Look for any podcast host, guest or anyone
Showing episodes and shows of

Intex IT Cyber Security Consultancy

Shows

Cyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 44 The Role of Cyber Insurance    In this episode, I speak about: Overview of the rising importance of cyber insurance in managing organizational risks due to cyber threats. The focus of the episode: what cyber insurance covers and how it benefits businesses. Key Segments: What is Cyber Insurance? Definition and purpose: Mitigating risk from cyber incidents (e.g., data breaches, ransomware). Common coverage areas: data recovery, legal fees, notification costs, business interruptions. Importance of Cyber Insurance: Growing cost of data breaches and their financial implications fo...2025-03-2410 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 43 Understanding Cyber Threat Intelligence: Staying Ahead of Cyber AttacksIn this episode, I dive into the critical importance of Cyber Threat Intelligence (CTI) and how it helps organisations stay ahead of attackers. Learn about the practice of gathering, analyzing, and applying information to understand potential or existing threats. I break down the three levels of CTI: strategic, tactical, and operational intelligence, explaining their roles in enhancing security posture. Discover how CTI provides insights into who is attacking, their methods, and their objectives. Explore the process of data collection from various sources, analysis to identify patterns, and dissemination of actionable intelligence within the organization. I...2024-08-2113 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 42 Defenders of the Cyberverse - Insights from Alexander Rogan and Christian Rogan of Platinum High Integrity Technologist.Welcome to Episode 42 of the Cyber Security Happy Hour Podcast, with your host, Christie. In this gripping episode, I interview Alexander Rogan and Christian Rogan, co-founders of Platinum High Integrity Technologies. They discuss their disruptive Cyber Security solution, a technology that works at ring zero, effectively blocking unauthorised binary codes from deploying onto the system. This game-changing approach confronts malware before it can do damage, ensuring cyber safety. Tune in as they shed light on how their technology eliminates the need for constant updates and struggles with false positives.   We dive d...2024-04-181h 01Cyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 41 Demystifying Vulnerability ScansWelcome to Episode 41 of the Cyber Security Happy Hour Podcast.   In this podcast, your host, Christie, explores the critical facet of cyber security vulnerability scanning. Decode the myths, understand what vulnerability scans encompass, and why their role within an organization is of paramount importance. Firstly, begin with an overview of vulnerability scans, which are systematic system and network evaluations that identify potential security weaknesses. The focus is on how these scans are employed using specialised tools to unearth vulnerabilities such as outdated software, weak passwords and non-security flaws that cyber attackers c...2024-03-1315 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 40 The Zero Trust Security ModelWelcome to episode 40 of the Cyber Security Happy Hour Podcast. Host: Christie Episode 40: The Zero Trust Security Model  Today, I take a deep dive into the Zero Trust Security Model, a Cyber Security approach that continuously verifies and never assumes trust. The zero trust framework challenges conventional methods of trust based on entities' locations, securing potential loopholes through constant verification whether users are inside or outside the organization network. The goal of the Zero Trust Model is not just to prevent unauthorized access to data and services, but to e...2024-02-0216 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 39 Navigating the World of Cyber Security: A Conversation with Mora AwosileWelcome to the Cyber Security Happy Hour Podcast Host: Christie  Episode 39: Navigating the World of Cyber Security with Guest Mora Awosile Mora Awosile is a Cyber Security Specialist and works in Cyber ​​Defense with expertise in Defense and Resilience. Focused on Change Project Management and Incident Response.   With the increasing frequency and complexity of Cyber threats, there is a constant demand for skilled information security professionals. This high demand translates into robust job opportunities and career growth in the field.    