Look for any podcast host, guest or anyone
Showing episodes and shows of

Cybersecurity Marketing Society.

Shows

Dirty South Security PodcastDirty South Security PodcastEp.10 - Truth in Marketing An Honest Regard on Marketing Cybersecurity RSA 2025Welcome to Episode 10 of our Dirty South Security podcast series, where we dive deep into the world of marketing within the cybersecurity industry, especially in the context of RSA 2025. In this episode, we tackle some of the most pressing and controversial topics in the field:Topics Covered:AI Misrepresentations at RSA and BeyondExplore the practice of misrepresenting AI solutions in today's industry. We discuss how these misrepresentations impact trust and the overall landscape of cybersecurity.Marketing Investments: What Works, What Doesn'tGet insights into foundational marketing strategies. We share hot...2025-05-0831 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderCybersecurity by Design: Building OT Security Into Your Manufacturing Plant FloorIn this episode, Dino and Craig address the practicalities of building cyber resilience directly into manufacturing environments - rather than after the fact. Using real-world analogies and field-tested insights, they break down why treating OT security like physical safety is crucial. They challenge the outdated mindset of retrofitting cybersecurity protection after deployment of industrial plant floor equipment.This episode covers all the key elements of protecting your plant floor. From the importance of designing cybersecurity upfront, to implementing the SANS 5 Critical Controls, specific to cybersecurity in operational technology (OT) environments. Whether yo...2025-04-0823 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderThe CISO & Talent Crisis: Turnover Meets OT Cybersecurity GapsIn this episode, Dino and Craig dive deep into the disturbing talent exodus in cybersecurity. The discussion is sparked by Gartner’s prediction that 25% of cybersecurity professionals will leave the field in the next year. They explore the growing gap between IT and OT teams, the lack of CISO influence in executive leadership, and the friction between cybersecurity goals and operational uptime. With real-world anecdotes and hard-hitting insights, they unpack everything from rogue assets and malware in OT environments to the challenges of implementing EDR tools in live production lines. Whether you're a CI...2025-04-0126 minCyberSecurity SummaryCyberSecurity SummaryTribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity LeadershipThis Book is an excerpt from Tribe of Hackers: Security Leaders, a book offering cybersecurity leadership strategies. The excerpt features interviews with numerous cybersecurity professionals, who share their experiences, decision-making processes, and advice on leading teams. The contributors discuss challenges like collaborating with other departments, managing difficult decisions, and building effective teams. Many also offer book recommendations for aspiring cybersecurity leaders, covering topics such as leadership, risk management, and technical skills. The overall theme emphasizes the importance of strategic thinking, strong communication, and building collaborative relationships to succeed in cybersecurity leadership.You can listen and...2025-03-2737 minCybersecurity GrowthCybersecurity GrowthWhite House Cybersecurity Executive Order 14144Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. 00:00 intro 01:10 sponsorship - Cybersecurity Growth Training02:35 hot topic - White House Cybersecurity Executive Order 04:39 2021 White House Executive Order 1402805:27 Trump administration revoked 78 EO’s07:29 Sources of show content09:32 Requiring third party risk assessments10:57 Secure SDLC11:53 Open source software security12:45 sponsorship - Cybersecurity Growth Consulting17:35 SBOM: Software Bill Of Materials19:45 Web Authentication23:05 Post Quantum Cryptography28:30 AI33:55 sponsorship - Cybersecurity Gr...2025-03-2640 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderBlind Spots in Industrial Cybersecurity: What False Confidence Could Cost YouOrganizations in the industrial sector continue to invest in cybersecurity, but are they truly secure, or just leaning on a false sense of comfort?In this episode, industry experts Dino Busalachi and Craig Duckworth, dive into the dangerous gap between perception and reality when it comes to OT cybersecurity. They discuss real-world challenges, from blind spots in asset visibility to leadership misalignment and third-party risks. With a focus on practical steps, they explore why security frameworks must go beyond IT, how to align business needs with security, and why treating cybersecurity like safety...2025-03-1323 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderGartner, DOGE, and the Future of OT Cybersecurity PolicyIn this episode, we dive into the latest Gartner Magic Quadrant report for OT cybersecurity and analyze key players, market trends, and strategies for selecting the right security partners.We also discuss insights from the recent S4 conference, the growing importance of cyber-informed engineering, and how organizations can effectively align IT and OT security strategies. We discuss CapEx versus OpEx and potential implications of the DOGE initiative around industrial cybersecurity investments.Whether you're planning your next cybersecurity investment or tackling legacy system