Secure Talk Podcast

By Justin Beals

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Justin Beals

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 34
Reviews: 0
Episodes: 173

Description

Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.

Episode Date
The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life
May 14, 2024
Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family
Apr 30, 2024
Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy
Apr 16, 2024
Reputation as a risk: understanding the security threat of harmful narratives
Apr 02, 2024
Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches
Mar 27, 2024
Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence
Mar 19, 2024
Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses
Mar 05, 2024
The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity
Feb 21, 2024
HealthTech, GAMP and 23andMe: A conversation with Stephen Ferrell, security leader in Life Sciences.
Feb 08, 2024
Secure Talk has a new host! Measuring Security and the impact of AI on Security certification.
Jan 20, 2024
Self-Sovereign Identities, Zero-Knowledge Credentials, and AI Digital Assistants
Aug 21, 2023
A Better Way to Deploy Cloud Infrastructure
Jul 27, 2023
Threat Modeling for Software Design & Development
Jul 24, 2023
Secure Remote Access with Karen Gondoly, CEO of Leostream
Jul 17, 2023
Security Technology for De-Fi Investors
Jul 12, 2023
AI Cameras, Autonomous Vehicles, and More!
Jun 30, 2023
Service Now Security Advantages
Jun 27, 2023
Multi-Chain NFT Trading, with Lasha Antadze Founder of Rarify Labs
Jun 21, 2023
The Cure for a Failing Data Privacy Strategy
Jun 15, 2023
Mobile Safety: How to Ensure You Aren't Being Tracked
May 24, 2023
Cybersecurity Risks with SaaS Applications
May 22, 2023
Engaging Your Team in Cybersecurity
May 11, 2023
Zero-Trust Content Security
May 08, 2023
API Security Challenges & Solutions
May 02, 2023
How to Select a VPN Provider
May 01, 2023
How to Implement an Effective Cloud Risk Management Strategy
Apr 25, 2023
2023 OpenText Cybersecurity Threat Report & Recommendations
Apr 19, 2023
Democratizing Data with Tim Tutt, CEO and Co-Founder of Night Shift Development
Apr 17, 2023
Data Protection as a Services with "Mr. Backup" W. Curtis Preston
Apr 13, 2023
Dez Rock, CEO of SIEMonster
Apr 07, 2023
How Software Developers use Red Teaming & White Box Audits to Improve Security and More!
Apr 06, 2023
Vendor Risk Management & Compliance in Healthcare
Apr 03, 2023
Financial Security in Chaotic Times
Mar 31, 2023
The Evolution of Identity Standards and Identity Orchestration
Mar 30, 2023
How Online Communities Can Facilitate Information Sharing to Solve IT & Security Challenges
Mar 28, 2023
Critical Device Security Strategies & Tools
Mar 28, 2023
How to Optimize Cybersecurity Training
Mar 24, 2023
The Endpoint Management Vulnerability Gap
Mar 23, 2023
Becoming an Ethical Hacker
Mar 21, 2023
How to Prevent Synthetic Identity Theft
Mar 20, 2023
Cybersecurity Breach Response & More
Mar 17, 2023
Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions
Mar 16, 2023
Building Autonomy & Trust in Distributed Engineering Teams
Mar 07, 2023
Preventing Cyber Attacks Across the Software Supply Chain
Mar 02, 2023
Security Training for Software Development Teams
Feb 20, 2023
Automating Data Discovery & Security
Feb 16, 2023
Best Practices for Cybersecurity Practitioners
Feb 10, 2023
Optimizing Cyber Threat Detection & Response
Feb 06, 2023
Cybersecurity Solutions for the Federal Government
Feb 01, 2023
Using Open Source Linux-Based Software for Identity Management
Jan 27, 2023
Optimizing the Microsoft Security Stack
Jan 25, 2023
The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups
Jan 20, 2023
Managed Security Services for Start-Ups and SMEs
Jan 17, 2023
A Vaccine Approach to IoT Device Cybersecurity
Jan 09, 2023
Chat-based Cybersecurity Education
Jan 03, 2023
Data Security Posture Management vs. Cloud Security Posture Management and more!
Dec 20, 2022
A Method for Managing Risk
Dec 14, 2022
Why Compliance Doesn't Equate to Security
Dec 06, 2022
Compliance and Cybersecurity Issues with Collaboration Platforms such as Zoom, Slack, & Teams
Nov 30, 2022
Critical Flaws in Legacy Cybersecurity Systems, with Dr. Danny Rittman
Nov 29, 2022
SMB Ransomware Trends, with Grayson Milbourne of OpenText Security Solutions
Nov 29, 2022
Cyber Threat Intelligence
Nov 17, 2022
Replacing Legacy SIEMs, Jack Naglieri CEO at Panther Labs
Oct 31, 2022
Security Awareness Training with Javvad Malik at KnowBe4
Oct 27, 2022
Cybersecurity In and Out of the U.S. Military, with Stephen Semmelroth
Oct 24, 2022
Modern Security Best Practices with George Gerchow, Chief Security Officer at Sumo Logic
Oct 19, 2022
Security Certifications as Sales Assets, with Justin Beals, CEO of Strike Graph
Oct 17, 2022
The Importance of a Comprehensive Network Asset Inventory with Huxley Barbee
Oct 13, 2022
Blockchain Bridges and More with Collin O'Brien of Rubic
Oct 10, 2022
API Security with Karl Mattson CISO at Noname Security
Oct 03, 2022
Cybersecurity Focused Hardware Destruction, with John Shegerian
Sep 08, 2022
Creating a Security Oriented Culture, with Kai Roer
Sep 06, 2022
Cloud Security Governance with Fausto Lendeborg, CEO of Secberus
Aug 26, 2022
How to Choose a VPN and more with Yegor Sak, Founder of Windscribe
Aug 25, 2022
CSIRTs, ASM 2.0, and more with Dave Monnier from Team Cymru
Aug 19, 2022
Security Risks with Open Source Software, with Steve Wilson, CPO at Contrast Security
Aug 10, 2022
How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud
Jul 29, 2022
Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro
Jul 21, 2022
Protecting Personal Data, Podcasting, and More with Adam Levin Co-Host of the What the Hack Podcast
Jul 18, 2022
How to Prevent Data Leaks Using a No-Code Platform with Yasir Ali, CEO of Polymer
Jul 15, 2022
Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security
Jul 06, 2022
CISO Best Practices and MDM Tips with Chaim Mazal, CISO at Kandji
Jun 17, 2022
Nation State Cybercrime with Investigative Journalist & Author Geoff White
Jun 08, 2022
Automated Crypto Trading Tools with Gabriele Musella, Co-Founder & CEO at Coinrule
May 31, 2022
Preventing Phygital Attacks with Will Plummer, CSO at RaySecur
May 16, 2022
Identity & Access Management, Digital IDs & More with Sushil Madhukar of TechDemocracy
May 13, 2022
Justin Beals, Founder & CEO of Strike Graph
May 11, 2022
Searchable Encryption Technology with Dan Draper, CEO & Founder of CipherStash
Mar 30, 2022
The Importance of Cyber Resilience with Kiran Vangaveti, CEO of BluSapphire Technologies
Mar 25, 2022
New Approaches to Application Security with Jeff Williams Co-Founder of Contrast Security
Mar 14, 2022
Unlimited Decentralized Financial Markets with Eric Chen, CEO of Injective Labs
Feb 23, 2022
Crypto Mining Equipment with Mason Jappa, CEO of Blockware Solutions
Feb 17, 2022
Open Source Device Management with Mike McNeil, CEO of Fleet DM
Feb 15, 2022
DeFi, CeFi, Blockchain and more with Yubo Ruan, Founder of Parallel Finance
Feb 03, 2022
Security Automation with Eoin Hinchy, CEO of Tines
Jan 28, 2022
Frances Zelazny, Co-Founder & CEO of Anonybit
Jan 25, 2022
Storage, Backup, and Recovery, with W. Curtis Preston of Druva
Jan 21, 2022
How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani
Jan 04, 2022
Chris Kline, COO & Co-Founder of Bitcoin IRA
Dec 15, 2021
Data Loss Prevention (DLP) with Rohan Sathe, CTO & Co-Founder of Nightfall
Dec 06, 2021
VPNs with Brad Hawkins, CEO of SaferNet
Dec 01, 2021
Security Managed Services with James Fair, SVP of Technical Operations at Executech
Nov 23, 2021
Application Security for Developers with Harshil Parikh, CEO of TROMZO
Nov 16, 2021
Steve Ginty, Director of Threat Intelligence at RiskIQ
Nov 11, 2021
Philippe Humeau, CEO of CrowdSec
Nov 08, 2021
Maxime Lamothe-Brassard, Founder LimaCharlie
Sep 29, 2021
Rick Jordan, Founder & CEO of ReachOut Technology
Aug 23, 2021
Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management
Aug 12, 2021
Emil Sayegh, CEO of Ntirety
Aug 09, 2021
Jonathan Moore, CTO of SpiderOak
