Latest Email security Podcast Episodes

Cyber Security Heroes artwork

6 Tips for Breaking Into Cybersecurity

Cyber Security Heroes - August 01, 2022 05:00 - 51 minutes ★★★★★ - 17 ratings
Cybersecurity is a broad field with new opportunities appearing every year.  But what do you need to do to stand out among the job seekers and break into the industry? There is no one path to landing a job in cyber, but there are a few best practices to attain the skills you need to get your fo...

Cyber Security Heroes artwork

How To Succeed In Red Teaming Without Experience

Cyber Security Heroes - July 31, 2022 16:18 - 42 minutes ★★★★★ - 17 ratings
You don’t need to be a technical wizard to succeed in red teaming.  And people with no or low experience don’t have to go through months of training before you give them work. There are many components of red teaming that can be taught in a short amount of time from open source reconnaissance t...

Cyber Security Heroes artwork

Why search and delete is the wrong approach to phishing incident response

Cyber Security Heroes - July 29, 2022 04:00 - 37 minutes ★★★★★ - 17 ratings
Search and delete is a common response to phishing emails, but it’s not the best approach.  It’s inefficient, ineffective, and with the sheer volume of phishing attacks, it’s not feasible as a standard practice. The only thing search and delete truly provides is a false sense of security.   In...

Cyber Security Heroes artwork

How to Prevent an Identity and Access Management System Breach

Cyber Security Heroes - July 25, 2022 23:30 - 48 minutes ★★★★★ - 17 ratings
When identity access management system Okta was breached earlier this year, 366 companies had their data compromised.  For those companies, a single point of failure put their data, and business, at risk. Because of the nature of Okta and similar systems, it wasn’t clear what, if any, changes h...

Cyber Security Heroes artwork

5 Things You Need to Know About Modern Disaster Recovery

Cyber Security Heroes - July 20, 2022 00:00 - 1 hour ★★★★★ - 17 ratings
The biggest mistake companies make is not having a suitable disaster recovery plan in place. They think that a box of tapes serving as their backup is enough.  That might have been true a couple of decades ago, but with ransomware attacks happening every few minutes, that won’t cut it anymore. ...

Cyber Security Heroes artwork

How to Find Cybersecurity Talent in a Candidate-Driven Market

Cyber Security Heroes - July 12, 2022 00:00 - 46 minutes ★★★★★ - 17 ratings
Cybersecurity companies need to be realistic when recruiting new talent.  With so many companies hiring, there is stiff competition for candidates. Job descriptions that require a long list of certifications for entry level jobs won’t get filled easily. One with a salary below market or few day...

Cyber Security Heroes artwork

Adrianus Warmenhoven, Defensive Strategist @Nord Security

Cyber Security Heroes - July 05, 2022 18:36 - 1 hour ★★★★★ - 17 ratings
Adrianus Warmenhoven was one of the first web-hosters in Europe, setting up ISPs in the very early 1990s and the first ISP in Tanzania. He has worked with National Forensics Institute on cybercrime, taught at Universities on subjects such as security, performance and scaling. And he was involve...

Cyber Security Heroes artwork

Cybersecurity benefits of behavioral biometrics and adversarial machine learning

Cyber Security Heroes - June 28, 2022 00:30 - 37 minutes ★★★★★ - 17 ratings
Justin Macorin, CTO and Co-founder at Ponsero discussed with me some cybersecurity use cases for NLP and behavioral biometric technology, especially when it comes to phishing and spam!We also discussed AI and ML misconceptions, the importance of quality data sets to train the models and how all ...

Cyber Security Heroes artwork

Navigating The Complex Ecosystem Of Subjects, Resources & Endless Certs

Cyber Security Heroes - June 21, 2022 00:30 - 41 minutes ★★★★★ - 17 ratings
Christian Scott is the COO and Chief Information Security Officer at GoVanguard, a boutique cybersecurity firm that performs red teaming services, like penetration testing and social engineering.  They do a lot of work for multi-billion dollar hedge funds, international internet service provide...

Cyber Security Heroes artwork

How to Create Cybersecurity Training Playbooks

Cyber Security Heroes - June 14, 2022 00:30 - 53 minutes ★★★★★ - 17 ratings
A good training program is not just beneficial to new hires.  It’s beneficial to everyone. Clear playbooks that can be referred to time and again make everyone stronger and reduce turnover. But many companies are missing the mark when it comes to the onboarding process from a lack of documentat...

