As cyber threats continue to get more sophisticated around the globe, Senior Managing Director and Head of Cyber Security for the Americas at FTI Consulting, Ms. Jordan Rae Kelly appears on Episode #122 of TF7 Radio to talk about what the U.S. needs to do to secure critical infrastructure and protect our citizens privacy. Ms. Kelly also spoke about election security, what she learned from her experiences with the 2016 elections, and what we need to do to make sure the 2020 elections are...
CNBC Cyber Security Reporter Kate Fazzini appears on Episode #121 of Task Force 7 Radio to break down what actually went down with the mobile app used at the recent Iowa DNC Caucus, review the recent Senate Report on Election Security, and unpack what actually happened in the Jeff Bezos cell phone hack. All this and much, much more on Episode #121 of Task Force 7 Radio.
With our special guest, Dr. Magda Chelly, we are going to define the problem with attracting women into the Cyber Security space and discuss what we need to do moving forward to solve this problem which is driving the Cyber Security Talent Crisis across the globe.
Author and National Security Expert Tyler Cohen Wood appears on Episode #120 of Task Force 7 Radio to talk about her efforts in getting more women into STEM related jobs and getting girls interested in STEM careers early on in their lives. Tyler also spoke about why she thinks people are still falling for phishing scams, what are some of the biggest Cyber Security challenges businesses are facing today, and what people can do to enhance their own personal cyber security at home.
In the first segment of the show, Host George Rettas provides analysis on last week's announcement by the FBI recommending that all Americans reboot their office and home routers to mitigate a nation state threat from the Russian Government.
Max Deighton, the North America Lead for Context and Henry Prince, Senior Security Consultant for Context both join Episode #119 of Task Force 7 Radio to talk about the importance and value of conducting Red Team exercises. The duo unpacks what red teaming really means, what are the rules of engagement when bringing an adversarial mindset to a problem, and how open source intelligence can be used to conduct successful exercises.
Dr. George Antoniou, Associate Professor of Cyber Security Management at Lynn University joins Episode #118 of Task Force 7 Radio to talk about what the next generation CISO looks like. Dr. Antoniou unpacks the changing role of the CISO, what the CISO position might look like in 20 years, and what is driving all the recent changes to the position.
Partner and Shareholder of Greenberg Traurig, Paul Ferrillo joins Episode #117 of Task Force 7 Radio to talk about what Board Members should be asking their CISO's, how they should prepare themselves for these discussions, and how often and for how long should these briefings last.
The CEO and Co-Founder of Verodin, Chris Key appears on Episode #116 of Task Force 7 Radio to about the use of instrumentation, the quantification of Cyber Risk in financial terms, and why organization's investment in technology controls are only performing at 25%.
The Chief Executive Officer, Josh Lefkowitz and Chief Strategy Officer, Chris Camacho of Flashpoint join Episode #115 of Task Force 7 Radio to recap some of the most talked about Cyber Security Topics of 2019. From Ransomeware, to the Insider Threat, to Cyber Security Fusion Center models, the duo unpacks the most interesting topics of the year.
Many people in the Cyber Security profession aspire to be the Chief Information Security Executive of their organization some day. Listen to the Chief Information Security Officer of Ciena, Andy Bonillo describe his journey from humble beginnings to becoming a CISO on Episode #114 of Task Force 7 Radio.
Application Security expert Samir Sherif joins Episode #113 of Task Force 7 Radio to talk about the importance of Application Security and role quality Development Security Operations plays in the National Security of the United States.
The Chairman and Chief Executive Officer of BlackOps Partners Corporation, Casey Fleming appears on this week's episode of Task Force 7 Radio to talk about China, what kind of threat they pose to the United States, and their competitive economic strategy of "they must live, we must die" as a world power.
Is China an enemy or a competitor to the United States? Former Director of the NSA and the former Commander of U.S. Cyber Command, Admiral Michael Rogers weighs in on this topic and much more on Episode #111 of TF7 Radio!
Frank Kim, CEO of ThinkSec, taps into his experience as a CISO Advisory Consultant to talk about how CISO's measure the success of their programs and how security leaders communicate their posture to Boards and Executive Leadership Committees. He also talks about how CISO's build their business cases to reflect their cyber security strategies.
Former NSA TAO Officer, and the Chief of Outreach at the Army Cyber Institute at West Point, Dr. Michael Klipstein appears on this week's episode of Task Force 7 Radio to discuss why Information Operations are so easy to conduct by Nation States and how they have become so dangerous to the National Security of the United States.
CNBC Cyber Security Reporter Kate Fazzini speaks with TF7 Radio Host George Rettas about this year's annual financial sector war games, what type of attacks the financial sector drilled on, and what was different about this year's Quantum Dawn exercise than in previous years.
The Managing Director of the Digital Security and Risk Search Practice at Quantum Search Partners, Mr. Stephen Spagnuolo appears on Episode #108 of Task Force 7 Radio to give you the inside scoop on what is really going on with the Cyber Security job market.
Former FBI Agent and current Chief Information Security Officer of Cyxtera, Leo Taddeo appears on Episode #107 of Task Force 7 Radio to talk about how the Cyber Threat has changed over the years, why it's getting harder for enterprises to manage Cyber Risks, and why organizations can't depend on the government to protect them from Cyber Threats.