challenges, this episode provides practical guidance to help you navigate the...2025-02-2524 minThe Hacker\'s CacheThe Hacker's Cache#35 Q&A: The Harsh Truth: You NEED to Code for Cybersecurity MasteryIf you want to be an expert in cybersecurity, coding isn’t optional—it’s essential. In this Q&A episode of The Hacker’s Cache, I break down why learning to code separates the entry-level professionals from the true experts and how AI is shifting the skills needed in offensive security. I also dive into the different career paths available after landing your first pentesting job—whether it’s climbing to a senior role, transitioning to red teaming, going freelance, or specializing in niche areas like IoT and hardware hacking. Plus, I answer listener questions about cybersecurity certifications, the safest j...2025-02-1936 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderAssessing AI’s Role in CybersecurityThe rapid evolution of AI is reshaping industrial cybersecurity, but are organizations ready for the risks? In this episode, three different experts explore the complexities of securing OT environments, the rising role of AI in threat detection, and the challenges of integrating IT and OT security. From governance and compliance to workforce development and emerging cyber threats, this discussion sheds light on the shifting cybersecurity landscape. Gain insights into the future of industrial security, the impact of AI-driven decision-making, and the importance of balancing innovation with risk management.Chapters:00:00:00...2025-02-1823 minCISSP Cyber Training Podcast - CISSP Training ProgramCISSP Cyber Training Podcast - CISSP Training ProgramCCT 220: Firewall and Advanced Cybersecurity Techniques for CISSP (Domain 7.1)Send us a textUncover the secrets to mastering firewalls and advancing your cybersecurity career with insights from the CISSP Cyber Training Podcast. Ever wondered how a simple firewall can be your strongest ally against a $12 billion threat that financial firms have faced over the past two decades? Join me, Sean Gerber, as we navigate the indispensable role of firewalls within cybersecurity, especially for those gearing up for the CISSP exam. This episode promises an enriched understanding of firewalls, from regulatory compliance to integrating next-generation firewalls in cloud environments like Azure and AWS.The discussion...2025-02-1742 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderOverlooked Risks With IIoT in Industrial CybersecurityCraig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT. They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable. The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden risks posed by vendor access, remote connections, and unmonitored network traffic. With real-world insights, they explore how organizations can leverage cybersecurity tools not just for threat prevention but also for process integrity and operational efficiency. If you’ve ever wondered how to...2025-02-1122 minThe Hacker\'s CacheThe Hacker's Cache#33 Are Cybersecurity Bootcamps a Scam? ft. Keith ColemanAre cybersecurity bootcamps worth the hefty price tag, or are they just another overhyped shortcut to nowhere? In this episode of The Hacker’s Cache, I sit down with Keith Coleman, a seasoned cybersecurity professional with experience in pentesting, security engineering, DevSecOps, and more. We break down the true value of bootcamps, why many graduates struggle to land jobs, and what alternative paths provide a better return on investment. Keith shares his journey from IT to cybersecurity, his take on degrees vs. certifications, and why hands-on learning beats expensive bootcamps every time. If you're considering a cybersecurity bootcamp, listen to...2025-02-0540 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderThe A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson BortJoin us as we delve into the fascinating world of operational technology (OT) cybersecurity with Bryson Bort, founder of SCYTHE, Grimm, and co-founder of ICS Village. Discover how his experiences shaped innovative approaches to OT risk management, why visibility and architecture are foundational to security, and the importance of building trust between IT and OT teams. From real-world case studies to actionable strategies, this episode explores the evolving landscape of industrial cybersecurity and the steps organizations must take to stay ahead.Chapters:00:00:00 - Welcome and introduction to today’s focus on industrial cybe...2025-01-2833 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderUncovering Blind Spots in OT CybersecurityIn this week's episode, Craig Duckworth and Dino Busalachi address common blindspots that challenge industrial cybersecurity. They explore the hidden vulnerabilities within operational technology (OT) environments, the limitations of traditional IT approaches in industrial settings, and the critical importance of asset visibility. With a focus on actionable strategies, they advocate for secure-by-design principles, cross-functional partnerships, and tailored solutions to address the dynamic and diverse nature of OT systems. This discussion is essential for anyone seeking to navigate the complexities of cybersecurity in industrial environments while ensuring operational continuity.Chapters:00:00:00...2025-01-2129 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threatsThe provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for