Cyber Work-logo

Cyber Work

Technology Podcasts >

Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends. Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends. Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
More Information

Location:

Madison, WI

Description:

Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends. Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Twitter:

@InfoSecEdu

Language:

English

Contact:

(708) 689-0131


Episodes

Alissa Knight talks API security, formjacking and hacking | Cyber Work Podcast

9/16/2019
More
Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcoming book. In the podcast, Knight and host Chris Sienko discuss: – What's been happening since you've been on the podcast last? (3:10) – You've been on an international tour, sharing vulnerabilities you've discovered on 30 financial institution mobile apps; how that going? (5:38) – You've discovered during this tour that people were more...

Duration:00:31:46

From hacker to lawyer: An expert in cybersecurity law

9/9/2019
More
Bradley Gross, founder and president of the Law Office of Bradley Gross and an expert in technology and digital law, discusses his career arc from hacker to lawyer and the various layers of cybersecurity law. In the podcast, Gross and host Chris Sienko discuss: – Tell us about your unconventional journey from hacker to lawyer. What type of hacker were you, and when/where did you get interested in hacking and computers in general? (1:28) – Do you have any hacking war stories? Any frightening...

Duration:00:29:35

Ask an expert: How to start and advance your cybersecurity career

9/5/2019
More
Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, answered anything and everything related to getting started in cybersecurity and helping take your career to the next level. This episode of the Cyber Work podcast is a rebroadcast of a webinar featuring Keatron Evans. In this podcast, you'll learn everything you need to know about getting...

Duration:00:31:47

The human element of cybersecurity careers

9/2/2019
More
Cheryl Kerrigan, Vice President of People at BlueCat, discusses the importance of communication, soft skills and healthy employee cultures in modern cybersecurity companies. In the podcast, Kerrigan and host Chris Sienko discuss: – How did you move from standard HR positions to this more tech-focused career? (1:24) – What is "Vice President of People"? How does it differ from a Human Resources position? What are your primary responsibilities and requirements, and how are they different from...

Duration:00:31:54

How to become a cybersecurity analyst

8/26/2019
More
Jonathan Butler, Professional Services & Security Analytics Manager at Distil Networks, discusses his security analyst journey, what someone should like doing if they plan on going into the field, and the future of security analytics as a whole. In the podcast, Butler and host Chris Sienko discuss: – How did you first get started in computers and security specifically? Were tech, computers and security always your interests, or did you move down that avenue later in life? (1:01) – When you...

Duration:00:35:13

Phish testing: What to do about so-called “repeat offenders”

8/22/2019
More
Are phishing simulations pentesting for humans or training? What’s more effective with those folks who can’t stop themselves from clicking on everything: “name and shame” or a private, personal coaching session? We’ve seen it all: organizations that have terminated internet access (or even employees) and employers that take an educational approach to phishing. What’s your opinion? How do you deal with phishing repeat offenders? Does the term “repeat offender” offend you? Or are you...

Duration:00:42:21

What’s it like being a cybersecurity risk analyst?

8/19/2019
More
John Bree, Neo Group Inc. Senior Vice President and Partner, discusses his risk analyst journey, what a day in the life of a risk analyst looks like and insider tips on how to start out in security risk analytics. In the podcast, Bree and host Chris Sienko discuss: – How did you first get started in risk analytics? How did that phase of your career transition from the previous jobs you had? (1:05) – When did you start seeing the types of trends that precipitated a move to cybersecurity risk...

Duration:00:17:54

The importance of cybersecurity education

8/12/2019
More
Dave Hatter, a cybersecurity consultant for over 25 years and a technology educator at Cincinnati State, discusses his security journey, the future of cybersecurity education and the roles of certification in pursuing high level cybersecurity careers. In the podcast, Hatter and host Chris Sienko discuss: – When did you first get interested in computers and security? – How did you move from software engineering to cybersecurity, teaching and beyond? What were the major steps along the way and...

Duration:00:25:04

PenTest+ Everything you need to know about CompTIA’s new certification

8/8/2019
More
Penetration testers defend organizations by discovering weaknesses before the bad guys do. CompTIA’s new PenTest+ certification validates your knowledge around identifying, exploiting, reporting and managing vulnerabilities. This episode of the Cyber Work podcast is a rebroadcast of a webinar featuring Patrick Lane, CompTIA Director of Products. In this podcast, you'll learn everything you need to know about CompTIA’s PenTest+ cert, including: Why CompTIA created the PenTest+ certification...

Duration:00:41:48

Leveraging board governance for cybersecurity

8/5/2019
More
Michael Figueroa, President and Executive Director of the Advanced Cyber Security Center (ACSC), discusses the importance of leveraging board governance in cybersecurity initiatives. In the podcast, Figueroa and host Chris Sienko discuss: – Why are so many organizations still unaware of the need for strong unified security planning? (1:44) – Is this a situation where C-suite members shoulder the burden of security on themselves, or even assume that it's just IT's problem and leave it at...

