Podcast
The Cyber Defense Matrix
Sounil Yu, author of The Cyber Defense Matrix, joins host Jeremy Snyder this week to talk about his bestselling book, and what we could all learn from it. We also held our first-ever giveaway, a copy of Sounil's book. If you participated in it, tune in to find out if you've won!
Jeremy Snyder . Nov 9 2022

Podcast
The Cyber Defense Matrix
Sounil Yu, author of The Cyber Defense Matrix, joins host Jeremy Snyder this week to talk about his bestselling book, and what we could all learn from it. We also held our first-ever giveaway, a copy of Sounil's book. If you participated in it, tune in to find out if you've won!
Jeremy Snyder . Nov 9 2022

Podcast
Hyppönen's Law: If It's Smart, It's Vulnerable
Mikko Hypponen, bestselling author of If It’s Smart, It’s Vulnerable, joins us this week to talk about the Hypponen Law, the future of the internet, and the worrying trend that he foresees in the future with respect to cybercriminal gangs, and how he thinks we can best combat the new developments when they come to fruition. He also laments the loss of privacy in the internet age and gives us a few tips to secure our environments and regain some of our privacy.
Jeremy Snyder . Nov 2 2022

Podcast
Hyppönen's Law: If It's Smart, It's Vulnerable
Mikko Hypponen, bestselling author of If It’s Smart, It’s Vulnerable, joins us this week to talk about the Hypponen Law, the future of the internet, and the worrying trend that he foresees in the future with respect to cybercriminal gangs, and how he thinks we can best combat the new developments when they come to fruition. He also laments the loss of privacy in the internet age and gives us a few tips to secure our environments and regain some of our privacy.
Jeremy Snyder . Nov 2 2022

Podcast
The Importance of Good Cyber Hygiene
So you’ve made the transition to the cloud, but you’re wondering how it is that your cloud costs are so high. Is it supposed to be that way when the cloud promises competitive advantages and cost savings? It’s all down to cloud sprawl and practicing good cyber hygiene, according to Nick Lumsden, our guest this week.
Join host Jeremy Snyder as he speaks with Nick Lumsden, co-founder, and CTO at Tenacity Cloud to understand how cyber hygiene is key to reducing cloud sprawl, cloud costs, and your attack surfaces.
Jeremy Snyder . Oct 26 2022

Podcast
The Importance of Good Cyber Hygiene
So you’ve made the transition to the cloud, but you’re wondering how it is that your cloud costs are so high. Is it supposed to be that way when the cloud promises competitive advantages and cost savings? It’s all down to cloud sprawl and practicing good cyber hygiene, according to Nick Lumsden, our guest this week.
Join host Jeremy Snyder as he speaks with Nick Lumsden, co-founder, and CTO at Tenacity Cloud to understand how cyber hygiene is key to reducing cloud sprawl, cloud costs, and your attack surfaces.
Jeremy Snyder . Oct 26 2022

Podcast
Project Zero Trust
The old mantra that humans are the weakest link in cybersecurity should be discarded, according to George Finney. Listen in as we talk to him about why he thinks so, and why he drew from psychology, neuroscience, history, and economics for his first book Well Aware. We also had George define Zero Trust and talk about his new book Project Zero Trust, which includes a foreword from John Kindervag, the “father” of Zero Trust.
Jeremy Snyder . Oct 19 2022

Podcast
Project Zero Trust
The old mantra that humans are the weakest link in cybersecurity should be discarded, according to George Finney. Listen in as we talk to him about why he thinks so, and why he drew from psychology, neuroscience, history, and economics for his first book Well Aware. We also had George define Zero Trust and talk about his new book Project Zero Trust, which includes a foreword from John Kindervag, the “father” of Zero Trust.
Jeremy Snyder . Oct 19 2022

Podcast
Threat Hunting and Incident Response
We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised! Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents, and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices.
Jeremy Snyder . Sep 28 2022

Podcast
Threat Hunting and Incident Response
We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised! Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents, and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices.
Jeremy Snyder . Sep 28 2022

Podcast
Ready, Game, Train, GO!
As an employer, it can be difficult to gauge the hands-on experience of potential cybersecurity hires. Yes, they come with the right degrees and the right certifications, but can they do what you are hiring them to do? How can you assess their hands-on capabilities? Eric Basu and his company, Haiku, Inc., created World of Haiku to help bridge the gap between employers and aspiring cybersecurity professionals. We talk to him this week to learn how the game came about, the difference between gamified training and games that train, and future plans for the game.
Jeremy Snyder . Sep 7 2022

Podcast
Ready, Game, Train, GO!
As an employer, it can be difficult to gauge the hands-on experience of potential cybersecurity hires. Yes, they come with the right degrees and the right certifications, but can they do what you are hiring them to do? How can you assess their hands-on capabilities? Eric Basu and his company, Haiku, Inc., created World of Haiku to help bridge the gap between employers and aspiring cybersecurity professionals. We talk to him this week to learn how the game came about, the difference between gamified training and games that train, and future plans for the game.
Jeremy Snyder . Sep 7 2022

