Player FM - Internet Radio Done Right
Checked 1d ago
Додано three роки тому
Вміст надано Greg Schaffer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Greg Schaffer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !
Переходьте в офлайн за допомогою програми Player FM !
The Virtual CISO Moment
Відзначити всі (не)відтворені ...
Manage series 3309495
Вміст надано Greg Schaffer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Greg Schaffer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk management services. Visit https://vcisoservices.com to learn more. A Second Chance Publishing, LLC podcast.
…
continue reading
474 епізодів
Відзначити всі (не)відтворені ...
Manage series 3309495
Вміст надано Greg Schaffer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Greg Schaffer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk management services. Visit https://vcisoservices.com to learn more. A Second Chance Publishing, LLC podcast.
…
continue reading
474 епізодів
All episodes
×From the ISACA Middle Tennessee conference March 2025. Will Klotz is a Senior Information Security Consultant at GuidePoint Security. As a CISSP-certified professional with an MBA and a proud veteran of the U.S. Army Signal Corps, he brings a unique blend of technical expertise, military discipline, and business leadership to the Governance, Risk, and Compliance (GRC) space. His career spans building and leading robust risk management programs, developing policies and standards, and driving innovation in cybersecurity practices.…
Jim Bradfield is the CEO/Director at NAS Wireless. He is an experienced, innovative, visionary, professional CEO; leader, handler, cleaner, and mentor, with a demonstrated history of successfully completing high profile, complex, mission critical and stealth projects in the information technology and services industry. He has an MBA from the University of Phoenix and AT&T Computer Science courses at MIT, is a lifetime member of AFCEA (Armed Forces Communications and Electronics Association), and member of ASIS International (American Society for Industrial Security).…
The views and opinions of the speaker do not represent the views and opinions of the FDIC. From ISACA Middle Tennessee Conference March 2025. Linda Finck was hired by the FDIC in December 1989 and currently serves as a Senior IT Examiner in the FDIC Dallas Region. She has: - 30+ years experience in the financial services industry (working for a national bank and FDIC) - 20+ years performing IT examinations of community financial institutions and regional data centers - 20+ years serving as field office, regional office, and Washington office instructor/presenter for examiners, community groups, and financial institution directors, senior management, and IT personnel - 5+ years serving as Examiner-in-Charge of a Significant Service Provider She also was a contributing author of the March 2008 FFIEC Business Continuity Planning IT Examination Handbook.…
David Kim (DK) is a trusted advisor as an AI, GRC, cybersecurity, and PCI DSS consultant and currently sits on Technical Advisory Boards, Governance Boards. He has centered his entire career around IT topics such as telecommunications, data networking, VoIP, unified communications, network management, information systems security, regulatory compliance, privacy, and auditing IT infrastructures for compliance. Learn how and why we met 24 years ago and thoughts around privacy and risk in the SMB space.…
As featured in Top Cyber News Magazine's 2022 40 Under 40, Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from tech startups to Fortune 500 companies to the United States Department of Defense (DoD). Thomas is also a proud veteran of the United States Army where he served on active duty as a Military Intelligence Analyst, specializing in signals intelligence (SIGINT) and open source intelligence (OSINT). Thomas actively provides technical expertise to information security community projects as a Subject Matter Expert (SME) who evaluates industry-respected credentials on CompTIA's Certification Advisory Committee for Cybersecurity, as a technical reviewer for global technology book publisher Packt, and as a mentor to junior information security professionals in his free time.…
From the Middle Tennessee ISACA Conference March 19, 2025. Adam Malone is a Leadership Consultant at The Tenacious Operator, a Leadership Consultancy with a focus on developing teams, not solely individuals. He works with Professional Services firms like Accountants, Engineers & Lawyers, Regional Banks, other small to medium businesses. In addition to Leadership Consulting he helps his partner with firms, associations & trade groups to deliver engaging keynotes & workshops to build high performing teams.…
