Look for any podcast host, guest or anyone
Showing episodes and shows of

Jerod Brennen

Shows

The Bid Picture with Bidemi OlogundeThe Bid Picture with Bidemi Ologunde396. Jerod Brennen.Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Jerod Brennen, an Executive Advisor, Cybersecurity Career Coach, and vCISO at SideChannel. The conversation touched on a wide variety of cybersecurity concepts including the role and use of storytelling as a security tool; the 2025 cyber threat landscape; AI as a friend or enemy; data privacy gray zones, and lots more.Support the show2025-07-031h 20KitecastKitecastJerod Brennen: From Music Educator to Cybersecurity Consultant and MentorJerod Brennen, VP of Cybersecurity Services at SideChannel, brings a unique perspective to cybersecurity leadership. Originally pursuing a career in music education, Brennen's journey led him through various IT roles before landing in cybersecurity at a public utility. Today, he serves as a vCISO for multiple organizations while also creating educational content for LinkedIn Learning, where he has developed over 40 courses covering topics from application security to ethics in technology. His unconventional path from music to technology has shaped his approach to security leadership, emphasizing the importance of both technical expertise and human understanding.As a vCISO...2024-11-0453 minBrakeSec Education PodcastBrakeSec Education PodcastSPECIAL INTERVIEW: John Aron and Jerod Brennen BrakeSec Show Outline (all links valid as of 27 Jan 2023, subject to change)   Is it scheduled?  Yes || No|| Completed   Date:  2023/01/26   Guest info Name and Title: John Aron, Founder/CEO of Aronetics Email: john@aronetics.com Time Zone (if other than Pacific): Eastern Standard   Guest info Name and Title: Jerod Brennen Email: jerod@brennenconsulting.com Time Zone (if other than Pacific): 2023-02-101h 21Identity at the CenterIdentity at the Center#193 - Recapping 2022 and Predicting 2023 with Jerod BrennenJim and Jeff sit with Jerod Brennen, Principal Consultant and vCISO with SideChannel, to discuss IAM themes for 2022 and predict the 2023 IAM breakout stars for the identity space. Connect with Jerod: https://www.linkedin.com/in/jerodbrennen/ Jerod's LinkedIn Learning: https://www.linkedin.com/learning/instructors/jerod-brennen Jerod’s Cybersecurity Talks (YouTube) - https://www.youtube.com/playlist?list=PLI0hoXtO7SA5Lq0rHrsT02SXWulm2Dal- Decentralized Identity Foundation - https://identity.foundation/ North America Gartner IAM Summit: https://www.gartner.com/en/conferences/na/identity-access-management-us Identiverse: ht...2022-12-191h 17Tech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Putting ethics into practiceThe beauty of ethics is that they're still in play, even if no one else is looking. Explore some scenarios where your own personal cybersecurity ethics are likely to be challenged, as well as how to prepare yourself for when the time comes. LinkedIn Learning.2022-11-3002 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Organizational ethicsWhen you lead as an individual contributor or you lead from the C-suite, every cybersecurity professional has a role to play in influencing the ethics of their organization. Learn tips and techniques you can apply to be a positive influence on your organization's culture. LinkedIn Learning.2022-11-2303 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Certifications and codes of ethicsA number of organizations have come to the foreground in the cybersecurity industry, offering training and certifications that include codes of ethics. Learn about some of those certifications, the codes that the certification bodies have built into their certifications, and the impact that these certifications can have on an individual's career. LinkedIn Learning.2022-11-1603 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Global impactCybersecurity ethics have been at the heart of some well-known news stories of events that have impacted global politics. Explore a few of these stories and some questions you could use to turn these stories into teaching opportunities for your teams. LinkedIn Learning.2022-11-0903 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: HacktivismThe ethics of cybersecurity aren't restricted to the workplace, and there have been multiple examples of regular citizens engaging in hacking for causes they believe in. Learn about the practice of hacktivism and the role that cybersecurity professionals play in the practice. LinkedIn Learning.2022-11-0202 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Hacking backAs cybercriminals have become more sophisticated and more brazen, the debate on whether or not organizations should hack back has become a more popular consideration. Learn about the ethics and risks of engaging in this practice. LinkedIn Learning.2022-10-2603 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Responsible disclosureSecurity researchers and bug bounty hunters often feel compelled to share their findings publicly in order to ensure that organizations take action to address exploitable vulnerabilities. Learn how to responsibly disclose findings in a way that minimizes negative outcomes while maximizing positive outcomes. LinkedIn Learning.2022-10-1903 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Third-party engagementsMany cybersecurity professionals act as third-party contractors or consultants, and these relationships come with their own considerations. Learn about some of the documentation that comes with these relationships, as well as recommendations for handling both the sensitive information and the sensitive scenarios that you're likely to encounter. LinkedIn Learning.2022-10-1202 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Handling sensitive informationCybersecurity professionals often gain access to sensitive information ranging from intellectual property to private personal information. Learn best practices for managing that access with discretion. LinkedIn Learning.2022-10-0502 minTech on the Go: Ethics in CybersecurityTech on the Go: Ethics in CybersecurityTech on the Go: Morals, ethics, and lawsLearn the distinct meanings of morals, ethics, and laws and find out industry-specific examples of each. Understanding the relationship among these concepts is crucial for practicing cybersecurity professionals. LinkedIn Learning.2022-09-2702 minIdentity at the CenterIdentity at the CenterIdentity at the Center #60 - Identity Centric Security with Jerrod BrennenJim and Jeff talk with Jerod Brennen, Music Teacher and IAM Renaissance Man, about his IAM journey, Identity Centric Security, and some of the IAM education sessions that he has developed. Show Links: Connect with Jerod on LinkedIn here: https://www.linkedin.com/in/slandail/ LinkedIn Learning: https://www.linkedin.com/learning/instructors/jerod-brennen Webinar - Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls: https://www.brighttalk.com/webcast/18458/430843 Jerod's YouTube playlist: https://www.youtube.com/playlist?list=PLI0hoXtO7SA5Lq0rHrsT02SXWulm2Dal-       Adrian Crenshaw (IronGeek): https://twitter.com/irongeek_adc       Identity D...2020-09-0745 minIdentity at the CenterIdentity at the CenterIdentity at the Center #59 - Optimizing Security & Convenience with Frank VillavicencioJim and Jeff talk with Frank Villavicencio, Head of Product for Shared Services at ADP, about the IAM user experience and how to optimize security and convenience. Connect with Frank on LinkedIn here: https://www.linkedin.com/in/fvillavicencio/ IDSA Webinar - Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls with Jerod Brennen of SailPoint: https://www.idsalliance.org/webinar-hacking-identity-the-good-bad-and-ugly-of-identity-centric-security-controls/ Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at...2020-08-3159 min