『CISO Tradecraft®』のカバーアート

CISO Tradecraft®

著者: G Mark Hardy & Ross Young
  • サマリー

  • Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
    Copyright 2024 All rights reserved.
    続きを読む 一部表示
エピソード
  • #181 - Inside the 2024 Verizon Data Breach Investigations Report
    2024/05/13

    In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predominance of hacking and malware. The report identifies the top methods bad actors use for exploiting companies, including attacking VPNs, desktop sharing software, web applications, conducting phishing, and stealing credentials, emphasizing the growing sophistication of attacks facilitated by technology like ChatGPT for phishing and deepfake tech for social engineering. The episode touches on various cybersecurity measures, the omnipresence of multi-factor authentication (MFA) as a necessity rather than a best practice, and the surge in denial-of-service (DDoS) attacks. Hardy also discusses generative AI's role in enhancing social engineering attacks and the potential impact of deepfake content on elections and corporate reputations. Listeners are encouraged to download the DBIR for a deeper dive into its findings.

    Transcripts: https://docs.google.com/document/d/1HYHukTHr6uL6khGncR_YUJVOhikedjSE

    Chapters

    • 00:00 Welcome to CISO Tradecraft
    • 00:35 Celebrating Milestones and Offering Services
    • 01:39 Diving into the Verizon Data Breach Investigations Report
    • 04:22 Top Attack Methods: VPNs and Desktop Sharing Software Vulnerabilities
    • 09:24 The Rise of Phishing and Credential Theft
    • 19:43 Advanced Threats: Deepfakes and Generative AI
    • 23:23 Closing Thoughts and Recommendations
    続きを読む 一部表示
    25 分
  • #180 - There's Room For Everybody In Your Router (with Giorgio Perticone)
    2024/05/06

    In this joint episode of the Security Break podcast and CISO Tradecraft podcast, hosts from both platforms come together to discuss a variety of current cybersecurity topics. They delve into the challenge of filtering relevant information in the cybersecurity sphere, elaborate on different interpretations of the same news based on the reader's background, and share a detailed analysis on specific cybersecurity news stories. The discussion covers topics such as the implications of data sharing without user consent by major wireless providers and the fines imposed by the FCC, the significance of increasing bug bounty payouts by tech companies like Google, and a comprehensive look at how edge devices are exploited by hackers to create botnets for various cyberattacks. The conversation addresses the complexity of the cybersecurity landscape, including how different actors with varied objectives can simultaneously compromise the same devices, making it difficult to attribute attacks and protect networks effectively.

    Transcripts: https://docs.google.com/document/d/1GtFIWtDf_DSIIgs_7CizcnAHGnFTTrs5

    Chapters

    • 00:00 Welcome to a Special Joint Episode: Security Break & CISO Tradecraft
    • 01:27 The Challenge of Filtering Cybersecurity Information
    • 04:23 Exploring the FCC's Fine on Wireless Providers for Privacy Breaches
    • 06:41 The Complex Landscape of Data Privacy Regulations
    • 16:00 The Economics of Data Breaches and Regulatory Fines
    • 24:23 Bug Bounties and the Value of Security Research
    • 33:21 Exploring the Economics of Cybersecurity
    • 33:50 The Lucrative World of Bug Bounties
    • 34:38 The Impact of Security Vulnerabilities on Businesses
    • 35:50 Navigating the Complex Landscape of Cybersecurity
    • 36:22 The Ethical Dilemma of Selling Exploit Information
    • 37:32 Understanding the Market Dynamics of Cybersecurity
    • 38:00 Focusing on Android Application Security
    • 38:34 The Importance of Targeting in Cybersecurity Efforts
    • 42:33 Exploring the Threat Landscape of Edge Devices
    • 46:37 The Challenge of Securing Outdated Technology
    • 49:28 The Role of Cybersecurity in Modern Warfare
    • 53:15 Strategies for Enhancing Cybersecurity Defenses
    • 01:05:25 Concluding Thoughts on Cybersecurity Challenges
    続きを読む 一部表示
    1 時間 7 分
  • #179 - The 7 Broken Pillars of Cybersecurity
    2024/04/29

    In this episode of CISO Tradecraft, host G. Mark Hardy discusses seven critical issues facing the cybersecurity industry, offering a detailed analysis of each problem along with counterarguments. The concerns range from the lack of a unified cybersecurity license, the inefficiency and resource waste caused by auditors, to the need for a federal data privacy law. Hardy emphasizes the importance of evaluating policies, prioritizing effective controls, and examining current industry practices. He challenges the audience to think about solutions and encourages sharing opinions and additional concerns, aiming to foster a deeper understanding and improvement within the field of cybersecurity.

    Transcripts: https://docs.google.com/document/d/1H_kTbCG8n5f_d1ZHNr1QxsXf82xb08cG

    Chapters

    • 00:00 Introduction
    • 01:28 Introducing the Seven Broken Things in Cybersecurity
    • 02:00 1. The Lack of a Unified Cybersecurity License
    • 06:53 2. The Problem with Cybersecurity Auditors
    • 10:09 3. The Issue with Treating All Controls as High Priority
    • 14:12 4. The Obsession with New Cybersecurity Tools
    • 19:23 5. Misplaced Accountability in Cybersecurity
    • 22:38 6. Rethinking Degree Requirements for Cybersecurity Jobs
    • 26:49 7. The Need for Federal Data Privacy Laws
    • 30:53 Closing Thoughts and Call to Action
    続きを読む 一部表示
    32 分

あらすじ・解説

Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
Copyright 2024 All rights reserved.

CISO Tradecraft®に寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。