Cyber Security Heroes artwork

How to Find the Right Cybersecurity Career Mentor

Cyber Security Heroes - June 07, 2022 00:30 - 45 minutes ★★★★★ - 17 ratings
You’ve likely heard the phrase “it’s not what you know, but who you know.”  In cybersecurity, it’s both. To get access to opportunities, you need connections. But to follow through on those opportunities, you need to have knowledge and skills. Mentorship can help you with both.  In this episod...

Cyber Security Heroes artwork

5 Things You Need to do When Creating a Privacy Program

Cyber Security Heroes - June 01, 2022 00:30 - 53 minutes ★★★★★ - 17 ratings
Businesses starting to build a privacy program need to ask themselves this:  How would customers feel if their data was used in a way that ends up in the New York Times? What would happen to your business? Good privacy policies benefit the business, don’t hurt engineering morale, and protect th...

Cyber Security Heroes artwork

Navigating a Career in Cybersecurity

Cyber Security Heroes - May 24, 2022 00:30 - 57 minutes ★★★★★ - 17 ratings
Despite the cybersecurity talent shortage, it can be tough to navigate the cybersecurity world at first. If you want to get your foot in the door with cybersecurity, there are a lot of obstacles to overcome such as education, experience, and when and how to specialize. But when it comes to work...

Cyber Security Heroes artwork

How to be an Effective CISO

Cyber Security Heroes - May 17, 2022 00:30 - 52 minutes ★★★★★ - 17 ratings
The role of the CISO has evolved from a technical one to more of an advisory one. A CISO guides business leaders on how to implement security controls while meeting business goals. A CISO should be prepared to communicate the return of investment on reducing risk through cybersecurity and transl...

Cyber Security Heroes artwork

How to Better Utilize the Technical Controls You Already Have in Place

Cyber Security Heroes - May 10, 2022 00:30 - 30 minutes ★★★★★ - 17 ratings
There are many tech tools available to cite the capability to reduce phishing scams and cybersecurity threats.  But it’s important to carefully evaluate what technology you’re bringing to the table and how you’re approaching the problem in a way that’s not wasting time and money unnecessarily. ...

Cyber Security Heroes artwork

How Cybersecurity Leaders Can Attract And Recruit Top Talent

Cyber Security Heroes - May 03, 2022 00:30 - 40 minutes ★★★★★ - 17 ratings
Cybersecurity leaders are in a unique position to drive their companies forward.  This includes their ability to identify, hire, and nurture top talent. Joshua Scott is the Head of Security and IT at Postman, where he seeks to find great hires and help his employees thrive.  In ep 10 of our mi...

Cyber Security Heroes artwork

A Deep Dive With Allan Alford On Okta's Breach Response

Cyber Security Heroes - April 30, 2022 00:30 - 1 hour ★★★★★ - 17 ratings
In this episode, we unpack and critique the handling of the Okta breach communications effort and why it matters, especially for all of us on the sidelines passing judgment without all the facts. Allan Alford is the CISO/CTO at TrustMAPP & Host of The Cyber Ranch Podcast Show Links Connect wi...

Cyber Security Heroes artwork

2022 Best Practices for Cybersecurity Recruiters and Job Seekers

Cyber Security Heroes - April 25, 2022 21:00 - 1 hour ★★★★★ - 17 ratings
Episode #9 of our mini-series #1SEAT is out. 👇 2022 Best Practices for Cybersecurity Recruiters and Job SeekersRecruiting in security has always been a challenge, and the Great Resignation has only made it more difficult to find the right job candidates.  There’s a high demand for internet sec...

Cyber Security Heroes artwork

Celebrating Our 1-year Anniversary: 2021 Montage Part 1

Cyber Security Heroes - April 19, 2022 01:00 - 33 minutes ★★★★★ - 17 ratings
It's Cyber Security Heroes' birthday month!  Thank you so much for tuning in and being part of the journey, it's really taken off and we are humbled by ALL the positive feedback. So to celebrate our 1 year anniversary, we did a montage of all the best of 2021 quotes. Enjoy and thank you to all...

Cyber Security Heroes artwork

Pwn Your Career With Founder and CEO Deidre Diamond

Cyber Security Heroes - April 16, 2022 05:00 - 51 minutes ★★★★★ - 17 ratings
Welcome to episode #8 of our new mini-series #1SEAT: PWN Your Career Deidre Diamond is the Founder and CEO at Cyber Security Network (http://www.cybersn.com), a company transforming the way Cyber Security Professionals approach job searches.  From online job matching to full-service recruitmen...

