COMPASS Cyber Security public
[search 0]
Plus
Téléchargez l'application!
show episodes
 
Artwork
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Loading …
show series
 
"How do you drive trust in a digital first or software first world?" This is the question that Francis Ofungwu, Global Field CISO at GitLab, helps customers answer every day. Securing software development is unlike enterprise security, where CISOs have strong visibility into the environment and can exercise direct control. To secure software, leade…
  continue reading
 
GRSA/Compass Group is a global provider of food services and support operating in over 50 countries. How does CISO Adriano Lima, ensure his company remains secure while serving companies, schools, hospitals, oil platforms, and customers in remote locations around the world? Discover his secrets for success as he shares his experiences with Zscaler …
  continue reading
 
Darin Hurd, EVP and CISO at Guaranteed Rate, explains the value of zero trust security in the financial sector. Lenders cannot control the federal funds interest rate or the state of the economy, which can change rapidly. However, they must respond and adapt to these variables and others while ensuring their infrastructure remains secure. Darin exp…
  continue reading
 
Brent Deterding, CISO of Afni, knows focusing on empathy yields benefits for his personal, and professional life. Whether raising foster children, meeting with vendors, or analyzing cyber attacks, his policy of treating others with dignity opens new doors and creates opportunities. Learn how being transparent in conversations helps him avoid costly…
  continue reading
 
Board-Level Cyber Risk Oversight New regulations are elevating cybersecurity issues to the attention of the boardroom, is your organization prepared? Board member Helmuth Ludwig and Zscaler Sr. Director of Global Executive Advisory, Lauren Wise, wrote the book on board-level cyber risk oversight. Listen to their discussion on defining material brea…
  continue reading
 
Elena Elkina, Partner at Aleada Consulting, uses her legal and technical background to help organizations explore the treacherous intersection of privacy and security. Are your security processes compliant with privacy regulations? If your cybersecurity posture meets security regulations, have you met your privacy obligations? Elena shares her insi…
  continue reading
 
Shannon Lietz is an award-winning security professional, patent-holder, visionary innovator, and industry leader. She joins host Sean Cordero for an in-depth discussion on lucky vs. good cybersecurity, passion-based hiring, DevSecOps, and our industry’s need for accountability and metrics.Par Zscaler, Inc.
  continue reading
 
For many organizations, data backups are not treated as something that may ultimately determine the survivability of the company. Avoid making this mistake, listen to W. Curtis Preston’s (a.k.a. “Mr Backup”) sobering stories of businesses destroyed in a single day due to poor data resiliency practices and how the 3-2-1 backup rule can help fend out…
  continue reading
 
Zscaler CISO-Americas Benjamin Corll and Brad Moldenhauer join host Sean Cordero to discuss the hottest cybersecurity topics at Miami's recent Global CISO Exchange. Sean delves into their experience to uncover what security executives are discussing today. What problem has CISOs brainstorming in their hallway conversations? Where do industry leader…
  continue reading
 
Is a CISO’s ascent to industry stardom less about passion for technology and more about overall C-suite business acumen? That holds true for award-winning CISO at BAT, Dawn-Marie Hutchinson. Discover how an MBA, effective presentation skills (Toastmasters anybody?), and keeping your company’s annual reports own your nightstand can be a turning poin…
  continue reading
 
Joseph Drasin, assistant vice president for planning and continuous improvement at the University of Maryland, College Park’s Division of Information Technology, is a faculty fellow in the Honors College, and a technology leadership expert. A software engineer turned academic, Drasin specializes in organizational development, change management, and…
  continue reading
 
In the final episode of CISO’s Gambit for this year, host Sean Cordero is joined by colleagues Brad Moldenhauer, Mark Lueck, and Ben Corll, members of the office of the CISO at Zscaler, for a look back on 2022. They discuss the year’s cybersecurity happenings, the evolving role of security leadership, and what trends they anticipate continuing into…
  continue reading
 
