InfoSec público
[search 0]
Mais

Download the App!

show episodes
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Information Security in Ireland is a new podcast covering information security and related issues such as privacy, data protection, online safety and technology policy. This podcast is produced by 3 leading Irish security experts: - Paul Rochford, a volunteer leader with ISSA Ireland, the Irish chapter of the Information Systems Security Association - Owen O'Connor, managing director of Cernam, an Irish digital investigations company - Mark McDonagh, Chief Technology Officer with Netfort Tec ...
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Jede Nacht Hacker. Jeden Morgen Klugscheißer. Einfache Tipps für deine IT-Sicherheit. Brauchst du einfach umzusetzende Tipps für deinen Alltag oder willst du deine Mitarbeiter für Themen wie Informationssicherheit und Datenschutz sensibilisieren? – Dann ist Eddy der Infosec Frosch genau das Richtige für dich. In weniger als 10 Minuten pro Woche erklärt dir Eddy, wo die Fallstricke liegen, welche Schwachstellen ein Angreifer ausnutzen kann und wie du dich schützen kannst. Täglich kurze Tipps ...
 
G
Getting Into Infosec

1
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Mensal
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
Carving an unconventional path towards information security, Yael advises many a CISO, CIO and CRO. Leadership roles at BlackRock and JPMorgan during periods of crisis and growth have given her a unique technical and business perspective — instead of saying “Here’s why that won’t work.”, she asks “But what if we tried this?” In this episode you’ll …
 
Whether you're stepping into your first managerial role, or you're about to inherit a fully formed team, you might be facing self-doubt and uncertainty. Security veteran Tia Hopkins — Chief Cyber Resilience Officer and Field CTO at eSentire, adjunct professor, LinkedIn instructor — shares with Caroline how to overcome impostor syndrome as you progr…
 
Return guest Robert Wood is the CISO for the Centers for Medicare and Medicaid Services. He leads enterprise cyber security, compliance, privacy, and counter intelligence functions at CMS and ensures the Agency complies with secure IT requirements while encouraging innovation.In this episode, Robert discusses with Caroline how big changes and organ…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
CISSP is one of the most valuable Cyber Security Certificates in the market today. This course will qualify you to pass the CISSP Exam. ✏️ The course was created by Mohamed Atef. A Cyber Security consultant and a certified instructor with 20+ years of experience in Cyber Security projects. 🔗 Check out more Cyber Security training at InfoSec4TC YouT…
 
Bipin Gajbhiye is a security practitioner, advisor, and investor. These three roles coalesce into a unique perspective on how cybersecurity professionals can achieve their goals — whether it's negotiating with the board, landing a critical investment, or advancing in their careers.Por Humans of InfoSec
 
Geoff Huston has been working on the Internet since the early 80’s and, in his own words, “did his bit” to set up the Internet in Australia, as well as to set up the early global Internet in the academic and research community. In this episode, he shares with Caroline the leaps and bounds hardware has made over the decades to bring us opportunities…
 
Is the manager role the only path ahead in cybersecurity? Seif Hateb, Security Architect at Twilio, shares his view on the Individual Contributor vs Manager dilemma, and how people in the field can pursue the type of role that fits them best.And if you're just starting in the cybersecurity field, make sure to check out Seif's YouTube channel, full …
 
As the CISO of North America at Checkmarx, Peter works towards providing the technology, expertise, and intelligence that enable developers and enterprises to secure the world’s applications. A lifelong developer at heart, Peter shares with Caroline his insights on what motivates Dev teams to prioritize security, and why so many current strategies …
 
What felt like science fiction 40 years ago is our reality today. What about the technology that will come in the next 40-50 years? What could change, and how can people band together to craft a bright and equitable future?Eugene Spafford — technologist and professor of Computer Sciences at Purdue University — talks with Caroline about how advances…
 
Eddy und Sebastian sind durch Jordanien gereist und haben interessante Sachen auf einem öffentlichen PC gefunden. Schalte ein und erfahre, was du vermeiden solltest, wenn du einen fremden Computer verwendest und wie du dich schützen kannst. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und je…
 
Richard holds many titles, one of which is the President of the OWASP LA Chapter. Initially an architect, learning AutoCAD sparked his interest for all things technical. After a career change, Richard has held many high-profile roles in cybersecurity, bolstering numerous communities and initiatives.Don't forget to check out https://planetcybersec.c…
 
Eddy und Sebastian reden heute darüber, wie du deine Daten sinnvoll aufräumst, zusammenhältst und mit anderen teilen kannst. Denn Ordnung bedeutet Sicherheit. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoed…
 
Security Advisor at Office of the CISO and Co-Host of Google's Cloud Security Podcast, Dr. Anton Chuvakin, chats with Caroline about the past, present and future: how a hacked computer shifted his interest from physics to security, how threats from the 80s still plague orgaizations, and how cybersecurity will continue to spill out of the digital re…
 
Eddy und Sebastian teilen heute ein paar Praxiserfahrungen mit dir, wie Firmendaten verlorengehen können und wie du das verhindern kannst. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoeddy.de…
 
Eddy und Sebastian erklären dir, wie du weiterhin bei deinem ehemaligen Arbeitgeber Zugriff auf die Daten haben kannst und worauf du als Verantwortlicher achten solltest, um solche Zugriffe zu verhindern. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Tw…
 
Don’t have a “typical security background?” Neither did Henning Christiansen, who is now the CISO at Ottobock. Before starting in InfoSec, he tried out roles in finance, development and auditing. Until one day, he began to nurture his interest in InfoSec, which led him to roles in Bombardier Transportation, Axel Springer, and now Ottobock. With dec…
 
Eddy und Sebastian fordern dich nochmal auf dein iPhone in die Hand zu nehmen und ein paar Sicherheits- und Datenschutzeinstellungen zu optimieren. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoeddy.de…
 
Eddy und Sebastian zeigen dir in dieser kurzen Folge zum Mitmachen, was du tun musst, um deine Datenschutzeinstellungen in iOS und iPadOS zu optimieren.Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast.Eddy auf Twitter: https://twitter.com/eddy_infosecinfoeddy.de…
 
Security Relations Leader Vandana Verma is the Chair of the Board of Directors at OWASP. Starting with the dream of supporting her family, she pursues her curiosity around technology and builds renowned expertise in application security, infrastructure, and product security. In this episode, Caroline learns more about Vandana’s story, her diversity…
 
Eddy und Sebastian reden diese Woche darüber, wie du mit wenigen Handgriffen deine Internetverbindung schneller und sicherer machen kannst, dank alternativer DNS Resolver und was du tun kannst, dass du heute schon von Apple Passkey profitierst. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter un…
 
Eddy und Sebastian haben diese Woche wieder erlebt, dass Phishing und ominöse Anrufe noch immer gut funktionieren. Sie geben dir Tipps wie du am besten reagieren solltest und haben dir eine kostenlose und konkrete Kontaktmöglichkeit eingerichtet, über die du im Notfall schnell Hilfe bekommst. E-Mail: sos@infoeddy.de Threema: V4SWN5JU Schalte ein be…
 
Zenobia Godschalk — SVP of Communications at Hedera Hashgraph, and Founder and CEO of ZAG Communications — shares how a passion for PR, tech, and privacy has shaped her career. From handling comms around cloud computing, to investor relations in InfoSec, and now spearheading awareness around distributed ledger technology, she shares helpful tips on…
 
Eddy und Sebastian erzählen dir wie Missverständnisse zwischen IT-Abteilung und User zu Sicherheitsrisiken führen können und erklären, welche Sprache ihr am besten bei IT-Problemen sprechen solltet. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter:…
 
Eddy und Sebastian berichten von versehentlichen Hintertürchen in Netzwerken, die du selbst in den Griff bekommen kannst. Sie erklären dir, worauf du bei ehemaligen Mitarbeitern achten solltest, aber auch was wichtig ist, wenn du externe Dienstleister einsetzt. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freit…
 
With over 15 years of technical and managerial experience, Marnie Wilking has led security programs across multiple verticals — retail at Wayfair, healthcare at Orion Health, and finance at Early Warning and Wells Fargo. Listen to her story to learn how the CISO role changes in each environment, and what stays the same.…
 
Eddy und Sebastian sitzen seit Tagen in einem dunklen Raum mit Cisco Merakis, Windows PCs und unzähligen Kabeln und suchen nach einer Lösung, wie du Standorte komfortabel und datenschutzkonform vernetzen kannst und gleichzeitig den User im Fokus hast. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twi…
 
Eddy und Sebastian hatten die Woche Kontakt mit Menschen, die sie über Passwörter aufklären mussten. Erfahre in dieser Folge, was alles schiefgehen kann. Und es wird die Frage gestellt, ob uns unsere Geräte belauschen. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcas…
 
Eddy und Sebastian schauen sich heute einmal an, welche Rolle der User bei Ransomware-Angriffen spielt und wie du dich und User für die du verantwortlich bist schützen kannst. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/ed…
 
Eddy und Sebastian feiern das einjährige Jubiläum ihres Cybersecurity-Podcasts und fassen dir deshalb nochmal die vier wichtigsten Tipps zusammen, wie du und deine Liebsten sicher unterwegs sind. Teilen nicht vergessen! Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podca…
 
Loading …

Guia rápido de referências