Player FM - Internet Radio Done Right
27 subscribers
Checked 14d ago
Ajouté il y a neuf ans
Contenu fourni par RSAC and RSA Conference. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par RSAC and RSA Conference ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !
Mettez-vous hors ligne avec l'application Player FM !
Podcasts qui valent la peine d'être écoutés
SPONSORISÉ
B
Biscuits & Jam


1 Shuai Wang’s Journey from China to Charleston 38:30
38:30
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé38:30
Chef Shuai Wang was the runner-up on the 22nd season of Bravo’s Top Chef and is the force behind two standout restaurants in Charleston, South Carolina—Jackrabbit Filly and King BBQ—where he brings together the flavors of his childhood in Beijing and the spirit of the South in some pretty unforgettable ways. He grew up just a short walk from Tiananmen Square, in a tiny home with no electricity or running water, where his grandmother often cooked over charcoal. Later, in Queens, New York, his mom taught herself to cook—her first dishes were a little salty, but they were always made with love. And somewhere along the way, Shuai learned that cooking wasn’t just about food—it was about taking care of people. After years working in New York kitchens, he made his way to Charleston and started building something that feels entirely his own. Today, we’re talking about how all those experiences come together on the plate, the family stories behind his cooking, and what it’s been like to share that journey on national TV. For more info visit: southernliving.com/biscuitsandjam Learn more about your ad choices. Visit podcastchoices.com/adchoices…
Beyond MFA: Why Multi-factor Alone Is Not a Fail-Safe for Identity Protection
Manage episode 347146722 series 1237183
Contenu fourni par RSAC and RSA Conference. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par RSAC and RSA Conference ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Most organizations have moved beyond the insecure username and password access control a long time ago and started using multifactor authentication. But as Yahoo, Deloitte, and LinkedIn know, MFA won’t always save the company from a data breach. Not only has MFA access been defeated multiple times by attackers, but users hate it. It’s cumbersome, annoying, increasingly exploitable. In this podcast Violet Sullivan and Jessica Smith will discuss the evolution of MFA, why and how it can be exploited, and what organizations can and should do to address access control in a way that keeps their data security and users happy. Speakers: Jessica Smith, Vice President of Client Services, AllClear ID Health Violet Sullivan, Esq. CIPP/US, Vice President of Client Engagement, Redpoint Cybersecurity Kacy Zurkus, Content Strategist, RSAC
…
continue reading
180 episodes
Manage episode 347146722 series 1237183
Contenu fourni par RSAC and RSA Conference. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par RSAC and RSA Conference ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Most organizations have moved beyond the insecure username and password access control a long time ago and started using multifactor authentication. But as Yahoo, Deloitte, and LinkedIn know, MFA won’t always save the company from a data breach. Not only has MFA access been defeated multiple times by attackers, but users hate it. It’s cumbersome, annoying, increasingly exploitable. In this podcast Violet Sullivan and Jessica Smith will discuss the evolution of MFA, why and how it can be exploited, and what organizations can and should do to address access control in a way that keeps their data security and users happy. Speakers: Jessica Smith, Vice President of Client Services, AllClear ID Health Violet Sullivan, Esq. CIPP/US, Vice President of Client Engagement, Redpoint Cybersecurity Kacy Zurkus, Content Strategist, RSAC
…
continue reading
180 episodes
Все серии
×R
RSA Conference

1 Call for Speakers: Tips & Strategies 21:35
21:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé21:35
Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out before the CFS opens later this month. Speakers: John Elliott, Principal Consultant, Withoutfire and Pluralsight Author Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Courage and Resilience : Getting it, Keeping it, and Growing it 17:16
17:16
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé17:16
Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on how to make this happen. Speakers: Jennifer Leggio, Chief Strategy Officer, W2 Communications, Kacy Zurkus, Director of Content, RSAC, and Tatyana Sanchez, Content & Programming Coordinator, RSAC…
R
RSA Conference