organizations by providing in-depth knowledge about common threats and practical strategies. It focuses on understanding malware evolution, vulnerability management, threat intelligence, and effective cybersecurity strategies. The book also examines government involvement in cybersecurity, emphasizing the need for organizations to navigate legal and ethical considerations in protecting data from government access. Finally, the book explores cloud computing security, discussing how to adapt existing security strategies and adopt modern approaches for secure cloud operations.You can...2025-01-2034 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderAI in Industrial Cybersecurity: Friend, Foe, or Something in Between?Join us for an in-depth exploration of industrial cybersecurity with expert and Emmy award-winning reporter Kerry Tomlinson, who focuses on cybersecurity, Kerry Tomlinson. Discover practical strategies to combat today’s most critical threats, from navigating AI vulnerabilities to addressing ethical dilemmas around safety and profit. Kerry underscores the essential role of human involvement and cultural alignment in fostering cyber resilience. Learn why foundational practices—like asset inventories and prioritized action plans—are crucial, and how organizations can stay ahead in an ever-evolving threat landscape while building a culture of digital safety.Chapte...2025-01-1430 minCyberSecurity SummaryCyberSecurity SummaryModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your OrganizationThe provided Book "Modern Cybersecurity Practices," which is a guide to exploring and implementing agile cybersecurity frameworks and strategies within an organization. The book utilizes a real-world case study involving a fictional company, Company X, to illustrate common security vulnerabilities and attack vectors, including credential stuffing, buffer overflows, and SQL injection. The book's approach uses a series of practical exercises and scenarios to demonstrate how attackers can exploit these vulnerabilities and move laterally through a network, eventually exfiltrating sensitive data. The text then transitions into a detailed discussion of security best practices, standards, policies, and procedures for building a...2025-01-0815 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderCybersecurity Challenges and Insights with Industry Analyst Jonathon GordonJonathon Gordon, Director of Industrial Cybersecurity at TakePoint Research, dives into the intricate world of OT cybersecurity. From the disconnect between vendors and asset owners to the complexities of managing diverse remote access technologies, Jonathon shares actionable insights and real-world insights addressing the most pressing cybersecurity challenges in critical infrastructure and manufacturing sectors. He discusses the evolving role of automation technology vendors, the growing significance of AI and machine learning, and the pressing need for diversity and knowledge-sharing in the cybersecurity workforce. This conversation is a must-listen for anyone navigating the multifaceted world...2025-01-0728 minThe Hacker\'s CacheThe Hacker's Cache#28 Outwork the Competition: Winning the Cybersecurity Career GameIn this episode, Kyser Clark discusses the competitive landscape of cybersecurity, emphasizing the importance of culture fit, the reality of job openings, and how to stand out in a crowded field. He highlights the necessity of hard work, continuous learning, and the value of soft skills in securing a position. Additionally, he addresses the misconceptions about the cybersecurity job market and encourages listeners to invest in their careers through training and certifications.TakeawaysCompetition is fierce in cybersecurity due to limited job openings.Culture fit is often more important than technical skills in hiring...2025-01-0128 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderOT Cybersecurity Insights with Lauren Blocker, Rockwell AutomationIn this week's episode, Lauren Blocker of Rockwell Automation, shares insights on the evolving landscape of industrial cybersecurity. From overcoming the challenges of legacy systems to building standards-based security frameworks, Lauren highlights strategies to elevate cybersecurity in manufacturing and beyond. She emphasizes the importance of aligning IT and OT perspectives, addressing obsolescence risks, and fostering proactive approaches to safeguard critical infrastructure. Tune in to learn how to bridge the gap between compliance and holistic security while navigating the complexities of the industrial cybersecurity journey.Chapters:00:00:00 - The Role of Cybersecurity...2024-12-1732 minCyberSecurity SummaryCyberSecurity SummaryHow to Measure Anything in Cybersecurity RiskThis is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative approach to cybersecurity risk management. The authors contend that existing methods, such as risk matrices and risk scores, are flawed and hinder decision-making. They propose using quantitative methods to assess risk, including the assignment of probabilities and dollar impacts, and demonstrate how to apply these techniques through a series of practical examples. The book explores methods for calibrating experts, combining their estimates, and leveraging Bayesian methods to update beliefs about cybersecurity risks. It emphasizes the im...2024-12-1515 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderKeys to Bridging the Industrial Cybersecurity IT/OT GapIn this week's episode, Dino and Craig dive into the persistent disconnect between IT and OT teams and its impact on industrial cybersecurity. They explore why IT tools often fall short on the plant floor and provide actionable insights to achieve true IT/OT convergence. From addressing the challenges of resource gaps to fostering collaboration between teams, this conversation sheds light on practical strategies to bridge the divide and create a unified approach to industrial cybersecurity on the plant floor and for critical infrastructure.Chapters:00:00:00 - Why Local Collaboration is Critical for...2024-12-1024 minCyberSecurity SummaryCyberSecurity SummaryEssential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsThe Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method to various aspects of cybersecurity. The book covers topics such as intrusion detection, malware analysis, cryptography, digital forensics, system security engineering, human-computer interaction, and visualization. Each chapter presents an example scientific experiment in the respective field, highlighting key concepts, methodologies, and challenges encountered in conducting cybersecurity research. The author emphasizes the importance of rigor, reproducibility, and sharing results in the scientific community, arguing that the scientific method can greatly improve the effectiveness and validity of cybersecurity practices...2024-12-0315 minCyberSecurity SummaryCyberSecurity SummaryEffective Cybersecurity: A Guide to Using Best Practices and StandardsThis Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managing the cybersecurity function, conducting security assessments, and implementing security controls. The book examines various cybersecurity frameworks, standards, and guidelines, including ISO 27001, ISO 27002, NIST Cybersecurity Framework, CIS Critical Security Controls, and COBIT 5. The document delves into risk management, threat identification, vulnerability assessment, control selection, and incident response. It also explores crucial topics such as data security, access control, system management, mobile device security, cloud computing, and cryptographic techniques.You can listen and download our episodes for...2024-12-0133 minCyberSecurity SummaryCyberSecurity SummaryData Analytics for CybersecurityThe Book "Data Analytics for Cybersecurity" provides a comprehensive guide to understanding and applying data analytics methods for cybersecurity. It starts by defining cybersecurity and introducing its various aspects, including the role of data analytics. The book then explores different sources of cybersecurity data, including network traffic, system logs, and user behavior data. Data mining concepts such as clustering, classification, and association rule mining are then introduced, explaining how these techniques can be applied to discover patterns in cybersecurity data. Finally, the book explores advanced data analytics approaches for cybersecurity, including big data analytics, spatial and temporal data analysis...2024-11-2511 minThe Hacker\'s CacheThe Hacker's Cache#22 Q&A: Cybercrime, Certifications, and Sacrifice in Cybersecurity CareersKyser Clark introduces a new Q&A format where he answers listener questions about cybersecurity, ethical hacking, and career development. He discusses the allure of cyber crime, the importance of networking certifications, and the sacrifices necessary to succeed in the field. Kyser emphasizes that while certifications can enhance career prospects, they are not the only path to success. He encourages listeners to manage their finances wisely and invest in their education to achieve their career goals.TakeawaysMany people turn to cyber crime due to desperation and thrill.The anonymity of the internet...2024-11-2039 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderThe Future Looks Bright : Building a Career in OT CybersecurityExplore the fast-evolving field of OT cybersecurity with Emma Duckworth, a professional whose journey from chemical engineering to securing operational technologies highlights the growing need for cross-functional collaboration in industrial environments. Emma shares her experiences working on the plant floor, the challenges of uniting IT and OT teams, and the role of emerging technologies like intrusion detection and prevention systems in safeguarding manufacturing processes. Gain practical insights into career paths, mentorship, and the critical importance of hands-on learning in this dynamic industry.Chapters:00:00:00 - A Fresh Look at OT Cybersecurity00:01:29 - From...2024-11-1918 minCISSP Cyber Training Podcast - CISSP Training ProgramCISSP Cyber Training Podcast - CISSP Training ProgramCCT 193: Practice CISSP Questions - Navigating Cybersecurity Compliance and Data Protection Strategies (Domain 1.5)Send us a textUnlock the secrets of cybersecurity mastery as Sean Gerber unpacks the importance of CISSP certification amidst a looming gap of over 5 million unfilled cybersecurity positions by 2024. This episode promises to equip you with insights from the latest ISC² global workforce study, emphasizing the blend of technical prowess and essential soft skills employers crave, such as communication and critical thinking. Dive into expert advice on acing CISSP exam questions, especially those tricky legal scenarios involving data transfer you might face.Explore comprehensive