In a first, host Sean Cordero welcomes accomplished venture capitalist to the show, Marcus Bartram, General Partner at Telstra Ventures. Marcus has backed investments in such recognizable security ventures as CrowdStrike (a Zscaler partner). Throughout their conversation, Bartram explains what he looks for in an attractive cybersecurity investment,…
  continue reading
 
Not everyone arrives at work in the morning to advance humans’ understanding of our place in the universe. But David Liska does. As the Associate Director of Engineering & Technology at the Space Telescope Science Institute, he’s been integral in launching and operating one of humanity’s most ambitious astronomical projects to date: the James Webb …
  continue reading
 
Does academia take the right approach to producing tomorrow's cybersecurity leaders? What role should private sector leaders play? JP Saini, Chief Digital & Technology Officer at Sunbelt Rentals joins host Sean Cordero to discuss how mentorship directly contributes to better business outcomes, the importance of soft skills, and the fundamentals nec…
  continue reading
 
Get up to speed on the art and science of training models, big data sets, and limitations and possibilities for AI in cybersecurity and beyond. Zscaler Vice President of AI and Machine Learning Howie Xu has been a pioneer in applying AI and ML to cybersecurity since the late 1990s. In this episode, he is joined by VP and CISO AMS - Brad Moldenhauer…
  continue reading
 
After the RSA showroom floor proved zero trust's popularity as a buzzword, how will its tenants be solidified and standardized to separate true adherents from charlatans? To find out, host Sean Cordero welcomes John Yeoh, global vice president of research at the Cloud Security Alliance, and Lauren Wise, senior director, global executive advisory at…
  continue reading
 
Zscaler VP & CISO Brad Moldenhauer joins host Sean Cordero for a deep dive into new phishing data and tactical analysis provided by the Zscaler ThreatLabz team. They cover why political turmoil tends to correlate with rising phishing rates, phishing attack vectors like browser-in-the-browser (BitB) that are gaining steam among adversaries, supply c…
  continue reading
 
There is no one path to the top security role, but once there, the challenges for newbie CIOS are familiar. What are the keys to success? What kind of background and skill set is best? How do you pick up an inherited tech stack and budget and run with it? What is the right organizational structure given how infrastructure and risk management have e…
  continue reading
 
The global M&A market is on a record-setting pace with trillions of dollars in transactions every year. With that comes a lot of success stories and unfortunate failures. In this episode, CISO-Americas and host Sean Cordero and Zscaler guests Sami Ramachandran, Managing Director, M&A, Divestiture, Private Equity, and Pam Kubiatowski, Field CTO, det…
  continue reading
 
Sean welcomes Bryan Green, former Business Information Security Officer (BISO) at Salesforce, and Brad Moldenhauer, former CISO at Steptoe & Johnson, as guests in this stage-setting discussion into trends and concerns that will occupy the minds and focus of cybersecurity leaders the world over. Listen for perspectives and insights you can use in yo…
  continue reading
 
CISO - Americas, Sean Cordero, a newcomer to the Zscaler team, picks up the reins as host and interviews Deepen Desai, the Global CISO and Head of Security Research at the company about the most pressing cybersecurity topic this month, Log4j. Listen in for insights into how attackers can and have been exploiting the massive vulnerability, preventio…
  continue reading
 
The Zscaler CISO team is joined by their esteemed colleague, Sahir Hidayatullah, to investigate the capability known in the cybersecurity industry as Active Defense. The Zscaler CISO team has been actively engaged with customers on various threat prevention and detection strategies for SecOps maturity. The problem in this area today is apparent: al…
  continue reading
 
CISA TIC Program Manager, Sean Connelly, speaks with our Federal CISO, Danny Connelly, about the game changing aspects of TIC 3.0 and what it means for the federal government. The Office of Management and Budget (OMB) Memorandum M-19-26, “Update to the Trusted Internet Connection (TIC) Initiative”, provides agencies a modernized approach to impleme…
  continue reading
 