1 Unmasking the Risks of Generative AI Deception 15:39
15:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé15:39
Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potential solutions! Speakers: Aparna Achanta, Principal Security Architect, IBM, Tatyana Sanchez, Content & Programming Coordinator, RSAC, Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Beyond Learning to Code: How to Get Kids Curious About Cybersecurity 24:04
24:04
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé24:04
As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cybersecurity as a career path of interest where they belong? Listen in as RSAC explores this topic with industry influencers. Speakers: Jason Blanchard, Content & Community Director, Black Hills Information Security David Brumley, CEO, Mayhem Security John Hammond, Principal Security Researcher, Huntress Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Your Cybersecurity Career and You 16:47
16:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé16:47
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place to start or continue your career and reach the top. Speakers: Alex Holden, CISO, Hold Security, LLC Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Third Party & Vendor Risk Management: The Program Committee's Perspective 29:09
29:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé29:09
With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuable takeaways attendees can expect to gain from this year’s sessions. Speakers: Edna Conway, CEO, Board Director, Sr. Nonresident Fellow, EMC Advisors, Active Cypher, Attabotics, Critical Start, Cyber Re, Carnegie Endowment for International Peace Todd Inskeep, Executive Cybersecurity Advsior, Incovate Solutions Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Guiding the Guide: Influence in Crisis Mode 19:33
19:33
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé19:33
This Podcast explores the essential skills needed to effectively influence leadership during a crisis. It begins by exploring different roles of crisis management and attendees will learn the importance of understanding what motivates the stakeholders and how aligning with these priorities enhances influence and explores the importance of building trust and credibility long before a crisis hits. Speakers: Nas Hajia, Seucrity Architect, Director, Okta Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Unpacking the Critical Infrastructure Track: A Committee Perspective 21:58
21:58
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé21:58
In this Podcast, we're joined by the Critical Infrastructure Program Committees to discuss the exciting submissions they've received for RSAC 2025. We'll delve into the key trends they observed, what submissions stood out to them, and what they're most looking forward to experiencing at Conference. Tune in to hear valuable insights and reflections from these industry experts. Speakers: Dawn Cappelli, Director, OT-CERT, Dragos Patrick Miller, CEO, Ampyx Cyber John Johnson, CISO, Docent Institute, & Founder/CEO, Aligned Security Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Empowering Seniors: Practical Cybersecurity for the Digital Age 24:50
24:50
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé24:50
Seniors face growing cyberthreats like phishing and identity theft. This session simplifies cybersecurity, offering practical tools and strategies to help older adults and their caregivers recognize and avoid scams. Attendees will gain clear, actionable steps to protect themselves and their loved ones from evolving online dangers. Speakers: Alex East, Senior Solutions Engineer, Armorcode Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 A Conversation with Our Security Strategy & Architecture Program Committee 24:11
24:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé24:11
In today’s technological landscape, integrating AI into business operations presents both opportunities and complex security challenges. Our podcast will explore the importance of our Security Strategy and Architecture track, which examines robust security strategies from a diverse set of subject matter experts. We will cover foundational topics including the evolution of defense in depth, advanced threat modeling, adherence to established and evolving security standards and frameworks, and addressing more sophisticated attacks. We’ll also highlight innovative solutions and open-source frameworks shaping security, helping businesses enhance their security posture, comply with regulations, and fully harness emerging technologies to drive growth and efficiency. Additionally, we will explore the trends we have seen this year while reading the submissions. Join us for actionable insights to navigate the complexities of cybersecurity by careful design and implementing effective strategies to safeguard your organization and drive progress. Speakers: Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft Kelley Misata, Founder and Chief Trailblazer, Sightline Security & President, Open Information Security Foundation (OISF/Suricata) Ed Moyle, Partner, SecuirtyCurve Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC Listen to more RSAC Podcasts here: https://www.rsaconference.com/library/podcast…
R
RSA Conference

1 Behind the Scenes of the Hackers and Threats Track 26:52
26:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé26:52
Yes, winter is here, and some may find this time of year unbearable. But on the bright side, we're approaching RSAC 2025. And as we approach April, we're excited to bring together the Hackers & Threats track Program Committee Members. Tune into this podcast as they'll disclose behind-the-scenes insights, what they've seen in their tracks, which sessions stood out to them and why, and of course, what they're most excited about for RSAC 2025. Greg Day, VP & Global Field CISO, Cybereason Nicole Little, Security Products and Partnerships Manager, Netflix Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Father and Son, CISO and Psychologist: Navigating the Digital Age 29:36
29:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé29:36
Richard Bird and Xavier Bird are father and son. Richard has spent 3 decades in technology and cybersecurity. Xavier, like most of Gen Z, is a digital native. He also happens to be a doctoral candidate in psychology who has focused his attention on adolescent counseling and the impact digital experiences have on the development of self-image among children consuming a steady diet of feeds and streams from video games to influencers. From the pitfalls of “algorithmic parenting” to the ripple effects of social media culture on identity formation. Tune in to this podcast as this father and son duo unpack the nuanced interplay of privacy, security, and mental health in the digital age. Speakers: Richard Bird, Senior Fellow, Executive Member, CyberTheory Zero Trust Institute, CyberEd.io. Xavier Bird, Psychology Doctorate (PsyD) Candidate, University of Denver Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference

1 Inside the RSAC Program Committee: Device Security & Accessibility 24:08
24:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé24:08
As we approach RSAC 2025, we're excited to bring together the Program Committee Members (PCMs) from our Device Security & Accessibility track. Tune into this podcast to learn what Device Security and Accessibility means, what topics the PCs saw trending in the submissions, and what people can look forward to learning about at the Conference. Speakers: Justin Merhoff, Director of Security, Deque Systems Maggie Morganti, Senior Director of Product Security, WorldPlay Smitha Sriharsha, Sr Manager Platform Security Engineering, F5 Networks Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Jingle All the Way to Safety: Cyber Security Tips for the Holidays 22:19
22:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé22:19
As the holidays approach, many are well into their shopping sprees. It's an exciting time to prepare for the holiday season and spend time with loved ones. However, with cyberattacks on the rise, we can expect a significant increase in cyberattacks during this season. Join this podcast to explore safety and security tips for online shoppers, learn about current cyberthreats, and discover actionable steps to protect yourself from becoming a victim of cybercrime. Speakers: Bailey Marshall, Customer Engineer, Security, Google Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies 19:25
19:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé19:25
SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhancing their cyber resilience, SMEs can improve compliance, build trust with customers, and ultimately drive business growth. Speakers: Praise Ayodele, Graduate Researcher, University of Central Missouri Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Governing AI Innovation: Balancing Ethics and Compliance 27:16
27:16
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé27:16
As AI rapidly integrates into our lives, it presents both immense opportunities and significant risks. This podcast explores the urgent need for robust governance frameworks to ensure AI is used responsibly. We will delve into ethical guardrails, risk mitigation strategies, and best practices inspired by academic AI principles. Join us to discover how to harness AI's power while upholding your organization's values. Speakers: Brian Warshawsky, Director, Research Ethics and Compliance, University of California, Berkeley Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Election Security: Best Practices and Emerging Threats 20:48
20:48
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé20:48
In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system. This podcast explores the critical issue of election security, emphasizing the need for a collaborative and proactive approach. Join this talk as we delve into the bipartisan nature of election threats, highlighting the shared vulnerabilities faced by campaigns across the political spectrum. We discuss actionable steps that individuals, campaigns, and organizations can take to enhance their cybersecurity posture. Speakers: Andrew Schoka, Founder, VoterGuard Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Securing Sovereignty: How Technology is Strengthening Tribal GC Elections 21:39
21:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé21:39
Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addressing challenges unique to Tribal elections. Speakers: Mackenzie Quick, Cybersecurity Analyst, Suquamish Tribe Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Navigating the Evolving Threat Landscape: Cybersecurity in Retail and Fashion 16:09
16:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé16:09
Join us for an in-depth discussion on the cybersecurity threats facing the retail and fashion industries. We'll explore the top trends for 2024 and 2025, including AI, e-commerce fraud, ransomware, and supply chain compromise. Our expert guest will share real-world examples of cyberattacks targeting the retail and fashion value chain, shedding light on the tactics used by threat actors. We'll also discuss predictions for 2026 and explore strategies for mitigating these risks and safeguarding your organization. Speakers: Alexandra Forsyth, Retail, Fashion and Cyber Security Expert, A.F's RetailGuide Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 The World of AI: Governance and Application 31:04
31:04
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé31:04
Speakers: Arti Raman, CEO and Founder, Portal26 Dane Sherrets, Senior Solutions Architect, HackerOne Kacy Zurkus, Senior Content Manager, RSA Conference AI has been implemented in almost every organization and AI governance helps ensure that AI is being used ethically and unbiasedly. We will explore the multifaceted world of AI, focusing on governance and applications. Join this podcast as we unfold the challenges and opportunities associated with AI technologies, examining the need for responsible governance, diverse applications across industries, and necessary measures for navigating the evolving landscape.…
R
RSA Conference

