Cover image of Cyber Pro Files

Cyber Pro Files

Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting ... Read more

Ranked #1

Podcast cover

SC 106: David Cass, Global CISO IBM Cloud & SaaS, and David Rooker, CISO Actian Corp, Discuss Today's Greatest Security Threats

SC 106: David Cass, Global CISO IBM Cloud & SaaS, and David Rooker, CISO Actian Corp, Discuss Today's Greatest Security Threats

In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit and you will hear CISOs di... Read more

18 Aug 2016

9mins

Ranked #2

Podcast cover

SC 44: FBI Views on Cybersecurity

SC 44: FBI Views on Cybersecurity

The recent US Presidential Directive along with White House statements on cybersecurity have brought new energy to law e... Read more

18 Feb 2015

11mins

Ranked #3

Podcast cover

SC 47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs

SC 47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs

Monitoring new cloud environments for adequate security is challenging, particularly when trying to determine which appr... Read more

4 Mar 2015

7mins

Ranked #4

Podcast cover

SC 105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking

SC 105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking

In part three of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communicatio... Read more

11 Aug 2016

8mins

Most Popular Podcasts

Ranked #5

Podcast cover

SC 104: David Cass, CISO IBM Cloud & SaaS, and David Mahon, CSO CenturyLink, Discuss the Most Common Threats Hitting Businesses Today

SC 104: David Cass, CISO IBM Cloud & SaaS, and David Mahon, CSO CenturyLink, Discuss the Most Common Threats Hitting Businesses Today

In this conversation with  Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, Cent... Read more

10 Aug 2016

10mins

Ranked #6

Podcast cover

SC 45: The Security Hits Keep Coming

SC 45: The Security Hits Keep Coming

Some research suggests that 97 percent of organizations are already compromised, according to former Gartner analyst Eri... Read more

24 Feb 2015

7mins

Ranked #7

Podcast cover

SC 99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More

SC 99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More

CISOs can never reduce risk to zero. As technology development increases at a lightning speed with the Internet of Thing... Read more

21 Jun 2016

11mins

Ranked #8

Podcast cover

SC 125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers

SC 125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers

Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processin... Read more

9 Oct 2017

10mins

Ranked #9

Podcast cover

SC 122: CISO David Cass Talks Cloud Adoption and Security

SC 122: CISO David Cass Talks Cloud Adoption and Security

Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cy... Read more

6 Jun 2017

14mins

Ranked #10

Podcast cover

SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers acro... Read more

7 Nov 2017

11mins

Ranked #11

Podcast cover

SC 20: Securing the Branch Location and Remote Site

SC 20: Securing the Branch Location and Remote Site

BLACK HAT SERIES 2014 Hackers continue to go after the easiest target -- the branch or remote office be it a gas station... Read more

11 Aug 2014

11mins

Ranked #12

Podcast cover

SC 17: Sex Tapes, Cloud and Security

SC 17: Sex Tapes, Cloud and Security

A recent movie shows what happens when a private video goes "up into the cloud" for everyone to see.  The movie is calle... Read more

9 Jul 2014

13mins

Ranked #13

Podcast cover

SC 66: Using User Behavior Intelligence To Identify Account Takeovers

SC 66: Using User Behavior Intelligence To Identify Account Takeovers

Massive database breaches have resulted in millions of user identification and authentication profiles being compromised... Read more

14 Jul 2015

6mins

Ranked #14

Podcast cover

SC 81: Addressing the Growing Cybersecurity Threat in 2016 with Jason Witty, U.S. Bancorp CISO

SC 81: Addressing the Growing Cybersecurity Threat in 2016 with Jason Witty, U.S. Bancorp CISO

The overall cost of cyber crime in 2015 to the world economy as a whole was estimated at a conservative $575 billion, ac... Read more

23 Dec 2015

13mins

Ranked #15

Podcast cover

SC 120: DocuSign CISO Discusses the Human Element of Incident Response

SC 120: DocuSign CISO Discusses the Human Element of Incident Response

The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in wh... Read more

28 Feb 2017

13mins

Ranked #16

Podcast cover

SC 40: A Small Company Takes on the Devil Inside the Beltway

SC 40: A Small Company Takes on the Devil Inside the Beltway

LabMD processes medical specimens. One day, a security services company emailed them advising that its patented searchin... Read more

6 Jan 2015

19mins

Ranked #17

Podcast cover

SC 21: Yale New Haven Health System Cyber Security Case Study

SC 21: Yale New Haven Health System Cyber Security Case Study

YALE NEW HAVEN HEALTH SYSTEM CASE STUDY With an increase in cyber attacks across industries, and in particular healthcar... Read more

18 Aug 2014

12mins

Ranked #18

Podcast cover

SC 62: Augmenting the Past with Network Forensics

SC 62: Augmenting the Past with Network Forensics

Most "new" security technologies use functions and features developed years ago. Network Forensics applies machine learn... Read more

5 Jun 2015

8mins

Ranked #19

Podcast cover

SC 67: Cloud SIEM Doesn't Really Exist - Yet

SC 67: Cloud SIEM Doesn't Really Exist - Yet

SIEM stands for Security Information and Event Management. SIEM is continuing to grow in usage but where does it stand i... Read more

20 Jul 2015

7mins

Ranked #20

Podcast cover

SC 58: A CISO Talks Security in Healthcare

SC 58: A CISO Talks Security in Healthcare

Healthcare providers have some of the most complicated environments with a multitude of systems, users and regulatory ma... Read more

11 May 2015

8mins

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”