Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Cyber risk resilience for executives. Hackers are winning and lawmakers are taking action with new cyber risk mandates. In an increasingly internet delivered world, new cyberlaws and regulations with steep sanctions have been levied against leaders unable to prove their reasonable governance of the data privacy and cybersecurity problems. With cyber threats evolving at an alarming pace, cyber risk awareness and governance is needed as compliance alone is no longer enough for all businesses. ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
1
Data Protection: Protecting Your Organization’s Data In The Digital Age With Yasir Ali
20:44
20:44
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
20:44
In today’s digital landscape, organizations need to build a secure foundation to protect their data. Yasir Ali is the Founder and CEO of PolymerHQ DLP, a company that offers a unique approach to data loss prevention designed for SaaS applications. He brings valuable insights about protecting your organization’s data and his approach to data loss pr…
…
continue reading
1
Artificial Intelligence And Data Privacy With Caroline McCaffery
27:07
27:07
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:07
Artificial intelligence is sweeping every aspect of the digital space right now, and it always finds its way into our personal lives in more ways than one. Despite its many benefits, concerns regarding data privacy arise. Caroline McCaffery of ClearOPS is here to discuss the state of data privacy laws and regulations as AI becomes more ubiquitous. …
…
continue reading
1
Navigating Cyber Risk: Building Cybersecurity Resilience With Wendy Epley
29:22
29:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:22
Cybersecurity incidents usually stem from human-enabled actions. But to err is human; it is only by learning from those mistakes that we can improve. In this episode, John Riley and George Usi sit down with Wendy Epley, Principal Analyst and Information Security expert at the University of Arizona. As a seasoned professional with over 15 years of e…
…
continue reading
1
The CMMC Evolution: A CEO's Guide To Cyber Resilience With Seth Guntharp
39:20
39:20
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
39:20
Effective cybersecurity isn't just a checkbox – it's an ongoing investment in resilience. It starts from the top, where collaboration between IT and leadership paves the way for a secure digital future. In this episode, we have Seth Guntharp to shed light on the challenges and triumphs of achieving CMMC (Cybersecurity Maturity Model Certification).…
…
continue reading
1
Anthropics Responsible AI Scaling Policy
47:26
47:26
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
47:26
In this episode of the Emerging Cyber Risk podcast, Joel and Max explore Anthropic's responsible AI scaling policy. They discuss the practicality and strategic nature of the framework, which aims to ensure the safety of AI models as they push the boundaries of capabilities. They highlight the commitments made by Anthropic and the public disclosure …
…
continue reading
1
Joel's Book Review (Secure Intelligent Machines)
35:04
35:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:04
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
…
continue reading
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
1
2024 Annual Planning for AI Enablement
32:43
32:43
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:43
On this episode of the Emerging Cyber Risk podcast, we discuss the AI planning that is going into 2024 and how this may affect our business. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulak…
…
continue reading
1
RCR 155: Identity Unlocked: Unraveling Identity Management (Domain 5)
39:14
39:14
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
39:14
Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. W…
…
continue reading
1
The Intersection of AI and the Military: A Discussion with Taylor Johnston, Former Chief of Innovation for the U.S. Air Force
31:39
31:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:39
On this episode of the Emerging Cyber Risk podcast, our guest is Taylor Johnston, Chief Operations Officer at the USF Institute of Applied Engineering and former Chief of Innovation for the United States Air Force. Join us as we investigate the integration of artificial intelligence and automation into the air force and the wider military. Tune in …
…
continue reading
1
RCR 154: CISSP Exam Questions (Domain 4)
11:49
11:49
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
11:49
Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the comp…
…
continue reading
1
RCR 153: Unraveling the Intricacies of VOIP and iSCSI in Cybersecurity - CISSP Domain
39:51
39:51
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
39:51
Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it…
…
continue reading
1
RCR 152: CISSP Exam Questions (D3)
12:19
12:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
12:19
Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DRE…
…
continue reading
1
How Should Business Executives Act And React After A Cyberattack
22:17
22:17
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
22:17
In this pilot episode, John Riley and George Usi discuss the recent cyberattacks on Las Vegas casino giants MGM Resorts International and Caesars Entertainment. Their conversation centers not so much on the technical aspect but more on the leadership side, discussing how business executives should swiftly act and appropriately react. John and Georg…
…
continue reading
1
How Executives Can Navigate Cyber Risks Today With Clarence Dingman
40:01
40:01
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
40:01
As technologies become even more interconnected and deeply embedded in our lives, facing cyber risks has become more real than ever. Cyber security could be the only thing that keeps you and your business safe. In this episode, John Riley and George Usi sit down with the President of PingWind, Inc., Clarence Dingman, to discuss how executives and l…
…
continue reading
1
RCR 151: Mastering Threat Modeling: A Comprehensive Guide to Cybersecurity and CISSP Exam Preparation
42:46
42:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
42:46
Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for b…
…
continue reading
1
The Biden Administration Hands the Safety & Security of AI to Industry Leaders!
