Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads
Cyber Security Interviews-logo

Cyber Security Interviews

120 Favorites

More Information

Location:

United States

Twitter:

@CSI_Podcast

Language:

English


Episodes

042 – Jared Coseglia: Those Numbers Are Real

11/20/2017
More
Jared Michael Coseglia, founder and CEO of TRU Staffing Partners, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software… The post 042 – Jared Coseglia: Those Numbers Are Real appeared first on Cyber Security Interviews.

Duration: 00:43:01


041 – Andrew Hay: Creative Solutions to Hard Problems

11/13/2017
More
Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder & Chief Technology Officer (CTO) for LEO Cyber Security, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision… The post 041 – Andrew Hay: Creative Solutions to Hard Problems appeared first on Cyber Security Interviews.

Duration: 00:36:08


#040 – Michelangelo Sidagni: One Size Doesn’t Fit All

11/6/2017
More
Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research, and operations for NopSec. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives. Michelangelo holds numerous professional certifications… The post #040 – Michelangelo Sidagni: One Size Doesn’t Fit All appeared first...

Duration: 00:39:58


#039 – James Tarala: What Does the Risk Really Look Like

10/30/2017
More
James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the SANS Institute, the Institute of Applied Network Security (IANS), and the Center for Internet Security for over 20 years. He has spoken at RSA for numerous years and has enjoyed the… The post #039 – James Tarala: What Does the Risk Really Look Like appeared first on Cyber Security Interviews.

Duration: 00:47:14


#038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5

10/9/2017
More
SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh… The post #038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5 appeared first on Cyber Security Interviews.

Duration: 00:51:31


#037 – Johannes Ullrich: Solving That Puzzle In Your Network

10/2/2017
More
Dr. Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, he founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in… The post #037 – Johannes Ullrich: Solving That Puzzle In Your Network appeared first on Cyber Security Interviews.

Duration: 00:40:55


#036 – Jorge Orchilles: Offense Informs Defense

9/25/2017
More
Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter. Jorge has been involved in the Information Technology field since… The post #036 – Jorge Orchilles: Offense Informs Defense appeared first on Cyber Security Interviews.

Duration: 00:48:20


#035 – David Kovar: Where Is the Best Application of Your Skill Set

9/18/2017
More
David Kovar is the President and founder of Kovar & Associates where he leads the development of URSA – Unmanned & Robotics Systems Analysis – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads… The post #035 – David Kovar: Where Is the Best Application of Your Skill Set appeared first on Cyber Security Interviews.

Duration: 00:52:41


#034 – Harlan Carvey: You Have To Apply the Data To Your Theory

9/11/2017
More
Harlan Carvey is currently the Director of Intelligence Integration at Nuix. Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident… The post #034 – Harlan Carvey: You Have To Apply the Data To Your Theory appeared first on Cyber Security...

Duration: 01:00:56


#033 – Perry Carpenter: Security Culture Management

9/4/2017
More
Perry Carpenter currently serves as Chief Evangelist and Strategy Officer for KnowBe4. Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at Gartner Research, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies. With a long career as a security professional and… The post #033 – Perry Carpenter: Security Culture Management appeared first on...

Duration: 00:45:25


#032 – Ryan Kalember: We’ve Moved From Mass Surveillance to Targeted Attacks

8/28/2017
More
Ryan Kalember has over 15-years of experience in the information security industry. Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully… The post #032 – Ryan Kalember: We’ve Moved From Mass Surveillance to Targeted Attacks appeared first on Cyber...

Duration: 00:52:05


#031 – Jobert Abma: All Bugs Are Shallow

8/21/2017
More
Jobert Abma is a co-founder and technical lead at HackerOne, one of the leading bug bounty service platforms. He is an avid hacker, developer and advocate for transparent and safe vulnerability disclosure. He and co-founder Michiel Prins have been named one of Forbes 30 under 30 for 2017 in tech. As a hacker himself, Jobert has… The post #031 – Jobert Abma: All Bugs Are Shallow appeared first on Cyber Security Interviews.

Duration: 00:49:56


#030 – Joseph Carson: We Need a People-Centric Approach

8/14/2017
More
Joseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security & virtualization, access controls, and privileged account management. He currently serves as Chief Security Scientist at Thycotic. Joseph is a Certified Information Systems Security Professional (CISSP), active member… The post #030 – Joseph Carson: We Need a People-Centric...

Duration: 00:54:36


#029 – Don’t Hire Security Consultants

8/7/2017
More
This is a solo episode between interviews. I have been doing IT and security consulting for a long time. Over this time, I have noticed a few things that are worth noting when hiring a security consultant. In fact, I would say until you perform some basics and perform some due diligence on your own,… The post #029 – Don’t Hire Security Consultants appeared first on Cyber Security Interviews.

Duration: 00:06:05


#028 – Brett Shavers: It’s Not the Machine, But the Examiner

7/31/2017
More
Brett Shavers is a consultant to corporations and government agencies in computer related cases as well as being the author of “Placing the Suspect Behind the Keyboard“, co-author of “Hiding Behind the Keyboard” and co-author of the “X-Ways Forensics Practitioner’s Guide.” Brett began his career as a digital forensics investigator in law enforcement and was… The post #028 – Brett Shavers: It’s Not the Machine, But the Examiner appeared first on Cyber Security Interviews.

Duration: 00:48:05


#027 – Lance Spitzner: What Behaviors Do We Care About

7/24/2017
More
Lance Spitzner is the Director of the SANS Security Awareness program. Lance has over 20 years of security experience in cyber threat research, awareness, and training. He invented the concept of honeynets, founded the Honeynet Project, and published three security books. Lance has worked and consulted in over 25 countries and helped over 350 organizations… The post #027 – Lance Spitzner: What Behaviors Do We Care About appeared first on Cyber Security Interviews.

Duration: 00:44:50


#026 – Casey Ellis: I Enjoy Thinking Like a Criminal

7/17/2017
More
Casey Ellis is founder and CEO of Bugcrowd. He started life in infosec as pentester, moved to the dark side of solutions architecture and sales, and finally landed as a career entrepreneur. He’s been in the industry for 15 years, working with clients ranging from startups to government to multinationals, and awkwardly straddles the fence… The post #026 – Casey Ellis: I Enjoy Thinking Like a Criminal appeared first on Cyber Security Interviews.

Duration: 00:33:55


#025 – Robb Reck & Alex Wood: We Need To Understand the Technology We are Securing

7/10/2017
More
Rob Reck and Alex Wood are both seasoned security professionals in the Denver, CO area and a host of their own podcast, Colorado = Security. Rob is the Chief Information Security Officer at Ping Identity. In addition to his job at Ping Identity, Robb is an active member of the Colorado security community. In early… The post #025 – Robb Reck & Alex Wood: We Need To Understand the Technology We are Securing appeared first on Cyber Security Interviews.

Duration: 00:45:21


#024 – Independence

7/3/2017
More
This is another short podcast before we get back into full interviews next week. In this episode, I explore the concept of Independence. In the US, this week we are celebrating Independence Day. This got me thinking about what that means in my business experience. I wanted to share a few observations for those who are thinking about going out on their… The post #024 – Independence appeared first on Cyber Security Interviews.

Duration: 00:05:33


#023 – Coming Back

6/26/2017
More
So many of you are wondering why the break in Cyber Security Interviews. There is a bit of a story that goes along with it. I wanted to share this story because I think sheds light into life and career changes that others can learn from. Sharing stories on careers and challenges is a big… The post #023 – Coming Back appeared first on Cyber Security Interviews.

Duration: 00:08:20

See More