Podcast
Cyber Mayday And The Day After
Dan Lohrmann, award-winning CISO, keynote speaker, mentor, columnist, and bestselling co-author of the book Cyber Mayday and the Day After joins us this week to talk about cybersecurity roles in the public and private sectors, checklists for dealing with disruptions to your business, what organizations can learn from breaches, and much more including a lesson from a blackout on how tabletop exercises should be conducted.
Jeremy Snyder . Aug 10 2022

Podcast
Cyber Mayday And The Day After
Dan Lohrmann, award-winning CISO, keynote speaker, mentor, columnist, and bestselling co-author of the book Cyber Mayday and the Day After joins us this week to talk about cybersecurity roles in the public and private sectors, checklists for dealing with disruptions to your business, what organizations can learn from breaches, and much more including a lesson from a blackout on how tabletop exercises should be conducted.
Jeremy Snyder . Aug 10 2022

Podcast
Zero Trust and Cyber Warfare
Dr. Chase Cunningham, a well-renowned expert on Zero Trust, sits down with us this week to talk about zero trust, VPNs, SASE, WAFs, and how the IS and security team can still be the department of "no" and still accommodate the demands of DevOps and contribute to an organization's growth.
Jeremy Snyder . Jul 27 2022

Podcast
Zero Trust and Cyber Warfare
Dr. Chase Cunningham, a well-renowned expert on Zero Trust, sits down with us this week to talk about zero trust, VPNs, SASE, WAFs, and how the IS and security team can still be the department of "no" and still accommodate the demands of DevOps and contribute to an organization's growth.
Jeremy Snyder . Jul 27 2022

Podcast
Insights from InfoSec Europe 2022
Physical tradeshows are back, and our guest and host were both at the recently-concluded InfoSecurity Europe 2022. Hear their insights on tradeshows and learn their main takeaways from conversations with industry peers in panels on a variety of cybersecurity topics like public-private partnerships, incident reporting and response.
Jeremy Snyder . Jul 13 2022

Podcast
Insights from InfoSec Europe 2022
Physical tradeshows are back, and our guest and host were both at the recently-concluded InfoSecurity Europe 2022. Hear their insights on tradeshows and learn their main takeaways from conversations with industry peers in panels on a variety of cybersecurity topics like public-private partnerships, incident reporting and response.
Jeremy Snyder . Jul 13 2022

Podcast
People, Process, and Technology
How do you balance people, process, and technology, the three pillars of information security, to achieve a balanced security program? What can you do to bolster each pillar? Johannes Wiklund, the Head of Information Security at Jotforms, shares his experience on this, why he thinks a systematic approach to troubleshooting is important, and his key takeaways from the recent RSA conference.
Jeremy Snyder . Jun 29 2022

Podcast
People, Process, and Technology
How do you balance people, process, and technology, the three pillars of information security, to achieve a balanced security program? What can you do to bolster each pillar? Johannes Wiklund, the Head of Information Security at Jotforms, shares his experience on this, why he thinks a systematic approach to troubleshooting is important, and his key takeaways from the recent RSA conference.
Jeremy Snyder . Jun 29 2022

Podcast
Future Tech and Cybersecurity: A Conversation with Chuck Brooks
It's not often that you get to interview someone with more accolades that most of us can achieve in a lifetime, so we took full opportunity to obtain insights and opinions on a variety of cybersecurity-related topics such as the potential impact of new technologies on cybersecurity, biometrics, and cyber warfare in the Russia-Ukraine conflict.
Jeremy Snyder . Jun 8 2022

Podcast
Future Tech and Cybersecurity: A Conversation with Chuck Brooks
It's not often that you get to interview someone with more accolades that most of us can achieve in a lifetime, so we took full opportunity to obtain insights and opinions on a variety of cybersecurity-related topics such as the potential impact of new technologies on cybersecurity, biometrics, and cyber warfare in the Russia-Ukraine conflict.
Jeremy Snyder . Jun 8 2022

Podcast
The Human Defense Layer
Most cybersecurity programs work against human nature instead of with our innate behaviors, resulting in breaches even though your organizations may already have spent large amounts of money on security technologies. Perry Carpenter, our guest this week, helps you understand your end-users and build an effective Human Defense Layer to bolster your cybersecurity posture.
Jeremy Snyder . May 25 2022

Podcast
The Human Defense Layer
Most cybersecurity programs work against human nature instead of with our innate behaviors, resulting in breaches even though your organizations may already have spent large amounts of money on security technologies. Perry Carpenter, our guest this week, helps you understand your end-users and build an effective Human Defense Layer to bolster your cybersecurity posture.
Jeremy Snyder . May 25 2022

Podcast
A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?
Jeremy Snyder . May 18 2022

Podcast
A CISO's Take On the Gartner Magic Quadrant
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider?
Jeremy Snyder . May 18 2022