1 Elevate & Innovate: Success Tips for Women Entrepreneurs 17:31
17:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé17:31
Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potential investors. We will also highlight some of the ideas we would love to see come through the RSAC 2025 Call for Submissions. Tune in to this podcast to learn practical tips and strategies to craft compelling submissions and get inspired to contribute your voice at RSA Conference 2025. Speakers: Gadalia Montoya Weinberg O'Bryan, Founder & CEO, Dapple Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 RSAC 2025: Call for Submissions Tips 21:55
21:55
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé21:55
Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to keep in mind when submitting your presentation. Join this podcast with Program Committee member, John Elliot, who will share some helpful tips and guidance to those interested in submitting their ideas for RSAC 2025. Speakers: John Elliott, Principal Consultant, Withoutfire and Pluralsight Author Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Secure by Design: Transforming the Software Security Landscape 24:29
24:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé24:29
Secure by design has many core principles, including manufacturer accountability, radical transparency, and leadership-driven security prioritization. Secure by design is critical for organizations as it minimizes risks and vulnerabilities within an enterprise. Join us as we discuss a transformative approach to software development and cybersecurity. Listeners will gain insights into how this initiative is reshaping the tech industry's approach to security, moving from reactive measures to proactive, built-in safeguards. Speakers: Vaibhav Malik, Partner Solutions Architect, Cloudflare Surya Prakash, Senior Vice President, Global Financial Corporation Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Healthcare Cybersecurity: The Intersection of Patient Safety & Clinical Resiliency 29:50
29:50
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé29:50
Healthcare sectors need to implement a strong cybersecurity team, proactive strategies, and security awareness training, but how do they do that while prioritizing patient care? Enter the need for clinical resiliency. Join this podcast to learn actionable takeaways for building a team medical providers who also understand both the impact of cyberattacks on hospitals and how to achieve resilience in the face of an attack to ensure patient safety and care quality. Speakers: Christian Dameff, Emergency Physician and Clinical Informatics Fellow, University of California San Diego Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes 23:05
23:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé23:05
Drones are becoming more common in skies around the world. While the initial reaction seems to be focused on privacy concerns, which are very valid, there should also be a higher focus on what someone can do with a relatively lightweight drone. Having it carry a hacking device or it being a hacking device itself is something that has not been talked about enough. Speakers: Brad Ammerman, Senior Director of Security, Prescient Security Alex Thines, Senior Security Consultant, Prescient Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 The CISA Zero Trust Maturity Model and the Five Pillars in Practice 18:44
18:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé18:44
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to learn how to use and adapt CISA Zero Trust Maturity Model and it’s five security pillars in practice. Join this podcast to hear real-world examples of challenges, benefits, and approaches about the model. Speakers: Jason Garbis, President, Numberline Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 The Fundamentals: Policymakers on Cybersecurity 14:01
14:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé14:01
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to hear about the educational resources on cybersecurity fundamentals that policymakers need to keep up in the rapidly changing regulatory environment. Learn how preparing them will support strong policies and equitable participation in the global digital economy. Join this podcast to hear some approaches and resources, as we discuss ways to build community to fill this strategic gap. Speakers: Diana Burley, Vice Provost Research & Innovation, American University Tatyana Sanchez, Content and Programming Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 The Impact of AI for Cybersecurity on the Healthcare Sector 34:45
34:45
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé34:45
In today’s digital world, organizations are increasingly impacted by AI for the good and bad. AI is being used in the healthcare industry for a variety of reasons. Despite AI being a resource for the healthcare sector it also comes with challenges. Join this podcast as we discuss: • How the healthcare can prepare for combatting AI-driven cyber threats • What steps should be taken now, next weeks, next months • Strategy for adoption of AI for cybersecurity • Upskilling your team • Realistic expectations…
R
RSA Conference

