22 episodes

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more.

Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

The SecureWorld Sessions SecureWorld

    • Technology

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more.

Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

    The Two Faces of AI

    The Two Faces of AI

    In this episode, we share a new definition of artificial intelligence, discuss the upheaval AI will cause, and look at the dark side of AI. Interviews with Annie Searle of University of Washington; Craig Spiezle of the Online Trust Alliance and AgeLight; Steve Brown, the Bald Futurist; and Dr. Raj Sachdev, Dean of Columbia College School of Business.

    Also, Trend Micro shares about “counter-AI and ML,” which could work against us and against the security of your organization: http://bit.ly/TM_AI_ML

    • 21 min
    Hacking Cars and Cybersecurity

    Hacking Cars and Cybersecurity

    Interview with Kristie Pfosi, Sr. Manager of Automotive Cybersecurity at Mitsubishi Electric. Kristie and her team asked drivers: What kind of alert would you want if your smart car gets hacked? What should happen after your car is hacked? The team put drivers through simulated cyberattacks behind the wheel to see what makes sense.

    Also, Trend Micro and the Zero Day Initiative’s latest Pwn2Own competition, which includes automotive industry related hacking and patching. MORE: http://bit.ly/TM_Pwn2Own

    • 19 min
    Cybersecurity Career: Technologist to CISO

    Cybersecurity Career: Technologist to CISO

    In this episode, we’re talking with Randy Raw, VP of Information Security at Veterans United Home Loans. He shares about his career track: from a cybersecurity technologist to his role in executive leadership. Which skills can help you rise into leadership? Which alliances do you need to help your cyber career develop?

    Also, we reveal new research from Trend Micro. It used a smart factory honeypot setup to attract hackers, and the findings are interesting:
    http://bit.ly/TM_smart_factory

    • 22 min
    Being a Young Woman in Security: What It's Like

    Being a Young Woman in Security: What It's Like

    'The SecureWorld Sessions' podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.

    In this episode, we're talking with Alexis Womble, Sr. Threat Intelligence Analyst at BAE Systems, about being a young woman in the field of InfoSec. What is it like? She shares her experiences and career journey.

    RESOURCE:
    SecureWorld 2020 conference schedule
    https://www.secureworldexpo.com/events

    • 13 min
    Nation-State Cyber Threats

    Nation-State Cyber Threats

    In this episode of "The SecureWorld Sessions," we're talking with Cedric Leighton, CNN military analyst and retired U.S. Air Force colonel, about the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups.

    RESOURCE LINKS:

    •  Iran’s Top 10 Cyber Attack Methods, Detection, and Mitigation: http://bit.ly/Iran_APTs

    •  SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/even

    • 17 min
    Zero Trust in Cybersecurity

    Zero Trust in Cybersecurity

    We interview Christopher Frenz, AVP of Information Security at Interfaith Medical Center in Brooklyn. He explains the cyber threat landscape for hospitals, discusses a simulated mass malware outbreak, and details his organization's Zero Trust journey and how it is improving the cybersecurity posture.

    RESOURCES:
    Trend Micro Zero Trust blog: http://bit.ly/TM_ZeroTrust

    Web conference on Practical Steps to Zero Trust: https://www.secureworldexpo.com/resources/practical-steps-zero-trust-sila

    • 18 min

Top Podcasts In Technology

Listeners Also Subscribed To