Look for any podcast host, guest or anyone
Showing episodes and shows of

CISA

Shows

The Other Side Of The FirewallThe Other Side Of The FirewallMore CISA Budget Cuts?In this episode, Ryan Williams Sr. and Shannon Tynes discuss the recent budget cuts proposed for the Cybersecurity and Infrastructure Security Agency (CISA) and the implications of these cuts on cybersecurity efforts in the U.S. They highlight CISA's critical role in managing cyber incidents and the importance of maintaining adequate funding for cybersecurity initiatives. The conversation also touches on the challenges CISA faces, including talent retention and the need for continued education in cybersecurity. Article: DHS budget request would cut CISA staff by 1,000 positions https://federalnewsnetwork.com/cybersecurity/2025/05/dhs-budget-request-would-cut-cisa-staff-by-1000-positions/?fbclid...2025-06-0309 minUS Federal Agency ProfilesUS Federal Agency Profiles“Cybersecurity and Infrastructure Security Agency (CISA)” by Horizon Institute for Public ServiceThe Cybersecurity and Infrastructure Security Agency (CISA) is the nation's cyber defense agency and national coordinator for critical infrastructure security and resilience. ---Outline:(00:12) Overview(01:33) Background on CISA(03:01) Organizational structure(05:31) CISA and AI policy(06:32) Recent AI-related developments at CISA(08:56) CISA offices working on AI policy(09:15) Working at CISA(11:19) Further reading(11:24) Experience reports --- If you’re interested in pursuing a career in emerging technology policy, complete our Policy Career Interest Form, and we ma...2025-03-3113 minThe Other Side Of The FirewallThe Other Side Of The FirewallCISA Budget Cuts: A Step Backward for Cybersecurity?In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the recent cuts to CISA's funding and workforce, exploring the implications for cybersecurity services provided to local governments. They emphasize the importance of CISA's role in protecting national security and the potential consequences of reallocating resources. The conversation also touches on the challenges of streamlining government services and the impact of AI on cybersecurity.Article: CISA Cuts $10M in ISAC Funding & 100s of Employeeshttps://www.darkreading.com/remote-workforce/cisa-cuts-isac-funding-employees?fbclid=IwZXh0bgNhZW0...2025-03-1712 minAmerican Democracy MinuteAmerican Democracy MinuteDOGE Cuts 300 Experts From CISA’s Election Security Team and U.S. Government Cybersecurity Support; Funding for State Cybersecurity Also SuspendedThe American Democracy Minute Radio Report & Podcast for March 14, 2025DOGE Cuts 300 Experts From CISA’s Election Security Team and U.S. Government Cybersecurity Support; Funding for State Cybersecurity Also SuspendedMore Trump administration mass layoffs at CISA have experts raising concerns over U.S. readiness for cyber attacks on election infrastructure and federal agency networks.  An additional 100 inhouse and contracted cyber specialists were terminated in early March. Some podcasting platforms strip out our links.  To read our resources and see the whole script of today’s report, please go to our website at https://Americ...2025-03-1301 minCyberWire DailyCyberWire DailyCISA keeps watch on Russia.CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's Threat Vector segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week’s special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you? Remember to leave us a 5...2025-03-0435 minRed Alert: China\'s Daily Cyber MovesRed Alert: China's Daily Cyber MovesChina's Cyber Moves: Hacking Their Way to the Top! 🇨🇳💻 The FBI and CISA Sound the Alarm 🚨 Is Your Router Safe? 😱 Find Out Now!This is your Red Alert: China's Daily Cyber Moves podcast.Hey there, I'm Ting, and I'm here to give you the lowdown on China's daily cyber moves against US targets. Let's dive right in.As we speak, on February 4, 2025, the cyber landscape is heating up. Just last month, the FBI and CISA issued a joint statement warning about unauthorized access to commercial telecommunications infrastructure by actors affiliated with the People's Republic of China[5]. This is part of a broader pattern of aggressive cyberattacks aimed at disrupting US critical infrastructure.Let's backtrack a bit. In 2024...2025-02-0403 minAmerican Democracy MinuteAmerican Democracy MinuteFederal Agency CISA Helps States Harden Election Systems. It’s Now Under Attack by Its Own AdministrationThe American Democracy Minute Radio Report & Podcast for Jan. 31, 2025Federal Agency CISA Helps States Harden Election Systems.  