Cover image of Cyber Security Interviews
(50)
Business
Careers
News
Tech News

Cyber Security Interviews

Updated 7 days ago

Business
Careers
News
Tech News
Read more

There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.

Read more

There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.

iTunes Ratings

50 Ratings
Average Ratings
47
0
1
0
2

Absolutely recommended

By Dogfolife69 - Apr 28 2018
Read more
Stunning interviews with Cybersecurity thought leaders!

Great content!

By DelePay - Aug 21 2017
Read more
Great content for anyone interested in cyber security

iTunes Ratings

50 Ratings
Average Ratings
47
0
1
0
2

Absolutely recommended

By Dogfolife69 - Apr 28 2018
Read more
Stunning interviews with Cybersecurity thought leaders!

Great content!

By DelePay - Aug 21 2017
Read more
Great content for anyone interested in cyber security
Cover image of Cyber Security Interviews

Cyber Security Interviews

Latest release on Jan 13, 2020

Read more

There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.

Rank #1: #002 – David Cowen: Standing On the Shoulders of Giants

Podcast cover
Read more
David Cowen has more than sixteen years of experience in the areas of security integration, architecture, assessment, programming, forensic analysis and investigations. He started out as a penetration tester then moved to digital forensics. Currently, he  is a partner at G-C Partners, LLC, a full service digital forensics investigation company, and has experience working in a…

Nov 23 2016

1hr 17mins

Play

Rank #2: #062 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy

Podcast cover
Read more
Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors. Prior to Habitu8, Chad was co-founder and VP of Engineering at…

Dec 10 2018

39mins

Play

Rank #3: #003 – Lenny Zeltser: You Can Never Know Everything

Podcast cover
Read more
Lenny Zeltser is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization’s security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by…

Dec 05 2016

1hr 10mins

Play

Rank #4: #074 – Bill Conner: You Cannot Have Privacy Without Security

Podcast cover
Read more

Bill Conner is the President and CEO of SonicWall. Bill has lead key divisions of AT&T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle.

Bill also created and hosted “Hacked” for SiriusXM’s business radio. He has been recognized with several awards including Marketing Computers “Marketer of the Year,” Tech Titans “Corporate CEO of the Year,” Federal Computer’s “Top 100 Award,” and the “National Youth Science Camp Alumnus of the Year.”

In this episode, we discuss starting in encryption, security for the SMB market, advanced malware, threat intel, cloud security, breaking SSL in the enterprise, network basics for IoT, governments backdooring encryption, and so much more.

Where you can find Bill:

Sep 16 2019

42mins

Play

Rank #5: #043 – David Navetta: The Year Of the Phishing Attack

Podcast cover
Read more
David Navetta is a US co-chair of Norton Rose Fulbright’s Data Protection, Privacy and Cybersecurity practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as “breach coach” or is on the approved panel…

Nov 27 2017

45mins

Play

Rank #6: #051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

Podcast cover
Read more
Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s…

Apr 24 2018

52mins

Play

Rank #7: #038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5

Podcast cover
Read more
SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh…

Oct 09 2017

51mins

Play

Rank #8: #073 – Bernard Harguindeguy: Identity Is The Keystone

Podcast cover
Read more

Bernard Harguindeguy is the Chief Technology Officer & General Manager Intelligence from Ping Identity. Bernard joined Ping in June 2018 through the acquisition of Elastic Beam, where he was the CEO and founder. His work at Elastic Beam revolutionized the use of AI to protect API infrastructures from cyber attacks and deliver deep insight into API access and usage.

Bernard earned an MS in Engineering Management from Stanford University and a BS in Electrical Engineering from the University of California Irvine where he was inducted into the Engineering Hall of Fame.

In this episode, we discuss starting in email security, identity as the perimeter, API security, selling to the C suite, how AI will help security, IoT security, and so much more.