1 Shielding Small Businesses: Tips for Defending Against Cyber Threats 17:35
17:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé17:35
We engage in a dynamic discussion our guests who will share their experiences in cyber and thoughts on the cyber risks for small businesses where there is a crucial gap in the cybersecurity market. Focusing on the unmet needs of small businesses, guests will discuss the importance of providing support and solutions tailored to this underserved sector accompanied by use cases and real-world examples. Speakers: Tiffiny Bryant, Information Security Analyst, Shipt Inc. Nick Gipson, CEO, Gipson Cyber, Jordyn Short, Collaborator, Stats on Stats Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Inclusion Research: Women in CyberSecurity (WiCyS) 20:05
20:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé20:05
Diversity, Equity, and Inclusion (DEI) has long been talked about in an effort to diversify the workforce, but what are organizations really doing to change organizational culture. Understanding different perspectives on inclusion is key to informing how to create effective change to help attract and retain talent. Join this podcast to learn about the findings of inclusion research that Women in CyberSecurity (WiCys) have conducted. Speakers: Lynn Dohm, Executive Director, Women in CyberSecurity (WiCyS) Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 DevSecOps Insights and Exciting Horizons 25:29
25:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé25:29
Tune in as RSAC 2024 DevSecOps Program Committee Members discuss the trends pulled out from the DevSecOps track. Join this podcast to hear the latest trends, their significance, and what track submissions are telling us about today’s cybersecurity landscape and much more. Speakers: Akira Brand, Application Security Engineer, Akira Brand Consulting Jennifer Czaplewski, Senior Director, Target Chris Romeo, Chief Executive Officer, Devici Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 Changing the End Game: AI-Powered Security Solutions 25:07
25:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé25:07
How can we ensure we drive product security from the get go? How can we provide security assurance throughout the protect detect and response lifecycle of our services and solutions? How can AI empower our defenders? Leaders from Microsoft and Google will share insights on how AI can improve security efficiencies for the entire product lifecycle. We review real world examples from cloud security solution providers that can benefit the broad security community and defenders. Speakers: Heather Adkins, Vice President, Security Engineering, Google Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft Aanchal Gupta, CVP, Microsoft Tatyana Sanchez, Content and Programming Coordinator, RSA Conference…
R
RSA Conference

1 Neglected Essentials: The Overlooked Basics of Cloud Security 19:03
19:03
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé19:03
This podcast shares research that reveals how many of the most common cloud security risks—despite being tied to basic security guidelines such as the Principle of Least Privilege—are widely overlooked in organizations of all sizes, even in those with a high maturity level in terms of cloud security. We'll explain why that is and investigate approaches to reduce your risk. Speakers: Neil Carpenter, Principal Technical Evangelist, Orca Security Bar Kaduri, Research Team Leader, Orca Security Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
R
RSA Conference

Many organizations have fallen victim to data breaches and exposure. It is crucial to strengthen security as the rise of cyberattacks increases. What are some strong measurements to reduce the risk of data exposure? Join the RSAC 2024 Governance, Risk, and Compliance Program committee as they discuss what decision-makers need to think about from a compliance perspective. Speakers: Elliott Franklin, Chief Information Security Officer, Fortitude-RE James Lugabihl, VP Security - Governance Risk & Compliance, ADP Jamie Sanderson Reid, Director, Cyber Governance Risk & Compliance (GRC), The AES Corporation Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
R
RSA Conference

1 The Basics: Privacy by Design 13:20
13:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé13:20
Protecting data is a critical key when developing products, systems, or services. What are some privacy measures to consider? Join us for a discussion on the overview of Privacy By Design and how to implement it into practice. Speakers: Kim Wuyts, Manager Cyber & Privacy, PwC Belgium Tatyana Sanchez, Content and Programming Coordinator, RSAC…
R
RSA Conference

1 What's Trending in Privacy & Data Protection? 29:37
29:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé29:37
With differing privacy approaches that expand many geographies, more organizations are focused on building a strong privacy program. Is it time for Privacy by Design? And where exactly is the intersection between privacy and security? Join the RSAC 2024 Privacy & Data Protection Program Committee for insights into why privacy was a strong trend in the RSAC 2024 submissions. Speakers: John Elliott, Principal Consultant, Withoutfire & Pluralsight Author Laura Koetlze, VP, Group Research Director, Forrester Research Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

What does the cybersecurity workforce of the future looks like, and more importantly, how do we get there? Join us for a discussion on embracing the resilience and brilliance of black women is cyber, all part of the Black Women in Cyber Collective, who are working to protect our privacy and secure our world while also fostering opportunities to expand open pathways into cyber careers. Speakers: Shinesa Cambric, Principal Product Manager, Microsoft Mari Galloway, CEO & Founding Board Member, Cyberjutsu Talya Parker, Founder, Black Girls in Cyber Kacy Zurkus, Senior Content Strategist, RSA Conference…
R
RSA Conference