It’s Now Under Attack by Its Own Administration Last April, federal cybersecurity agency CISA issued warnings to election officials on how to combat a Russian online scheme to mislead American voters in the 2024 election.  CISA is now under attack by its own administration.To view the whole script of today’s report, please go to our website.Today’s LinksArticles & Resources:Brennan Center for Justice - Project...2025-01-3001 minFDD Events PodcastFDD Events PodcastInfrastructure Security in the Cyber Age: A Conversation with CISA Director Jen EasterlyChina has prepositioned destructive cyber capabilities in U.S. energy and transportation infrastructure. Russia has capabilities to disrupt undersea cables and industrial control systems. Iran has exploited unprotected networks to deface machines monitoring water systems. The Cybersecurity and Infrastructure Agency (CISA) at the Department of Homeland Security is charged with collaborating with the private sector to secure critical systems. Since its creation in 2018, CISA has led federal efforts to understand and mitigate systemic cyber risk. How vulnerable is America in cyberspace? How has public-private cyber collaboration changed over the past six years? And, as U.S. adversaries become more...2025-01-1558 minPolicy Career GuidesPolicy Career Guides“Cybersecurity and Infrastructure Security Agency (CISA)” by Horizon Institute for Public ServiceThe Cybersecurity and Infrastructure Security Agency (CISA) is the nation's cyber defense agency and national coordinator for critical infrastructure security and resilience. ---Outline:(00:12) Overview(01:32) Background on CISA(03:00) Organizational structure(05:20) CISA and AI policy(06:21) Recent AI-related developments at CISA(08:45) CISA offices working on AI policy(09:04) Working at CISA(11:08) Further reading(11:14) Experience reports --- If you’re interested in pursuing a career in emerging technology policy, complete our Policy Career Interest Form, and we ma...2025-01-0112 minThe Adversarial PodcastThe Adversarial PodcastThe Adversarial Podcast Ep. 14 - Future of CISA/SEC under Trump, US Telco news, DAO faces $50M hackIn this episode of The Adversarial Podcast, Jerry Perullo, Mario Duarte, and Sounil Yu discuss the latest developments in cybersecurity, geopolitical threats, and emerging trends as 2025 approaches.00:00 Introduction 02:06 Trump 2.0's effect on security 03:25 Future of CISA 09:00 Future of SEC cyber reports 15:57 Possible Trump 2.0 priorities 19:40 Spying on US Telco 20:20 What is SS7? 24:04 SS7 vs. SMS interception 25:40 Privacy impact of SS7 attacks 30:12 National security 31:17 CISA's guidance for telco 36:58 DPRK targets DAO network, $50M heist using macOS malware2024-12-2354 minCyberHub PodcastCyberHub PodcastCISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts🚨 CISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as CISA Encourages Encrypted Apps for Messaging with more news below:• CISA Mandates Cloud Security  • Google Calendar Phishing Abuse  • SonicWall critical flaw                For more information, please visit our website: https://www.cyberhubpodcast.com/ ✅ Story Links: https://www.bleepingcomputer.com/news/security/cisa...2024-12-1919 minThe Gate 15 Podcast ChannelThe Gate 15 Podcast ChannelThe Gate 15 Interview EP 53. CISA’s JCDC, plus! Love for Boston, love for potatoes, love for cats, and love for cyber.In this episode of The Gate 15 Interview, Andy Jabbour speaks with Jeri Rogish and Mitchell Freddura, both with the Cybersecurity and Infrastructure Security Agency (CISA) and CISA’s Joint Cyber Defense Collaborative (JCDC). Jeri serves as Deputy Chief of JCDC’s Product Development Section and Mitch serves in the Partnerships Office. Jeri on LinkedIn. Mitch on LinkedIn. For further information about participating, email cisa.jcdc@cisa.dhs.gov. Discussed in the podcast: Jeri & Mitch’s