Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading

1
RCR 159: Quick-Start Guide for Cybersecurity Supply Chain Risk Management (C-SCRM)
30:43
30:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:43Unlock the secrets to safeguarding your business in today's volatile supply chain landscape. On this episode of the Reduce Cyber Risk Podcast, hosted by Shon Gerber, we take you on a journey through the intricacies of cybersecurity in supply chains. With rapid technological advancements and the rise of AI models like DeepSeek, businesses must navig…
…
continue reading

1
RCR 158: Emerging Threats & Trends and the Future of Cybersecurity
32:33
32:33
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
32:33Is your business ready to tackle the hidden vulnerabilities lurking within your software supply chains? Discover the profound impact of President Biden's recent cybersecurity executive orders and learn why third-party software is a crucial focal point for safeguarding your organization. From real-world examples to actionable insights, I navigate th…
…
continue reading

1
RCR 157: Strategic Fortification Against Cyber Intrusions - Understanding the Fundamentals
42:52
42:52
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
42:52Uncover the secrets to mastering cybersecurity amidst a booming demand for IT professionals. Join me, Shon Gerber, as we tackle the thrilling landscape of tech opportunities, where U.S. tech unemployment has reached a two-year low. Discover how certifications like CompTIA can launch your career in this high-stakes field, and learn why experience is…
…
continue reading

1
RCR 156: Navigating Cybersecurity: From B-1 Bomber WSO to CISO at Global Multi-National Corporation
22:41
22:41
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:41From the cockpit of a B-1 bomber to the nerve centers of global cybersecurity, I, Shon Gerber, invite you to explore the thrilling transition that shaped my career and mission. Discover the unexpected parallels between flying high-stakes missions and safeguarding billion-dollar enterprises from cyber threats. This episode offers a personal narrativ…
…
continue reading

1
Anthropics Responsible AI Scaling Policy
47:26
47:26
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
47:26In this episode of the Emerging Cyber Risk podcast, Joel and Max explore Anthropic's responsible AI scaling policy. They discuss the practicality and strategic nature of the framework, which aims to ensure the safety of AI models as they push the boundaries of capabilities. They highlight the commitments made by Anthropic and the public disclosure …
…
continue reading

1
Joel's Book Review (Secure Intelligent Machines)
35:04
35:04
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
35:04On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
…
continue reading
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading

1
2024 Annual Planning for AI Enablement
32:43
32:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
32:43On this episode of the Emerging Cyber Risk podcast, we discuss the AI planning that is going into 2024 and how this may affect our business. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulak…
…
continue reading

1
RCR 155: Identity Unlocked: Unraveling Identity Management (Domain 5)
39:14
39:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:14Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. W…
…
continue reading

1
The Intersection of AI and the Military: A Discussion with Taylor Johnston, Former Chief of Innovation for the U.S. Air Force
31:39
31:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
31:39On this episode of the Emerging Cyber Risk podcast, our guest is Taylor Johnston, Chief Operations Officer at the USF Institute of Applied Engineering and former Chief of Innovation for the United States Air Force. Join us as we investigate the integration of artificial intelligence and automation into the air force and the wider military. Tune in …
…
continue reading

1
RCR 154: CISSP Exam Questions (Domain 4)
11:49
11:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:49Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the comp…
…
continue reading

1
RCR 153: Unraveling the Intricacies of VOIP and iSCSI in Cybersecurity - CISSP Domain
39:51
39:51
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:51Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it…
…
continue reading

1
RCR 152: CISSP Exam Questions (D3)
12:19
12:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
12:19Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DRE…
…
continue reading

1
RCR 151: Mastering Threat Modeling: A Comprehensive Guide to Cybersecurity and CISSP Exam Preparation
42:46
42:46
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
42:46Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for b…
…
continue reading

1
The Biden Administration Hands the Safety & Security of AI to Industry Leaders!
35:04
35:04
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
35:04On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
Are you ready to unlock the secrets of data classification and pass your CISSP exam in one go? That's right! Your host, Sean Gerber, is here to guide you through an insightful exploration into the world of data classification. From the intricacies of content-based and context-based data classification to the various stages of the information life c…
…
continue reading