The Zscaler CISO team has been hearing the same question in their day-to-day interactions: should I deploy zero trust: at the edge or at the endpoint? In this podcast, they share their perspectives on why a layered defense is critically important to protect organizations from today's threats. SASE + EDR = “Better Together”, and the team clears up s…
  continue reading
 
The Zscaler CISO team looks at the inherent tension between business enablement and cyber security that plays out in many organizations. How do you balance the need for strong security AND still adopt cloud-and mobile-technologies that allow for business agility, resiliency, and user productivity? Why is user experience important to successful ente…
  continue reading
 
The Zscaler CISO team delves into what happened at Colonial Pipeline, and the federal government’s response to the attack in the form of the Executive Order on Improving the Nation’s Cybersecurity. What the Colonial Pipeline attack was The nature of ransomware attacks The issues with Colonial Pipeline’s response Some details on how the new EO addre…
  continue reading
 
In this episode, Brad Moldenhauer, Marc Leuck, Nicolas Casimir, and Danny Connelly of the Zscaler CISO team cover the ins and outs of SSL inspection for enterprise cybersecurity posture. They review: The importance of SSL inspection The implementation challenges of SSL inspection Privacy and legal challenges associated with SSL inspection Encrypted…
  continue reading
 
The WannaCry Ransomware attack that began May 12, 2017 is one of the largest ransomware attacks in history. This attack used a computer worm, borrowed from leaked NSA exploits, to target Microsoft Windows operating systems at an unprecedented scale. To date, over 300,000 machines in 150 countries have been affected. This podcast offers an in-depth …
  continue reading
 
President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission’s Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive inform…
  continue reading
 
This episode of The CyberGuide discusses the CIA Vault 7 Release on WikiLeaks. This exposed the CIA’s ability to manipulate and exploit software without consumer knowledge. For example, the documents introduced a new series of threat actors of which demonstrate the CIA’s capability to hack smart TVs and smartphones. Tune in for more information abo…
  continue reading
 
This episode of The CyberGuide reviews the landscape of cyber security in 2016 and offers predictions for 2017. Organizations are in the early stages of understanding the importance of cyber security and investing in it. However, threats, including ransomware and spear phishing, are becoming more sophisticated. These facts make way for an interesti…
  continue reading
 
The Internet of Things (IoT) is the interconnectedness of devices that have an IP address, that are embedded in everyday objects, and have the ability to send and receive data. Examples of IoT devices include mobile devices, fitness trackers, and smart speakers, among many others. These devices have endless potential but users must be aware of the …
  continue reading
 
It is impossible to protect your organization from a threat you don’t know exists. As a result, it is imperative your organization goes through the threat identification and analysis process at least once a year. This episode of The CyberGuide explains this procedure and how it is applicable and it begins by broadly examining potential threat sourc…
  continue reading
 
It is difficult for organizations to make informed decisions on cyber security risk management without understanding the unique threats they may face. As a result, the 5 Steps to Develop a Security Program helps businesses determine where their vulnerabilities exist and offer suggestions on remediation. To allocate your resources effectively, it is…
  continue reading
 
Regardless of an organization’s size and industry, the Top 10 Most Common Findings in Security Assessments are applicable and help organizations understand their unique cyber security threats. The commonalities in these assessments allow organizations to better allocate their resources. The top 10 findings are broken out across the Three Pillars of…
  continue reading
 
Negligent and malicious insiders are major threats to organizations as they are responsible for a large percentage of data breaches. Insiders pose a unique threat to your organization because they know your network the best and typically have access that an outsider does not. Businesses must find a balance between security and functionality because…
  continue reading
 
Cyber security is a foreign language to most executives. This episode offers suggestions when speaking with executives about cyber security and enterprise risk management in your organization. Cyber security is a broad topic that addresses a range of topics from risk management to regulatory compliance. Executives need to think of cyber security as…
  continue reading
 
Loading …

Guide de référence rapide