Cyber Security Heroes artwork

How Companies and Job Seekers Can Solve the Cybersecurity Shortage

Cyber Security Heroes - April 12, 2022 01:00 - 43 minutes ★★★★★ - 17 ratings
Companies are getting attacked daily by cyber criminals. Most of those attacks aren’t getting into their systems, but when you add up all of the phishing emails and attempts to get credentials, it can look like thousands of attacks in a month. At the same time, there are over three million open...

Cyber Security Heroes artwork

Chip Harris – Who’s The Man Behind the Mask?

Cyber Security Heroes - April 08, 2022 15:45 - 1 hour ★★★★★ - 17 ratings
Bryan Vorndran, an assistant director in the FBI's cyber division reported that Russian hackers have been scanning the systems of energy companies and other critical infrastructure in the United States during a hearing before a U.S. House of Representatives panel last Tuesday. In this episode I...

Cyber Security Heroes artwork

How to Protect Yourself from Scammers

Cyber Security Heroes - April 05, 2022 01:00 - 49 minutes ★★★★★ - 17 ratings
Everyone has a right to privacy. Though social media has blurred the lines between what constitutes public versus private, your personal information still needs to be protected. Every time you give up private information, whether that’s a phone number, an email, or a birth date, you make yourse...

Cyber Security Heroes artwork

Bohan Zang Shares How He Landed His First SOC Analyst Role

Cyber Security Heroes - April 03, 2022 06:30 - 26 minutes ★★★★★ - 17 ratings
In this episode #6 of mini-series #1SEAT, Bohan Zang a Security Operations Center Analyst I from eSentire shares his journey on how he landed the role without having any prior security experience.   We covered: Resume advice Interview preparation What certifications he recommends Security t...

Cyber Security Heroes artwork

How Non-tech Professionals Can Solve the Cybersecurity Talent Problem

Cyber Security Heroes - March 28, 2022 22:00 - 48 minutes ★★★★★ - 17 ratings
Cybercrime is on the rise and we don’t have enough defenders fighting against it.  In the next few years, cybercrime is estimated to become a multi-trillion dollar industry and that money is going to fund more illegal things. The impact will be felt far beyond cybersecurity. That threat means w...

Cyber Security Heroes artwork

How Businesses and Consumers Can Prepare For A Russian Cyber Attack

Cyber Security Heroes - March 26, 2022 07:00 - 22 minutes ★★★★★ - 17 ratings
According to an FBI warning to president Biden, there is evolving intelligence that Russia is exploring options for potential cyber attacks against the U.S. homeland and specifically critical infrastructure. In this episode, I spoke to Christian Scott, CEO and Chief Information Security Officer ...

Cyber Security Heroes artwork

The Unraveling Of The Okta Breach And What You Can Do

Cyber Security Heroes - March 23, 2022 13:29 - 18 minutes ★★★★★ - 17 ratings
Okta, Inc. is a publicly traded identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and device...

Cyber Security Heroes artwork

How to Jumpstart Your Pen Testing Career

Cyber Security Heroes - March 22, 2022 06:30 - 50 minutes ★★★★★ - 17 ratings
It’s never too late to think about a career change.  Penetration testing, also known as pen testing, is a subset of cybersecurity where an individual simulates a cyber attack to evaluate the effectiveness of a system’s security. If you’re considering moving into penetration testing, you have to...

Cyber Security Heroes artwork

The New Cyber Era Post Ukraine Invasion

Cyber Security Heroes - March 19, 2022 13:00 - 1 hour ★★★★★ - 17 ratings
In light of recent events such as the Russian invasion of Ukraine and the acquisition of Mandiant by Google. I was lucky enough to get time with Karim Hijazi former Founder and CEO of Unveillance (acquired by Mandiant (v1.0)), former Director of Intelligence for Mandiant, presently Founder and ...

HIPAA Critical artwork

68. Aja Anderson: "Bad actors are offering your employees incentives to help them."

HIPAA Critical - March 16, 2022 17:00 - 22 minutes ★★★★★ - 12 ratings
Episode 68 features Aja Anderson, Paubox Customer Success Manager. 

Related Email security Topics