Backgrounds. JCDC background. How the JCDC is “uniting the global cyber community.” Best practices to support a “coordinated defensive cyber posture...2024-12-1151 minOpen at IntelOpen at IntelInside CISA: Enhancing Cybersecurity Through Collaboration and Open Source InitiativesIn this episode, Jack Cable, Senior Technical Advisor at CISA, discusses the agency's role in securing the technology ecosystem, particularly focusing on open source software security. Jack explains what CISA is, its mission to protect critical infrastructure, and the significance of the 'Secure by Design' initiative. The conversation covers the collaboration efforts with the open source community, resources available for developers, and the importance of integrating security into software development. Jack also shares his personal journey into cybersecurity and emphasizes empowering developers to enhance security measures from the start. 00:00 Introduction 00:45 What is CISA? 01:26 CISA's Mission...2024-12-0421 minOpen at IntelOpen at IntelInside CISA: Enhancing Cybersecurity Through Collaboration and Open Source InitiativesIn this episode, Jack Cable, Senior Technical Advisor at CISA, discusses the agency's role in securing the technology ecosystem, particularly focusing on open source software security. Jack explains what CISA is, its mission to protect critical infrastructure, and the significance of the 'Secure by Design' initiative. The conversation covers the collaboration efforts with the open source community, resources available for developers, and the importance of integrating security into software development. Jack also shares his personal journey into cybersecurity and emphasizes empowering developers to enhance security measures from the start. 00:00 Introduction 00:45 What is CISA? 01:26 CISA's Mission...2024-12-0421 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistCISA’s Role in Supporting Asset Owners & Government Sectors with Cybersecurity Podcast: Industrial Cybersecurity InsiderEpisode: CISA’s Role in Supporting Asset Owners & Government Sectors with CybersecurityPub date: 2024-10-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis episode we dive into the critical strategies necessary for securing operational technology (OT) environments, with OT/ICS Strategy Lead at CISA, Danielle Jablanski. Danielle explores the evolving role of CISA in assisting asset owners and government sectors, emphasizing the importance of collaboration and understanding in cybersecurity. From building resilience against "shiny object syndrome" to prio...2024-10-3130 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderCISA’s Role in Supporting Asset Owners & Government Sectors with CybersecurityThis episode we dive into the critical strategies necessary for securing operational technology (OT) environments, with OT/ICS Strategy Lead at CISA, Danielle Jablanski. Danielle explores the evolving role of CISA in assisting asset owners and government sectors, emphasizing the importance of collaboration and understanding in cybersecurity. From building resilience against "shiny object syndrome" to prioritizing effective incident response and vendor relationships, this conversation provides valuable insights into crafting an actionable, sustainable OT security strategy. Danielle also shares how workforce development is crucial in creating a robust cybersecurity posture and discusses CISA’s ap...2024-10-2930 minOpen Source SecurityOpen Source SecurityWhat's wrong with CISA?Josh and Kurt talk about a few things that have recently come out of CISA. They seem to be blaming the vendors for a lot of the problems, but there's also not any actionable advice telling the vendors what they should be doing. This feels like the classic case of "just security harder". We need CISA to be leading the way funding and defining security, not blaming vendors for giving the market what it demands. Show Notes iCloud Photos Downloader CISA boss: Makers of insecure software must stop enabling today's cyber villains A Security Market for...2024-09-3034 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistHow CISA Supports Cybersecurity from Critical Infrastructure to Elections Podcast: Industrial Cybersecurity InsiderEpisode: How