Artwork

Contenu fourni par Cyber Crime Junkies. Host David Mauro.. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Cyber Crime Junkies. Host David Mauro. ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !

Role of Security Leadership. Matthew Rosenquist Interview.

1:01:00
 
Partager
 

Manage episode 427965403 series 3559123
Contenu fourni par Cyber Crime Junkies. Host David Mauro.. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Cyber Crime Junkies. Host David Mauro. ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.

Connect with Matthew:

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapitres

1. Role of Security Leadership. Matthew Rosenquist Interview. (00:00:00)

2. Origin Story (00:02:26)

3. Understanding Zero-Day Vulnerabilities (00:06:33)

4. Nation-State Attacks and the Value of Zero-Day Exploits (00:11:08)

5. The Threat of Supply Chain Attacks (00:17:37)

6. Investing in Cybersecurity in the Age of Zero-Day Exploits (00:22:17)

7. The Role of Security Leadership (00:26:48)

8. Measuring Cybersecurity Risk (00:28:21)

9. The Need for Unified Regulations (00:37:11)

10. The Importance of Privacy Education (00:46:36)

11. Impact of Quantum Computing on Encryption (00:51:11)

12. Cybersecurity Predictions for the Future (00:52:45)

212 episodes

Artwork
iconPartager
 
Manage episode 427965403 series 3559123
Contenu fourni par Cyber Crime Junkies. Host David Mauro.. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Cyber Crime Junkies. Host David Mauro. ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.

Connect with Matthew:

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapitres

1. Role of Security Leadership. Matthew Rosenquist Interview. (00:00:00)

2. Origin Story (00:02:26)

3. Understanding Zero-Day Vulnerabilities (00:06:33)

4. Nation-State Attacks and the Value of Zero-Day Exploits (00:11:08)

5. The Threat of Supply Chain Attacks (00:17:37)

6. Investing in Cybersecurity in the Age of Zero-Day Exploits (00:22:17)

7. The Role of Security Leadership (00:26:48)

8. Measuring Cybersecurity Risk (00:28:21)

9. The Need for Unified Regulations (00:37:11)

10. The Importance of Privacy Education (00:46:36)

11. Impact of Quantum Computing on Encryption (00:51:11)

12. Cybersecurity Predictions for the Future (00:52:45)

212 episodes

كل الحلقات

×
 
Loading …

Bienvenue sur Lecteur FM!

Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.

 

Guide de référence rapide