Where you can find Bernard:

Aug 19 2019

40mins

Play

Rank #9: #050 – Chris Roberts: Make New Mistakes

Podcast cover
Read more
Chris Roberts is the Chief Security Architect at Acalvio and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security…

Apr 09 2018

46mins

Play

Rank #10: #012 – Cindy Murphy: Learn How To Learn

Podcast cover
Read more
Cindy Murphy served in law enforcement  for more than thirty years (twenty-five of those years at the Madison Police Department in Wisconsin) before leaving the force to launch Gillware Digital Forensics, where she is co-owner and serves as president and lead examiner. Her peers have called her “one of the most dedicated people in the field of digital…

Feb 06 2017

1hr 5mins

Play

Rank #11: #053 – Cameron Williams: Make Your Day Easier

Podcast cover
Read more
Cameron Williams is the Founder and CTO of OverWatchID. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such as IBM, Boeing, Sony, BP, Chase and Washington Mutual. He has designed and built a multitude…

May 14 2018

42mins

Play

Rank #12: #021 – Troy Hunt: It’s Fun to Build Stuff

Podcast cover
Read more
Troy Hunt is an internationally recognized cyber security researcher, speaker, blogger, and instructor. He is the author of many top-rating security courses for web developers on Pluralsight and is a Microsoft Regional Director and a six time Microsoft Most Valued Professional (MVP) specializing in online security and cloud development. Prior to becoming an independent security…

Apr 17 2017

43mins

Play

Rank #13: #028 – Brett Shavers: It’s Not the Machine, But the Examiner

Podcast cover
Read more
Brett Shavers is a consultant to corporations and government agencies in computer related cases as well as being the author of “Placing the Suspect Behind the Keyboard“, co-author of “Hiding Behind the Keyboard” and co-author of the “X-Ways Forensics Practitioner’s Guide.” Brett began his career as a digital forensics investigator in law enforcement and was…

Jul 31 2017

48mins

Play

Rank #14: #020 – Jad Saliba: The Thirst For Knowledge

Podcast cover
Read more
Jad Saliba is the founder and CTO of Magnet Forensics, a leading digital forensics company. Jad guides the organization to create products that meet the needs of customers from law enforcement, consultancies, or the corporate world. A former digital forensics investigator with a background in computer science, Jad can uniquely identify issues faced by forensics…

Apr 10 2017

43mins

Play

Rank #15: #052 – Jeremiah Grossman: The Cavalry Is Not Coming

Podcast cover
Read more
Jeremiah Grossman is the CEO of Bit Discovery.  Jeremiah’s career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as “the embodiment of converged IT and physical security.” In 2001, Jeremiah…

Apr 30 2018

33mins

Play

Rank #16: #004 – Nicholas Percoco: Don’t Second Guess Yourself

Podcast cover
Read more
Nicholas Percoco has more than 19 years of information security experience and is currently the Chief Information Security Officer at Uptake. Prior to Uptake, Nicholas was the Vice President of Global Services at Rapid7. Nick has also been a Director at KPMG and the head of SpiderLabs at Trustwave where he led more than 2000…

Dec 12 2016

1hr 26mins

Play

Rank #17: #005 – Morgan Wright: The Rule of Threes

Podcast cover
Read more
Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world about cyber security. Previously…

Dec 19 2016

1hr 15mins

Play

Rank #18: #013 – Gary McGraw: Security Is Hard Work

Podcast cover
Read more
Dr. Gary McGraw is the Vice President of Security Technology at Synopsys (SNPS). Gary quite literally helped create the field of software security. He is a globally recognized authority on software security and the author of several bestselling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online…

Feb 13 2017

52mins

Play

Rank #19: #057 – Ron Gula: Encourage People To Be Entrepreneurs

Podcast cover
Read more
Ron Gula is the President of Gula Tech Adventures. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security…