35:04
35:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:04
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
1
Cybersecurity And Business Leadership: A CEO's Guide To Protecting Their Business With Ryan Grimes
29:40
29:40
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:40
Safeguarding your business is not rocket science, but you may want to seriously consider hiring experts to do it, even if you have an IT team on your premises. Join John Riley and George Usi in this episode of Navigating Cyber Risk as they engage with Ryan Grimes, a seasoned IT professional with a unique passion for both cybersecurity and growing f…
…
continue reading
1
Navigating The Intersection Between Web Design And Cybersecurity With Mary Putnam, DesignYourSite
34:01
34:01
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:01
There are a lot of parallels between web design and cybersecurity, and keeping your website secure may be the first step to making sure your business is safe from threats from bad actors. Mary Putnam, the CEO at DesignYourSite.net, straddles this intersection by providing comprehensive web services for businesses that include security audits and se…
…
continue reading
Are you ready to unlock the secrets of data classification and pass your CISSP exam in one go? That's right! Your host, Sean Gerber, is here to guide you through an insightful exploration into the world of data classification. From the intricacies of content-based and context-based data classification to the various stages of the information life c…
…
continue reading
In the ever-accelerating world of cybersecurity, it's not a question of 'if,' but 'when' you'll face a breach. Join John Riley and George Usi co-founders of Omnistruck, as they unravel the high-stakes landscape of cyber risk management in Navigating Cyber Risk. This podcast, designed by executives for executives, delivers real-world insights into t…
…
continue reading
1
RCR 149: Securing Your Digital Landscape- A Deep Dive into Data and Asset Classification (D2)
35:59
35:59
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:59
Are you ready to make your digital assets and information impenetrable? Well, we're here to navigate you through the maze of understanding and protecting your most valued digital treasures. This episode is packed with a wealth of knowledge, as we discuss the intricacies of information and asset protection. We highlight the vitality of data classifi…
…
continue reading
1
RCR 148: CISSP Exam Questions (Domain 1)
13:27
13:27
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
13:27
Are you charged with navigating the precarious terrain of supply chain risk management? Then, prepare to sharpen your skills in this action-packed episode! I'm Sean Gerber, and I'll be guiding you through the labyrinth of supplier audits and evaluations, discussing the delicate balance between the two. We'll also delve into strategies for mitigatin…
…
continue reading
1
RCR 147: Securing the Chain- Mastering Supply Chain Risk Management (SCRM) for the CISSP (D1)
34:49
34:49
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:49
Prepare to unravel the complexities of supply chain risk management (SCRM) and gain invaluable insights that could safeguard your business from massive disruptions. We're diving into the nerve-wracking challenges of SCRM, emphasizing just how crucial it is for every business in our hyper-connected age. Learn about the nuances of this formidable tas…
…
continue reading
1
Navigating the Legal Challenges of Artificial Intelligence with Scott Koller of Baker & Hostetler LLP
38:31
38:31
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
38:31
On this episode of the Emerging Cyber Risk podcast, our guest is Scott Koller, a skilled privacy and data security attorney and Partner at Baker & Hostetler LLP. Join us as we navigate the legal challenges posed by artificial intelligence (AI), delving into the associated risks and possible future solutions. We further explore the ownership and cop…
…
continue reading
1
RCR 146: CISSP Exam Questions (D1-8)
10:09
10:09
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
10:09
Ready to conquer the CISSP exam with confidence? Join me, Shon Gerber, in this week's CISSP Cyber Training Podcast as we tackle questions from all eight domains to give you the insights and knowledge you need for success. From understanding the purpose of a risk register to exploring the primary security concerns in a microservices architecture, th…
…
continue reading
1
RCR 145: Mastering CISSP and Navigating Cybersecurity Certifications
20:35
20:35
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
20:35
Ready to level up your cybersecurity career? Wondering which certifications are worth your time and investment? We've got you covered in today's episode, where we break down everything from the entry-level CompTIA A+ certification to the more advanced CISSP. Get an insider's look at the costs, study time, and areas of concentration for each of thes…
…
continue reading
1
Molding Reality: How 3D Printing Bridges Design And Creation With Abraham Feld
36:23
36:23
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
36:23
From crafting dreams to engineering realities, 3D printing is reshaping industries and bridging the gap between imagination and innovation. So, what’s the catch? In this episode, we sit down with Abraham Feld, a visionary expert in additive manufacturing and co-founder of Creative 3D Technologies, to explore the world of 3D printing. Abraham takes …
…
continue reading