CISA Supports Cybersecurity from Critical Infrastructure to ElectionsPub date: 2024-08-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationChris Cockburn, Cybersecurity Advisor at CISA, shares his insights on how CISA supports industrial cybersecurity from critical infrastructure to elections. We explore the impact of state-sponsored cyber threats, the importance of securing emerging technologies like AI through the "Secure by Design" initiative, and the role of government-private sector partnerships in building a resilient cybersecurity posture. He shares th...2024-08-2824 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderHow CISA Supports Cybersecurity from Critical Infrastructure to ElectionsChris Cockburn, Cybersecurity Advisor at CISA, shares his insights on how CISA supports industrial cybersecurity from critical infrastructure to elections. We explore the impact of state-sponsored cyber threats, the importance of securing emerging technologies like AI through the "Secure by Design" initiative, and the role of government-private sector partnerships in building a resilient cybersecurity posture. He shares the free resources available to support industrial cybersecurity including Fusion Centers. Whether it's defending against sophisticated cyber attacks or ensuring the integrity of our election systems, this episode provides essential guidance for securing the future of critical infrastructure.2024-08-2724 minWater Values PodcastWater Values PodcastCybersecurity Threats, Resources, and Assistance with CISA’s David Mussington David Mussington, Executive Assistant Director for Infrastructure Security at the Cybersecurity & Infrastructure Security Agency (CISA), gives a phenomenal interview covering cybersecurity issues relevant to water and wastewater utilities (and other critical infrastructure sectors, too!), including identifying resources, aid, and funding opportunities for water and wastewater utilities. In this session, you’ll learn about: David’s impressive background in cybersecurity  What CISA is and what it does How CISA assists and supports owners and operators of critical infrastructure  The risks cyber threats pose to critical infrastructure systems The changing nature of cyber threats Why cybersecurity is more than j...2024-08-2028 minNodesignal - Deine Bitcoin-FrequenzNodesignal - Deine Bitcoin-FrequenzNodesignal-Techboost - E192 - CISA SalatIn dieser Folge versuchen wir, wie bereits im vergangenen Techboost angesprochen, dem Thema CISA etwas mehr Raum zu widmen. Hierfür haben wir Fabian @fjahr eingeladen, der kürzlich ein Stipendium durch die Human Rights Foundation erhalten hat. Mit dem Ziel der Forschung zu Cross-Input Signature Aggregation.Von und mit - Calso - Thorsten - Fabian JahrProduziert und geschnitten: ThorstenHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattforme...2024-07-201h 17Utility Security PodcastUtility Security PodcastUtility Security Podcast - CISA’s New Secure By Design Pledge Sets New Standard for CybersecurityUtility Security Podcast: CISA’s New Secure By Design Pledge Sets New Standard for Cybersecurity Welcome to the Utility Security Podcast, your command center for all things utility security. From power plant warriors to grid guardians and even curious citizens, this podcast is your essential briefing on securing our nation's utilities. In this episode, we dive into CISA’s new Secure By Design Pledge, a groundbreaking initiative aimed at setting new standards for cybersecurity in the utility sector. Our special guest, Matthew Rogers, PhD, shares his extensive experience in cybersecurity and his role at CES. We d...2024-06-2723 minThe Gate 15 Podcast ChannelThe Gate 15 Podcast ChannelWeekly Security Sprint EP 69. Summer Scams & CISA is BIG TIME! Terror Alarms, NTAS Bulletins and FUD! Living on the Edge! Hurricane Season!In the Weekly Security Sprint, Andy and Jen covered the following topics. Opening. TLP:CLEAR | FB-ISAO Newsletter H2OSecCon Spring 2024: A Resounding Success in Water and Wastewater Sector Security.   