Cyber Security Interviews-logo

Cyber Security Interviews

Technology Podcasts >

More Information

Location:

United States

Twitter:

@CSI_Podcast

Language:

English


Episodes

054 – Brian Vecci: Understanding the Value of What We Have

6/20/2018
More
Brian Vecci is the Technical Evangelist at Varonis where he supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial… The post 054 – Brian Vecci: Understanding the Value of What We Have appeared first on Cyber Security Interviews.

Duration:00:45:29

053 – Cameron Williams: Make Your Day Easier

5/14/2018
More
Cameron Williams is the Founder and CTO of OverWatchID. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such as IBM, Boeing, Sony, BP, Chase and Washington Mutual. He has designed and built a multitude… The post 053 – Cameron Williams: Make Your Day Easier appeared first on Cyber Security Interviews.

Duration:00:42:56

052 – Jeremiah Grossman: The Cavalry Is Not Coming

4/30/2018
More
Jeremiah Grossman is the CEO of Bit Discovery. Jeremiah’s career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as “the embodiment of converged IT and physical security.” In 2001, Jeremiah… The post 052 – Jeremiah Grossman: The Cavalry Is Not Coming appeared first on Cyber Security Interviews.

Duration:00:33:36

051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

4/24/2018
More
Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s… The post 051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult appeared first on Cyber Security...

Duration:00:52:14

050 – Chris Roberts: Make New Mistakes

4/9/2018
More
Chris Roberts is the Chief Security Architect at Acalvio and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security… The post 050 – Chris Roberts: Make New Mistakes appeared first on Cyber Security Interviews.

Duration:00:46:57

049 – Keith McCammon: We Have An Analysis Problem

4/2/2018
More
Keith McCammon is the Chief Security Officer and Co-founder of Red Canary in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in their customers’ environments. Keith is a known expert in offensive cyber computing and defensive IT security… The post 049 – Keith McCammon: We Have An Analysis Problem appeared first on Cyber Security Interviews.

Duration:00:48:03

048 – Tom Brennan: Engage the Community In a Positive Way

3/26/2018
More
Tom Brennan is the Founder of Proactive Risk with two decades of hands on the keyboard experience building, breaking and defending data for clients worldwide. He is a an alumni of McAfee, Intel Security, SafeCode, Trustwave, WhiteHat, ADP, Datek Online, and the United States Marines. Tom served the OWASP Foundation as an elected member of… The post 048 – Tom Brennan: Engage the Community In a Positive Way appeared first on Cyber Security Interviews.

Duration:00:40:52

047 – Cody Cornell: Allow People to Focus on Interesting Things

3/19/2018
More
Cody Cornell is the Founder and CEO of Swimlane. Cody is responsible for the strategic direction of Swimlane and the development of it’s security operations management platform. Collaborating with industry leading technology vendors, he works to identify opportunities to streamline and automate security activities saving customer operations costs and reducing risk. In 2011, Cody co-founded… The post 047 – Cody Cornell: Allow People to Focus on Interesting Things appeared first on Cyber...

Duration:00:30:22

046 – Bret Fund: Trying To Solve the Talent Gap Problem

3/5/2018
More
Bret Fund is the CEO of SecureSet. As a founder of the business in 2014, he has led the growth of the organization from startup to multiple programs and campuses. He oversees the growth, strategy and financial operations for the company. As a former professor, Bret has a great passion for and a strong executional… The post 046 – Bret Fund: Trying To Solve the Talent Gap Problem appeared first on Cyber Security Interviews.

Duration:00:39:40

045 – Kristinn Gudjonsson: You Don’t Want Analysts Spending All Their Time Extracting Data

2/26/2018
More
Kristinn Gudjonsson is a manager with the Detection & Response team at Google, where he has been for the last 6 1/2 years. Kristinn joined Google in 2011 as part of the incident response team, investigating and responding to security incidents, before making the move to management, where he now oversees the digital forensics and… The post 045 – Kristinn Gudjonsson: You Don’t Want Analysts Spending All Their Time Extracting Data appeared first on Cyber Security Interviews.

Duration:00:32:50

044 – James Carder: Automate As Much As You Can

2/19/2018
More
James Carder is the CISO of LogRythm and brings more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity, and availability of information assets, oversees both threat and… The post 044 – James Carder: Automate As Much As You Can appeared first on Cyber Security Interviews.

Duration:00:37:55

043 – David Navetta: The Year Of the Phishing Attack

11/27/2017
More
David Navetta is a US co-chair of Norton Rose Fulbright’s Data Protection, Privacy and Cybersecurity practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as “breach coach” or is on the approved panel… The post 043 – David Navetta: The Year Of the Phishing Attack appeared first on Cyber Security...

Duration:00:45:47

042 – Jared Coseglia: Those Numbers Are Real

11/20/2017
More
Jared Michael Coseglia, founder and CEO of TRU Staffing Partners, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software… The post 042 – Jared Coseglia: Those Numbers Are Real appeared first on Cyber Security Interviews.

Duration:00:43:01

041 – Andrew Hay: Creative Solutions to Hard Problems

11/13/2017
More
Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder & Chief Technology Officer (CTO) for LEO Cyber Security, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision… The post 041 – Andrew Hay: Creative Solutions to Hard Problems appeared first on Cyber Security Interviews.

Duration:00:36:08

#040 – Michelangelo Sidagni: One Size Doesn’t Fit All

11/6/2017
More
Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research, and operations for NopSec. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives. Michelangelo holds numerous professional certifications… The post #040 – Michelangelo Sidagni: One Size Doesn’t Fit All appeared first...

Duration:00:39:58

#039 – James Tarala: What Does the Risk Really Look Like

10/30/2017
More
James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the SANS Institute, the Institute of Applied Network Security (IANS), and the Center for Internet Security for over 20 years. He has spoken at RSA for numerous years and has enjoyed the… The post #039 – James Tarala: What Does the Risk Really Look Like appeared first on Cyber Security Interviews.

Duration:00:47:14

#038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5

10/9/2017
More
SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh… The post #038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5 appeared first on Cyber Security Interviews.

Duration:00:51:31

#037 – Johannes Ullrich: Solving That Puzzle In Your Network

10/2/2017
More
Dr. Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, he founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in… The post #037 – Johannes Ullrich: Solving That Puzzle In Your Network appeared first on Cyber Security Interviews.

Duration:00:40:55

#036 – Jorge Orchilles: Offense Informs Defense

9/25/2017
More
Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter. Jorge has been involved in the Information Technology field since… The post #036 – Jorge Orchilles: Offense Informs Defense appeared first on Cyber Security Interviews.

Duration:00:46:54

#035 – David Kovar: Where Is the Best Application of Your Skill Set

9/18/2017
More
David Kovar is the President and founder of Kovar & Associates where he leads the development of URSA – Unmanned & Robotics Systems Analysis – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads… The post #035 – David Kovar: Where Is the Best Application of Your Skill Set appeared first on Cyber Security Interviews.

Duration:00:52:41