Podcast Episodes

Back to Search
Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos
Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos

Episode 117

Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devi…

3 years, 6 months ago

Short Long
View Episode
Automated Security Validation With Red Team Penetration Testing Software | There Is A Silver Lining | A Pentera Brand Story With Aviv Cohen
Automated Security Validation With Red Team Penetration Testing Software | There Is A Silver Lining | A Pentera Brand Story With Aviv Cohen

Episode 116

This is a story that begins with the journey of Arik Liberzon, the founder and CTO and head of the R&D and product teams at Pentera. Arik was the hea…

3 years, 6 months ago

Short Long
View Episode
From Fighting Crime As A Former Federal Prosecutor To Protecting Cyberspace As The CSO At A Multi-National Tech Company | A Conversation With Huawei USA CSO Andy Purdy | Redefining CyberSecurity Podcast With Sean Martin

Episode 115

When a multi-national technology company needs to manage cyber risk on a global scale while not losing sight of the regional and local aspects of the…

3 years, 6 months ago

Short Long
View Episode
Pentesting Done Right | It's Time To Re-Imagine Your Penetration Testing Program To Achieve Outcomes Over Activity | A Bugcrowd Brand Story With Justin Kestelyn
Pentesting Done Right | It's Time To Re-Imagine Your Penetration Testing Program To Achieve Outcomes Over Activity | A Bugcrowd Brand Story With Justin Kestelyn

Episode 114

Traditional penetration testing has been a cornerstone of effective cybersecurity for decades, providing a vital baseline function for every security…

3 years, 6 months ago

Short Long
View Episode
What Every CISO Needs To Know About Crisis Management Planning | A Crucial Conversation With Jasper Ossentjuk
What Every CISO Needs To Know About Crisis Management Planning | A Crucial Conversation With Jasper Ossentjuk

Episode 113

As world events have demonstrated these past couple of years, crisis management is a requisite for doing business in today’s world. CISOs have choice…

3 years, 6 months ago

Short Long
View Episode
Device Security, Consumer Privacy, And The Internet Of Things | Mapping International Laws And Regulations To The Internet | A Conversation With David Rogers | Redefining CyberSecurity Podcast With Sean Martin

Episode 112

The current state of IoT security and privacy may look different to many people, businesses, and governments. This discrepancy could be a problem. Wi…

3 years, 6 months ago

Short Long
View Episode
Diving Deeper Into The Who, What, When, Why, And How Of Breaking Into Cybersecurity | Chapter 2 | A Level Effect Brand Story With Anthony Bendas, Will Nissler, And Sidney Crout
Diving Deeper Into The Who, What, When, Why, And How Of Breaking Into Cybersecurity | Chapter 2 | A Level Effect Brand Story With Anthony Bendas, Will Nissler, And Sidney Crout

Episode 111

There are so many questions that come with pursuing a cybersecurity career and education. Listen as we answer many of these questions and discuss how…

3 years, 6 months ago

Short Long
View Episode
The Flip Side Of Cybersecurity | Law & Policy | A Conversation With K Royal, PhD, JD | Redefining CyberSecurity Podcast With Sean Martin

Episode 110

It may be a relatively easy connection to make - cybersecurity and privacy. But what about legal and operations and third-party products and services…

3 years, 6 months ago

Short Long
View Episode
The Convergence Of Operational Technology (OT) Security With Information Technology (IT) Security | A Crucial Conversation With Rock Lambros
The Convergence Of Operational Technology (OT) Security With Information Technology (IT) Security | A Crucial Conversation With Rock Lambros

Episode 109

Operational Technology (OT) and Information Technology (IT) have historically been managed by separate teams. But with cyberattacks targeting IoT dev…

3 years, 6 months ago

Short Long
View Episode
A Conversation With Giora Engel | Black Hat 25 & DEF CON 30 Live Streaming Coverage With ITSPmagazine | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Episode 108

It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Giora Engel!

Watch the live stream video …

3 years, 7 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us