strategies for safeguarding data and ensuring compliance in today’s com...2024-11-1425 minThe CyberPulse ScoopThe CyberPulse ScoopCybersecurity News: From Ransomware Attacks to AI Threats and Business ProtectionCybersecurity threats: They explore recent cyberattacks, vulnerabilities, and emerging threats like ransomware and phishing. The importance of cybersecurity for businesses: They emphasize the need for businesses of all sizes to prioritize cybersecurity, highlighting the potential consequences of cyberattacks. Cybersecurity best practices: They provide practical tips for improving cybersecurity, such as using multi-factor authentication, keeping software updated, and educating employees about cybersecurity risks. The role of cybersecurity professionals: They discuss the importance of having qualified cybersecurity professionals to help organizations protect their systems and data. The impact of technology on cybersecurity: They...2024-11-0625 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderThe Future Looks Bright : Insights & Advice for Next Gen Cybersecurity LeadersOT Cybersecurity Engineer, Noah Duckworth, joins Dino Busalachi for this episode. They discuss the challenges and nuances of industrial cybersecurity, as he shares insights from his experience working in the OT (Operational Technology) cybersecurity space. Noah talks about the complexities of integrating traditional IT cybersecurity measures within industrial networks, the specific tools and practices used, and the importance of safe, industry-specific approaches to vulnerability management. He also provides a perspective on various industrial sectors, such as food and beverage and transportation, and how cybersecurity requirements vary across different verticals and environments. This episode...2024-11-0517 minCybersecurity Mentors PodcastCybersecurity Mentors PodcastSimply Cyber Con '24 - Storytelling Skills to Level Up Your Cybersecurity CareerIn this episode John shares an upcoming talk that he gave at the Simply Cyber Con '24 in Charleston, SC. Title: From Technical to Tactical: Storytelling Skills to Level Up Your Cybersecurity CareerDescription:In the fast-paced and complex world of cybersecurity, technical expertise alone isn't enough to stand out. What if you could turn your experiences into compelling stories that not only capture attention but also propel your career forward? Drawing on the transformative principles from Matthew Dicks' acclaimed book Storyworthy, this talk will explore how cybersecurity professionals can harness...2024-11-0243 minCybersecurity GuideCybersecurity GuideTasha Cornish | Cybersecurity AssociationTasha Cornish is the executive director of the Cybersecurity Association, a nonprofit that focuses on building a strong cybersecurity community. The organization has three Centers of Excellence: the Center for Business Growth and Innovation, the Center for Cybersecurity Talent, and the Center for Cyber Resilience. The Center for Cybersecurity Talent works to create opportunities for on-the-job training, internships, and apprenticeships to help build the next generation of cybersecurity professionals. Check out Cybersecurity Guide for a complete transcript of this episode.2024-10-3127 minThe Hacker\'s CacheThe Hacker's Cache#19 Beating the Odds in Cybersecurity: What It Really Takes ft. James ScottKyser Clark interviews James Scott, a cybersecurity professional with a diverse background in the military and digital forensics. They discuss James's journey into penetration testing, the challenges he faced in landing his first role, and the importance of networking and creating personal tools. The conversation also covers the significance of programming skills in cybersecurity, the value of digital forensics knowledge, and the impact of volunteering at conferences. James shares insights on pursuing a PhD in cybersecurity, focusing on weaponizing forensics and compliance training. The episode concludes with advice on persistence and standing out in a competitive field....2024-10-3035 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderCISA’s Role in Supporting Asset Owners & Government Sectors with CybersecurityThis episode we dive into the critical strategies necessary for securing operational technology (OT) environments, with OT/ICS Strategy Lead at CISA, Danielle Jablanski. Danielle explores the evolving role of CISA in assisting asset owners and government sectors, emphasizing the importance of collaboration and understanding in cybersecurity. From building resilience against "shiny object syndrome" to prioritizing effective incident response and vendor relationships, this conversation provides valuable insights into crafting an actionable, sustainable OT security strategy. Danielle also shares how workforce development is crucial in creating a robust cybersecurity posture and discusses CISA’s ap...2024-10-2930 minCyberSecurity SummaryCyberSecurity SummaryThe Cybersecurity Playbook for Modern EnterprisesThis summary is talking about the Book "The Cybersecurity Playbook for Modern Enterprises".The source is a cybersecurity playbook for modern enterprises, aimed at preventing data breaches and cyberattacks. It addresses the increasing prevalence and profitability of cybercrime, emphasizing the need for robust defenses. The text covers various aspects of cybersecurity, including best practices, human behavior in the digital world, threat actors, social engineering