16 episodes

EverythingCyber is a brand new security and tech podcast by Kumar Soorya and Kaif Ahsan. The podcast's objective is to provide in-depth analysis on a variety of tech and infosec subjects with a forward-looking perspective.

Pretext: We started this journey as I and Kaif used to have deep talks on various security and tech-based topics over zoom to broaden our knowledge and perspectives. Then we hit a moment where we were like hey why do we not share some of the cool things that we find with others too? So here we are :)

Everything Cyber Kumar Soorya

    • Technology

EverythingCyber is a brand new security and tech podcast by Kumar Soorya and Kaif Ahsan. The podcast's objective is to provide in-depth analysis on a variety of tech and infosec subjects with a forward-looking perspective.

Pretext: We started this journey as I and Kaif used to have deep talks on various security and tech-based topics over zoom to broaden our knowledge and perspectives. Then we hit a moment where we were like hey why do we not share some of the cool things that we find with others too? So here we are :)

    Ep. 17 - Top Security Incidents, Trends & Tools of 2023 & 2024 Lookahead

    Ep. 17 - Top Security Incidents, Trends & Tools of 2023 & 2024 Lookahead

    🔒 2023 Security Recap & 2024 Predictions 🔍 | Cybersecurity Trends & Tools Unveiled! Dive into the biggest security incidents of 2023, explore the latest cybersecurity trends, and uncover the most effective tools that have shaped the digital landscape. Plus, get a comprehensive analysis of what to expect in 2024. From advanced threats to cutting-edge defenses, join us as we navigate the evolving world of cybersecurity.


    ---------------------------------------------------------------------------------------------------------------------------
    Follow us on LinkedIn:   / ever.  .

    Our Hosts:

    Kaif Ahsan -   / kaif-ahsan  
    Kumar Soorya -   / kumar-soorya  
    Samuel Sentongo -   / sentongo  
    ---------------------------------------------------------------------------------------------------------------------------
    Audio Credit -
    shushubobo - “I need bingsu” cute vlog music

    [no copyright music] [(tag or mention or link)](   • [no copyright music] " i need bingsu ...  )


    #Cybersecurity2023 #2024Predictions #SecurityTrends

    • 36 min
    Ep. 16 - Cybersecurity in healthcare

    Ep. 16 - Cybersecurity in healthcare

    🏥 Cybersecurity in healthcare has never been more vital, and understanding the landscape can be crucial to dealing with the threats properly. In this in-depth analysis, we unravel the challenges that are looming in the healthcare sector and offer reliable strategies to safeguard sensitive data. It is essential viewing for healthcare professionals, IT experts, and everyone in between. To do that, we have Alana Tobgui, a cybersecurity professional with vast experience in this space. The topics we covered -

    🔥 00:00 | Intro - Summarising the upcoming episode.

    🌟 01:30 | Speaker Intro - Introducing the speaker to the audience.

    🏥 04:07 | Landscape of Security in Healthcare Understand the current status quo of security measures in the healthcare industry.

    🛑 06:00 | Typical Threat in Healthcare Identify the common threats that are putting healthcare data at risk.

    🛡️ 07:40 | Data Protection in Healthcare Learn robust strategies to protect healthcare data from unauthorized access.

    💻 09:36 | Securing Software and Hardware in Healthcare Discover the secrets behind securing the digital tools that power modern healthcare.

    📚 12:00 | Security Guidelines for Healthcare An overview of the must-follow guidelines to ensure airtight security.

    🚧 13:56 | Challenges in Implementing Cybersecurity in Healthcare We delve into the hurdles encountered when putting security strategies into action.

    🔗 19:40 | Third Party Risks in Healthcare Uncover the hidden risks associated with third-party involvement and learn how to mitigate them.

    🛠️ 22:44 | Patch Management Learn about the critical role of patch management in keeping systems secure.

    🔍 26:20 | Myths of Cybersecurity in the Healthcare Space Debunking common myths and setting the record straight for a safer future.

