16 afleveringen

Cyber Kumite is a discussion of today's cybersecurity challenges. Our hosts are seasoned cybersecurity executives with hands-on, technical backgrounds. They aren't afraid to question "best practices" or emerging trends that may be overrated fads. Gain insights from guest CISOs and other experts.

Cyber Kumite is presented by Security Risk Advisors, a cybersecurity consulting firm.


Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

Cyber Kumite Security Risk Advisors

    • Technologie

Cyber Kumite is a discussion of today's cybersecurity challenges. Our hosts are seasoned cybersecurity executives with hands-on, technical backgrounds. They aren't afraid to question "best practices" or emerging trends that may be overrated fads. Gain insights from guest CISOs and other experts.

Cyber Kumite is presented by Security Risk Advisors, a cybersecurity consulting firm.


Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    Dredd feat. Evan Perotti

    Dredd feat. Evan Perotti

    Evan Perotti has created Dredd to help automate the process of analyzing detection rules. This is a free tool downloadable from Github. Chris and Evan discuss its inspiration and many use cases.

    • 13 min.
    Cloud Security feat. Owen Zacharias

    Cloud Security feat. Owen Zacharias

    Owen Zacharias discusses the benefits and challenges of cloud security. There are many tools and applications available to help secure your cloud environment but it is still up to you to configure and maintain the controls properly.

    • 25 min.
    SIEM vs. UBA feat. Nick Ascoli

    SIEM vs. UBA feat. Nick Ascoli

    Nick Ascoli discusses differences between SIEM and UBA platforms, and debunks common misconceptions about UBA tools.

    • 21 min.
    Table Top Exercises

    Table Top Exercises

    Tim and Chris discuss the usefulness of cybersecurity TTX and how to keep the exercises fresh. Find out how to make the most of these simulations, who should be there, and how frequenly they should be performed.

    • 18 min.
    Election Security feat. Mick Baccio

    Election Security feat. Mick Baccio

    Mick Baccio, former CISO for Pete Buttigieg, talks about how he became the first Presidential Election Campaign CISO and what security challenges will be faced in the upcoming 2020 election.
    Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    • 24 min.
    Security Operations Metrics

    Security Operations Metrics

    Blue Teams specialist John Fung joins us to discuss Security Operations Metrics. Are they useful for measuring the security program? Which metrics are actually good? Learn how to avoid hyperbole and instead focus on manageable metrics that you can control.
    Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    • 17 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
Bright Podcast
Bright B.V.
De Technoloog | BNR
BNR Nieuwsradio
Lex Fridman Podcast
Lex Fridman
Tweakers Podcast
Tweakers