techniques, malware, insider threats, and the importance of information security. It also explores the challenges of securing networks and workloads, particularly in the context of cloud computing and remote work. Finally...2024-10-2722 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderAI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with ClarotyIn this week's episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.Chapters:00:00:00 - Pandemic's Impact on Critical Infrastructure00:01:08 - Introduction to...2024-10-2229 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity for Connected Medical DevicesThis summary is talking about the Book "Cybersecurity for Connected Medical Devices".This text is an excerpt from a book on cybersecurity for medical devices. The book discusses the importance of cybersecurity for connected medical devices and examines the threats and vulnerabilities that these devices face. The text highlights the shared responsibility between medical device manufacturers (MDMs) and healthcare delivery organizations (HDOs) for cybersecurity and outlines the steps MDMs should take to develop a secure product. The text also covers the regulatory landscape for medical device cybersecurity, focusing on US FDA and EU regulations, as...2024-10-2121 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity Ethics, Legal, Risks, and PoliciesThis summary is talking about the Book "Cybersecurity Ethics, Legal, Risks, and Policies".This text is an excerpt from a book about cybersecurity and examines the ethical and legal aspects of cybersecurity, cybersecurity risks, and cybersecurity policies. The book discusses various ethical challenges related to cybersecurity, including harmful actions, software piracy, copyright infringement, and ransomware attacks. It also examines the differences between ethical and legal perspectives on cybersecurity and details relevant cyber laws and case studies in the United States. Additionally, the text explores cybersecurity risks, including threat actors, risk identification, and risk management techniques...2024-10-2114 minCybersecurity Mentors PodcastCybersecurity Mentors PodcastThe Recruiter’s Playbook: How to Navigate Cybersecurity Jobs with Joe HudsonIn this episode we sit down with Joe Hudson, Director of Growth at TCM Security, to discuss the challenges and opportunities in cybersecurity job hunting. With experience on both sides of the cybersecurity job market, Joe shares his personal journey from teaching to recruiting, and ultimately into cybersecurity. He provides actionable advice for job seekers, from the importance of networking to decoding job descriptions, as well as tips on working with recruiters and preparing for interviews.Key Takeaways:Joe’s unique path from a teaching career to a successful role in cybersecurity.The role of...2024-10-1858 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity A Practical Engineering ApproachThis summary is talking about the Book "Cybersecurity A Practical Engineering Approach".The first source, "Cybersecurity: A Practical Engineering Approach," is a textbook that presents a comprehensive overview of cybersecurity, focusing on a practical engineering approach. It covers topics like identity management, cryptography, network security, intrusion detection, and penetration testing. The text utilizes real-world examples and scenarios to illustrate key concepts, and includes numerous exercises for students to practice their skills. The second source, "Discovering Computer Science: Interdisciplinary Problems, Principles, and Python Programming," is a textbook that focuses on the fundamentals of computer science, with...2024-10-1616 minCyberSecurity SummaryCyberSecurity SummaryTheoretical Cybersecurity - Principles and Advanced ConceptsThis summary is talking about the Book "Theoretical Cybersecurity - Principles and Advanced  Concepts".The sources, primarily from the book "Theoretical Cybersecurity", focus on advocating for a more strategic and pragmatic approach to cybersecurity. The authors argue that the traditional "don't get hacked" mentality is outdated and ineffective, suggesting instead a "we will get hacked" approach. This involves prioritizing assets based on their criticality to an organization's strategic goals and focusing on resilience rather than simply preventing every attack. The authors also discuss the importance of understanding the motivations and resources of attackers, and how t...2024-10-1518 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderWomen in STEM: Bridging the Talent Gap in Industrial CybersecurityCraig sits down with Jessica Cook, a computer science engineering senior at Mississippi State University, to explore her journey into industrial cybersecurity. From discovering her passion for tech in high school to gaining hands-on experience in OT cybersecurity, Jessica discusses how internships and real-world exposure have shaped her understanding of the industry. She talks about the exciting evolution of industrial careers, highlighting how traditional manufacturing roles are becoming more technical and data-driven. Jessica shares valuable advice on building relationships, leveraging networking opportunities, and overcoming the challenges of being a woman in a traditionally...2024-10-1522 minCyberSecurity SummaryCyberSecurity SummaryMachine Learning for Cybersecurity CookbookThis summary is talking about the Book "Machine Learning for