Security Business عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Artwork

1
Business of Security Podcast

Lawrence A Snow

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
The Business of Security Podcast discusses the business side of security. From finding work and what skills are needed to where and how do you network To sharing ideas, tips and advice on networking, technology, marketing, and tools you can use to successfully grow your security business. The podcast offer interviews with leaders in the security talking about the state of the security business, how to brand your business to be successful by using marketing and social media tools. The goal of ...
  continue reading
 
Welcome to the Wheels Up podcast, the resource to help business, executive and VIP travellers stay safe on the ground and in the air. Join travel security and executive protection expert Troy Claydon as he shares tips on how to give yourself or those in your care a safe journey no matter where your travels take you.https://expertsonair.fm/wheels-up/ http://www.panopticsolutions.com/
  continue reading
 
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
  continue reading
 
Loading …
show series
 
In the leadership and communications segment, Smart cybersecurity spending and how CISOs can invest where it matters, Grading CISOs: Effective Metrics and Personal Growth Strategies, The Pandemic Proved that Remote Leadership Works, and more! Show Notes: https://securityweekly.com/bsw-387
  continue reading
 
Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
  continue reading
 
This episode looks at managing a Cyber Incident in your Small or Medium Sized Business. After listening to this episode, your will be better equipped to understand how a cyber incident response should go, what to look for and how to manage it. Even if you have an IT company to do incident response, this will help you work with them and ensure that …
  continue reading
 
Guest: Michael Byrom – CEO, The Chain Reaction Challenge Foundation Consultant at McBride Legal | Director at Southern Cross Soloists Ltd In this episode, we speak with Michael Byrom, a legal expert and philanthropist dedicated to making a difference through The Chain Reaction Challenge Foundation. With a career spanning over 40 years in commercial…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! In this episode, Accidental CISO is joined by guest host Brennen Schmidt. Brennen is an author, speaker, and principal of ALEUS Consulting Group up in Regina, Saskatchewan, Canada. As …
  continue reading
 
Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
  continue reading
 
In the leadership and communications segment, CISO vs. CIO: Where security and IT leadership clash (and how to fix it), The CISO's bookshelf: 10 must-reads for security leaders, The CISO's bookshelf: 10 must-reads for security leaders, and more! Show Notes: https://securityweekly.com/bsw-386
  continue reading
 
Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
  continue reading
 
Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
  continue reading
 
In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Show Notes: https://securityweekly.com/bsw-385
  continue reading
 
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS…
  continue reading
 
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS…
  continue reading
 
A Cyber Incident can be an intimidating process for any business owner and management team. Sadly, Cyber Incidents, especially email attacks are increasing. This episode looks at Cyber Incident Response planning specifically from the point of view of a Business Owner. What are the steps you can use to make the process easier. We discuss the PICERL …
  continue reading
 
This week: CISOs struggling to balance security, business objectives, Signs Your Organization’s Culture is Hurting Your Cybersecurity, Servant Leadership: Putting Trust at the Center, and more! Show Notes: https://securityweekly.com/bsw-384
  continue reading
 
This week: CISOs struggling to balance security, business objectives, Signs Your Organization’s Culture is Hurting Your Cybersecurity, Servant Leadership: Putting Trust at the Center, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-384…
  continue reading
 
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification. In part 2, we discuss the step…
  continue reading
 
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification. In part 1, we discuss the chal…
  continue reading
 
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification. In part 1, we discuss the chal…
  continue reading
 
This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Visit https://www.securityweekly.com/bsw for all th…
  continue reading
 
This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Show Notes: https://securityweekly.com/bsw-382…
  continue reading
 
In the leadership and communications segment, Cybersecurity Responsibilities Across the C-Suite: A Breakdown for Every Executive, Humble Leaders Inspire Others to Step Up, Effective Communication in the Workplace, and more! Show Notes: https://securityweekly.com/bsw-381
  continue reading
 
From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
  continue reading
 
From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
  continue reading
 
In the leadership and communications segment, How CISOs can elevate cybersecurity in boardroom discussions, Nearly half of CISOs now report to CEOs, showing their rising influence, Steve Jobs Shared 1 Crystal Clear Way You'll Spot an Exceptional Leader, and more! Show Notes: https://securityweekly.com/bsw-380…
  continue reading
 
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
  continue reading
 
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
  continue reading
 
This cyber security podcast discusses an email fraud attack on an Australian business that cost $190,000. A Business Email Compromise attack on a Mobius, an electrical contractor in Western Australia. They crafted emails to Inoteq, a contractor to Rio Tinto and $235,400 was paid into a hackers account ; Mobius took Inoteq to the District Court in P…
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش