BBC Radio 5 live’s award winning gaming podcast, discussing the world of video games and games culture.
…
continue reading
Player FM - Internet Radio Done Right
13 subscribers
Checked 17h ago
Tilføjet three år siden
İçerik Understanding Cyber and Clear Cut Cyber Ltd tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Understanding Cyber and Clear Cut Cyber Ltd veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !
Player FM uygulamasıyla çevrimdışı Player FM !
Dinlemeye Değer Podcast'ler
SPONSOR
C
Cloud Realities


1 CR093: Role of AI/Gen AI in cybersecurity with Corence Klop, Rabobank 44:18
44:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi44:18
AI and Generative AI are transforming cybersecurity by enhancing threat detection and response. These technologies offer unmatched accuracy and efficiency, making them crucial for protecting sensitive data. As cyber threats evolve, integrating AI into security strategies is essential. This week, Dave, Esmee and Rob talk to Corence Klop, CISO at the Rabobank, about the expanding role of AI and Generative AI in cybersecurity, and how to begin integrating these technologies into your organization. TLDR 04:45 Rob is confused about wrong AI information for a hotel booking 08:20 Conversation with Corence 33:40 How can you identify the state of flow for your end-user in agile practices? 40:50 Going to the swimming pool and disco with your daughter Guest Corence Klop: https://www.linkedin.com/in/corenceklop/ Hosts Dave Chapman: https://www.linkedin.com/in/chapmandr/ Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/ Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ Production Marcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/ Dave Chapman: https://www.linkedin.com/in/chapmandr/ Sound Ben Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/ Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ ' Cloud Realities' is an original podcast from Capgemini…
Cyber Essentials Update - Part 1
Manage episode 431707719 series 3210167
İçerik Understanding Cyber and Clear Cut Cyber Ltd tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Understanding Cyber and Clear Cut Cyber Ltd veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Cyber Essentials - Part 1: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/
…
continue reading
40 bölüm
Manage episode 431707719 series 3210167
İçerik Understanding Cyber and Clear Cut Cyber Ltd tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Understanding Cyber and Clear Cut Cyber Ltd veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Cyber Essentials - Part 1: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/
…
continue reading
40 bölüm
Tüm bölümler
×The Bottom Line Cash! We talk about funding cyber security, when you need funding, and top tips on how to secure funding. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 Cyber Essentials Update - Part 2 24:43
24:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi24:43
Cyber Essentials - Part 2: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 Cyber Essentials Update - Part 1 20:34
20:34
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi20:34
Cyber Essentials - Part 1: We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements that are not obvious. This advice stems from us advising and supporting complex organisation is gaining CE. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 How CISOs sleep at night - aka Assurance 37:27
37:27
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi37:27
How CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Risking It All: Episode three of four in our special series on risk. Matt and Tom continue their journey through cyber risk management, and talk about how we might go about accepting certain levels of risk. Exercising, threat modelling, and a good communications plan all feature. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Risky Tools and Techniques by Clear Cut Cyber Ltd
In the first of a four-part series on risk we examine what risk management means in the cyber world, how people get it wrong, and how to solve it. Featuring special guest, and Clear Cut Cyber risk expert, Matt. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 How to plan cyber incident response 24:31
24:31
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi24:31
Learn how to plan cyber incident response We explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more. If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website https://clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
What is a CISO? In this episode Toby and Tom are joined by a special guest - Dr Andy Grayland. Andy is an experienced CISO, and currently fills that role for Silobreaker. He joins the team to discuss what a CISO is, what the role entails, when you need one, and what he thinks the most important actions and skills are for a new CISO. If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com or to learn more about Silobreaker go to Silobreaker.com. Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Security assessments In this episode Toby and Tom discuss what security assessments are, different types of assessment, and how they are conducted. They also talk through some of the assessments they have conducted. If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com. Including free cyber security health checks for charitable organisations. Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 From Function to Fortification 27:07
27:07
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi27:07
From Function to Fortification: identifying and securing critical business functions In this episode Toby and Tom discuss why understanding business impact is key to context for any cyber security programme, and a process for working it out. If you want any cyber security support please get in contact with the team via the website: https://clearcutcyber.com or email info@clearcutcyber.com Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…

1 Cyber Essentials Part 2 - Scope 19:06
19:06
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi19:06
Cyber Essentials In this second part of the cyber essentials scheme we examine what the scope of it is, how you define your scope, and what is not in scope. Further reading: NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Cyber Essentials The UK has a certification scheme called Cyber Essentials to help improve cyber security. In this podcast we help you understand what the cyber essentials and cyber essentials plus schemes are, and why you should follow the advice contained in the essentials. This podcast provides and overview of the scheme, and later podcasts will go into the detail of them. Further reading: NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/ Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Honeypots and Deception Ever wondered what honeypots have to do with cyber security and how to use them to give high quality alerts about an attack? Listen to understand. Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/

1 Operational Technology - OT 19:47
19:47
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi19:47
Episode 25 - OT / Operational Technology We understand: What is OT, what is the difference between OT and IT, why this difference matters, and why you need to think differently when securing OT. Read more about OT: https://en.wikipedia.org/wiki/Operational_technology Black energy OT attack that Tom described: https://en.wikipedia.org/wiki/BlackEnergy Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/…
Player FM'e Hoş Geldiniz!
Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.