Cybersecurity Cookbook".This text is an excerpt from the "Machine Learning for Cybersecurity Cookbook" by Emmanuel Tsukerman, a guide to using machine learning for cybersecurity. The book offers recipes for building a variety of machine learning solutions to combat cyberattacks, including malware detection, social engineering, intrusion detection, and securing data. It also includes chapters on the basics of setting up a virtual lab environment and using Python virtual environments for effective malware analysis. Each chapter covers a variety of techniques, ranging from simple methods like...2024-10-1211 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity Career GuideThis summary is talking about the Book "Cybersecurity Career Guide".This Cybersecurity Career Guide provides advice and information for those looking to enter the cybersecurity field. The guide starts by defining cybersecurity and its role in business and society. It explores different cybersecurity disciplines, common skills, and how to prepare for a job search. The guide also discusses navigating impostor syndrome, overcoming career challenges, and building a professional network. A strong emphasis is placed on understanding and addressing challenges like burnout, gatekeeping, and stagnation. The guide also provides practical advice for developing skills and navigating...2024-10-1108 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity and Digital ForensicsThis summary is talking about the Book "Cybersecurity and Digital Forensics".The provided text is a collection of excerpts from "Cybersecurity and Digital Forensics.pdf," a book that explores various aspects of cybercrime and cybersecurity. The book discusses the dynamics of cybercrime, including motivations, classifications, and famous cases. It delves into cybersecurity strategies, encompassing data protection, risk management, and social engineering. The book also covers the challenges and issues related to emerging technologies like cloud computing, social media, smartphones, and the Internet of Things (IoT). Finally, the book examines the role of digital forensics in...2024-10-1111 minCyberSecurity SummaryCyberSecurity SummaryCybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurityThis summary is talking about the Book "Cybersecurity: The Beginner's Guide - A comprehensive guide to getting  started in cybersecurity".This text is an excerpt from a cybersecurity guide for beginners that explains the basics of cybersecurity, the history of breaches, and the various technologies used to protect against cybercrime. It also discusses the different career paths available in the cybersecurity field, the importance of gaining relevant skills and certifications, and how to find a job in this industry. Finally, the text provides expert opinions on navigating a cybersecurity career, including advice on how to s...2024-10-1118 minThe Hacker\'s CacheThe Hacker's Cache#16 Why Cybersecurity Is Stressful and How to Succeed with Opeyemi Kolawole (Hacking Insights)Kyser Clark interviews Opeyemi Kolawole, a full-time red teamer and cybersecurity professional. They discuss Opeyemi's background in biology and his transition into the cybersecurity field. Opeyemi shares his experience and insights on various certifications, including the Cyberwarfare Lab Certified Red Team Analyst (CPTA) and the importance of staying up to date in the field. They also discuss the benefits of building a personal brand on platforms like LinkedIn and YouTube.Connect with Opeyemi on LinkedIn: https://www.linkedin.com/in/opeyemi-v-kolawole/TakeawaysTransitioning from a different field into cybersecurity is possible with...2024-10-0938 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderHow CISOs Are Bridging the Gap between OT and IT CybersecurityIn this rewind episode, we explore the critical role CISOs play in bridging the gap between operational technology (OT) and enterprise cybersecurity. With manufacturing and critical infrastructure facing increasing cyber threats, CISOs must navigate both the boardroom and the plant floor to secure complex environments without disrupting production. This discussion focuses on the importance of risk assessment, real-time monitoring, and the adoption of specialized cybersecurity tools. The episode highlights the need for cross-functional collaboration, leveraging external expertise, and shifting toward proactive, secure-by-design approaches. It also addresses the vulnerabilities in supply chains...2024-10-0835 minCyberSecurity SummaryCyberSecurity SummaryHack the Cybersecurity InterviewThis summary is talking about the Book "Hack the Cybersecurity Interview".It is a book that guides readers through the process of preparing for and securing cybersecurity jobs. It provides advice on personal branding, soft skills, and common interview questions, with chapters dedicated to specific cybersecurity roles, including SOC Analyst, Penetration Tester, Digital Forensics Analyst, Cryptographer/Cryptanalyst, GRC/Privacy Analyst, Security Auditor, Malware Analyst, and Cybersecurity Manager. The authors also include behavioral interview questions and their suggested answers, as well as final thoughts and reflections on the industry.You can listen...2024-10-0739 minCybersecurity Mentors PodcastCybersecurity Mentors PodcastBe Yoda, Not Luke - Mastering Emotional Intelligence in Cybersecurity with Adam AndersonIn this episode, we have an insightful conversation