39 episodes

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

Future of Cyber Security Rasool Irfan

    • Technology

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

    Episode 39 - GenAI and guidance to cyber security practitioners

    Episode 39 - GenAI and guidance to cyber security practitioners

    Cyber security leaders need to be empowered addressing below GenAI impacts


    What if my security team want to leverage GenAI use-cases?
    What if my business team want to evaluate, experiment, perform POCs around GenAI apps?
    What if my business team continue to consume the GenAI products?
    What if my organizations targeted by AI attacker?




    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 7 min
    Episode 38 - RSA Conference Innovation Sandbox 2023

    Episode 38 - RSA Conference Innovation Sandbox 2023

    The RSA Conference Innovation Sandbox is an annual competition that showcases the latest and most innovative cybersecurity startups and emerging technologies. Cybersecurity professionals can learn a lot from security innovations showcased at events such as the RSA Security Conference.








    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 8 min
    Episode 37 - Manage effective Container/ K8 Security Assessments

    Episode 37 - Manage effective Container/ K8 Security Assessments

    Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). Digital business require lean team with talented expertise to conduct assessment services. 


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 7 min
    Episode 36 - Vulnerability Management Maturity Assessment Program

    Episode 36 - Vulnerability Management Maturity Assessment Program

    Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external professionals to conduct assessments based on defined framework across building blocks and act to mature your vulnerability management program. Listen to this podcast for more details


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 6 min
    Episode 35 - Threat Hunting Capability Development Framework

    Episode 35 - Threat Hunting Capability Development Framework

    With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns.


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 6 min
    Episode 34 - Cyber security table top exercise (TTX)

    Episode 34 - Cyber security table top exercise (TTX)

    Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success. 


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message

    • 9 min

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
TED Radio Hour
NPR
Acquired
Ben Gilbert and David Rosenthal