Podcast Episodes
Back to SearchBook | Can. Trust. Will. Hiring For The Human Element In The New Age Of Cybersecurity | Redefining Security With Leeza Garber And Scott Olson
Episode 35
If the goal is to fill a role and keep it filled, we may be missing the point of hiring and retaining top talent.
More than ever, investing in the hum…
4 years ago
St. Joseph's Health | Cybersecurity & Vendor Risk Management: Why It Matters | Redefining CyberSecurity With Ebony Riley And Jesse Fasolo
Episode 34
Many organizations are ill-prepared when it comes to making sure their hospital is protected from risk, both from an organizational and IT standpoint…
4 years, 1 month ago
How And When To Put Standards To Work — And Not | Redefining CyberSecurity With Alyssa Miller And Accidental CISO
Episode 33
As is common for the Redefining Security show, conversations are often inspired by a social post. This one about standards is no different. However, …
4 years, 1 month ago
Maritime Intelligence | OSINT And The Ocean | Redefining CyberSecurity With Rae Baker
Episode 32
The sea is broad and deep. So is the information that is created by and for the maritime vessels floating around and underneath the surface. What is …
4 years, 1 month ago
The Blindspot Of Infosec Training | Redefining CyberSecurity With Eric Thomas
Episode 31
It's time to change the way we think about cyber security training. Evidently, the cybersecurity community agrees — just look at the post made recent…
4 years, 3 months ago
The Real Story About LOG4J - No FUD - No Clickbait - No BS | A Special ITSPmagazine Redefining CyberSecurity Webcast Panel With Alyssa Miller, Katie Nickels, Eric Thomas, And Mark Nunnikhoven
Episode 30
Back in 2013, I wrote a piece for TechTarget (sadly, it’s no longer online). It focused on mobile security and app security and referenced a report t…
4 years, 3 months ago
Cloud Transformation And Security | Redefining CyberSecurity With Helen Oakley
Episode 29
It seems that nearly every enterprise is in the midst of a cloud transformation. This begs the question, how and where does information security tran…
4 years, 4 months ago
The Psychology Of Cybersecurity And The Value Of Thinking Outside The Box | Redefining CyberSecurity With Morgan Wright
Episode 28
The problem is not the problem, it is the way you think about the problem. Get outside the box.
Fear, manipulation, influence, and deceit are some of …
4 years, 4 months ago
The Relationship Between Roles — When Product Management Meets Information Security | Redefining CyberSecurity With Christie Chaffee
Episode 27
Product Management: the team responsible for new product development. Information Security: the team responsible for ensuring systems and data are pr…
4 years, 4 months ago
Should We Stop Requiring CISOs To Have A CISSP? Let’s Talk About It | Redefining CyberSecurity With Brian Bobo
Episode 26
We keep hearing the mantra that CISOs and CSOs need to be business leaders. So how come we keep seeing job descriptions and hearing about interviews …
4 years, 5 months ago