Security Awareness/Scams/PSA | Vacation Planning and Travel Scamming Protect Yourself from Summer Vacation Scams: Stay Cyber Aware During Your Vacation Phone Scammers Impersonating CISA Employees CISA - National Internet Safety Month: This June, Take 4 Easy Steps to Stay Safe Online Other Notables – I love when big orgs put money where their mouth is… America’s rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that   Summer S...2024-06-1834 minNa Ceste BrnoNa Ceste Brno24|06|09| Václav Kadlec | Co je císařovo císaři, co je Boží BohuVáclav Kadlec pokračoval v sérii kázání o opravě městských hradeb z knihy Nehemjáš. Tentokrát byla řeč o vztahů křesťanů k vládní moci. Jaké principy by si měli křesťané osvojit ve vztahu ke státu? Nehemjáš 3:28 "Od Koňské brány dál opravovali kněží, každý naproti svému domu." Římanům 13:1-7 "Každý ať se podřizuje vládní moci, neboť není moci, leč od Boha. Ty, které jsou, jsou zřízeny od Boha, takže ten, kdo se staví proti vládnoucí moci, vzpírá se Bo...2024-06-0930 minThe State of Enterprise IT SecurityThe State of Enterprise IT SecurityS1 EP. 19: New CISA Guidelines, Kaiser Data Leak, Okta Credential Stuffing AttacksIn Episode 19 of The State of Enterprise IT Security, Brad Bussie tackles critical issues affecting the cybersecurity landscape. From new CISA guidelines aimed at protecting critical U.S. infrastructure to major data leaks impacting millions, this episode dives deep into the challenges and strategies for securing our digital world.Topics Covered:CISA Guidelines for AI in Critical Infrastructure: Discussion on new measures to enhance the security of U.S. critical infrastructure against AI-related threats.Kaiser Data Leak: Examination of a significant data breach affecting 13.4 million Kaiser members, including the inadvertent sharing of data with advertisers.Okta...2024-05-1317 minInfosecTrainInfosecTrainCISA Old vs CISA new syllabus Comparison | ISACA CISA syllabus update 2024Evolution Unveiled: CISA 2019 VS 2024 Comparison brings to light the significant changes and developments between the years, offering invaluable insights into the evolution of CISA policies. Dive deep into the comparison journey and discover the key differences that have shaped the landscape. Join us as we explore the nuances, uncover hidden truths, and reveal the untold story behind CISA 2019 VS 2024. Don't miss out on this must-watch analysis! CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organization’s IT and business environment. The CISA certification training course validates the ce...2024-04-1234 minThe Gate 15 Podcast ChannelThe Gate 15 Podcast ChannelThe Gate 15 Interview EP 44: Faith-Based ISAO and DHS CISA on partnership, risk reduction, pizza MREs, and some great rock n’ rollIn this episode of The Gate 15 Interview, Andy Jabbour welcomes Mayya Saab, Executive Director, Faith-Based Information Sharing & Analysis Organization (FB-ISAO), Susan Schneider, presently detailed as Associate Director, Non-governmental Engagements, with the DHS Office of Partnership and Engagement, and Daniel Avondoglio, with the Office of Security Programs at CISA. Mayya on LinkedIn. Susan on LinkedIn. Daniel on LinkedIn. Those who want to engage with the DHS Office of Partnership and Engagement may email ngoengagement@hq.dhs.gov. This discussion is not limited in only being relevant to the faith-based community but addresses considerations and ideas relevant to the broader community. During the podcast...2024-04-021h 07Manufacturing Matters with The Council of IndustryManufacturing Matters with The Council of IndustryMohamed Telab, Deputy Regional Director For The Cybersecurity And Infrastructure Security Agency (CISA)In this podcast episode, Harold King, President of the Council of Industry, sits down with Mohamed Telab, Deputy Regional Director For The Cybersecurity And Infrastructure Security Agency (CISA).In this episode, Mohamed sheds light on the unique role of CISA, the only federal agency dedicated to collaborating with industry to address cybersecurity and infrastructure challenges. From understanding the interconnectedness of critical infrastructure to mitigating risks posed by cyber threats and natural disasters, Mohamed provides valuable insights into CISA's mission and initiatives. Discover how CISA works closely with industry partners, state and local governments, and...2024-03-2627 minGovFuture PodcastGovFuture PodcastFostering Effective Cyber Defense