High Demand for Expertise Contin...2023-12-2037 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 38 Remote work as a Cyber Security ProfessionalWelcome to the Cyber Security Happy Hour Podcast Host: Christie  Episode 38 Remote work as a Cyber Security Professional   As a Cyber Security Professional, working remotely has become more and more common in recent years. There are many benefits to working remotely, but there are also some unique challenges and considerations that come with it. Here are some of the most important things to keep in mind when working remotely in Cyber Security:   Remote work advantages:   Flexibility Commute Reductions Increased Productivity Low cost of living Digi...2023-11-0918 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 37 Cyber Security for Small BusinessesWelcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 37 Cyber Security for Small businesses   Steps to protect your Small Business   Risk Assessment: Threat Identification Vulnerability Assessment: Conduct Risk Analysis:  Risk Mitigation: Evaluate and Implement Cybersecurity Controls: Regular Review  Document the Process Create a Security Policy: Data Classification: Train your Employees       Enjoy! You can listen on: Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT We...2023-10-0921 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 36 ISO 27001 SOA & Risk Treatment PlanWelcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 36: ISO 27001 SOA & Risk Treatment Plan   Statement of Applicability (SOA) for ISO 27001   Identify relevant controls: Assess control relevance: Select applicable controls: Determine control implementation: Plan control implementation: Document the SOA: Review and approval:   Risk Treatment Plan   Review the risk assessment: Prioritize risks: Identify risk treatment options: Select risk treatment measures: De...2023-05-1816 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 35 Conducting an ISO 27001 Risk AssessmentWelcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 35 Conducting an ISO 27001 Risk Assessment   In the podcast I will be discussing the steps to conduct RISK Assessment as part of the ISO 27001 Implementation.   Steps: Identify assets Identify threats Identify vulnerabilities Determine likelihood and impact Determine risk levels Select risk treatment options   Four approaches you can take when addressing a risk Tolerate the risk Treat the risk by applying controls Terminate the risk by avoiding it entirely Transfer the risk   2023-05-0317 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 34 ISO 27001 Gap AnalysisWelcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Episode 34 ISO 27001 Gap Analysis   In the podcast I will be discussing the steps to conduct a ISMS Gap Analysis.   Identify the scope: Obtain a copy of the ISO 27001 standard: Conduct a baseline assessment: Compare against the standard: Identify gaps and prioritize them: Develop an action plan:   Enjoy! You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0...2023-03-2011 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 33 Defining your ISO 27001 ISMS ScopeWelcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Defining your ISO 27001 ISMS Scope   The boundaries of the information security management system (ISMS) The Scope should be defined to ensure that all critical assets and processes are covered. The organization's legal, regulatory, and contractual requirements. The organization's processes, such as data processing, storage, and transmission. The organization's people, such as employees, contractors, and third-party vendors.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    2023-03-0611 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 32 Changes to ISO/IEC 27001(2022)Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Changes to ISO/IEC 27001(2022)   What are the ISO 27001 and 27002 standards What is the difference between ISO 27001 and 27002?  Annex A controls Certified to ISO 27001:2013, now what? Can I already become certified to ISO 27001:2022? Will the changes affect my current ISO/IEC 27001 certificate?   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your d...2023-02-1211 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 31 Cyber Security vs Physical SecurityWelcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Cyber Security vs Physical Security   Cyber Security  Physical Security Differences between Cyber and Physical Security Physical security components Physical security measures Threats     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.      GET NORD...2022-09-0611 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 30 Cyber ForensicsWelcome to the Cyber Security Happy Hour Podcast.     Host: Christie  Topic: Cyber Forensics What is Computer Forensics?  Examples of Cyber Forensics?  Forensics Procedures Types of computer forensics  Skills and Knowledge required to  become a Cyber Forensics Examiner. Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     ...2022-05-2618 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 29 With Arijit Biswas Chief Technical Officer speaks about Cyber Security at Diamanté BlockchainWelcome to the Cyber Security Happy Hour Podcast.    Host: Christie Ogubere Guest: Arijit Biswas Topic: The Cyber Security Eco System at Diamante Blockchain 
I am your host Christie and on this podcast I am joined by the Technical Officer at Diamante Blockchain Arijit Biswas. Diamanté Blockchain
The blockchain network process. 
Cyber Security of Diamante Blockchain technology. 