Duration:00:27:08

The dangers of role-based access control (RBAC)

7/29/2019
More
Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current problems with role-based access control and how access control is evolving to become more secure. In the podcast, Parimi and host Chris Sienko discuss: – When did you first get interested in computers and security? (1:16) – What does CloudKnox offer its clients and what is its role in the cybersecurity landscape? (2:13) – What is role-based access control? How does it work, and how is it meant to be used to protect...

Duration:00:22:49

Getting started in digital forensics

7/25/2019
More
Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. This episode of the Cyber Work podcast is a rebroadcast of a webinar featuring Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security. In this podcast, he discusses: The difference between computer, mobile and network forensics How a forensics certification can progress your career...

Duration:00:23:41

What does a vulnerability verification specialist do?

7/22/2019
More
Lauren McCaslin, vulnerability verification team lead for the Threat Research Center at WhiteHat Security, discusses her path to becoming a vulnerability verification specialist and what it's like to have a career focused on cybersecurity vulnerabilities. In the podcast, McCaslin and host Chris Sienko discuss: – When did you first get interested in computers and security? (1:15) – What is a vulnerability verification specialist and what are your daily duties? (2:45) – Is there a common...

Duration:00:21:34

Hacking cars, getting arrested and a career in cybersecurity

7/15/2019
More
Alissa Knight, senior analyst at Aite Group, discusses her work penetration testing connected cars and the ups and downs of her security career, from getting arrested for hacking as a teenager to becoming a senior security analyst and her upcoming book on hacking modern vehicles. In the podcast, Knight and host Chris Sienko discuss: – How far back does your interest in computers and security go? (1:45) – What government entity did you hack into and why did you do it? (2:40) – Can you tell us...

Duration:00:36:24

Closing the cyber skills gap: Advice from a CEO, CTO and educator

7/11/2019
More
The shortage of cybersecurity professionals has grown to nearly 3 million globally, with approximately 498,000 openings in North America. In addition, the half-life of technical skills has shrunk to approximately two years. Finding new cybersecurity workers and continually developing their skills is vital for organizations’ data security — and an opportunity for those beginning or progressing their infosec careers. This episode of the Cyber Work podcast is a rebroadcast of a webinar from...

Duration:00:39:35

Preventing and repairing security breaches

7/8/2019
More
John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations from online and physical threats, and career paths for those looking to pursue a career in cybersecurity. In the podcast, Torres and host Chris Sienko discuss: – When did you first get interested in computers and cybersecurity? (1:15) – Was there any resistance to adding more of a tech-focus to your job methods? (3:40) – What are some specific issues or...

Duration:00:32:47

Impostor syndrome, burnout and the challenges of a career in security

7/1/2019
More
Susan Morrow, head of research and development at Avoco Secure, returns to the podcast to discuss her 20 years in the security industry, how she landed a Fortune 500 client working from her bedroom, and the growing role of women in the industry. In the podcast, Morrow and host Chris Sienko discuss: - When did you first get interested in security? (1:20) - Tell us about the many different cybersecurity hats you've had to wear at Avoco Secure and elsewhere? (4:10) - What are some of the...

Duration:00:44:35

DoH! Will the new protocol change how infosec professionals work?

6/24/2019
More
Andrew Wertkin, CTO of BlueCat Networks, returns to the podcast to discuss a new and hotly contested privacy technology called DNS over HTTPS (DoH), the ethical and procedural issues around DoH, and how it may change the way infosec professionals work. In the podcast, Wertkin and host Chris Sienko discuss: - Can you explain DNS over HTTPS and its purpose? (2:00) - Can you talk about the evolving role of DNS when it comes to security? (4:35) - Are there legitimate concerns about DoH making it...

Duration:00:39:58

Latest malware trends are bad news for business

6/17/2019
More
Adam Kujawa, director of Malwarebytes Labs, discusses the latest Malwarebytes Labs Cybercrime Tactics and Techniques Report, why the report is unlikely to make organizations very happy and how the findings will affect the cybersecurity industry in the years to come. In the podcast, Kujawa and host Chris Sienko discuss: - How did you get interested in cybersecurity? (1:45) - Do you sill find yourself having to learn new skills in your position? (2:30) - What are some of the hard and soft...

Duration:00:30:06

How data science and machine learning are affecting cybersecurity

6/10/2019
More
Anu Yamunan, VP of product management and research at Exabeam, discusses her 18 years of experience designing and securing products, and how data science and machine learning are being used in the cybersecurity industry. In the podcast, Yamunan and host Chris Sienko discuss: - How did you first get interested in computers and security? (1:15) - What are your daily job duties and favorite aspects of the job? (3:00) - What previous jobs and skills helped you springboard into your current...

Duration:00:29:35