1. EachPod
EachPod
Secure Talk Podcast - Podcast

Secure Talk Podcast

Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance.

Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.

Technology Tech News News
Update frequency
every 6 days
Average duration
42 minutes
Episodes
235
Years Active
2018 - 2025
Share to:
Becoming an Ethical Hacker

Becoming an Ethical Hacker

Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. Heath is a CISSP and has received numerous credentials including…
00:38:31  |   Tue 21 Mar 2023
How to Prevent Synthetic Identity Theft

How to Prevent Synthetic Identity Theft

JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engine…
00:44:48  |   Mon 20 Mar 2023
Cybersecurity Breach Response & More

Cybersecurity Breach Response & More

Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your h…
00:48:01  |   Fri 17 Mar 2023
Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions

Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions

Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related…
00:49:58  |   Thu 16 Mar 2023
Building Autonomy & Trust in Distributed Engineering Teams

Building Autonomy & Trust in Distributed Engineering Teams

Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces. Nick also co-hosts the Managing U…
00:33:50  |   Tue 07 Mar 2023
Preventing Cyber Attacks Across the Software Supply Chain

Preventing Cyber Attacks Across the Software Supply Chain

Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution. Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of …
00:41:01  |   Thu 02 Mar 2023
Security Training for Software Development Teams

Security Training for Software Development Teams

Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to buil…
00:40:37  |   Mon 20 Feb 2023
Automating Data Discovery & Security

Automating Data Discovery & Security

Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and se…
00:32:42  |   Thu 16 Feb 2023
Best Practices for Cybersecurity Practitioners

Best Practices for Cybersecurity Practitioners

Luis Valenzuela is Director, Data Loss Prevention & Data Governance for InComm Payments. He is also a CISSP and PMP. Luis talks about best practices for data loss prevention, data governance, and cy…
00:44:58  |   Fri 10 Feb 2023
Optimizing Cyber Threat Detection & Response

Optimizing Cyber Threat Detection & Response

Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detect…
00:46:25  |   Mon 06 Feb 2023
Cybersecurity Solutions for the Federal Government

Cybersecurity Solutions for the Federal Government

Steve Orrin, Federal Chief Technology Officer & Senior Principal Engineer for Intel talks about how he works with various government agencies to develop and deliver cybersecurity solutions. He expl…
00:42:12  |   Wed 01 Feb 2023
Using Open Source Linux-Based  Software for Identity Management

Using Open Source Linux-Based Software for Identity Management

Kevin Dominik Korte is the President of Univention North America. Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open s…
00:44:51  |   Fri 27 Jan 2023
Optimizing the Microsoft Security Stack

Optimizing the Microsoft Security Stack

André Keartland is a solutions architect at Netsurit. He has been working in the IT industry for almost 30 years. As a solutions architect, his role is to design and implement solutions for enterpr…
00:54:48  |   Wed 25 Jan 2023
The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups

The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups

Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, complian…
00:44:36  |   Fri 20 Jan 2023
Managed Security Services for Start-Ups and SMEs

Managed Security Services for Start-Ups and SMEs

Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service. Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing da…
00:46:08  |   Tue 17 Jan 2023
A Vaccine Approach to IoT Device Cybersecurity

A Vaccine Approach to IoT Device Cybersecurity

Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya. He believes it’s time to look past the ‘patchability’ approach and implement a ‘vac…
00:44:07  |   Mon 09 Jan 2023
Chat-based Cybersecurity Education

Chat-based Cybersecurity Education

Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for train…
00:41:42  |   Tue 03 Jan 2023
Data Security Posture Management vs. Cloud Security Posture Management and more!

Data Security Posture Management vs. Cloud Security Posture Management and more!

Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows. J…
00:39:41  |   Tue 20 Dec 2022
A Method for Managing Risk

A Method for Managing Risk

Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services. Bryant explains how having a methodology for managing cyber risk is critical and talks about the m…
00:43:12  |   Wed 14 Dec 2022
Why Compliance Doesn't Equate to Security

Why Compliance Doesn't Equate to Security

Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference be…
00:51:28  |   Tue 06 Dec 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Secure Talk. This content is not affiliated with or endorsed by eachpod.com.