1
RCR 149: Securing Your Digital Landscape- A Deep Dive into Data and Asset Classification (D2)
35:59
35:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
35:59Are you ready to make your digital assets and information impenetrable? Well, we're here to navigate you through the maze of understanding and protecting your most valued digital treasures. This episode is packed with a wealth of knowledge, as we discuss the intricacies of information and asset protection. We highlight the vitality of data classifi…
…
continue reading

1
RCR 148: CISSP Exam Questions (Domain 1)
13:27
13:27
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:27Are you charged with navigating the precarious terrain of supply chain risk management? Then, prepare to sharpen your skills in this action-packed episode! I'm Sean Gerber, and I'll be guiding you through the labyrinth of supplier audits and evaluations, discussing the delicate balance between the two. We'll also delve into strategies for mitigatin…
…
continue reading

1
RCR 147: Securing the Chain- Mastering Supply Chain Risk Management (SCRM) for the CISSP (D1)
34:49
34:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
34:49Prepare to unravel the complexities of supply chain risk management (SCRM) and gain invaluable insights that could safeguard your business from massive disruptions. We're diving into the nerve-wracking challenges of SCRM, emphasizing just how crucial it is for every business in our hyper-connected age. Learn about the nuances of this formidable tas…
…
continue reading

1
Navigating the Legal Challenges of Artificial Intelligence with Scott Koller of Baker & Hostetler LLP
38:31
38:31
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
38:31On this episode of the Emerging Cyber Risk podcast, our guest is Scott Koller, a skilled privacy and data security attorney and Partner at Baker & Hostetler LLP. Join us as we navigate the legal challenges posed by artificial intelligence (AI), delving into the associated risks and possible future solutions. We further explore the ownership and cop…
…
continue reading

1
RCR 146: CISSP Exam Questions (D1-8)
10:09
10:09
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
10:09Ready to conquer the CISSP exam with confidence? Join me, Shon Gerber, in this week's CISSP Cyber Training Podcast as we tackle questions from all eight domains to give you the insights and knowledge you need for success. From understanding the purpose of a risk register to exploring the primary security concerns in a microservices architecture, th…
…
continue reading

1
RCR 145: Mastering CISSP and Navigating Cybersecurity Certifications
20:35
20:35
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
20:35Ready to level up your cybersecurity career? Wondering which certifications are worth your time and investment? We've got you covered in today's episode, where we break down everything from the entry-level CompTIA A+ certification to the more advanced CISSP. Get an insider's look at the costs, study time, and areas of concentration for each of thes…
…
continue reading
Ready to elevate your cybersecurity knowledge and pass the CISSP exam? This episode is packed with insights on software development, diving into the crucial phase of integrating security into the software development lifecycle (SDLC). We uncover the secrets of design and architecture, as well as static and dynamic application security testing (SAST…
…
continue reading

1
RCR 143 - Navigating the Cybersecurity Landscape through Secure Software Design (D8.1)
42:32
42:32
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
42:32Are you ready to elevate your cybersecurity knowledge and ace that CISSP exam? Join me, Shon Gerber, as we delve deep into the often-overlooked realm of software development lifecycle and the essential security controls within the development ecosystem. We'll unpack the three key secure design principles: least privilege, fail-safe defaults, and de…
…
continue reading

1
Exploring the Adoption of AI in the Defense Industry with Ron Fehlen of L3Harris Technologies
35:42
35:42
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
35:42On this episode of the Emerging Cyber Risk podcast, our guest is Ron Fehlen, VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to h…
…
continue reading

1
Exploring the Intersection of Cyber Security and AI: Insights from Phil Harris of IDC
37:41
37:41
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
37:41On this episode of the Emerging Cyber Risk podcast, our guest is Phil Harris, Research Director, Cyber Security Risk Management Services at IDC, the premier global marketing intelligence platform. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk managemen…
…
continue reading

1
Transparency and Collaboration: Driving AI Adoption in the Military and Government with Aaron McCray of the US Navy
44:14
44:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
44:14On this episode of the Emerging Cyber Risk podcast, our guest is Aaron McCray, a twenty-six-year veteran of the U.S. Navy. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. …
…
continue reading

1
RCR 142: CISSP Exam Questions (Domain 7)
13:18
13:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:18Do you know the differences between security events and security incidents? Are you confident in your ability to protect log files from unauthorized access? Join me, your host Sean Gerber, in this week's episode of the CISSP Cyber Training Podcast as we explore domain 7 of the CISSP exam and tackle these important questions. Remember, it's all abou…
…
continue reading