The layers of transactional security.   Diamante Blockchain: https://diamanteblockchain.com/       Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to...2022-01-1123 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 28 Log4J VulnerabilitiesWelcome to Episode 28 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 28 is Log4J Vulnerabilities   What is Log4J? How does Log4j Work? Systems Affected CVSS  Patching and Updates   Enjoy #log4j #log4shell #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   2022-01-0411 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 27 Why you need Cyber InsuranceWelcome to Episode 27 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 27 Why you need Cyber Insurance.   What is Cyber Risk Insurance? How are you affected by Cyber Attack? Various types of Cyber Insurance Policy Top 5 Tips to become Cyber Secure       Enjoy #Insurance #Cyberinsurance #Data Breach #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intex...2021-12-0711 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 26 Robinhood‘s Data Breach - Cyber AttackWelcome to Episode 26  of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 25 Robinhood's Data Breach - Cyber Attack   Robinhood who are they? What is a data breach?  What happened? Effects of a Data Breach Prevention methods  Remediation  Enjoy #Robinhood #Data Breach #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intext...2021-11-0914 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 25 Four Lessons Learnt from Squid Game that applies to Cyber Security  Welcome to Episode 24: Host: Christie   Four Lessons Learnt from Squid Game that applies to Cyber Security   Lesson 1: Vulnerability Lesson 2: Team Work Lesson 3: Internal Threats Lesson 4: The Unknown   Enjoy   #squidgame #cyberthreats #cybersecurity     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: int...2021-10-2609 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 23 So you want to be a Bug Bounty Hunter?Welcome to Episode 23 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is; So you want to be a Bug Bounty Hunter?   What is a Bug Bounty Hunter? What are Bug Bounty Programs? Advantages Disadvantages Bug Bounty Websites HackerOne https://hackerone.com/security GitHub https://bounty.github.com/ BugCrowd https://bugcrowd.com/   Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ ...2021-10-1113 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastCyber Security TopicsHello and thank you for listening to the Cyber Security Happy Hour Podcast. Let me know if there are Cyber Security topics you would like to me to discuss. You can leave a comment. Look forward to hearing from you. 2021-09-2001 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 22 Biometrics in Cyber SecurityWelcome to Episode 22 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Biometrics in Cyber Security   What is Biometrics?  What is Biometric security?  How Biometric Security Works  Types of Biometrics Advantages and Disadvantages of Biometrics Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to...2021-05-0518 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 21 DDoS (Distributed Denial of Service) AttacksWelcome to Episode 21 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today's podcast DDoS Attacks   What are DdoS Attacks(Distributed Denial of Service) Botnets Some instances of DdoS attacks Mitigation and Prevention Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in tra...2021-04-1318 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 20 The Insider ThreatWelcome to Episode 20 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today's podcast The Insider Threat.    What is an Insider Threat? What were the consequences? Preventative Measures How to Minimise the Risk Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in trans...2021-03-1616 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 19 Public Wi-Fi Security  Welcome to Episode 19 of the Cyber Security Happy Podcast,  The podcast host is Christie - Cyber Security Consultant.   Security of Public Wi-Fi Differences between a private and a public Wi-Fi Security Attacks Guidance and Solutions to Attacks   Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget...2021-03-0215 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 18 RansomwareWelcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 18 of the Cyber Security Happy Podcast  I am your host Christie  This  topic of today podcast is Ransomware.    What is ransomware?  How do I get ransomware? How does ransomware spread? How to defend against ransomware? Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast...2021-02-1616 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 17 Data BreachesWelcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 17 of the Cyber Security Happy Podcast. I am your host Christie. The topic of today podcast is Data Breaches. What are Data Breaches Causes of Data Breaches What to do if you data has been leaked Incident Response Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Do you want Cyber Security Training click on the links below: https://intextraining.co.uk   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not for...2021-01-2715 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 16 - 5 Safety Tips For Shopping OnlineWelcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 16 of the Cyber Security Happy Podcast  I am your host Christie and Happy New Year to you.  This is our first podcast for 2021 the topic of today podcast is 5 Safety tips for shopping online.  Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Do you want free Cyber Security Training click on the links below: https://www.cybr...2021-01-1212 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 15 Top 10 Cyber Security Risks of 2020Welcome to the Cyber Security Happy Hour Podcast.    In this episode 15, in this episode I talk about the top ten Cyber Risk of 2020.   1.SME 2. Compromising Email 3.Phishing 4.Password and 6 more... Enjoy   I wish all our listeners a Happy Christmas and a prosperous New Year!!!     