56 episodes

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more.

Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

The SecureWorld Sessions SecureWorld

    • Technology
    • 4.9 • 8 Ratings

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more.

Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

    Modern Cybersecurity Leadership

    Modern Cybersecurity Leadership

    We hear from CISO Yaron Levi about modern cybersecurity leadership. He shares about what security professionals need to do now to lead. Why is InfoSec mainly reactive instead of proactive? Why do most organizations view security as a technology problem instead of a business risk problem? Why do so many organizations lack a clear security strategy? And why do security leaders fall back on "silver bullet" solutions?

    Trend Micro report on SLUB Malware Watering Hole: https://bit.ly/TM_SLUB

    • 33 min
    The Future of Cloud Security

    The Future of Cloud Security

    Interview with Mark Nunnikhoven, VP of Cloud Research at Trend Micro, on securing the cloud into the future. How do we make cloud security usable and stable? What is the state of DevSecOps? What can we do about misconfigurations in the cloud? What are cloud security opportunities and challenges? Are cloud platform security tools enough to secure your data?

    •  Trend Micro Cloud Migration Best Practices: https://bit.ly/TM_CloudMigration
    •  Trend Micro Cloud One Conformity: https://bit.ly/TM_Conform

    • 31 min
    Oil and Natural Gas Cyber Threats

    Oil and Natural Gas Cyber Threats

    We talk to cybersecurity leaders in the oil and natural gas industry, as experts from the ONG-ISAC answer: What does the cyber threat landscape look like for the petroleum industry, and what are the potential impacts? What are barriers to sharing threat intelligence and benefits of doing so? How do you see cyber threats evolving in 2021 and beyond for the energy sector?

    Also, details on Trend Micro's whitepaper on security vulnerabilities for the water and energy sectors. http://bit.ly/TM_WE

    • 29 min
    The CMMC Explained

    The CMMC Explained

    We talk to James Goepel about the Cybersecurity Maturity Model Certification (CMMC). He discusses this important new certification for supply chain security within the U.S. Department of Defense (DoD) system. Why was the CMMC created, who needs it, how will it work, and will it spread beyond the DoD?

    James is a former member of the CMMC Accreditation Body Board of Directors, and is now CEO of Fathom Cyber.

    Also, Trend Micro shares details of its Midyear Security Roundup: http://bit.ly/TM_Midyear_2020

    • 42 min
    New National Cyber Power Index

    New National Cyber Power Index

    Interview with Julia Voo, one of the authors of the newly published National Cyber Power Index 2020. Which country is the most powerful in cyberspace? The NCPI takes a "whole of country" approach to measuring cyber power, ranking 30 countries in the context of seven national objectives. Voo is a Cyber Fellow at the Belfer Center at the Harvard Kennedy School.

    The National Cyber Power Index 2020 report: http://bit.ly/NCPI2020

    Trend Micro Cyber Risk Index: http://bit.ly/TM_CRI

    • 39 min
    Culture in Information Security

    Culture in Information Security

    In this episode, we hear from Don McKeown, Information Security Manager at Wolters Kluwer Health. He talks about the various levels of culture within an organization, and the culture of security. Plus, approaches to security: blocking and tackling programs, compliance-based information security programs, and risk-based InfoSec programs.

    RESOURCE LINKS:
    •  Don McKeown on LinkedIn: https://www.linkedin.com/in/donspage/
    •  Trend Micro ransomware best practices: http://bit.ly/TM_RFH

    • 25 min

Customer Reviews

4.9 out of 5
8 Ratings

8 Ratings

JoshCrist ,

Empowering, insightful and actionable! 👏👏👏

Whether you’re well established as a cyber security innovator, or just getting started carving out your role as a change agent within your organization - this is a must-listen podcast for you! Bruce does an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of navigating an ever changing data security and compliance environment - with actual leaders in the field. Highly recommend listening and subscribing!

Top Podcasts In Technology

Listeners Also Subscribed To