Joshua Crumbaugh joins us for a special Thursday edition of The Virtual CISO Moment. With over 20 years of experience in cybersecurity, he is the CEO of PhishFirewall, a company that helps organizations solve their phishing problem. He has a credential in Offensive Security and has published a book on cybersecurity education and awareness. Join us as we discuss the human factor in securing information. Also, if you're in the Huntsville Alabama area, catch his keynote at BSides Huntsville THIS SATURDAY (April 12, 2025), where he will discuss the launch of an exciting new product. Here's a hint from a recent post of his: "Ready to STOP phishing COLD? 'Emotional Intelligence EQ' is the new superpower in combatting social engineering attacks."…
As a Principal in the DenSecure team at Wolf & Company, P.C., Sean Goodwin leads and executes cybersecurity projects for clients across various industries, including healthcare, financial services, and retail. He has over a decade of experience in cybersecurity and information security and holds several credentials, such as GSE #271, CISSP, CISA, GIACx13, QSA, and PCIP. His mission is to help organizations improve their security posture and resilience against cyber threats. We touch on many topics including the need to properly understand PCI DSS CDE scope, compliance versus security, and how trust may be the most important element when effecting positive changes in the information security program.…
Chris Camacho is the Co-Founder and COO of Abstract Security. Abstract Security collects and routes data from cloud sources (such as AWS CloudTrail, Azure Activity Logs and GCP Audit Logs), removes unwanted noise, performs optimization, threat enrichment and normalizes data to OCSF schema in real-time before routing it to any SIEM or data lake of your choice. Join us as we discuss his path in information security, pivoting from an executive security career for global financial originations to startups, all as part of a passion for helping to make the world more secure. And check out Abstract Security's new book, Applied Security Data Strategy, with sections written by leaders in the information security field. Download it for free at https://www.abstract.security/applied-security-data-strategy-ebook.…
John Masserini is the founder and managing partner of SentiCon Security, the voice behind the award-winning blog Chronicles of a CISO, and a founding member of BSides South Florida. He also is the creator of the popular and very useful NIST Cyber Security Framework Maturity Toolkit, available on GitHub. He brings his years of experience as a CISO and as executive coach, Virtual CISO, independent consultant, and proprietor of SentiCon Security to the conversation, where we explore the necessity of trust in the security provider relationship, giving back, adjusting to life after years as a CISO, and other great stuff!…
Tyler Bartley is a Cybersecurity Engineer at Critical Start. Join us as we discuss the benefits of taking a break to rediscover your passion, the risk o SMBs of unqualified personnel, and how music can help bring stress down.
Dylan Evans is the Workstream Owner at Simple Salt. They stop internet crime and demystify security for businesses with a lot to lose by explaining exactly how internet crime practically threatens business health and goals, and the easiest and most effective things you can do about it. Join us for a fascinating discussion as we dive into how we as an industry are failing SMB security and how we can approach trying to find solutions.…
With over 23 years of experience in the IT industry, Ryan Burch is a seasoned and versatile leader with a proven track record of planning, executing, and delivering complex and innovative IT solutions that align with organizational goals. He is passionate about empowering teams, streamlining operations, and ensuring high standards of quality, security, and performance in all aspects of IT service delivery. He is also the author of The History of Online Scans and How to Avoid them. Check it out at https://www.amazon.com/History-Online-Scams-Avoid-Them/dp/B0DXKHYZ84…
Bob Davis joins us on a special episode to celebrate three years and 184 conversations on The Virtual CISO Moment. Bob is the Partner / Chief Information Security Officer of Franklin CISO Partners, LLC. Franklin CISO Partners provides virtual, fractional, and interim Chief Information Security Officer services to small and medium-sized clients in healthcare and financial services. Join us as we dive into information security issues healthcare and financial services and how a fractional CISO can help.…
T
The Virtual CISO Moment

In the first installment of the SMB SME Series, phishing awareness training SME Cary Johnson discusses the need for third-party audits of security awareness programs. As he noted in a recent LinkedIn post https://www.linkedin.com/posts/activity-7293297179073392644-dJ6P/ "Cybersecurity awareness programs will never truly be effective if we continue to let vendors measure the performance of their own products. A common industry complaint is that many vendor tools and programs prioritize compliance but don't drive real behavioral change. Why? Because we’re allowing these vendors to control the narrative by providing the performance metrics for their own product." Join us as we unpack this important issue. You may never look at phishing programs the same.…
Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.