Jul 23 2018

36mins

Play

Rank #20: #017 – Marie Hattar & Dave Ginsburg: What Keeps the CISO Up at Night

Podcast cover
Read more
In this episode I am speaking with Marie Hattar and David Ginsburg. This is also my first podcast episode with two guests. Marie is the CMO at IXIA and is responsible for their brand and global marketing efforts. Marie has more than 20 years of marketing leadership experience spanning the security, routing, switching, telecom and mobility…

Mar 13 2017

50mins

Play

#080 – Heather Mahalik: Earn The Tool

Podcast cover
Read more

Heather Mahalik is the Senior Director of Digital Intelligence at Cellebrite and a Senior Instructor, author and course lead for FOR585: Smartphone Forensic Analysis In-Depth. To say that digital forensics is central to Heather's life is quite an understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to media associated with terrorism. She has helped law enforcement, eDiscovery firms, military, and the federal government extract and manually decode artifacts used in solving investigations around the world.

Heather began working in digital forensics in 2002, and has been focused on mobile forensics since 2010 - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used. She also maintains www.smarterforensics.com. Heather is the co-author of Practical Mobile Forensics (1st -4th editions), currently a best seller from Pack't Publishing.

In this episode, we discuss coming back to law enforcement, cloud forensics, what drives her research, early mentors, the start of cellphone forensics, mobile device threats, developing presentations, and so much more!

Where you can find Heather:

Jan 13 2020

37mins

Play

#079 – Mari DeGrazia: Not Just One Technology

Podcast cover
Read more

Mari DeGrazia is a Senior Vice President in the Cyber Risk practice of Kroll, a division of Duff & Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital forensics community. Mari joined Kroll from Verizon Enterprises where she served as Case Lead on various network intrusion and data breach investigations.

Mari is a strong believer in giving back to the forensic community and has written and released numerous programs/scripts, two of which are used in SANS training. In addition, she has presented her research at several industry conferences, published articles in eForensics Magazine, and was the technical editor for Windows Registry Forensics S.E.

In this episode, we discuss starting in IT, balancing work and family, self-training, the importance of the DFIR community, cross-training, using AI for detection, cloud security, giving back to the industry, and so much more.

Where you can find Mari:

Jan 06 2020

44mins

Play

#078 – Nadean Tanner: Boil It Down

Podcast cover
Read more

When my 7-year-old introduced me to his second-grade class, he put it best: "My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber."

- Nadean Tanner

Nadean Tanner is the Senior Manager of Technical Education Programs at Puppet. She is responsible for all things product training from working with internal knowledge sources and the instructional design team to produce modern, engaging knowledge assets to delivering online and onsite classroom sessions. 

Nadean is an experienced instructor and speaker with nearly 20 years' experience in information technology and security training delivery and development. At Rapid7, she taught vulnerability management and network and application assault as well as SQL, Ruby, and API. Before Rapid 7, Nadean taught Security Analytics and Advanced Security Operations Center Management for RSA. She taught cybersecurity and information assurance 8570 classes for the Department of Defense including CISSP at Fort Gordon, Fort Carson, and the Pentagon, and she developed and taught graduate-level computer science courses at Louisiana State University for six years.

In this episode, we discuss teaching and traveling, communicating technical terms, talking about the basics, writing a book, teaching with humility, knowing when you are an expert, and so much more.

Where you can find Nadean:

Dec 16 2019

44mins

Play

#077 – Frank Downs: Know When To Leave

Podcast cover
Read more

Frank Downs is the director of cybersecurity practices at ISACA. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, he proceeded to obtain a master’s degree in cybersecurity from UMBC, after a pit stop at Johns Hopkins to obtain a master’s degree in Government.

Eventually, Frank decided to ease the learning process for individuals transitioning from non-technical backgrounds into cybersecurity by becoming a full-time Intelligence and Operations Consultant for multiple federal law enforcement and intelligence agencies.