Strategies – Interview with Garfield Jones, CISA [GovFuture Podcast]Cybersecurity is an ever changing field. Staying ahead is critical, and cybersecurity requires a united effort. In this episode of the GovFuture podcast we get the opportunity to talk to Dr. Garfield Jones. He is the Associate Chief of Strategic Technology for the Cybersecurity and Infrastructure Security Agency (CISA).Garfield shares how CISA supports organizations to become more resilient against cyber incidents. He also shares how CISA is evaluating AI technologies and adapting to these emerging technologies. He shares this both as potential solutions and potential threats. Considering the ever-growing sophistication of cyber attacks, Garfield...2024-03-1442 minThe Other Side Of The FirewallThe Other Side Of The FirewallCISA Hacked But How?In this episode, Ryan and Shannon discuss the recent hacking of the US Cybersecurity and Infrastructure Security Agency (CISA) and the quick response to take affected systems offline. They highlight the importance of system upgrades and modernization to prevent such attacks. The conversation also touches on the reality of cyber attacks and the attribution of the attack to China. The hosts emphasize the need for funding and support to ensure the security of critical systems and applaud CISA's resilience and quick action.TakeawaysThe US Cybersecurity and Infrastructure Security...2024-03-1310 minCyberHub PodcastCyberHub Podcast🚨 Cyber News: Microsoft Source Code Stolen, CISA Hacked, TikTok Ban and Intel Officer Sells Secrets to China, Patch Now🚨 Cyber News: Microsoft Source Code Stolen, CISA Hacked, TikTok Ban and Intel Officer Sells Secrets to China, Patch Now Cybersecurity NewsCyberHub PodcastMarch 11th, 2024 Today's Headlines and the latest #cybernews from the desk of the #CISO:Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive EmailsCISA forced to take two systems offline last month after Ivanti compromiseUS soldier arrested for selling national defense secrets to ChinaBills targeting data brokers and TikTok approved in Ho...2024-03-1116 minHistoriae Ante PortasHistoriae Ante PortasIn Brevis Historia – Šílení císaři II.V tomto díle dokončíme povídání o šílených římských císařích. Probereme si císaře flaviovské dynastie.Dozvíte se, proč byste Vitellia opravdu nechtěli pozvat k sobě domů na party; proč je Commodus vyobrazován oděný ve vlčí kůži a hustým plnovousem; odkud pochází přezdívka císaře Caracally a proč má císař Elagabalus tak neřímsky znějící jméno.Kromě toho probereme megalomaniakální sklony, snahy o věčnou slávu, bezskrupulozní likvidace členů nejbližší rodiny i zhýralost těchto čtyř císařů.A jak to s nimi skončilo? Zaposlouchejte se do podca...2024-03-0326 minChief of CybersecurityChief of CybersecurityCISA Has Healthcare Covered, This Podcast Tells You WhyIn this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...2024-02-2620 minChief of CybersecurityChief of CybersecurityCISA Has Healthcare Covered, This Podcast Tells You WhyIn this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable healthcare systems from malicious actors, ensuring the well-being and security of our communities. Discover the various cybersecurity measures implemented by CISA to fortify public healthcare infrastructure against cyber threats and vulnerabilities. Gain insights into their proactive strategies, incident response capabilities, and continuous monitoring practices that help maintain the seamless operation of our healthcare systems. Additionally, we explore how CISA collaborates with public...2024-02-2620 minInfosecTrainInfosecTrainHow to pass the CISA Exam | CISA Exam Preparation Strategy 2024🎙️ Excited to share my exclusive insights on mastering the CISA Exam in 2024! 🚀 Join me as I unveil proven strategies and tips to ace the test with confidence. Whether you're a seasoned pro or just starting your journey, this Session is packed with invaluable advice tailored for success. Let's conquer the CISA together! 