CISO Dojo Podcast-logo

CISO Dojo Podcast

News & Politics Podcasts

The CISO Dojo podcast looks at various security leader topics and guests discuss their paths in information security that lead them to where they are at today.

The CISO Dojo podcast looks at various security leader topics and guests discuss their paths in information security that lead them to where they are at today.

Location:

United States

Description:

The CISO Dojo podcast looks at various security leader topics and guests discuss their paths in information security that lead them to where they are at today.

Twitter:

@cisodojo

Language:

English

Contact:

4057720224


Episodes

Meet Jerich Beason Chief Information SVP and Security Officer for Epiq

9/20/2021
Jerich Beason is a cyber security hobbyist turned professional who holds Bachelors and Masters degrees in Cyber Security. He has served in progressive roles at some of the most respected companies within the cyber security industry including Lockheed Martin, RSA and Deloitte where he was a trusted advisor to executives within the federal government and fortune 500 organizations. Jerich advised these companies on cyber security strategy, architecture and program development. In his most role...

Duration:00:38:42

Meet AJ Yawn CEO and Co Founder of Bytechek

9/13/2021
AJ Yawn joins us for this episode of the CISO Dojo Podcast. AJ Yawn is a seasoned cloud security professional that possesses over a decade of senior information security experience with extensive experience managing a wide range of cybersecurity compliance assessments (SOC 2, ISO 27001, HIPAA, etc.) for a variety of SaaS, IaaS, and PaaS providers. AJ advises startups on cloud security and serves on the Board of Directors of the ISC2 Miami chapter as the Education Chair, he is also a...

Duration:00:50:55

Risk Appetite Statements

9/10/2021
In this episode Joe Sullivan and Stacy Dunn discuss approaches for developing a risk appetite statement and how to implement security based on the stated risk appetite.

Duration:00:25:55

Fraudulent Job Applicants

8/31/2021
What's the strangest thing you've encountered with a new hire? In this episode we talk about the time an evil twin with no experience managed to get an IT position and how scammers with no experience are landing multiple work from home tech jobs just to collect a paycheck until they get terminated. The rabbit hole goes even deeper with fake sites being set up as past employers and answering services attempting to make them look legitimate. We also talk about how to combat these attempts...

Duration:00:31:40

Who's Responsible for Breaches Anyways?

8/18/2021
In this episode Joe Sullivan and Stacy Dunn talk about who should be held responsible for breaches and what needs to be done to reduce consecutive breaches in an organization.

Duration:00:35:53

Can I look at your iPhone Pictures?

8/11/2021
There's a been a lot of discussion around Apple scanning for CSAM images. Joe Sullivan and Stacy Dunn talk about the pros and cons of this and how it affects privacy of iPhone users.

Duration:00:41:08

Dealing with Burn Out and GPEN Versus OSCP

7/25/2021
In this episode I talk about an approach to deal with burn out on your team. This is based on a study located here. I also look at the GPEN versus the OSCP certification in this episode.

Duration:00:09:51

Meet Paul Tucker CISO of Bank of Oklahoma

7/12/2021
Paul Tucker CISO of Bank of Oklahoma joins us for this episode of the CISO Dojo Podcast. Paul Tucker is Senior Vice President and Chief Information Security and Privacy Officer at BOK Financial. In this role Tucker leads the cybersecurity team responsible for the banks efforts to protect information important to the banks operation, while ensuring the overall cyber resiliency and privacy of the bank.

Duration:00:43:13

Cloud Security, Casinos, Supply Chain Attacks, INFOSEC Bikini, and Haters of Pants

7/7/2021
Joe Sullivan and Stacy Dunn wrap up the the third part of their cloud security series. The episode extends into current events with casino ransomware attacks, supply chain attacks, and why casinos should not be getting breached. We also talk about Social Media happenings like INFOSEC Bikini, the negative element on Twitter, and haters of pants.

Duration:00:43:29

Attack Surface Management & Threat Intelligence with Alex Tarter

6/28/2021
Alex Tarter joins us on the podcast to discuss attack surface management and threat intelligence. Alex is one of the founding members of TurgenSec which has recently had an interesting string of responsible disclosures related to: Check out Alex at: www.turgensec.comsecurity@turgensec.com

Duration:01:00:02

Stacy Dunn on Diversity, Equity, and Inclusivity | Part 3

6/14/2021
Part 3: Action items and actionable information; Give insights into how to support marginalized people and adopt better hiring practices. Sources: https://www.thisishowyoucan.com/post/__wheel_of_power_and_privilege https://www.forumone.com/ideas/why-and-how-to-prioritize-dei-at-your-organization/ http://greenlining.org/wp-content/uploads/2018/03/DEI-Framework.pdf ...

