Future of Cyber Security-logo

Future of Cyber Security

Technology Podcasts

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

Location:

Bangalore, India

Description:

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

Twitter:

@rasoolirfan

Language:

English

Contact:

9043000250


Episodes
Ask host to enable sharing for playback control

Episode 39 - GenAI and guidance to cyber security practitioners

11/22/2023
Cyber security leaders need to be empowered addressing below GenAI impacts --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:33

Ask host to enable sharing for playback control

Episode 38 - RSA Conference Innovation Sandbox 2023

5/2/2023
The RSA Conference Innovation Sandbox is an annual competition that showcases the latest and most innovative cybersecurity startups and emerging technologies. Cybersecurity professionals can learn a lot from security innovations showcased at events such as the RSA Security Conference. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:08:03

Ask host to enable sharing for playback control

Episode 37 - Manage effective Container/ K8 Security Assessments

6/23/2021
Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). Digital business require lean team with talented expertise to conduct assessment services. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:08:37

Ask host to enable sharing for playback control

Episode 36 - Vulnerability Management Maturity Assessment Program

4/4/2021
Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external professionals to conduct assessments based on defined framework across building blocks and act to mature your vulnerability management program. Listen to this podcast for more details --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:06:47

Ask host to enable sharing for playback control

Episode 35 - Threat Hunting Capability Development Framework

1/30/2021
With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:32

Ask host to enable sharing for playback control

Episode 34 - Cyber security table top exercise (TTX)

1/23/2021
Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:10:33

Ask host to enable sharing for playback control

Episode 33 - Microsoft Endpoint DLP use cases

11/15/2020
Microsoft Endpoint DLP helps organizations to adopt data protection strategies with most common use cases such as protecting sensitive data based on regulatory compliance, prevent unintentional or accidental exposure of critical data and restricting unwanted activities on windows devices. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:05:57

Ask host to enable sharing for playback control

Episode 32 - Azure Information Protection - Getting Started and Best Practices

10/26/2020
Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions. Microsoft Azure Information Protection has been widely purchased by many customers, but struggling to find ways to get started and require assistance in adopting best practices. Let's explore it in this podcast. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:11:39

Ask host to enable sharing for playback control

Episode 31 - Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk

10/19/2020
Cloud business leaders prefers multi cloud deployment strategies either within the region or across regions to have cost effective solution. IT security managers require security event management solutions prefers to have deployed on the cloud environment or either prefer SaaS offerings IBM QRadar and Splunk are the leading vendors in the market today offers wide range of SIEM use-cases. It require design and cost considerations to make it effective and fit for business purpose. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:08:38

Ask host to enable sharing for playback control

Episode 30 - Microsoft E5 can replace 16 Security vendors

9/28/2020
Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendors. However, if customer’s have unique requirements that are achievable only with marketplace security products should continue to leverage other security solutions. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:45

Ask host to enable sharing for playback control

Episode 29 - Simplify network security with SASE

9/21/2020
SASE (Security access service edge) concept is to have all the functional components of network and security required for enterprise available on cloud based services that are globally accessible for the digital business --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:27

Ask host to enable sharing for playback control

Episode 28 - People is the most critical vulnerability in any organization

7/24/2020
Every organization will have opportunity to learn from their security incidents. While performing root cause analysis, often organization fail to analyze deeper to figure-out the human element associated with it. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:48

Ask host to enable sharing for playback control

Episode 27 - Five ideas to enhance the cyber immune system

7/22/2020
IT security leaders are looking for cost effective security programs that enhance their cyber security immune systems. Listen to this podcast to learn those five key ideas. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:06:18

Ask host to enable sharing for playback control

Episode 26 - CISO should redefine corporate security strategy

6/29/2020
Cyber risk is business risk – CISO representation at board level is important to provide business solutions. Hence in the year 2020 – CISO’s should redefine the corporate security strategy. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:10:55

Ask host to enable sharing for playback control

Episode 25 - Social media addiction is injurious to mental health

5/17/2020
Increased adoption of digital make all generations to prey to social media platforms. With increase fake news or misinformation and lack of knowledge to perform fact check, mostly kids and adults are mentally affected and targeted for cyber bulling and online harassment. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:08:30

Ask host to enable sharing for playback control

Episode 24 - Develop self defensing capabilities in applications

5/10/2020
In mobile first market, organizations need to develop mobile applications that has self defensing capabilities. As the in-app protection technologies are new - DevOps leaders should invest time to learn and adopt implementing it for their high value applications. Listen to the self defensing capabilities here. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:09:04

Ask host to enable sharing for playback control

Episode 23 - Protection from Maze Ransomware

5/4/2020
Maze is a file encrypting virus and also a successor to ChaCha. Organizations need to have protection strategies from being victim of similar cyber attacks. Listen to this podcast for more details --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:06:15

Ask host to enable sharing for playback control

Episode 22 - Recommendations to adopt Zero Trust principles

4/28/2020
Organizations need to define zero trust strategy to enforce the security controls across the ‘defense in depth’ layers. Security in continuous process and require constant learning as the attacks are sophisticated and targeted. Adopting to Zero Trust principles keep the business safe from any breaches. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:07:35

Ask host to enable sharing for playback control

Episode 21 - India - The personal data protection bill, 2019

4/20/2020
The Personal data protection bill, 2019 mandates to implement cyber security controls such as de-identification, encryption, protect integrity, prevent misuse, unauthorized access to modify, disclose or destruct of personal data. The bill has obligations to take prompt and appropriate action in response to a data security breach. It shall be liable to a penalty which may extend to five crore rupees or two per cent. of its total worldwide turnover of the preceding financial year, whichever is higher. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:11:36

Ask host to enable sharing for playback control

Episode 20 - Cyber security leaders need fraud prevention to protect their digital business

4/13/2020
In this digital economy, online fraud detection systems are a necessary component in any security architecture and augment the basic application protection capabilities offered by a web application firewall and identity management solutions. Cyber security leaders need to know more about fraud management solutions. In this episode you'll hear key 45 solution providers operating in this space. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

Duration:00:12:01