💼 ➡️ Agenda for the Session • CISA Exam Preparation Strategy • Materials: What to Refer to and What Not to Refer to • How to Read and Analyze the Questions • Mock Questions for Practice 𝐂𝐈𝐒𝐀 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 & 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐂𝐨𝐮𝐫𝐬𝐞: CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organization’s IT and business environment. The CISA certification training course validates the certification holder’s skills and...2024-02-1546 minCMMC ProofCMMC ProofSecuring Your Digital Assets: Leveraging CISA's Free Cybersecurity ServicesJoin us as Jim Hofleen, CISA's Regional Cybersecurity Advisor for Iowa, shares invaluable insights into leveraging cybersecurity resources. With over 30 years of experience, Jim provides expert guidance on bolstering your organization's cyber defenses. Whether you're a small business or a large multinational organization, CISA offers free cybersecurity services and resources tailored to your needs. In this interview, we delve into practical strategies, tips, and resources offered by CISA to enhance your cybersecurity posture. Don't miss out on this opportunity to fortify your digital resilience with Jim's expertise and CISA's support.  Visit h...2024-02-1239 minThe Security DetailThe Security DetailEp. 2: Water with CISA's Amy Thomas, cyber risk analyst and Noah Powers, RVA program lead, penetration testing capabilitiesWater treatment facilities are part of the critical infrastructure that supports essential services. A cyberattack on these facilities could disrupt the supply of clean water, leading to severe consequences for public health, safety, and the economy. In this episode, two representatives from the US Cybersecurity and Infrastructure Security Agency, or CISA, share strategies to defend the water sector from cyberattacks. They also provide an update on CISA's investigation into an Iranian-linked campaign targeting Israeli-made Programmable Logic Controllers (PLCs) at a number of US water utilities. Resources:  CISA Risk and Vulnerability Assessments program CISA Security Advisors Top Ten Cybersecurity M...2024-01-1721 minThe Lawfare PodcastThe Lawfare PodcastThree CISA Senior Advisers on Secure by DesignSecure by Design means different things to different people. As part of Lawfare’s ongoing project to understand what Secure by Design might mean in practice, we are trying to identify the open questions—areas where research or inquiry might help our collective understanding of the concept and how it might work. Lawfare Contributing Editor Paul Rosenzweig sat down with three Senior Advisers to CISA—Lauren Zabierek, Jack Cable, and Bob Lord—who work on the cutting edge of SbD design and implementation, to get their thoughts on research that would be of ongoing value to their efforts to define an...2023-12-2253 minThe Lawfare Podcast: Patreon EditionThe Lawfare Podcast: Patreon EditionThree CISA Senior Advisers on Secure by DesignSecure by Design means different things to different people. As part of Lawfare’s ongoing project to understand what Secure by Design might mean in practice, we are trying to identify the open questions—areas where research or inquiry might help our collective understanding of the concept and how it might work. Lawfare Contributing Editor Paul Rosenzweig sat down with three Senior Advisers to CISA—Lauren Zabierek, Jack Cable, and Bob Lord—who work on the cutting edge of SbD design and implementation, to get their thoughts on research that would be of ongoing value to their efforts to define an...2023-12-2253 minHoporenkv Native American PodcastHoporenkv Native American PodcastPriority Telecommunication Services for Indian Country: How CISA Emphasizes Protecting Your CommunitiesRelease Date: 12.20.2023 Hoporenkv Native American Podcast: “Priority Telecommunication Services for Indian Country: How CISA Emphasizes Protecting Your Communities” Special Guests: • Larry Clutts, Priority Telecommunications Services Area Representative (PAR) for the Department of Homeland Security, Office of Emergency Communications, for FEMA Regions 6 and 8 • Cathy Orcutt, Priority Telecommunications Services Area Representative (PAR) for the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA), Emergency Communications Division, for CISA Regions 9 & 10 • Jim Fogarty, Priority Telecommunications Services Area Representative (PAR) for Regions 3 and 5 • Bruce Belt, Priority Telecommunications Services area Representative (PAR) for