1. EachPod

Cyber Work - Podcast

Cyber Work

Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Technology Education Careers Business How To Training
Update frequency
every 6 days
Average duration
39 minutes
Episodes
392
Years Active
2018 - 2025
Share to:
What makes a good cyber range? | Guest Justin Pelletier

What makes a good cyber range? | Guest Justin Pelletier

Justin Pelletier is the director of the cyber range program at the ESL Global Cybersecurity Institute at the Rochester Institute of Technology. Infosec Skills has some great cyber ranges, but Pelleti…

00:53:33  |   Mon 21 Mar 2022
Cybersecurity and all things privacy | Guest Chris Stevens

Cybersecurity and all things privacy | Guest Chris Stevens

Today's podcast highlights implementation privacy, policy privacy and all things privacy with privacy expert and Infosec Skills author and instructor Chris Stevens. From his years in the government’s…

00:50:09  |   Mon 14 Mar 2022
Working in DevOps | Guest Steve Pereira

Working in DevOps | Guest Steve Pereira

Steve Pereira of Visible Value Stream Consulting discusses DevOps, SecOps, DevSecOps and his own lifelong love of streamlining projects. You’ll hear how his dad’s job with Bell Telephone facilitated …

00:55:05  |   Mon 07 Mar 2022
Working as a digital forensics analyst | Cybersecurity Career Series

Working as a digital forensics analyst | Cybersecurity Career Series

Digital forensics analysts collect, analyze and interpret digital evidence to reconstruct potential criminal events and/or aid in preventing unauthorized actions from threat actors. They help recover…

00:08:36  |   Thu 03 Mar 2022
Three foundational cybersecurity certifications | Guest Mike Meyers

Three foundational cybersecurity certifications | Guest Mike Meyers

Infosec Skills author Mike Meyers of Total Seminars joins me to discuss three foundational certifications that will start you on just about any path you want to go. Specifically, the CompTIA A+, Netw…

00:53:48  |   Mon 28 Feb 2022
What does a security architect do? | Cybersecurity Career Series

What does a security architect do? | Cybersecurity Career Series

Security Architects are responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure. Security Architects develop informat…

00:13:52  |   Mon 21 Feb 2022
Data backup in ransomware situations | Guest Curtis Preston, aka “Mr. Backup”

Data backup in ransomware situations | Guest Curtis Preston, aka “Mr. Backup”

Curtis Preston, aka “Mr. Backup,” has been in the backup and recovery space since 1993. He’s written four books, hosts a podcast called “Restore it all,” founded backupcentral.com and is a tech evang…

01:00:32  |   Mon 14 Feb 2022
Long-term cybersecurity career strategies | Guest Maxime Lamothe-Brassard

Long-term cybersecurity career strategies | Guest Maxime Lamothe-Brassard

Maxime Lamothe-Brassard, founder of LimaCharlie, has worked for Crowdstrike, Google X and Chronicle Security before starting his own company. This episode goes deep into thinking about your long-term…

00:40:10  |   Mon 07 Feb 2022
Avoiding hardware-based cybersecurity threats | Guest Jessica Amado

Avoiding hardware-based cybersecurity threats | Guest Jessica Amado

Jessica Amado, head of cyber research at Sepio Systems, discusses hardware-based cybersecurity threats. We’ve all heard the USB in the parking lot trick, but Amado tells us about the increasingly com…

00:36:23  |   Mon 31 Jan 2022
What does a cloud security engineer do? | Cybersecurity Career Series

What does a cloud security engineer do? | Cybersecurity Career Series

Cloud security engineers design, develop, manage and maintain a secure infrastructure leveraging cloud platform security technologies. They use technical guidance and engineering best practices to se…

00:13:07  |   Thu 27 Jan 2022
Cybersecurity project management: Your career starts here | Cyber Work Live

Cybersecurity project management: Your career starts here | Cyber Work Live

Are you great with details? Do you like juggling multiple projects at once? Is your organization system the topic of awed discussion between your co-workers? Or are you just interested in getting int…

01:01:24  |   Mon 24 Jan 2022
What does a SOC analyst do? | Cybersecurity Career Series

What does a SOC analyst do? | Cybersecurity Career Series

Security operations center (SOC) analysts are responsible for analyzing and monitoring network traffic, threats and vulnerabilities within an organization’s IT infrastructure. This includes monitorin…

00:07:33  |   Thu 20 Jan 2022
Top cybersecurity breaches of 2021 | Guest Keatron Evans

Top cybersecurity breaches of 2021 | Guest Keatron Evans

Infosec’s Principal Security Researcher, instructor and cybersecurity renaissance man Keatron Evans returns to the show for the first in a series of once-quarterly episodes breaking down big stories …

00:51:51  |   Mon 17 Jan 2022
What does a security manager do? | Cybersecurity Career Series

What does a security manager do? | Cybersecurity Career Series

Security managers develop security strategies that align with the organization's goals and objectives. In addition, they direct and monitor security policies, regulations and rules that the technical…

00:17:58  |   Thu 13 Jan 2022
Predictions for cybersecurity in 2022 | Guest Andrew Howard

Predictions for cybersecurity in 2022 | Guest Andrew Howard

Andrew Howard, CEO of Kudelski Security, returns to give us his cybersecurity predictions for 2022! How will cybersecurity protect the supply chain, why is quantum computing on all of his clients' mi…

00:32:14  |   Mon 10 Jan 2022
What does a penetration tester do? | Cybersecurity Career Series

What does a penetration tester do? | Cybersecurity Career Series

Penetration testers, or ethical hackers, are responsible for planning and performing authorized, simulated attacks within an organization’s information systems, networks, applications and infrastruct…

00:10:20  |   Thu 06 Jan 2022
Security risks facing streamers on Twitch and YouTube | Guest Roderick Jones

Security risks facing streamers on Twitch and YouTube | Guest Roderick Jones

Roderick Jones of Concentric talks about security risks facing content creators, influencers, gamers and streamers on Twitch, YouTube and elsewhere. Online harassment is often seen as “part of the pa…

00:44:29  |   Mon 03 Jan 2022
High-tech hacking tools and how to defend against them | Guest Bentsi Ben-Atar

High-tech hacking tools and how to defend against them | Guest Bentsi Ben-Atar

Bentsi Ben-Atar of Sepio Systems talks about some truly scary high-tech hacking weapons and techniques, from Raspberry Pis in your mouse or keyboard to charging cables that can exfiltrate data from a…

00:40:02  |   Mon 20 Dec 2021
How to work in cloud security | Guest Menachem Shafran

How to work in cloud security | Guest Menachem Shafran

On today’s podcast, Menachem Shafran of XM Cyber talks about cloud security. Menachem tells us about the work of project manager and product manager, how the haste to migrate to the cloud can unneces…

00:37:58  |   Mon 13 Dec 2021
How to get started with bug bounties and finding vulnerabilities | Guest Casey Ellis

How to get started with bug bounties and finding vulnerabilities | Guest Casey Ellis

On this week’s Cyber Work Podcast, BugCrowd and disclose.io! founder Casey Ellis discusses how to think like a cybercriminal, the crucial need for transparent vulnerability disclosure, the origins of…

00:45:48  |   Mon 06 Dec 2021
Disclaimer: The podcast and artwork embedded on this page are the property of Infosec. This content is not affiliated with or endorsed by eachpod.com.