with Adam Anderson, a seasoned cybersecurity professional, entrepreneur, and author. Adam shares his journey from a technical "keyboard warrior" to realizing the power of emotional intelligence (EIQ) in building a successful cybersecurity career. We discuss the critical differences between IQ and EIQ, how emotional intelligence can be your secret weapon for career growth, and why you should strive to be Yoda rather than Luke Skywalker in the workplace. Tune in to discover actionable tips on how to improve your EIQ and leverage it to stand out in the cybersecurity field.2024-10-0653 minThe Hacker\'s CacheThe Hacker's Cache#15 From Zero to Hero: How Anyone Can Succeed in CybersecurityIn this solo episode, Kyser Clark discusses the accessibility of cybersecurity careers, emphasizing that anyone can enter the field regardless of their background. He shares his personal journey from blue-collar jobs to becoming a penetration tester, highlighting the importance of certifications and continuous learning. Kyser provides actionable steps for breaking into cybersecurity, including gaining tech experience, obtaining certifications, and effectively marketing oneself. He concludes by encouraging listeners to remain persistent and adaptable in their job search, reminding them that while anyone can enter the field, competition is fierce.TakeawaysAnyone can get into...2024-10-0234 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderOT Cybersecurity Lessons from the Trenches RevisitedIn this reflective episode, we revisit the real-world challenges of securing industrial environments, where the intersection of IT and OT often creates unforeseen cybersecurity vulnerabilities. From mismanaged remote access to the critical need for continuous asset monitoring, our experts dive deep into the lessons learned from boots on the ground work in the field.They share insights on managing OT cybersecurity risks while maintaining production uptime and operational integrity. This episode provides invaluable takeaways for those navigating the complexities of protecting industrial networks, offering practical solutions for balancing security with operational demands.2024-10-0131 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderZero Day to Virtual Patching: Cybersecurity Solutions A-Z with TXOne Networks RevisitedWe revisit key insights from past conversations with Dave Purdy and Debbie Lay of TXOne Networks, who shared their expertise on the critical cybersecurity challenges facing industrial environments. The episode delves into innovative solutions such as virtual patching and deep packet inspection, which are vital for securing legacy systems without causing operational disruption. With a focus on mitigating zero-day vulnerabilities and ransomware threats, the discussions also emphasize the importance of bridging the IT/OT divide to create cohesive, secure environments. This episode provides actionable strategies for professionals responsible for managing the cybersecurity of...2024-09-1721 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderProactive vs. Reactive Cybersecurity: A Strategic Communications PerspectiveIn this week's episode, Craig Duckworth and LuRae Lumpkin dive into the critical need for translating high-level cybersecurity solutions and priorities into clear, succinct communication across the industrial cybersecurity industry. They focus on bridging the communication gap between IT and OT teams, discussing how a unified approach from both leadership and operations can strengthen security efforts. The episode highlights evolving strategies for addressing breaches, improving risk management, and safeguarding critical infrastructure. Key takeaways include the importance of tailoring cybersecurity communication to different audiences, implementing proactive measures, and fostering a consistent, organization-wide message that...2024-09-1025 minIndustrial Cybersecurity InsiderIndustrial Cybersecurity InsiderFrom Legacy Systems to Ransomware: The Evolution of OT CybersecurityIn this episode, Craig Duckworth is joined by Roger Hill, founder of Hillstrong Group Security.Roger is a seasoned 30-year industry veteran in the field of industrial automation and cybersecurity. He joins Craig to discuss the critical challenges and emerging trends in industrial cybersecurity.From the evolution of security practices in industrial environments to the complexities of integrating modern solutions with legacy systems, Roger offers invaluable insights. He delves into the importance of breaking down silos between IT and OT teams, the rise of ransomware as a major threat, and the need for...2024-09-0332 minThe Hacker\'s CacheThe Hacker's Cache#10 Breaking into Cybersecurity: Tips from a Pro ft. Jake MayhewIn this conversation, Kyser Clark interviews Jake Mayhew, a senior penetration tester, about his background and experiences in cybersecurity. They discuss the importance of internships, the value of creating a home lab, and the benefits of networking at local conferences and meetups. Jake also shares advice for job seekers, including the significance of standing out through proactive actions like writing reports and asking questions. Jake Mayhew and Kyser Clark discuss their favorite hacker movies and shows, as well as their experiences with different hacking certifications. They also explore the challenges of pursuing higher-level certifications and offer advice for those...2024-08-2839 min