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/       Do you wa...2020-12-2215 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 14 Cyber Essentials Certification OverviewWelcome to the Cyber Security Happy Hour Podcast.  In this episode, I give an overview of the Cyber Essentials Certification.   What is Cyber Essentials? How do Organisation get Certified What the main technical controls Who Assesses the questionnaire?   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Enjoy   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos...2020-12-0108 minCyber Security Happy HourCyber Security Happy HourEpisode 13 SpywareWelcome to the Cyber Security Happy Hour Podcast.  In this episode, I talk about Spyware. What is Spyware?How does Spyware workThe different type of SpywarePreventing SpywareEnjoy Do you want free Cyber Security Training click on the links below:https://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU...2020-11-0316 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 13 SpywareWelcome to the Cyber Security Happy Hour Podcast.  In this episode, I talk about Spyware.   What is Spyware? How does Spyware work The different type of Spyware Preventing Spyware Enjoy   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using ou...2020-11-0316 minCyber Security Happy HourCyber Security Happy HourEpisode 12 Risk and Countermeasures of IOT DevicesIn this episode, I identify various IOT Devices, their risk in the home and workplace and countermeasuresEnjoy. Cyber Security Certification Traininghttps://intextraining.co.uk  Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month freeYou can follow us on Instagram https://www.instagram.com/cybersechap...2020-10-2050 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 12 Risk and Countermeasures of IOT DevicesIn this episode, I identify various IOT Devices, their risk in the home and workplace and countermeasures Enjoy.   Cyber Security Certification Training https://intextraining.co.uk     Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&ur...2020-10-2050 minCyber Security Happy HourCyber Security Happy HourEpisode 11 Cyber Attack Threat - The Malicious InsiderIn this episode, I examine the Risk of The Malicious Insider. What the top concerns for organizations.What is a Malicious Insider?How do you identify Insider Threat? CountermeasuresEnjoy. Do you want free Cyber Security Training click on the links below:https://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE TH...2020-09-2924 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 11 Cyber Attack Threat - The Malicious InsiderIn this episode, I examine the Risk of The Malicious Insider. What the top concerns for organizations. What is a Malicious Insider? How do you identify Insider Threat?  Countermeasures Enjoy.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our a...2020-09-2924 minCyber Security Happy HourCyber Security Happy HourEpisode 10 Cyber Risk Management ProcessIn this episode, I examine the Cyber Risk Management process. I explain the steps using the NIST Cyber Risk Management Framework and how this can be implemented within an organisation. Why Cyber Risk Management is Important NIST Cyber Risk ManagementIdentifyProtectDetectRespondRecoverEnjoy. Do you want free Cyber Security Training click on the links below:https://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer...2020-09-1517 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 10 Cyber Risk Management ProcessIn this episode, I examine the Cyber Risk Management process. I explain the steps using the NIST Cyber Risk Management Framework and how this can be implemented within an organisation.   Why Cyber Risk Management is Important  NIST Cyber Risk Management Identify Protect Detect Respond Recover Enjoy.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber...2020-09-1517 minCyber Security Happy HourCyber Security Happy HourEpisode 9 Cyber Security and PrivacyWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.   The Podcast topic for today is - Cyber Security and Privacy This episode is all about your Privacy and how Cyber Security can be used to secure your privacy.How organisations are supposed to protect your privacyData protection and Privacy The difference between privacy and securityWhat can you do to protect your own privacy especially on social media Enjoy.Do you want free Cyber Security Training click on the links below:https://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cy...2020-09-0119 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 9 Cyber Security and PrivacyWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - Cyber Security and Privacy   This episode is all about your Privacy and how Cyber Security can be used to secure your privacy. How organisations are supposed to protect your privacy Data protection and Privacy  The difference between privacy and security What can you do to protect your own privacy especially on social media   Enjoy. Do you want free Cyber Security Training click on the link...2020-09-0119 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 8 How Artificial Intelligence can be used in Cyber SecurityWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - How Artificial Intelligence can be used in Cyber Security   In this episode, I talk about AI, what exactly is AI and the different types.  How AI can be used in Cyber Security and examples of some platforms that AI is used in Cyber Security.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Pen...2020-08-1822 minCyber Security Happy HourCyber Security Happy HourEpisode 8 How Artificial Intelligence can be used in Cyber SecurityWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.   The Podcast topic for today is - How Artificial Intelligence can be used in Cyber Security In this episode, I talk about AI, what exactly is AI and the different types.  How AI can be used in Cyber Security and examples of some platforms that AI is used in Cyber Security. Do you want free Cyber Security Training click on the links below:https://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw This is Cyber  and Information Security Podcast - do not forge...2020-08-1822 minCyber Security Happy HourCyber Security Happy HourEpisode 7 How to get into Cyber SecurityWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.   