Jul 20, 2021
Dr. Chris Spencer on the Secure Use of Passpoint, NGH, and Eavesdropping Teddy Bears!
Jul 07, 2021
Data Protection via File Level Encryption, Dimitri Nemirovsky, COO of Atakama
Jun 29, 2021
Kathleen Booth, VP of Marketing at clean.io
Jun 24, 2021
Scott Schober, CEO of Berkeley Varitronics Systems
Jun 17, 2021
Mahmoud Abdelkader, CEO and co-founder of Very Good Security
Jun 09, 2021
Santosh Devaraj, CEO of TrustGrid
Jun 09, 2021
Bruce Dahlgren, CEO of MetricStream
May 18, 2021
Dexter Caffey, CEO of Smart Eye Technology
May 05, 2021
Mark Testoni, CEO at SAP National Security Services (SAP NS2)
Apr 19, 2021
Michel Tricot, Co-Founder & CEO of Airbyte
Apr 13, 2021
Dr. Eric Cole
Apr 01, 2021
Hiram Machado on Identity Governance
Mar 30, 2021
Zaid Sabih Al Quraishi, CEO at zSecurity
Mar 23, 2021
Jim Bowers, Security Architect for TBI
Feb 22, 2021
Self-Sovereign Identity Authors Alex Preukschat & Shannon Appelcline
Feb 08, 2021
Bina Ramamurthy, Author of Blockchain in Action
Jan 22, 2021
Neil Madden, Author of API Security in Action
Jan 21, 2021
Julien Vehent, Author of Securing DevOps
Jan 19, 2021
Sedat Kapanoglu, Author of Street Coder; The Rules to Break and How to Break Them
Jan 07, 2021
Laurentiu Spilca Explain Spring Security for Java Applications
Jan 04, 2021
Rois Ni Thuama, Head of Cyber Governance at Red Sift
Nov 30, 2020
Paul Clayson, CEO of AgilePQ
Nov 17, 2020
Privacy Law Update with Attorney Cecilia Jeong
Nov 12, 2020
Thomas Kranz, Author of Making Sense of Cyber Security
Nov 03, 2020
The Ins and Outs of Azure Sentinel with Microsoft's Edward Walton
Oct 16, 2020
Kip Boyle shares advice on how best to find a cybersecurity job and "Your Cyber Path"
Oct 05, 2020
Cyber Security Education w/Gabriel Friedlander, CEO of Wizer
Sep 23, 2020
Greg Edwards, CEO of CryptoStopper on Malware Attack Detection & Prevention
Aug 31, 2020
#35 Hiram Machado, CEO of adaQuest on the Value of Network Scans
Aug 24, 2020
#34 Paul Katzoff, CEO of WhiteCanyon Software
Aug 20, 2020
Productivity & Security with Microsoft Teams
Jun 26, 2020
Jonathan Hiroshi Rossi, CEO of Saya University
Jun 19, 2020
Windows Autopilot with Christophe Koehl
Apr 22, 2019
João Couto, Director of Operations adaQuest Brazil
Apr 15, 2019
The Rise of the Virtual CISO, with Hiram Machado
Mar 21, 2019
Richard Lewis, Best Practices for Security Minded Organizations & Application Security Development
Mar 11, 2019
Edward Walton Discusses Shadow IT
Mar 04, 2019
Cecilia Jeong, Privacy Attorney
Feb 05, 2019
Kip Boyle, Founder and CEO of Cyber Risk Opportunities
Jan 30, 2019
Andrea Fisher, Global Cyber Defense Specialist at Microsoft
Jan 19, 2019
Hiram Machado, adaQuest CEO
Dec 27, 2018
Andrea Fisher Provides an Overview of Windows 10
Oct 01, 2018
Plurilock CEO Ian Paterson Talks About Post Login Authentication
Aug 31, 2018
Matt Soseman Talks About Developments with MFA, Conditional Access, Windows Hello and More!
Aug 28, 2018
Interview with Rudolph Araujo from Awake Security
Aug 26, 2018
Interview with Trusona Founder & CEO, Ori Eisen
Jul 27, 2018
Cyber Insurance - Part 2
Jul 09, 2018
Cyber Insurance - Part 1
Jun 22, 2018
#15 Interview with Zaid Al-Quraishi, Ethical Hacker and Founder of zSecurity
Jun 07, 2018
#14 Office 365 Secure Score & Security Tune-Up
May 30, 2018
#13 Multi-Factor Authentication (MFA), Conditional Access, & Passwords
May 25, 2018
A Review of GDPR, Cryptojacking, and More....
May 19, 2018
How to Get a Cybersecurity Job!
May 10, 2018
#10 Interview with Cybersecurity Consultant & Station X CEO Nathan House
May 02, 2018
#9 Interview with ISSA Puget Sound Chapter President Justin White
Apr 27, 2018
How to Successfully Integrate a Newly Acquired Company onto Your IT Platform
Apr 21, 2018
#7 Security Architect Matt Soseman
Apr 09, 2018
#6 Paul Shares His Thoughts About Taking the CISSP Exam
Mar 31, 2018
GDPR - What is it? How to prepare?
Mar 14, 2018
#4 - Where do I start?
Mar 09, 2018
Episode #3 - Threat Detection & Protection
Mar 01, 2018
Episode #2 - Data Protection
Feb 28, 2018
The Emerging Paradigm for IT Security
Feb 16, 2018