In this episode, we discuss starting in another industry before the DoD, packet capture analysis, doing the work no one else wants to do, knowing when to move into new roles, non-traditional backgrounds, training and certifications, COBIT, and so much more.

Dec 10 2019

48mins

Play

#076 – Lesley Carhart: You’ve Got to Play the Game

Podcast cover
Read more

Lesley Carhart is a Principal Threat Analyst at the Threat Operations Center at Dragos. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Prior to Dragos, she was the incident response team lead at Motorola Solutions, performing digital forensics and incident handling services for both enterprise and public safety customers.

In 2017, Lesley was named a “Top Woman in Cybersecurity” by Cyberscoop news and received the Guidance Enfuse conference “Women in Technology” award. She holds a Bachelor’s Degree in Network Technologies from DePaul University, A.A.S. in Avionics Systems and Electronics Systems, GIAC GCIH, GREM, GCFA, and GCFE certifications, and currently serves as a Cyber Systems NCO in the US Air Force Reserves.

In her free time, Lesley co-organizes resume and interview clinics at several cybersecurity conferences, blogs, and tweets prolifically about infosec, and is a youth martial arts instructor.

In this episode, we discuss her early mentors, mentoring, writing resumes, starting as a coder, organizational missions, ICS security, electronic voting, submitting CFPs, and so much more.

Where you can find Lesley:

Sep 30 2019

45mins

Play

#075 – Brian Martin (Jericho): The Hacker Mindset

Podcast cover
Read more

Brian Martin (a.k.a. Jericho) has been poking about the hacker and security scene for over 22 years, building valuable skills such as skepticism and anger management. As a hacker-turned-security whore, Jericho has a great perspective to offer an unsolicited opinion on just about any security topic. A long-time advocate of advancing the field, sometimes by any means necessary, he thinks the idea of ‘forward-thinking’ is quaint; we’re supposed to be thinking that way all the time.

No degree, no certifications, just the willingness to say things many in this dismal industry are thinking, but unwilling to say themselves. He remains a champion of security industry integrity and small misunderstood creatures.

In this episode, we discuss starting as a phreak and phone systems, BBS hacking forums, sharing knowledge, calling people out, cybersecurity skill shortages, understanding the adversaries mindset, PCI compliance, and so much more.

Where you can find Brian:

Sep 23 2019

48mins

Play

#074 – Bill Conner: You Cannot Have Privacy Without Security

Podcast cover
Read more

Bill Conner is the President and CEO of SonicWall. Bill has lead key divisions of AT&T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle.

Bill also created and hosted “Hacked” for SiriusXM’s business radio. He has been recognized with several awards including Marketing Computers “Marketer of the Year,” Tech Titans “Corporate CEO of the Year,” Federal Computer’s “Top 100 Award,” and the “National Youth Science Camp Alumnus of the Year.”

In this episode, we discuss starting in encryption, security for the SMB market, advanced malware, threat intel, cloud security, breaking SSL in the enterprise, network basics for IoT, governments backdooring encryption, and so much more.

Where you can find Bill:

Sep 16 2019

42mins

Play

#073 – Bernard Harguindeguy: Identity Is The Keystone

Podcast cover
Read more

Bernard Harguindeguy is the Chief Technology Officer & General Manager Intelligence from Ping Identity. Bernard joined Ping in June 2018 through the acquisition of Elastic Beam, where he was the CEO and founder. His work at Elastic Beam revolutionized the use of AI to protect API infrastructures from cyber attacks and deliver deep insight into API access and usage.

Bernard earned an MS in Engineering Management from Stanford University and a BS in Electrical Engineering from the University of California Irvine where he was inducted into the Engineering Hall of Fame.

In this episode, we discuss starting in email security, identity as the perimeter, API security, selling to the C suite, how AI will help security, IoT security, and so much more.

