1. EachPod

Cyber Work - Podcast

Cyber Work

Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Technology Education Careers Business How To Training
Update frequency
every 6 days
Average duration
39 minutes
Episodes
392
Years Active
2018 - 2025
Share to:
Overcoming challenges to build a cybersecurity career | Guest Dr. Chanel Suggs

Overcoming challenges to build a cybersecurity career | Guest Dr. Chanel Suggs

Today's Cyber Work Podcast features Dr. Chanel Suggs, the Duchess of Cybersecurity®. Dr. Suggs is a teacher, business owner and thought leader and has appeared on TV and podcast platforms around the …

00:48:05  |   Mon 29 Aug 2022
What's it like to work in emergency response? | Guest Christopher Tarantino

What's it like to work in emergency response? | Guest Christopher Tarantino

Learn all about emergency response — and the myriad techniques and skills that term implies — in today's episode featuring Christopher Tarantino, CEO of Epicenter Innovation. Is there a physical secu…

00:44:46  |   Mon 22 Aug 2022
Securing operational technology: ICS, IoT, AI and more | Guest Francis Cianfrocca

Securing operational technology: ICS, IoT, AI and more | Guest Francis Cianfrocca

If you want to learn more about working with operational technology (OT) and internet-connected devices, then don't miss today's episode with Francis Cianfrocca, CEO of Insight Cyber Group. He discus…

00:53:08  |   Mon 15 Aug 2022
Cybersecurity project management: A peek behind the curtain | Cyber Work Live

Cybersecurity project management: A peek behind the curtain | Cyber Work Live

Last year, Cyber Work Live brought you into the world of cybersecurity project management — with tips for acquiring your skills, improving your resume and getting your foot in the door. But what does…

01:01:52  |   Mon 08 Aug 2022
OWASP Top 10: What cybersecurity professionals need to know | Guest John Wagnon

OWASP Top 10: What cybersecurity professionals need to know | Guest John Wagnon

On today's episode, our old pal John Wagnon, Infosec Skills author and keeper of the secrets of OWASP, joins me to talk about the big changes in the OWASP Top 10 that happened at the end of 2021, his…

00:39:08  |   Mon 01 Aug 2022
Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski

Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski

Today on the Cyber Work Podcast, Mark Kapczynski of OneRep reminds us of an awful truth most people either don’t know or don’t like to think about. Your personal information — your address, your phon…

00:44:37  |   Mon 25 Jul 2022
Keeping your inbox safe: Real-life BEC attacks and email fraud careers | Guest John Wilson

Keeping your inbox safe: Real-life BEC attacks and email fraud careers | Guest John Wilson

Today's episode is all about email fraud. John Wilson, head of the cyber intelligence division at Agari by HelpSystems, discusses Business Email Compromise (BEC), spearphishing, whaling, romance frau…

00:42:34  |   Mon 18 Jul 2022
Cybersecurity has a marketing problem — and we're going to fix it | Guest Alyssa Miller

Cybersecurity has a marketing problem — and we're going to fix it | Guest Alyssa Miller

On today's episode, we're breaking down phrases you've heard a million times: “security is everyone’s job,” “humans are the weakest link in the security chain,” “it’s not if you get breached, but whe…

00:56:22  |   Mon 27 Jun 2022
What does a secure coder do? | Cybersecurity Career Series

What does a secure coder do? | Cybersecurity Career Series

Secure coders are responsible for developing and writing secure code in a way that protects against security vulnerabilities like bugs, defects and logic flaws. They take proactive steps to introduce…

00:20:56  |   Mon 20 Jun 2022
Cybersecurity jobs: How to better apply, get hired and fill open roles | Guest Diana Kelley

Cybersecurity jobs: How to better apply, get hired and fill open roles | Guest Diana Kelley

Diana Kelley returns to the show to discuss her work as a board member of the Cyber Future Foundation and the goings-on at this year’s Cyber Talent Week. Whether you’re a cybersecurity hiring manager…

01:00:37  |   Mon 13 Jun 2022
Ethical user data collection and machine learning | Guest Ché Wijesinghe

Ethical user data collection and machine learning | Guest Ché Wijesinghe

Today on Cyber Work Ché Wijesinghe of Cape Privacy talks about the safe and ethical collection of user data when creating machine learning or predictive models. When your bank is weighing whether to …

00:24:00  |   Mon 06 Jun 2022
Working as a privacy manager | Cybersecurity Career Series

Working as a privacy manager | Cybersecurity Career Series

A Privacy Manager is responsible for the development, creation, maintenance and enforcement of the privacy policies and procedures of an organization. They ensure compliance with all privacy-related …

00:15:38  |   Mon 23 May 2022
What does a cybersecurity beginner do? | Cybersecurity Career Series

What does a cybersecurity beginner do? | Cybersecurity Career Series

Just getting started?  This role is for you!

The Cybersecurity Beginner role focuses on the foundational skills and knowledge that will allow anyone to take the first step towards transitioning into a…

00:14:47  |   Mon 16 May 2022
What does an ICS security practitioner do? | Cybersecurity Career Series

What does an ICS security practitioner do? | Cybersecurity Career Series

Industrial control system (ICS) security practitioners are responsible for securing mission-critical SCADA and ICS information systems. They are responsible for restricting digital and physical acces…

00:13:42  |   Mon 09 May 2022
A public discussion about privacy careers: Training, certification and experience | Cyber Work Live

A public discussion about privacy careers: Training, certification and experience | Cyber Work Live

Join Infosec Skills authors Chris Stevens, John Bandler and Ralph O’Brien as they discuss the intersection of privacy and cybersecurity. They’ll help you walk a path that will lead to an engaging car…

01:02:44  |   Mon 02 May 2022
What does a security engineer do? | Cybersecurity Career Series

What does a security engineer do? | Cybersecurity Career Series

Security engineers are responsible for implementing, and continuously monitoring security controls that protect computer assets, networks and organizational data. They often design security architect…

00:15:10  |   Mon 25 Apr 2022
What does an information risk analyst do? | Cybersecurity Career Series

What does an information risk analyst do? | Cybersecurity Career Series

Information risk analysts conduct objective, fact-based risk assessments on existing and new systems and technologies, and communicate findings to all stakeholders within the information system. They…

00:20:09  |   Mon 18 Apr 2022
The importance of cyber threat research | Guest Moshe Zioni

The importance of cyber threat research | Guest Moshe Zioni

Moshe Zioni of Apiiro talks about threat research and how to properly report discovered code vulnerabilities. We discuss the ways that vulnerabilities can find their way into code despite your best i…

00:40:00  |   Mon 11 Apr 2022
Security awareness and social engineering psychology | Guest Dr. Erik Huffman

Security awareness and social engineering psychology | Guest Dr. Erik Huffman

TEDx speaker, security researcher, host of the podcast MiC Club and all-around expert on security awareness and social engineering, Dr. Erik Huffman, is today's guest. Huffman spoke at the 2021 Infos…

00:56:18  |   Mon 04 Apr 2022
Better cybersecurity practices for journalists | Guest Marcus Fowler

Better cybersecurity practices for journalists | Guest Marcus Fowler

Marcus Fowler, senior vice president of strategic engagement and threats at DarkTrace, talks about attack vectors currently facing embedded journalists, their need to be available at all times for po…

00:50:32  |   Mon 28 Mar 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Infosec. This content is not affiliated with or endorsed by eachpod.com.