1 Is It Time to Move on From SMS? 18:21
18:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé18:21
Recent studies have found that SMS users increasingly do not trust the confidentiality and integrity of SMS, with users also reporting that they can not trust the true identity of the sender. Cybercriminals are able to exploit the weaknesses of this authentication tool, yet it continues to be a technology widely used and relied upon for perceived security in mobile messaging. Join this podcast to learn more about the weaknesses in SMS texting and why it might be time to move on to more robust security technologies. Speakers: Tatyana Bolton, Security Policy Manager, Google Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 You Can’t Have Zero Trust Without API Security 20:06
20:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé20:06
Zero Trust Security is often associated with network access and identity access management. However, while those solutions are important and necessary, the evolution in infrastructure and the onset of new attack surfaces require us to expand our perspective and include the API layer in security strategies. Join this podcast to hear industry influencers speak to the origins and evolution of the Zero Trust Framework, why Zero Trust must include the API layer for holistic and resilient security, what each participant sees as the future of Zero Trust, and how the latest reference architecture serves to guide security experts. Richard Bird, CSO, Traceable Chase Cunningham, CSO, Ericom Software Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference

1 The Great Debate of a Cybersecurity Skills Gap 27:21
27:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé27:21
For years, the cybersecurity industry has supported the narrative that there is a major skills gap, but some have been questioning whether the issues is an actual dearth of qualified candidates who possess the skills needed to fill open roles or an abundance of candidates with some transferable skills who aren't being given an opportunity to gain experience. Join this podcast in which we'll engage in the great debate of whether there actually is a cybersecurity skills gap.…
R
RSA Conference

1 Cybersecurity Community: Fortifying Defense Through Education and Sharing 13:03
13:03
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé13:03
Cyber leaders are unique in their necessity to share. Building community, leveraging best practices with organizations in the same industry is paramount to successfully protecting from threats. This podcast will delve into the world of the cybersecurity community and share some strategies, technologies, and best practices that CISOs can use to enhance the overall security posture of the organization. We'll focus on the importance of collaboration, communication, and relationship-building in cybersecurity.…
R
RSA Conference

1 Misconfigurations and the Business Implications of AI 17:26
17:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé17:26
In the race to develop the most powerful generative AI tools, businesses must take steps to avoid the inherent risks of this emerging tech. AI involves sharing massive quantities of data, so even a single misconfiguration can have serious repercussions. What are the new risks and broader business implications of AI that arise as organizations venture to harness its power? This podcast will examine that question and discuss the recent leak of 38 terabytes of data by AI engineers, as well as risk mitigation strategies that should be front of mind for developers and engineers looking to build more AI solutions.…
R
RSA Conference

1 Threat Modeling - Using the DIPP Method (Detect, Identify, Protect, Prevent) 16:38
16:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé16:38
Threat modeling is a process that is essential for organizations to use to combat threats, and for mitigating risks. Threat intelligence is a component that can be applied as a method for use with threat modeling to ensure that all risks and vulnerabilities are being properly assessed and techniques are used to protect assets. In this podcast, we'll discuss threat modeling and implementing threat intelligence to identify threat behavior and eliminate risks. Speakers: Tanisha L. Turner, Senior Security QA Engineer, Security Engineering Productivity, Elastic Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Security Testing at Scale for Cloud Native Technology 17:40
17:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé17:40
Cyberattacks have been growing in frequency and severity over the past decade and have increased exponentially with the adoption of cloud-native technology. The pressure is on for organizations to prioritize building and implementing a security testing strategy to avoid becoming the latest cyberattack headline. Speakers: Caroline Wong, Chief Strategy Officer, Cobalt Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference

1 Avoiding Costly Toolset Purchase and Resource Spend for Enterprise-Wide Threat Modeling 16:46
16:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé16:46
Threat modeling at an enterprise scale can be costly to implement, scale and maintain, but there are ways in which you can curtail spend in two key areas – threat modeling toolsets cost and resourcing cost. This podcast will discus key spend considerations including purchase model for OOTB software and services as well as resource allocation and required updates. Speakers: Karen Harris, Architect, Threat Modeling Program Lead, JP Morgan Chase Kacy Zurkus, Senior Content Manager, RSA Conference…
Bienvenue sur Lecteur FM!
Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.