The Podcast topic for today is - How to get into Cyber Security In this episode, I talk about the various roles within Cyber Security, Degrees, Cyber Security Certifications and how to get that Cyber Security Job.  Free Cyber Security Traininghttps://www.cybrary.it/ Free Penetration Testing Videoshttps://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c...2020-08-0417 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 7 How to get into Cyber SecurityWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - How to get into Cyber Security   In this episode, I talk about the various roles within Cyber Security, Degrees, Cyber Security Certifications and how to get that Cyber Security Job.     Free Cyber Security Training https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw         ...2020-08-0417 minCyber Security Happy HourCyber Security Happy HourEpisode 6 WhatsApp EncryptionWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.  The Podcast topic for today is WhatsApp Encryption.End-to-end encryption prevents cyber-criminals and governments from accessing the messages that has been sent to other WhatsApp users.  Topics covered within this podcast include understanding how end-to-end encryption works and past vulnerabilities of WhatsApp.This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.  GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: in...2020-07-1417 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 6 WhatsApp EncryptionWelcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.  The Podcast topic for today is WhatsApp Encryption. End-to-end encryption prevents cyber-criminals and governments from accessing the messages that has been sent to other WhatsApp users.  Topics covered within this podcast include understanding how end-to-end encryption works and past vulnerabilities of WhatsApp. This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id...2020-07-1417 minCyber Security Happy HourCyber Security Happy HourEpisode 5 Protecting your Mobile Devices and have more PrivacyEpisode 5  The Podcast topic for today is Protecting your mobile devices and have more Privacy. Podcast Host Christie Ogubere. Mobile phones are used for a variety of task.  This include browsing the internet, banking and emails. There are many dangers and if your mobile phone is not adequately protected that means unauthorised person can get access to your phone and data. I mention a few steps on how to recognise these dangers and simple steps to protect your mobile phone. This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn...2020-06-3018 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 5 Protecting your Mobile Devices and have more PrivacyEpisode 5    The Podcast topic for today is Protecting your mobile devices and have more Privacy. Podcast Host Christie Ogubere.   Mobile phones are used for a variety of task.  This include browsing the internet, banking and emails. There are many dangers and if your mobile phone is not adequately protected that means unauthorised person can get access to your phone and data.  I mention a few steps on how to recognise these dangers and simple steps to protect your mobile phone.   This is Cyber Security p...2020-06-3018 minCyber Security Happy HourCyber Security Happy HourEpisode 4 Impact from Covid-19 on Cyber Security JobsThis episode covers an important topic - the impact on Cyber Security Jobs as a result of Covid-19.  I talk about how COVID-19 has caused the virtual shutdown of major industries, the loss of millions of jobs, and the highest unemployment rate in the U.K and the rest of the world since the Great Depression.  The pandemic has made some companies to cut back on plans to hire new cyber-security and the technology industry as a whole are doing better than the general economy. The future of cyber security jobs and the increase in remote work. This is Cyber Security...2020-06-1117 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 4 Impact from Covid-19 on Cyber Security JobsThis episode covers an important topic - the impact on Cyber Security Jobs as a result of Covid-19.   I talk about how COVID-19 has caused the virtual shutdown of major industries, the loss of millions of jobs, and the highest unemployment rate in the U.K and the rest of the world since the Great Depression.   The pandemic has made some companies to cut back on plans to hire new cyber-security and the technology industry as a whole are doing better than the general economy.  The future of cyber security jobs and the increas...2020-06-1117 minCyber Security Happy HourCyber Security Happy HourEpisode 3 Recovering from Phishing AttackWelcome to Episode 3 of the Cyber Security Happy Hour. I will talking about Phishing attacks, how to recognise what an attack looks like. Furthermore, how to protect your confidential information and recover from a Phishing attack.I would like to to hear  your comments.You can also follow us on instagram @cybersechappy.On Facebook Cyber Security Happy Hour Podcast.2020-05-2717 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 3 Recovering from Phishing AttackWelcome to Episode 3 of the Cyber Security Happy Hour.   I will talking about Phishing attacks, how to recognise what an attack looks like.  Furthermore, how to protect your confidential information and recover from a Phishing attack. I would like to to hear  your comments. You can also follow us on instagram @cybersechappy. On Facebook Cyber Security Happy Hour Podcast.   2020-05-2717 minCyber Security Happy HourCyber Security Happy HourEpisode 1 Secure PasswordIn this episode I will giving insights on secure passwords. The  different types of authentication methods and how to create secure passwords.  How Cyber criminals capture and reuse passwords2020-05-0713 minCyber Security Happy Hour PodcastCyber Security Happy Hour PodcastEpisode 1 Secure PasswordIn this episode I will giving insights on secure passwords.  The  different types of authentication methods and how to create secure passwords.  How Cyber criminals capture and reuse passwords 2020-05-0713 min