1
RCR 141: Mastering Logging, Monitoring, and AI in Cybersecurity (CISSP Domain 7)
34:12
34:12
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
34:12Are you ready to level up your understanding of logging and monitoring in the world of cybersecurity? Join us, your host Sean Gerber, as we take a deep dive into CISSP domain seven, exploring the ins and outs of logging, monitoring, and how they play a crucial part in keeping your system protected. Listen closely as we unravel the challenges of man…
…
continue reading

1
Leveraging AI for Risk Management: Insights from Laura Whitt Winyard, VP of Security and IT at Hummingbird
30:13
30:13
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:13On this episode of the Emerging Cyber Risk podcast, our guest is Laura Whitt Winyard, VP of Security and IT at Hummingbird. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.…
…
continue reading

1
RCR 140: CISSP Exam Questions (D6)
11:30
11:30
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:30Ready to ace the CISSP exam? Join me in this episode as we explore domain six, focusing on security controls and assessments. You'll not only learn the primary objective of security control testing but also gain insights into various types of tests and the limitations of vulnerability scanners. Together, we'll dive into the nitty-gritty of security…
…
continue reading

1
RCR 139: Conduct security control testing (D6.2)
37:48
37:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
37:48Ready to ace the CISSP exam and level up your cybersecurity knowledge? Together with my background as a former red teamer, we guide you through domain six - security assessments and testing, covering both military and corporate America perspectives. We'll discuss essential concepts such as vulnerability assessments, risk tolerance of companies, and…
…
continue reading

1
RCR 138: CISSP Exam Questions (D5)
11:53
11:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:53Ready to conquer the CISSP exam and advance your cybersecurity career? Join me, Sean Gerber, as we break down identity and access management, exploring the primary benefits of single sign-on systems, session management, and multi-factor authentication. Plus, get insights on the differences between role-based access controls and other access control…
…
continue reading

1
RCR 137: Manage identification and authentication of people devices and services (D5.2)
39:06
39:06
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:06Are you ready to up your cybersecurity game? Look no further, as I, Sean Gerber, take you on a deep-dive into the world of identity and access management. Together, we'll explore various authentication methods, such as passwords, tokens, biometrics, and multi-factor authentication, and analyze their strengths and vulnerabilities. We'll also tackle …
…
continue reading

1
Navigating the Intersection of AI and Healthcare with Christopher Rogers
47:55
47:55
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
47:55Today's guest is Christopher Rogers, COO at Carenet Health. In this episode, we discuss how healthcare companies and consumers should navigate the intersection of AI and healthcare. We cover multiple touchpoints, including AI's potential benefits and pitfalls in healthcare and the importance of using it responsibly. We also examine the need for col…
…
continue reading

1
RCR 136: CISSP Exam Questions (Domain 4)
10:40
10:40
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
10:40Join Shon Gerber on the "CISSP Cyber Training Podcast" as he delves into Domain 4 of the CISSP exam, which focuses on Communications and Network Security. In this episode, Shon will cover some of the most challenging CISSP exam questions related to the OSI model, various TCP/IP layers, and protocols such as SYN, SYN/ACK, etc. He will explain the in…
…
continue reading

1
RCR 135: Implement Secure Communication Channels According to Design (D4.3)
29:28
29:28
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:28In this episode of the CISSP Cyber Training Podcast, we explore Domain 4 of the CISSP exam - Implementing a Secure Channel. We delve into the intricacies of the OSI model and TCP/IP, as well as the four layers of the TCP/IP model, to provide a comprehensive understanding of how to establish and maintain secure communication channels in your network…
…
continue reading

1
Incorporating AI in Risk Management: Challenges and Potential Benefits with Jeff Lowder, Co-Founder of The Society of Information Risk Analysts
41:53
41:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
41:53Today's guest is Jeff Lowder, the Co-Founder and Past President of The Society of Information Risk Analysts, a society dedicated to continually improving the practice of information risk analysis. Our discussion today focuses on the emerging cyber risks and ethical concerns associated with AI in enterprise risk management, highlighting the challeng…
…
continue reading