the Cybersecurity and Infrastructure Security Agency’s Regions 1 and 2 Episode Description: Cyber threats don't...2023-12-2027 minGovCIO Media & Research PodcastsGovCIO Media & Research PodcastsGovCast: Inside CISA’s ‘Secure by Design’ FrameworkCISA’s “secure by design” framework is helping software manufacturers bake cybersecurity into products as part of an effort to implement the National Cyber Strategy that the White House released earlier this year. Cybersecurity has traditionally been treated as an afterthought in technology. CISA wants to change that. CISA Senior Advisor Lauren Zabierek discusses what it means to be secure by design, what the new framework outlines and what it means for vendors and the development community. You’ll hear more about the framework’s three principles: Take ownership of customer security outcomes. Embrace ra...2023-12-1920 minUnsolicited ResponseUnsolicited ResponseCISA Attack Surface Scanning ServiceDale is joined by Steve Pozza, CISA Section Chief of Operational Resilience, and Tom Millar, CISA Branch Chief of Resilience, to discuss some of CISA's security services for asset owners. They discuss: The Internet accessible attack surface enumeration and vulnerability scanning surface. Asset owners can buy products or services to do this. Why is the government doing this? What CISA is doing with this attack surface data? How is CISA measuring the success of this service offering? Other broadly available services and tools, the cybersecurity performance goals (CPG assessment) ~500 done in 2023 (and their thinking about self-assessments), Malcom traffic...2023-12-0630 minThe Broken AgendaThe Broken AgendaEpisode 67 - CISA Part 2Part 2 of our series on CISA! Jimi mans the board in this episode to take us through what CISA has to offer to help organizations strengthen their security posture. The Cybersecurity & Infrastructure Security Agency, or CISA, is a component of the US Department of Homeland Security that works with partners to defend against ongoing cybersecurity and infrstructure threats. Are they just another level of unnecessary government or are they providing American industry acriticial - and worthwhile - service? Don't be afraid to check them out for yourself: 2023-11-2147 minDPO DownloadDPO DownloadEpisode 12 - CISA Chief of Cyber Security Region 2 Rich RichardIn honor of October Cyber Security Month the DPO download presents a special episode with Rich Richard the Chief of Cybersecurity Department of Homeland Security CISA division Region 2.  Join us as we discuss CISA's cyber security awareness month initiatives and how CISA can be a partner to provide Cyber Security Guidance to your School.  After listening make sure to visit CISA.gov and reach out to Rich to discuss how CISA can assist your district. 2023-10-1825 minThe Gate 15 Podcast ChannelThe Gate 15 Podcast ChannelWeekly Security Sprint EP 37. Conflict in the Middle East, CISA advisories, lessons learned, and more!In this week's Security Sprint, Dave and Andy talked about the following topics. War in Israel CISA Top 10 Cybersecurity Misconfigurations. NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations Virginia Beach Shooting Lessons Learned. State commission reviewing Virginia Beach mass shooting offers little new insight but recommends more tools for its work. Gate 15 offers our Hostile Event Preparedness Series and check out the Gate 15 White Paper on The Hostile Event Attack Cycle (HEAC). and we’d be happy to help your organization with active shooter/hostile events planning, exercising and overall preparedness. Don’t wait.    CISA: National School Safety Summit. The...2023-10-0926 min13 hříchů rodičovství - Jak z toho ven13 hříchů rodičovství - Jak z toho ven78: Císařský řezKaždé čtvrté dítě v Česku se narodí císařským řezem, nebo správněji císařským porodem. Císařský (Cézarův) porod byl prapůvodně zákrokem jen pro zcela extrémní případy, dnes je celosvětově oproti doporučením WHO obvykle nadužíván. Tento způsob porodu s sebou nese celou řadu zvýšených rizik zejména pro matku. Jaké reálné dopady má ale císařský porod na děti a co všechno pak v životě mají, nebo nemají jinak? A co znamená císařský porod pro psychiku a zdravotní stav matky, a co...2023-10-0351 min