    🎬 29:26 | Conclusion Wrap up and key takeaways to start protecting your healthcare environment now.

    🔔 Don't forget to like, share, and follow to stay updated with the latest content and become part of a community that aims to make the healthcare sector a safer place!

    📈 Reach out in the comments below with your experiences and insights on cybersecurity in healthcare. Let's create a knowledge-sharing hub and foster a community of safety and awareness!

    Speaker Profile - https://www.linkedin.com/in/alana-t-053b48188/

    ---------------------------------------------------------

    Follow us on LinkedIn: https://www.linkedin.com/company/ever...

    Our Hosts:

    Kaif Ahsan - https://www.linkedin.com/in/kaif-ahsan/

    Kumar Soorya - https://www.linkedin.com/in/kumar-soorya/

    Samuel Sentongo - https://www.linkedin.com/in/sentongo/

     

    ---------------------------------------------------------

    Song: Osheen & JayJen - Flying (Vlog No Copyright Music)

    Music provided by Vlog No Copyright Music.

    Video Link: https://www.youtube.com/watch?v=DElsMp9Mp2M

    失望した by EVA

    [https://joshlis.bandcamp.com]

    Promoted by

    [@RoyaltyFreePlanet](https://www.youtube.com/channel/UC6-wx-04aMXk6a3m_fSXLEw)

    -

    [https://royaltyfreeplanet.com]

    Creative Commons Attribution 3.0

    [http://bit.ly/RFP_CClicense]

    #CyberSecurity #HealthcareSecurity #DataProtection

    • 31 min
    Ep. 15 - Building Zero Trust Network Infrastructure w/ Kane Narraway

    Ep. 15 - Building Zero Trust Network Infrastructure w/ Kane Narraway

    In this talk we dive deep into current world of zero trust network, how they are built and how the space is evolving over time.

    • 36 min
    Ep. 14 - Data-driven security w/ Jeevan Singh

    Ep. 14 - Data-driven security w/ Jeevan Singh

    Welcome to another episode of deep-dive conversations! In the 14th instalment of the series, we are again joined by the esteemed Jeevan Singh to discuss how we can be a data-driven security program. Security can often be operating on a hunch. But if we can validate our hunches with data, we can become much more impactful as a team. In this talk, we explore common strategies and pitfalls when it comes to building a data-driven security program.

    Guest speaker profile -   / jeevansecurity  

    Timestamp:
    00:00 - Episode intro
    00:49 - Episode start
    04:30 - Product security metrics building
    06:38 - Evolution of data-driven metrics
    11:03 - Communicating risk between product security and business
    08:04 - Avoiding common metric pitfalls
    30:34 - Security: more or less for organisations?
    35:19 - Appsec engineers enhancing metric usage
    38:47 - Conclusion
    --------------------------------------------------------------------------

    Follow us on LinkedIn:   / everything-cyber  

    Our Hosts:
    Kaif Ahsan -   / kaif-ahsan  
    Kumar Soorya -   / kumar-soorya  
    Samuel Sentongo -   / sentongo  

    --------------------------------------------------------------------------
    Asset Credits
    shushubobo - “I need bingsu” cute vlog music [no copyright music] (   • [no copyright music] " i need bingsu ...  )

    Vodovoz Music Productions - Paranormal Produced by Danya Vodovoz,    • Paranormal   , Royalty Free Music

    • 39 min
    Ep. 13 - Leadership In Application Security w/ Jeevan Singh

    Ep. 13 - Leadership In Application Security w/ Jeevan Singh

    Welcome back to Everything Cyber’s Deep Dive Conversations! In today's episode, we're diving deep into the role of product security leadership, looking at the different areas of impact within this role.

    In this video, we'll explore:

    1️⃣ The role of product security leadership.
    2️⃣ How democratizing security can enable you to do more with less.
    3️⃣ A look into the different levels of product security leadership.
    4️⃣ Tips for empowering leaders within the product security team.

