6 episodes

Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.

eXploring cybersecurity Jeremy Ventura

    • Technology

Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.

    eXp 6 - How to Build API & Application Security Programs

    eXp 6 - How to Build API & Application Security Programs

    In this episode Maria Schwenger, AppSec and AI expert, speaks from her experience building and evolving API and Application security programs at organizations like IBM, American Family Insurance, Deloitte, and Honeywell.
    Key topics include:
    Getting started with API discoveryAccelerating API protectionChanging corporate cultureOperational and strategic metrics

    • 34 min
    eXp 5 - Dissecting Ransomware Attacks: Casinos, Best Practices and More!

    eXp 5 - Dissecting Ransomware Attacks: Casinos, Best Practices and More!

    In this episode we are joined by Chris Denbigh-White, CSO from NextDLP as we chat about recent cybersecurity events at casinos in Las Vegas.

    • 36 min
    eXp 4 - Risk Qualification vs. Risk Quantification

    eXp 4 - Risk Qualification vs. Risk Quantification

    In this episode of eXploring cybersecurity we discuss the new SEC regulations around incident reporting for public companies, risk quantification vs risk qualification, and the importance of basic cyber hygiene. Host and ThreatX Field CISO, Jeremy Ventura will be joined by Head of Cyber Risk Engineering at Bowhead Specialty Underwriters, Edwin Covert.
    Key Topics:
    New SEC Regulations on Incident Reporting: Delve into the latest SEC regulations that dictate how public companies should report cybersecurity incidents, exploring their implications and potential impact on the business landscape.Impact on CISOs and Boards: Explore the changing roles and responsibilities of Chief Information Security Officers (CISOs) and company boards in light of the new SEC plan, highlighting the challenges and opportunities they face in safeguarding corporate data.Preparedness of Organizations: Assess whether organizations are adequately prepared to meet the requirements of the new SEC regulations, discussing the measures and strategies they should implement to enhance their cybersecurity posture and incident response capabilities.Sustaining Cyber Hygiene and Fundamentals: Emphasize the importance of maintaining strong cybersecurity hygiene and foundational practices within organizations.Risk Qualification vs. Risk Quantification: Clarify the distinction between risk qualification and risk quantification in the context of cybersecurity, offering insights into how organizations can effectively assess and communicate cybersecurity risks to make informed decisions.

    • 41 min
    eXp 3 - CISOs in the Boardroom

    eXp 3 - CISOs in the Boardroom

    Key Topics:
    Understanding the boardroom significance: Explore why CISOs, like Jeff Farinich and Rich Lindberg, are indispensable in steering cybersecurity initiatives aligned with business priorities.Strategies for boardroom effectiveness: Learn how experienced CISOs establish their presence, build relationships, and foster collaboration with other business functions.Translating tech jargon into business terms: Gain insights on effective communication techniques that bridge the gap between complex cybersecurity concepts and boardroom discussions.Overcoming challenges: Hear firsthand experiences and strategies from our guests, how they are navigating evolving threats, resource constraints, and securing executive buy-in.Driving meaningful metrics: Discover methodologies for establishing key performance indicators (KPIs) that demonstrate the organization’s security posture and convey the value of cybersecurity initiatives to the board.Creating a security culture: Explore practical approaches to foster a security-conscious mindset throughout the organization.

    • 43 min
    eXp 2 - Understanding the Attacker's Mindset, Teaming Strategies, and AI's Role in the Future

    eXp 2 - Understanding the Attacker's Mindset, Teaming Strategies, and AI's Role in the Future

    In this podcast we are joined by Maril Vernon Senior Application Security Architect at Acquia (@SheWhoHacks) also known as the “One Woman Purple Team” and Jason Mar-Tang Director, Sales Engineering, Pentera.

    We delve into the world of cybersecurity attacks and explore different perspectives, including how attackers think and operate, the benefits and challenges of red/blue/purple teaming, and the potential impact of artificial intelligence in the future of cybersecurity.

    Whether you’re an IT security professional or simply interested in the topic, this podcast will provide valuable insights and information to help you stay ahead of the curve

    • 59 min
    eXp 1 - Breaking Barriers Down: The Importance of Diversity & Inclusion in Cybersecurity

    eXp 1 - Breaking Barriers Down: The Importance of Diversity & Inclusion in Cybersecurity

    In episode one our host Jeremy Ventura will be joined by Edwin Moreno, CISSP Field CTO from Mimecast and Karsten Chearis, Manager of Solutions Engineering at Rapid7.
    They'll be talking about Breaking Barriers Down: The Importance of Diversity & Inclusion in Cybersecurity and cover the following topics:
    🤔 Learn why diversity in cyber is demanded for critical thinking🇺🇸 Analyzing the US National Cybersecurity Strategy📚 Tips and Recommendations for those trying to break into Cyber

    • 57 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Hard Fork
The New York Times