1. EachPod

Redefining CyberSecurity - Podcast

Redefining CyberSecurity

Redefining CyberSecurity Podcast
Hosted by Sean Martin, CISSP

Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively?

For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, our communities, and our society, in a secure and safe way, we must begin by operationalizing security.

Executives are recognizing the importance of their investments in information security and the value it can have on business growth, brand value, partner trust, and customer loyalty.

Together with executives, lines of business owners, and practitioners, we are Redefining CyberSecurity.

Business Education Technology Tech
Update frequency
every 2 days
Average duration
31 minutes
Episodes
569
Years Active
2020 - 2025
Share to:
Knowledge Is Different Than Information | Investing In The CyberSecurity Crowd Means Investing In Businesses, Society, And Humanity | A CrowdSec Brand Story With CEO Philippe Humeau And Hacker-Maker Phillip Wylie

Knowledge Is Different Than Information | Investing In The CyberSecurity Crowd Means Investing In Businesses, Society, And Humanity | A CrowdSec Brand Story With CEO Philippe Humeau And Hacker-Maker Phillip Wylie

How can an industry have so much data and information yet still lack the knowledge necessary to make quick, meaningful, impactful decisions? There could be many reasons, but one is no longer a missin…

01:03:32  |   Mon 02 May 2022
Autonomous Datacenters On Rails | A Conversation With Amir Levintal About The Complexities, Risk Exposure, Safety Standards, And Protection Measures For Railway Systems | Redefining CyberSecurity With Sean Martin

Autonomous Datacenters On Rails | A Conversation With Amir Levintal About The Complexities, Risk Exposure, Safety Standards, And Protection Measures For Railway Systems | Redefining CyberSecurity With Sean Martin

The rise of digitalization has led to more interconnected rail systems. While this has propelled forward our trains and metros at some seriously high speed, it has also dramatically expanded the thre…

00:48:19  |   Mon 25 Apr 2022
Catch 22 | Consumers Hate Sharing Their Data, But There's No Other Option | An Imperva Brand Story About The Findings In The Imperva Global Consumer Survey With Terry Ray

Catch 22 | Consumers Hate Sharing Their Data, But There's No Other Option | An Imperva Brand Story About The Findings In The Imperva Global Consumer Survey With Terry Ray

Consumers worry about sharing data online, yet most feel they have “no choice” but to share their data if they want to use online services. It's a catch 22 — and it is not a bus.

Trust is waning. A ma…

00:40:23  |   Fri 22 Apr 2022
What To Expect At RSA Conference USA 2022 | ITSPmagazine Event Coverage: RSAC 2022 San Francisco, USA | A Conversation With Linda Gray Martin, Britta Glade, And Cecilia Murtagh Marinier

What To Expect At RSA Conference USA 2022 | ITSPmagazine Event Coverage: RSAC 2022 San Francisco, USA | A Conversation With Linda Gray Martin, Britta Glade, And Cecilia Murtagh Marinier

We are thrilled to kick off our event coverage for our first Chats On The Road to RSA Conference 2022 with our good friends to us to give the latest and greatest for what we can expect at this year's…

00:45:56  |   Thu 21 Apr 2022
Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean Martin

Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean Martin

Your organization has precious resources all over the place: on-premises in the data center on servers and in databases; in the office, at home, on the road on desktops, laptops, tablets, mobile phon…

00:50:37  |   Tue 19 Apr 2022
Higher Education And Regulated Research Community Of Practice (RRCoP) | 5 Goals To Raise The Security And Compliance Posture Of Academic Institutions | Redefining CyberSecurity With Carolyn Ellis, Erik Deumens, And Michael Parisi

Higher Education And Regulated Research Community Of Practice (RRCoP) | 5 Goals To Raise The Security And Compliance Posture Of Academic Institutions | Redefining CyberSecurity With Carolyn Ellis, Erik Deumens, And Michael Parisi

When it comes to implementing efficient and effective information security programs, higher education institutions can use all the help they can get. That's where the RRCoP community comes in.

In toda…

00:41:32  |   Fri 15 Apr 2022
Balancing Reward Over Risk | Evolving CyberSecurity Through Systems Engineering And Committee Collaboration | Redefining CyberSecurity With Howard Miller And Ron Ross

Balancing Reward Over Risk | Evolving CyberSecurity Through Systems Engineering And Committee Collaboration | Redefining CyberSecurity With Howard Miller And Ron Ross

In this episode, NIST Fellow, Ron Ross, and Pepperdine Graziadio Business School Advisory Board Member, Howard Miller, join the show to discuss risk assessment, reward analysis, and security manageme…

00:38:35  |   Mon 04 Apr 2022
Large-Scale Data Analytics For Cybersecurity And Solving Real-World Grand Challenges | Redefining CyberSecurity With Professor David Bader

Large-Scale Data Analytics For Cybersecurity And Solving Real-World Grand Challenges | Redefining CyberSecurity With Professor David Bader

We may see new "graph" processors in the future that can better handle the data-centric computations in data science. Will that be enough?

About David

David A. Bader is a Distinguished Professor in the…

00:39:00  |   Thu 31 Mar 2022
Book | Critical Infrastructure Risk Assessment: The Definitive Threat Identification And Threat Reduction Handbook | Redefining CyberSecurity With Ernie Hayden

Book | Critical Infrastructure Risk Assessment: The Definitive Threat Identification And Threat Reduction Handbook | Redefining CyberSecurity With Ernie Hayden

In a world where everything is connected and interdependent, complexity has become part of our very way of life, and it must be part of our way of thinking. But, especially when we look at infrastruc…

00:44:59  |   Thu 31 Mar 2022
Business Continuity: Building And Operationalizing A Functional Disaster Recovery Plan | A Live Stream Panel With Dr Rebecca Wynn And Gayle Anders | Redefining CyberSecurity With Sean Martin

Business Continuity: Building And Operationalizing A Functional Disaster Recovery Plan | A Live Stream Panel With Dr Rebecca Wynn And Gayle Anders | Redefining CyberSecurity With Sean Martin

Every organization has exposure to risk. Every organization experiences events that cross over the risk threshold to quickly realize they are facing an incident head-on.

It's how the organization prep…

00:50:07  |   Tue 29 Mar 2022
Creating A Data Security Strategy And Operationalizing A Mature Data Security Program | A Live Stream Panel With Chris Daskalos And Andy Rappaport | Redefining CyberSecurity With Sean Martin

Creating A Data Security Strategy And Operationalizing A Mature Data Security Program | A Live Stream Panel With Chris Daskalos And Andy Rappaport | Redefining CyberSecurity With Sean Martin

Data is the fuel that powers the business. What are organizations doing to protect it?

Organizations have become the custodians of critical information needed to remain competitive and sensitive infor…

00:50:16  |   Thu 24 Mar 2022
Book | Security Yearbook: A Complete History And Directory Of The Entire Cybersecurity Industry | Redefining CyberSecurity With Richard Stiennon

Book | Security Yearbook: A Complete History And Directory Of The Entire Cybersecurity Industry | Redefining CyberSecurity With Richard Stiennon

Do you think you know all of the cybersecurity vendors on the market? Think again. Need help getting a clear view for how they all fit into the bigger InfoSec picture in your org? Have a listen.

In to…

00:41:02  |   Mon 14 Mar 2022
How To Create Effective Security Cultures | Redefining CyberSecurity With Dutch Schwartz And Rock Lambros

How To Create Effective Security Cultures | Redefining CyberSecurity With Dutch Schwartz And Rock Lambros

As the CISO role has revolved from chief security engineer to cyber risk advisor, successful CISOs are focusing on culture, strategy, and leadership.  Let's discuss some real-world observations and e…

00:42:40  |   Tue 08 Mar 2022
The Playbook To Defend Against Aggressive Cyber Ops: Preparing For A Cyber Crisis As The Crisis Strikes | Redefining CyberSecurity With Mick Douglas

The Playbook To Defend Against Aggressive Cyber Ops: Preparing For A Cyber Crisis As The Crisis Strikes | Redefining CyberSecurity With Mick Douglas

There's a cyber crisis brewing. Not the first. Definitely not the last. But current. Here's some advice as seen on social media (paraphrased)... "take your years of strategizing, planning, budgeting,…

00:36:53  |   Sat 26 Feb 2022
Book | Can. Trust. Will. Hiring For The Human Element In The New Age Of Cybersecurity | Redefining Security With Leeza Garber And Scott Olson

Book | Can. Trust. Will. Hiring For The Human Element In The New Age Of Cybersecurity | Redefining Security With Leeza Garber And Scott Olson

If the goal is to fill a role and keep it filled, we may be missing the point of hiring and retaining top talent.

More than ever, investing in the human element of cybersecurity is paramount. How we s…

00:45:09  |   Thu 24 Feb 2022
St. Joseph's Health | Cybersecurity & Vendor Risk Management: Why It Matters | Redefining CyberSecurity With Ebony Riley And Jesse Fasolo

St. Joseph's Health | Cybersecurity & Vendor Risk Management: Why It Matters | Redefining CyberSecurity With Ebony Riley And Jesse Fasolo

Many organizations are ill-prepared when it comes to making sure their hospital is protected from risk, both from an organizational and IT standpoint. It's increasingly important to have a concrete r…

00:45:46  |   Mon 14 Feb 2022
How And When To Put Standards To Work — And Not | Redefining CyberSecurity With Alyssa Miller And Accidental CISO

How And When To Put Standards To Work — And Not | Redefining CyberSecurity With Alyssa Miller And Accidental CISO

As is common for the Redefining Security show, conversations are often inspired by a social post. This one about standards is no different. However, what you think about standards may be different af…

00:52:16  |   Tue 01 Feb 2022
Maritime Intelligence | OSINT And The Ocean | Redefining CyberSecurity With Rae Baker

Maritime Intelligence | OSINT And The Ocean | Redefining CyberSecurity With Rae Baker

The sea is broad and deep. So is the information that is created by and for the maritime vessels floating around and underneath the surface. What is this information used for? And how can it be misus…

00:40:56  |   Thu 27 Jan 2022
The Blindspot Of Infosec Training | Redefining CyberSecurity With Eric Thomas

The Blindspot Of Infosec Training | Redefining CyberSecurity With Eric Thomas

It's time to change the way we think about cyber security training. Evidently, the cybersecurity community agrees — just look at the post made recently by Eric Thomas (you can find it in the resource…

00:44:41  |   Mon 20 Dec 2021
The Real Story About LOG4J - No FUD - No Clickbait - No BS | A Special ITSPmagazine Redefining CyberSecurity Webcast Panel With Alyssa Miller, Katie Nickels, Eric Thomas, And Mark Nunnikhoven

The Real Story About LOG4J - No FUD - No Clickbait - No BS | A Special ITSPmagazine Redefining CyberSecurity Webcast Panel With Alyssa Miller, Katie Nickels, Eric Thomas, And Mark Nunnikhoven

Back in 2013, I wrote a piece for TechTarget (sadly, it’s no longer online). It focused on mobile security and app security and referenced a report that included some interesting open source software…

01:01:17  |   Fri 17 Dec 2021
Disclaimer: The podcast and artwork embedded on this page are the property of ITSPmagazine. This content is not affiliated with or endorsed by eachpod.com.