Cyber Security Effectiveness Podcast

All Episodes

Episode Title Guest Date Episode #
Securing the Insurance and Finance Industry Steven Edwards 11/5/20 81
SIP & Purple Teaming Evan Peña 10/14/20 80
Navigating 2020 as a CISO in Aviation Deneen DeFiore 10/6/20 79
Federal Government & Intel Insights JD Jack 9/22/20 78
Leading as a CISO in Auto Chip Regan 9/8/20 77
Threat and SIEM Management for Insurance DJ Goldsworthy 8/31/20 76
Validating Helix Steve Lodin 6/30/20 75
Evaluating Readiness & the Future of Intel Gopal Padinjaruveetil 8/24/20 74
Refining the Environment for OT, SCADA, and IT Dave Bang 7/27/20 73
The Ultimate Pairing of Threat Intel and Validation Sandra Joyce 6/16/20 72
Winning the Support of Board Rooms and CISOs Dawn-Marie Hutchinson 6/3/20 71
Mandiant Security Effectiveness Report Takeaways and Predictions Maj. Gen. Earl Matthews, USAF (Ret.) 5/8/20 70
Mistakes That Linger Rebecca Herold 4/6/20 69
Undergrad Experience Julianne Cox 4/6/20 68
Criminal Intentions Cindy Murphy 4/6/20 67
The Value in Compliance Alex Rutkovitz 4/6/20 66
The Path to Security Savviness Kyla Guru 4/6/20 65
The Automation Advantage for SOC Quiessence Phillips 4/6/20 64
Imagination Skills Amber Schroader 3/30/20 63
What Qualifies as Experience? Mari Galloway 3/30/20 62
Investing in the Right Relationship Roselle Safran 3/30/20 61
It’s All in the Evidence Mary Mack 3/30/20 60
Addressing Talent Shortage with Abroad Education Eileen Brewer 3/30/20 59
Women in the Workplace Elena Elkina 3/30/20 58
Keeping a Clear Focus: New Tech and Cyber Change Becky Pinkard 3/30/20 57
No Quick Fix Dr. Chanel Suggs 3/30/20 56
A Gamer’s Influence on DDoS Mary Haynes 3/30/20 55
Give and Take Lisa Jiggetts 3/23/20 54
Conference Conversations Kim Hakim 3/23/20 53
Taking Control Monique Morrow 3/23/20 52
Plan and Recover Alexa King 3/23/20 51
Boost Your Security Confidence Kristin Judge 3/23/20 50
A Competitive Field Kaitlyn Bestenheider 3/23/20 49
Industries Alike Tommy Hawkins 3/23/20 48
The Demand for Soft Skills Lisa Plaggemier 3/16/20 47
Maintaining Continuity in Critical Infrastructure Isabel Muench 3/16/20 46
Layers of Architecture Kathleen Moriarty 3/16/20 45
Prison Breaking the System Tiffany Strauchs Rad 3/16/20 44
Bouncing Back: Advice for Minimizing Reputational Damage from a Breach Siobhan Gorman 3/16/20 43
Outside Experience Ambareen Siraj 3/16/20 42
Creating a Banking Ecosystem Neira Jones 3/16/20 41
The Weakest Link Masha Sedova 3/16/20 40
From Breaking to Fixing Kelly Jackson Higgins 3/16/20 39
People Skills: Making Change in the Community Veronica Valeros Saracho 3/9/20 38
Psychology in Cyber Anita D'Amico 3/9/20 37
Fast-Moving Threat Models Lisa Myers 3/9/20 36
The Evolving Educator Dr. Meg Layton 3/9/20 35
Common Sense Risk Management Heather Engel 3/9/20 34
The Dangers of Overlooking Medical Device Security Marie Moe 3/9/20 33
Insightful Intelligence Sandra Joyce 3/9/20 32
Find Your Tribe Rick McElroy 3/9/19 31
Model Application for the Evolving Threat Landscape John Pironti 12/3/19 30
Cloud Policy and Evolving Tools Adam Fletcher 11/19/19 29
Cloud Migration: The Golden Rules Steve Lodin 11/5/19 28
A Teen’s Guide to Building Smart Cyber Habits Athena Contos 10/7/19 27
If Not You, Then Who? Parry Aftab 10/3/19 26
Customer Trust in the Clouds Deneen DeFiore 10/1/19 25
The Wide World of Healthcare Colby DeRodeff 9/24/19 24
Fight Like You Train Michael Allgeier 9/10/19 23
Strength in Numbers Jon Inns 9/3/19 22
The Art of Cyber Deception Mike Fabrico 8/15/19 21
Defending the State of Security Nick Andersen 8/1/19 20
Investing in the CISO Richard Stiennon 7/16/19 19
Machine Learning & Automation: Trust But Verify Lisa Huff 7/2/19 18
The Supply Chain Ripple Effect Mark Weatherford 6/18/19 17
The Power of Uncertainty in Cyber Richard Seiersen 6/4/19 16
From the Ground Up Ed Amoroso 5/21/19 15
Securing the Future Through Education Helen Patton 5/14/19 14
A Proactive Approach to Incident Response MacKenzie Brown 4/30/19 13
Risky Business: Data Privacy and Compliance Terry Ray 4/23/19 12
Safety Through Segmentation Bill Crowell 4/16/19 11
Blurring the Line Between Black and White Raj Samani 4/2/19 10
A Case for Prioritizing Cybersecurity: A Litigator’s Perspective Ijay Palansky 3/27/19 9
A Culture-Centric Approach to Managing Cyber Talent Kevin Morrison 1/22/19 8
The Age of the Intelligent SOC Greg Martin 1/9/19 7
A Higher Standard for Patient Safety Tim Waldo 12/6/18 6
Inside the Internet of Things (IoT) Dr. Ulf Lindqvist 11/19/18 5
Budgets, Bureaucracies, and Behaviors Malcolm Harkins 11/8/18 4
Air Time with Dave Ockwell-Jenner Dave Ockwell-Jenner 10/29/18 3
Ada Lovelace, AC/DC, and Behavior Research Ashley Zaya 9/26/18 2
Bang! A Chemical Reaction Dave Bang 8/30/18 1