023 | Guest Paul Giorgi

Paul Giorgi of XM Cyber helps us wrap up 2022 by discussing some of the most unusual and complex attack paths he and XM have seen in the past year. We discuss some of the most common breaches and met…

00:47:33  |   Mon 23 Jan 2023
ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks

ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks

Infosec Skills author Leighton Johnson talks about major changes to CISM in 2022. CISM has shifted qualitatively from the “Manager” side of the cert name to the “Security” side.

0:00 - Changes to CISM…

00:10:05  |   Thu 19 Jan 2023
How SOCs are changing: Location, remote work and more | Guest A.N. Ananth

How SOCs are changing: Location, remote work and more | Guest A.N. Ananth

A.N. Ananth of Netsurion joins us to talk about the future of SOCs. Security operations centers used to look more like bunkers crowded with network traffic analysts who rarely got to see the sun. Ana…

00:35:08  |   Mon 16 Jan 2023
The changing roles of red teaming | Guest Matt Lorentzen

The changing roles of red teaming | Guest Matt Lorentzen

Cyberis’ Matt Lorentzen talks all things pentesting, red teaming, the changing roles that red teaming has in fine-tuning and interrogating modern security and why you don’t have to stop doing the fun…

00:49:09  |   Mon 09 Jan 2023
How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks

How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks

Whether you’re studying for the CEH, CISSP, Pentest+, or even the Security+, there’s always one question about cryptography, and it’s easy to miss! Want to hear a cool trick to keep symmetric and asy…

00:06:03  |   Thu 05 Jan 2023
U.S. Cyber Games Season II: Behind the scenes with the head coach | Guest Ken Jenkins

U.S. Cyber Games Season II: Behind the scenes with the head coach | Guest Ken Jenkins

Returning guest Ken Jenkins stops by to talk about his work as the head coach of the US Cyber Games. If you’re intrigued by this emerging e-sport, you will want to keep it here: Jenkins discusses the…

00:55:32  |   Mon 12 Dec 2022
Connecting cloud security, data privacy and cybersecurity | Guest Ameesh Divatia

Connecting cloud security, data privacy and cybersecurity | Guest Ameesh Divatia

Ameesh Divatia, CEO of Baffle, Inc., talks about data privacy, data security, cloud security and how a skillset in the middle of that triangle will be your best asset in the years to come. All that, …

00:45:00  |   Mon 05 Dec 2022
K-12 cybersecurity: Protecting schools from cyber threats | Guest Mike Wilkinson

K-12 cybersecurity: Protecting schools from cyber threats | Guest Mike Wilkinson

Michael Wilkinson leads the digital forensics and incident response team at Avertium. The team is dedicated to helping clients investigate and recover from IT security incidents daily. Wilkinson talk…

00:37:41  |   Mon 21 Nov 2022
Behind the scenes of ransomware negotiation  | Guest Tony Cook

Behind the scenes of ransomware negotiation | Guest Tony Cook

Tony Cook of GuidePoint Security knows a lot about threat intelligence and incident response. But he’s also used these skills while working in ransomware negotiation! Cook has handled negotiations fo…

00:38:45  |   Mon 14 Nov 2022
CMMC has changed: Here's what you need to know | Guest Leighton Johnson

CMMC has changed: Here's what you need to know | Guest Leighton Johnson

Infosec instructor and 40-year cybersecurity veteran Leighton Johnson talks to us about all things CMMC. After last year’s attempted rollout, CMMC pulled back and retooled its entire framework. But w…

00:38:36  |   Mon 07 Nov 2022
Cybersecurity public speaking techniques | Guest Lisa Tetrault

Cybersecurity public speaking techniques | Guest Lisa Tetrault

Lisa Tetrault of Arctic Wolf talks about the adhesives that hold cybersecurity together: communication, collaboration and strong teamwork. First, Tetrault discusses how public speaking at conferences…

00:39:53  |   Mon 24 Oct 2022
Digital identity and cybersecurity are inseparable | Guest Susan Morrow

Digital identity and cybersecurity are inseparable | Guest Susan Morrow

Susan Morrow returns for her fourth time on the Cyber Work Podcast and the first since 2019. Morrow, simply put, is plugged into every aspect of digital identity currently being discussed, and she ta…

00:49:14  |   Mon 17 Oct 2022
Bad data privacy protocols can become an identity fraud disaster | Guest Stephen Cavey

Bad data privacy protocols can become an identity fraud disaster | Guest Stephen Cavey

Stephen Cavey, co-founder and chief evangelist of Ground Labs, talks about the jagged jigsaw puzzle of data collection, data privacy and the dozens — if not hundreds — of privacy regulations and fram…

00:43:59  |   Mon 10 Oct 2022
Privacy and international business | Guest Noriswadi Ismail

Privacy and international business | Guest Noriswadi Ismail

Noriswadi Ismail of Breakwater Solutions and the Humanising 2030 campaign joins us to talk about privacy as it pertains to international business, cybersecurity and why it’s important not just to lea…

00:45:39  |   Mon 03 Oct 2022
Attack surface managers and the state of attack surfaces | Guest Dave Monnier

Attack surface managers and the state of attack surfaces | Guest Dave Monnier

Dave Monnier of Team Cymru talks about the state of attack surfaces, the strengths and shortcomings of attack surface managers and why something we refer to as a “soft” skill might be the hardest ski…

00:48:28  |   Mon 26 Sep 2022
The importance of API security and PII | Guest Giora Engel

The importance of API security and PII | Guest Giora Engel

Today on Cyber Work, Giora Engel of NeoSec talks about securing APIs. Find out why APIs are the new network, why their very nature makes them vulnerable to abuse and how to position yourself as an au…

00:33:38  |   Mon 19 Sep 2022
Corporate data breaches and security awareness training | Guest Mathieu Gorge

Corporate data breaches and security awareness training | Guest Mathieu Gorge

Mathieu Gorge of VigiTrust talks about the Marriott Hotel data breach that happened back in June, including the facts of the event and why once-per-year security awareness training isn’t enough when …

00:42:28  |   Mon 12 Sep 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Infosec. This content is not affiliated with or endorsed by eachpod.com.