Duration:00:17:24

Meet CISO Chad Kliewer

6/7/2021
Chad Kliewer, CISO of Pioneer Telephone shares his journey in information security where he overcame nearly insurmountable challenges. Chad has faced broad use of credential sharing, placing the mouse on the monitor, because this is how it's supposed to work right? Chad has survived Sox audits and even the SolarWinds attack. There's so much to learn from this episode from a CISO and information security perspective! Connect with Chad on Twitter @ChadKliewer

Duration:01:03:12

CISO Dojo Ransomware Special Edition

6/4/2021
The White House just release a special document to the private sector about responsibility and steps to prevent ransomware. Quoting directly from the document: Companies that view ransomware as a threat to their core business operations rather than a simple risk of data theft will react and recover more effectively. The document goes on to talk about best practices such as: These are all basic activities organization need to start implementing now. The ransomware threat is escalating,...

Duration:00:15:52

Stacy Dunn on Diversity, Equity, and Inclusivity | Part 2

5/31/2021
Part of being an effective security leader is understanding and including people from all types of backgrounds. Usually, it’s talk tech, security, and strategy, but for these episodes, it’s time to discuss the 8th layer and how acceptance is not just 1’s and 0’s. In this short solo three-parter, Stacy will take you through the who, what, when, and why of Diversity, Equity, and Inclusivity. (DEI) Sources for Part 2: https://www.hrc.org/resources/hate-crimes-timeline ...

Duration:00:20:48

Stacy Dunn on Diversity, Equity, and Inclusivity | Part 1

5/24/2021
In this episode Stacy Dunn talks about Diversity, Equity, and Inclusivity and how we can get better at improving the culture of the information security workplaces and community. Part of being an effective security leader is understanding and including people from all types of backgrounds. Usually, it’s talk tech, security, and strategy, but for these episodes, it’s time to discuss the 8th layer and how acceptance is not just 1’s and 0’s. In this short solo three-parter, Stacy will take you...

Duration:00:23:42

Hiring Pen Testers, Hacking Holidays, and Hand Grenades

5/17/2021
Chris Elgee is a senior security analyst and Core NetWars Tournament design lead for Counter Hack, and commander of the Army National Guard's 126th Cyber Protection Battalion. At Counter Hack, Chris is responsible for the design and implementation of NetWars challenges and has created some of the player-favorite challenges throughout NetWars and the Holiday Hack Challenge. Chris also teaches SEC560 for the SANS Institute. Read more about Chris Elgee at:...

Duration:00:36:36

From Reverse Engineering Malware to CISO

5/10/2021
Lenny is the CISO at Axonius, which is a cybersecurity tech company. Lenny has also helped build anti-malware software at an innovative startup and oversaw security services at a Fortune 500 technology company. He has also lead the consulting practice at a leading cloud services provider. Lenny is also a Fellow Instructor at SANS and is the primary author of FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques. Lennny maintains a popular malware analysis tool kit...

Duration:00:50:37

Cloud Security Part 2

5/3/2021
In this episode we discuss concerns with security in the cloud that organizations need to be aware of. Moving to the cloud doesn't automatically mean it's more secure. We'll take a look at the CIS Controls and how you can implement them in a cloud environment to better secure your networks and data. The topics discussed in this episode are:

Duration:00:37:06

Cloud Security

4/27/2021
In this episode we discuss concerns with security in the cloud that organizations need to be aware of. Moving to the cloud doesn't automatically mean it's more secure. We'll take a look at the CIS Controls and how you can implement them in a cloud environment to better secure your networks and data.

Duration:00:33:06

Cyberstalking

4/20/2021
Stalking- What is it, exactly? And, more importantly, what do you do if it happens to you? What are the steps you can take and how can you understand ways to better protect yourself? What are the avenues for reporting stalking? How has technology impacted stalking and what can we do, as a society, to keep these behaviors from perpetuating? National...

Duration:00:39:59