Redefining CyberSecurity Podcast
Hosted by Sean Martin, CISSP
Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively?
For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, our communities, and our society, in a secure and safe way, we must begin by operationalizing security.
Executives are recognizing the importance of their investments in information security and the value it can have on business growth, brand value, partner trust, and customer loyalty.
Together with executives, lines of business owners, and practitioners, we are Redefining CyberSecurity.
Guest
Andy Rappaport
Data Security Architect at iRobot [@iRobot]
On LinkedIn | https://www.linkedin.com/in/andyrappaport/
Host
Sean Martin
Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining …
Guests
Jerry Bell
VP and CISO, IBM Public Cloud [@IBM | @IBMcloud] and founder & co-host of the Defensive Security Podcast [@defensivesec]
On Mastodon | https://infosec.exchange/@jerry/10930226783565765…
In the first episode of this two-part series, we looked at the history of privacy law and regulation and we explored how the definitions and requirements are expanding for the benefit of consumers an…
Guest
Scott Schober
President and CEO of Berkeley Varitronics Systems [@BVSystems]
On Linkedin | https://www.linkedin.com/in/snschober/
On Twitter | https://twitter.com/ScottBVS
On Facebook | https://www.…
The large ratio gap in the availability of IT security professionals to open positions existed long before COVID-19. And that gap has grown even bigger thanks to the great resignation that has contin…
Guests
LeAnn Cary
Senior Director - Advanced Fusion Center Practice Leader, Optiv [@Optiv]
On Twitter | https://twitter.com/leanncary
On Linkedin | https://www.linkedin.com/in/leanncary/
Yolanda Craig
Dire…
Guests
Deborah Blyth
Executive Public Sector Strategist at CrowdStrike [@CrowdStrike]
On Linkedin | https://www.linkedin.com/in/deborah-blyth/
On Twitter | https://twitter.com/debbiblyth
Merlin Namuth
CISO…
Over 100+ countries and counting (along with a growing number is U.S. states) have enacted data privacy legislation, creating a super-complex global data privacy landscape. Unless, of course, you app…
Global supply chains have grown much more complex than simply figuring out how to get products and services from Point A to Point B. Companies also depend on second-tier, third-tier, and even nth-tie…
Guests
William Kilmer
Venture Investor | Company Builder | Author | Innovation Strategist
On Linkedin | https://www.linkedin.com/in/wkilmer/
On Twitter | https://twitter.com/wkilmer
Marco Ciappelli
Co-Foun…
Aerospace and the satellite ecosystem is comprised of several systems — a system of systems, in fact. Does the sector offer enough transparency to ensure each one operates securely while supporting t…
CISOs and InfoSec teams in charge of product security realize how the drive for innovation can speed up their organization's product release philosophy. Software development teams want applications t…
The threat landscape has changed. The technology landscape has evolved. The security operations center analysts and researchers have had to do the same.
In this special event coverage episode, we conn…
The “waves” of ransom-driven DDoS — Distributed Denial of Service — attacks continue to come as the attack vectors, techniques, and targets continue to evolve. Where does this leave us? Let's look to…
Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devices. But many severely underestimate the count, an…
This is a story that begins with the journey of Arik Liberzon, the founder and CTO and head of the R&D and product teams at Pentera. Arik was the head of the red team for the Israeli Defense Forces, …
When a multi-national technology company needs to manage cyber risk on a global scale while not losing sight of the regional and local aspects of the business, one way to accomplish this is through r…
Traditional penetration testing has been a cornerstone of effective cybersecurity for decades, providing a vital baseline function for every security practice. But in the face of today's rapidly prol…
As world events have demonstrated these past couple of years, crisis management is a requisite for doing business in today’s world. CISOs have choices to make in the face of the next crisis that’s su…
The current state of IoT security and privacy may look different to many people, businesses, and governments. This discrepancy could be a problem. With so many different viewpoints, it can be challen…