    Whether you're an aspiring or experienced cybersecurity professional, this video is sure to enhance your understanding of product security leadership and elevate your skillset! 🚀💼

    Don't forget to hit that like button, follow our channel, and hit the notification bell so you never miss out on our latest cybersecurity content! 🔔👍

    Speaker Profile -   jeevansecurity  
    AppSec PNW - https://www.appsecpnw.org/

    Timestamps:
    00:00 - Episode intro
    01:12 - Episode Start
    02:03 - Speaker Intro
    04:40 - Impact of Great Leadership
    06:25 - Traits Of A Great Leader
    10:02 - Examples of Strong ProdSec Leadership
    22:27 - Democratising Security
    31:41 - Democratising Vulnerability Management
    37:42 - Product Security Maturity Levels
    42:35 - Scaled Security Program
    45:45 - Special Announcements
    46:42 - Outro
    ---------------------------------------------------------

    Follow us on LinkedIn:  https://www.linkedin.com/company/everything-cyber/.

    Our Hosts:
    Kaif Ahsan -   kaif-ahsan  
    Kumar Soorya -   kumar-soorya  
    Samuel Sentongo -   sentongo  

    Music: Motivational Day from AudioCoffee
    Sound Effect from Pixabay

    shushubobo - “I need bingsu” cute vlog music
    [no copyright music]    • [no copyright music] " i need bingsu ...  

    Music Info: Groove Day - Soul-Prod Music.
    Music Link: http://bit.ly/373YC76

    Track: Zaza - Be Together [NCS Release]
    Music provided by NoCopyrightSounds.
    Watch: http:/zaza.lnk.to/zazabtAT/youtube
    Free Download / Stream: http://ncs.io/zazabt#ProductSecurity #SecurityLeadership #ApplicationSecurity #CyberSecurity #infosec

    • 43 min
    Ep. 12 - Level-up your Threat Intelligence game with the Unprotect Project

    Ep. 12 - Level-up your Threat Intelligence game with the Unprotect Project

    Welcome back to Everything Cyber’s Deep Dive Conversations! In today's episode, we're diving deep into the incredible world of the Unprotect Project – the ultimate resource for evasion techniques, code snippets, and detection rules! 💥🔒

    The Unprotect Project is an unparalleled database designed specifically for those in Threat Intelligence and Red Teaming. With its vast array of resources, this project is a game-changer for cybersecurity professionals worldwide. 🌎🔐

    In this video, we'll explore:

    1️⃣ The origins and goals of the Unprotect Project.
    2️⃣ A walkthrough of the platform's features and interface.
    3️⃣ Hands-on demos of evasion techniques and code snippets.
    4️⃣ Tips for effectively using the Unprotect Project in your day-to-day work.
    5️⃣ How to contribute to this community-led initiative.

    Whether you're an aspiring or experienced cybersecurity professional, this video is sure to enhance your understanding of the Unprotect Project and elevate your skillset! 🚀💼

    Don't forget to hit that like button, subscribe to our channel, and hit the notification bell so you never miss out on our latest cybersecurity content! 🔔👍

    Speaker Profile - https://www.linkedin.com/in/thomas-ro...
    Visual Threat Intelligence Book pre-order by Thomas Roccia - https://store.securitybreak.io/threat...

    Timestamps:
    00:00 - Start
    00:54 - Speaker Intro
    06:53 - The Unprotect Project
    25:21 - How To Contribute
    28:21 - Thomas’s Upcoming Book
    ---------------------------------------------------------

    Follow us on LinkedIn: https://www.linkedin.com/company/ever...

    Our Hosts:
    Kaif Ahsan - https://www.linkedin.com/in/kaif-ahsan/
    Kumar Soorya - https://www.linkedin.com/in/kumar-soo...

    Music: Motivational Day from AudioCoffee
    Sound Effect from Pixabay

    #UnprotectProject #ThreatIntel #RedTeaming #CyberSecurity #InfoSec

    • 33 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Darknet Diaries
Jack Rhysider
Hard Fork
The New York Times
Download This Show
ABC listen