Podcast Episodes
Back to Search
Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos
Episode 117
Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devi…
3 years, 6 months ago
Automated Security Validation With Red Team Penetration Testing Software | There Is A Silver Lining | A Pentera Brand Story With Aviv Cohen
Episode 116
This is a story that begins with the journey of Arik Liberzon, the founder and CTO and head of the R&D and product teams at Pentera. Arik was the hea…
3 years, 6 months ago
From Fighting Crime As A Former Federal Prosecutor To Protecting Cyberspace As The CSO At A Multi-National Tech Company | A Conversation With Huawei USA CSO Andy Purdy | Redefining CyberSecurity Podcast With Sean Martin
Episode 115
When a multi-national technology company needs to manage cyber risk on a global scale while not losing sight of the regional and local aspects of the…
3 years, 6 months ago
Pentesting Done Right | It's Time To Re-Imagine Your Penetration Testing Program To Achieve Outcomes Over Activity | A Bugcrowd Brand Story With Justin Kestelyn
Episode 114
Traditional penetration testing has been a cornerstone of effective cybersecurity for decades, providing a vital baseline function for every security…
3 years, 6 months ago
What Every CISO Needs To Know About Crisis Management Planning | A Crucial Conversation With Jasper Ossentjuk
Episode 113
As world events have demonstrated these past couple of years, crisis management is a requisite for doing business in today’s world. CISOs have choice…
3 years, 6 months ago
Device Security, Consumer Privacy, And The Internet Of Things | Mapping International Laws And Regulations To The Internet | A Conversation With David Rogers | Redefining CyberSecurity Podcast With Sean Martin
Episode 112
The current state of IoT security and privacy may look different to many people, businesses, and governments. This discrepancy could be a problem. Wi…
3 years, 6 months ago
Diving Deeper Into The Who, What, When, Why, And How Of Breaking Into Cybersecurity | Chapter 2 | A Level Effect Brand Story With Anthony Bendas, Will Nissler, And Sidney Crout
Episode 111
There are so many questions that come with pursuing a cybersecurity career and education. Listen as we answer many of these questions and discuss how…
3 years, 6 months ago
The Flip Side Of Cybersecurity | Law & Policy | A Conversation With K Royal, PhD, JD | Redefining CyberSecurity Podcast With Sean Martin
Episode 110
It may be a relatively easy connection to make - cybersecurity and privacy. But what about legal and operations and third-party products and services…
3 years, 6 months ago
The Convergence Of Operational Technology (OT) Security With Information Technology (IT) Security | A Crucial Conversation With Rock Lambros
Episode 109
Operational Technology (OT) and Information Technology (IT) have historically been managed by separate teams. But with cyberattacks targeting IoT dev…
3 years, 6 months ago
A Conversation With Giora Engel | Black Hat 25 & DEF CON 30 Live Streaming Coverage With ITSPmagazine | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli
Episode 108
It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Giora Engel!
Watch the live stream video …
3 years, 7 months ago