Where you can find Bernard:

Aug 19 2019

40mins

Play

#072 – Vinny Sakore: This Was Crime

Podcast cover
Read more

Vinny Sakore joined the NetDiligence team in 2017 as their Chief Technology Officer. Prior to joining NetDiligence Vinny served as Verizon’s HIPAA Security Officer. His previous experience includes stints as Chief Technology Officer for two healthcare technology companies.

Vinny is a featured speaker nationally and internationally on the topics of Cyber Risk, Mobile Technology, and Information Security. He is a regular presenter at organizations and events such as the NetDiligence Cyber Risk forums, Information Security Forum (ISF), International Association of Privacy Professionals (IAPP), Healthcare Information Management Systems and Society (HIMSS), and the Risk Information Management Society (RIMS). Vinny has been quoted in numerous publications, including CSO Online, Wall Street Journal, and Information Security Magazine.

He serves on a number of not-for-profit boards and also teaches cybersecurity courses at Messiah College.

In this episode, we discuss the difference between privacy and security, talking to the board about cybersecurity, preparing for the cyber tsunami, government regulation, threat intel, aggregating insurance data, and so much more.

Where you can find Vinny:

Jul 08 2019

39mins

Play

#071 – Renaud Deraison: Complexity Breeds Insecurity

Podcast cover
Read more

Renaud Deraison is known in the global security community as the father of the Nessus vulnerability scanner. His original creation, Nessus, celebrated its 15th anniversary in 2013 and is considered the de facto standard for vulnerability scanning worldwide.

Renaud co-founded Tenable Network Security in 2002. As Chief Technology Officer, he drives product strategy and development. Before Tenable, Renaud was the primary author of the Nessus vulnerability scanner – releasing the first version of Nessus when he was 17.

Renaud continues to contribute to the global security community; he is the author of three patents related to network scanning and security and has published his work in books and magazines.

In this episode, we discuss building the first version of Nessus when he was a teenager, getting the basics right, challenges with the cloud, IoT and embedded devices security, responsible vulnerability disclosure, and so much more.

Where you can find Renaud:

May 27 2019

26mins

Play

#070 – Lorrie Cranor: Help Open The Doors

Podcast cover
Read more

Lorrie Faith Cranor, IEEE Fellow, is the Director and Bosch Distinguished Professor in Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. She also directs the CyLab Usable Privacy and Security Laboratory (CUPS) and co-directs the MSIT-Privacy Engineering masters program. In 2016 she served as Chief Technologist at the US Federal Trade Commission, working in the office of Chairwoman Ramirez. She is also a co-founder of Wombat Security Technologies, Inc, a security awareness training company.

She has authored over 150 research papers on online privacy, usable security, and other topics. She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability and founded the Symposium On Usable Privacy and Security (SOUPS).

In this episode, we discuss the difference between privacy and security, lawmakers and technologists working together, founding Wombat security, the famous “password dress,” what makes a good password policy, IoT nutrition labels, and so much more.

Where you can find Lorrie:

May 20 2019

29mins

Play

#069 – Ben Johnson: Break Down The Problems

Podcast cover
Read more

Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space. Prior to Carbon Black, Ben was an NSA computer scientist and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.

Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on boards of multiple security startups. Johnson earned a bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University.

In this episode we discuss starting with the NSA, starting Carbon Black, focusing on the endpoint, identity security, government compliance, why everyone is in sales, picking your founder team, and so much more.

Where you can find Ben:

May 06 2019

51mins

Play

#068 – Deborah Blyth: Security Is Everybody’s Job

Podcast cover
Read more

Deborah Blyth is the Chief Information Security Officer (CISO) State of Colorado, Governor’s Office of Information Technology. In August 2014, Deborah Blyth became the state’s new CISO, bringing a diverse 25-year technology background including 14 years of information security experience. As the CISO, she serves as the point of contact for all information security initiatives in Colorado, informing the Secretary of Technology & Chief Information Officer and executive agency leadership on security risks and impacts of policy and management decisions on IT-related initiatives.

Before joining the state of Colorado, Deborah led the Information Technology Security and Compliance programs at TeleTech and Travelport. Deborah is a Colorado native and graduated Summa cum Laude with a Bachelor of Science degree from Regis University.

In this episode, we discuss her start in IT and her passion for technology, changes from the board and C-suite, the CDOT attack, the importance of having an IR plan in place, leveraging change management for security, managing priorities, cloud security, and so much more.

Where you can find Deborah:

Apr 29 2019

44mins

Play

#067 – Fred Kneip: Compliance Doesn’t Equal Security

Podcast cover
Read more

Fred Kneip is the CEO and Founder of CyberGRX. Since founding the company in 2015, Fred has led the creation of the world’s first global third-party cyber risk management (TPCRM) exchange. During his tenure at CyberGRX, Fred has been responsible for the overall direction of the company and as the company’s chief strategist, for securing global partnerships, leading investments and overseeing management and corporate execution.

Prior to CyberGRX, Fred led the Security and Compliance Departments at Bridgewater Associates, an investment management firm overseeing about $160 billion for 350 of the largest and most sophisticated global institutional clients. Fred holds a BSE in Civil Engineering from Princeton University and an MBA from Columbia Business School.

In this episode we discuss the growing Denver cybersecurity scene, starting in compliance, managing supply chain and vendor risk, current and upcoming regulations, compliance versus security, benchmarking, and so much more.

Where you can find Fred:

Apr 22 2019

48mins

Play

#066 – Alissa Torres: A Well Balanced Approach

Podcast cover
Read more
Alissa Torres is a SANS analyst and Principal SANS instructor specializing in advanced digital forensics and incident response (DFIR). Alissa was recognized by SC Magazine as one of its “2016 Women to Watch.” and a recipient of the Enfuse 2018 Difference Makers Award for her efforts in educational outreach. She has more than 15 years…

Apr 15 2019

39mins

Play

#065 – Lizzie Cookson: Attackers Adapt With Us

Podcast cover
Read more
Lizzie Cookson is an Associate Director of Cyber Investigations at Kivu Consulting. She specializes in cyber extortion and threat intelligence with a focus on attacker negotiations, threat actor profiling, and data breach remediation. Lizzie’s case work has included network intrusions, e-commerce compromise, business email compromise, wire/tax fraud, employee misconduct, and over 150 cyber extortion investigations.…

Apr 08 2019

41mins

Play

#064 – Georgia Weidman: Cyber Security Lion Repellent

Podcast cover
Read more
Georgia Weidman is the founder and CTO of Shevirah and is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, author, and angel investor. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications. Her work in the field of smartphone exploitation has been featured internationally in print and…

Apr 01 2019

45mins

Play

#063 – Dean Sysman: You Are Swamped With Data

Podcast cover
Read more
Dean Sysman, is the CEO and co-founder, Axonius. Dean is a world renowned expert in cybersecurity and has been honored with being in the Forbes 30 Under 30 Israel 2017 list. Before founding Axonius, Dean co-founded Cymmetria, A YC-backed cyber deception company with Fortune 500 customers. He has spoken at major conferences including Blackhat, Defcon,…

Mar 25 2019

32mins

Play

#062 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy

Podcast cover
Read more
Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors. Prior to Habitu8, Chad was co-founder and VP of Engineering at…

Dec 10 2018

39mins

Play

#061 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised

Podcast cover
Read more
Yonathan Klijnsma is a threat researcher at RiskIQ, leading threat response and analysis efforts with the help of RiskIQ’s expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work. Outside of…

Dec 03 2018

43mins

Play

iTunes Ratings

50 Ratings
Average Ratings
47
0
1
0
2

Absolutely recommended

By Dogfolife69 - Apr 28 2018
Read more
Stunning interviews with Cybersecurity thought leaders!

Great content!

By DelePay - Aug 21 2017
Read more
Great content for anyone interested in cyber security