16 episodes

Cyber Kumite is a discussion of today's cybersecurity challenges. Our hosts are seasoned cybersecurity executives with hands-on, technical backgrounds. They aren't afraid to question "best practices" or emerging trends that may be overrated fads. Gain insights from guest CISOs and other experts.

Cyber Kumite is presented by Security Risk Advisors, a cybersecurity consulting firm.


Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

Cyber Kumite Security Risk Advisors

    • Technology
    • 5.0 • 4 Ratings

Cyber Kumite is a discussion of today's cybersecurity challenges. Our hosts are seasoned cybersecurity executives with hands-on, technical backgrounds. They aren't afraid to question "best practices" or emerging trends that may be overrated fads. Gain insights from guest CISOs and other experts.

Cyber Kumite is presented by Security Risk Advisors, a cybersecurity consulting firm.


Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    Dredd feat. Evan Perotti

    Dredd feat. Evan Perotti

    Evan Perotti has created Dredd to help automate the process of analyzing detection rules. This is a free tool downloadable from Github. Chris and Evan discuss its inspiration and many use cases.

    • 13 min
    Cloud Security feat. Owen Zacharias

    Cloud Security feat. Owen Zacharias

    Owen Zacharias discusses the benefits and challenges of cloud security. There are many tools and applications available to help secure your cloud environment but it is still up to you to configure and maintain the controls properly.

    • 25 min
    SIEM vs. UBA feat. Nick Ascoli

    SIEM vs. UBA feat. Nick Ascoli

    Nick Ascoli discusses differences between SIEM and UBA platforms, and debunks common misconceptions about UBA tools.

    • 21 min
    Table Top Exercises

    Table Top Exercises

    Tim and Chris discuss the usefulness of cybersecurity TTX and how to keep the exercises fresh. Find out how to make the most of these simulations, who should be there, and how frequenly they should be performed.

    • 18 min
    Election Security feat. Mick Baccio

    Election Security feat. Mick Baccio

    Mick Baccio, former CISO for Pete Buttigieg, talks about how he became the first Presidential Election Campaign CISO and what security challenges will be faced in the upcoming 2020 election.
    Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    • 24 min
    Security Operations Metrics

    Security Operations Metrics

    Blue Teams specialist John Fung joins us to discuss Security Operations Metrics. Are they useful for measuring the security program? Which metrics are actually good? Learn how to avoid hyperbole and instead focus on manageable metrics that you can control.
    Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.

    • 17 min

Customer Reviews

5.0 out of 5
4 Ratings

4 Ratings

Top Podcasts In Technology

The Neuron: AI Explained
The Neuron
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod