23 episodes

This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more.

The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.

Information Security Podcast Information Security Summit

    • Technology

This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more.

The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.

    Migrating to the Public Cloud...so what’s the big deal?

    Migrating to the Public Cloud...so what’s the big deal?

    Title: Migrating to the Public Cloud...so what’s the big deal?
    Description:
    This episode of the Information Security Podcast features an interview with Grant Asplund @gasplund from Check Point Software @CheckPointSW with host Rob Nettgen (@Robert_Nettgen).  This episode explores the factors an organization should consider when “Migrating to the Public Cloud”.
    Key Discussion Points and Actionable Items:
    The importance of an organization recognizing the difference between a public cloud provider vs. the end customer’s responsibility in both migrating and operating in the public cloud Proper preparation and planning are critical to any cloud migration Acknowledging that a key “hindrance” to public cloud adoption is security and the importance of addressing it before attempting a migration to the public cloud Take advantage of the “free” resources available from the public cloud providers to prepare for a public cloud migration. Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
    If you enjoyed the conversation with Grant Asplund, check out Grant’s podcast, Talking Cloud, featuring interviews regarding secure migration strategies to the public cloud.

    • 19 min
    Employee Security Awareness

    Employee Security Awareness

    Title: Employee Security Awareness
    Description:
    This episode of the Information Security Podcast features an interview with Lauren Zink from Oportun  @Oportun with host Rob Nettgen (@Robert_Nettgen).  This episode’s conversation discusses the importance of “Employee Security Awareness” as part of an organization’s overall Cyber Security Strategy.
    Key Discussion Points and Actionable Items:
    The importance of understanding the meaning of “Employee Security Awareness” Defining the elements of a “Employee Security Awareness” Program and how it should be orchestrated within an organization Understanding that “Employee Security Awareness” is not a “one-time” event but starts at the time an employee is hired and evolves as they move through an organization The risk organizations assume when technology is the only line of defense and does not incorporate “Employee Security Awareness” Integration of third-party vendors and contractors that are part of an organization into the “Employee Security Awareness” Program “Employee Security Awareness” is the responsibility of the entire organization, including Human Resources, Training, and Compliance, and is not limited to the Cyber Security Team. Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

    • 11 min
    Cyber Incident Response and Business

    Cyber Incident Response and Business

    Title: Cyber Incident Response and Business
    Description:
    This episode of the Information Security Podcast features an interview with Tom Hardin from the Franciscan Alliance @MyFranciscan with host Rob Nettgen (@Robert_Nettgen).  The conversation discusses the correlation between “Cyber Incident Response and Business” and the importance of preparing for Cyber Incidents within an organization.
    Key Discussion Points and Actionable Items:
    The correlation between Cyber Incident Response and Overall Business Incident Response The importance of adopting a Cyber Incident Response Framework such as NIST or ISO The process of engaging government resources, such as the FBI or other organizations, that can provide assistance as part of an Incident Response Alignment of a Cyber Incident Response to Cyber Insurance Policies Leveraging Industry Association resources to define a Cyber Incident Response Plan  Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

    • 13 min
    Security Friends

    Security Friends

    Title: Security Friends
    Description:
    This is a “special” Holiday episode of the Information Security Podcast which features host Rob Nettgen (@Robert_Nettgen) along with a special group of “Security Friends”.  The conversation is lively and entertaining with commentary on a number of recent cyber security news events.
    Please join the Security Friends as the Information Security Podcast celebrates the end of 2019 and looks forward to the start of 2020.
    Following this episode, we will be taking a short break for the Holidays and will return with a new episode of the Information Security Podcast on Tuesday, January 7, 2020.
    Happy Holidays from the Information Security Podcast!
    Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
     

    • 34 min
    In Pursuit of Cyber Criminals

    In Pursuit of Cyber Criminals

    Title: In Pursuit of Cyber Criminals
    Description:
    This episode of the Information Security Podcast features an interview with Special Agent Ryan Macfarlane from the FBI’s Cyber Crime Unit with host Rob Nettgen (@Robert_Nettgen).  The conversation discusses the role of the FBI in the “battle” against Cyber Criminals and how an organization can leverage the services of the FBI in the event of a Cyber Security Incident.
    Key Discussion Points and Actionable Items:
    Reporting issues, such as Wire Fraud, to the FBI within 48 hours to improve the chances of recovering losses. 
    The importance of establishing a working relationship with the FBI before a cyber incident so they can assist in the event of a cyber incident by contacting the local FBI where your organization is located.
    Validation that no organization, regardless of the size or industry, is “immune” from being a target of cyber crime due to the business ecosystem and the use of technology to support business transactions.
    The proliferation of Ransomware and the ability of the FBI to assist with these types of incidents.
    The benefit of using Multifactor Authentication (MFA) to reduce the likelihood of Social Engineering and Email Fraud.
    Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

    • 18 min
    Cyber Resilient Organizations

    Cyber Resilient Organizations

    Title: Cyber Resilient Organizations
    Description:
    This episode of the Information Security Podcast features an interview with Steve Hunt @Steve_Hunt from Hunt BI with host Rob Nettgen (@Robert_Nettgen).  The conversation discusses and defines the term “Cyber Resilient Organization” and the role of a CISO to facilitate an organization to reach the goal of becoming a “Cyber Resilient Organization”.
    Key Discussion Points and Actionable Items:
    How a CISO can be an “enabler” within an organization by:
    Having credibility and describing the value of security to the business Allowing an organization to be agile allowing a business to grow The evolution and positioning of risk management.
    What does it mean to be “cyber resilient” and create revenue?
    Sponsored By:
    ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
    Briteskies (@NoBrownCow) and https://www.briteskies.com/
    Recorded and Production By:
    Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
    Additional Information and Resources:
    For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

    • 18 min

Top Podcasts In Technology

Listeners Also Subscribed To