Ready to elevate your cybersecurity knowledge and pass the CISSP exam? This episode is packed with insights on software development, diving into the crucial phase of integrating security into the software development lifecycle (SDLC). We uncover the secrets of design and architecture, as well as static and dynamic application security testing (SAST…
…
continue reading
1
RCR 143 - Navigating the Cybersecurity Landscape through Secure Software Design (D8.1)
42:32
42:32
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
42:32
Are you ready to elevate your cybersecurity knowledge and ace that CISSP exam? Join me, Shon Gerber, as we delve deep into the often-overlooked realm of software development lifecycle and the essential security controls within the development ecosystem. We'll unpack the three key secure design principles: least privilege, fail-safe defaults, and de…
…
continue reading
1
Exploring the Adoption of AI in the Defense Industry with Ron Fehlen of L3Harris Technologies
35:42
35:42
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:42
On this episode of the Emerging Cyber Risk podcast, our guest is Ron Fehlen, VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to h…
…
continue reading
1
Modernizing Cybersecurity: Preventing Breaches With Ken Morris
31:40
31:40
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:40
We trudge into the cyberspace, potentially vulnerable to identity theft or cyber-attacks. Your company should be protected against potential attacks. In this episode, Ken Morris, the CEO of KnectIQ, offers valuable insights on preventing attacks and breaches through modernizing cybersecurity. He mentions building a technology that removes the need …
…
continue reading
1
The State Of The Banking Industry: Unveiling Why Banks Fail With Jay Williamson
33:37
33:37
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:37
We are seeing a number of bank failures happening recently, leaving those of us not from that sector wondering what is going on. Is our money safe? Is there a concern for our data? In this episode, Jay Williamson, the President and CEO of American Southwest Credit Union, joins John Riley and George Usi to shed light on the state of the banking indu…
…
continue reading
1
Exploring the Intersection of Cyber Security and AI: Insights from Phil Harris of IDC
37:41
37:41
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:41
On this episode of the Emerging Cyber Risk podcast, our guest is Phil Harris, Research Director, Cyber Security Risk Management Services at IDC, the premier global marketing intelligence platform. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk managemen…
…
continue reading
1
Addressing The Organic Waste Problem Through Hydrogen Production With Jean-Louis Kindler
29:34
29:34
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:34
Humans are producing endless amounts of organic waste every single day, and despite being mostly recyclable, a massive chunk of it only piles up in landfills. Jean-Louis Kindler wants to help reduce trash in the world by maximizing the impact of hydrogen production. Joining John Riley and George Usi, he talks about their work at Ways2H, where they …
…
continue reading
1
Amira Armond On Increasing The Likelihood Of Passing Cybersecurity Assessments
39:03
39:03
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
39:03
Businesses are required to undergo cybersecurity assessments to ensure data security. This process ensures that they have the necessary safeguards against cyberattacks, breaches, and data leaks. However, many fail to meet the regulatory requirements set by the Cybersecurity Maturity Model Certification and National Institute of Standards and Techno…
…
continue reading
1
Transparency and Collaboration: Driving AI Adoption in the Military and Government with Aaron McCray of the US Navy
44:14
44:14
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
44:14
On this episode of the Emerging Cyber Risk podcast, our guest is Aaron McCray, a twenty-six-year veteran of the U.S. Navy. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. …
…
continue reading
1
Unmasking Ransomware: The Shiny Penny That Costs Lives With Janine Darling
49:06
49:06
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
49:06
Ransomware is not just about money. It is also about lives frozen in uncertainty. It's time to unmask the dark reality, fortify our defenses, and protect the very essence of our digital existence. Our guest for today's episode is the CEO of Stash Global, Janine Darling, a leading expert in the field of cybersecurity. Janine discusses the shadowy wo…
…
continue reading
1
RCR 142: CISSP Exam Questions (Domain 7)
13:18
13:18
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
13:18
Do you know the differences between security events and security incidents? Are you confident in your ability to protect log files from unauthorized access? Join me, your host Sean Gerber, in this week's episode of the CISSP Cyber Training Podcast as we explore domain 7 of the CISSP exam and tackle these important questions. Remember, it's all abou…
…
continue reading
1
Unveiling Cyber Risks: Regulatory Challenges And Meeting Requirements With Eric Jenkusky
38:29
38:29
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
38:29
What would happen to the entire world if the internet suddenly shuts down? In this captivating episode, Eric Jenkusky of T.J. Clark International delves into the realms of cyber risks and the best way to navigate them. He shares an insider's look at the intersection of technology and defense, uncovering the hidden nuances that shape the military's …
…
continue reading