Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Change the Way You Think About Loss, Risk, and Revenue
|
Apr 11, 2024 |
Keep Calm and Communicate Better: Advice for Young Managers
|
Mar 21, 2024 |
Public-Private Partnership: How to Punish Bad Actors, Not Organizations
|
Feb 29, 2024 |
Why CISOs Need to be Champions of AI
|
Feb 08, 2024 |
A CISO’s Advice On Learning, Earning, and Dodging Burnout
|
Jan 18, 2024 |
How to Respond When You Don’t Get the Job
|
Dec 28, 2023 |
Great Leaders Make Leaders — Especially During a Breach
|
Dec 07, 2023 |
How One Job Taught Five Important Leadership Lessons
|
Nov 16, 2023 |
Why CISOs Should Solve Business Problems, Not Technology Problems
|
Nov 02, 2023 |
The CISO Triforce: Preparing Your Post-Breach Go Bag
|
Oct 19, 2023 |
What About Third-Party Risk? A CISO’s Questions for the SEC
|
Oct 05, 2023 |
100th Episode: Six Mentorship Questions with Two Top Leaders
|
Sep 21, 2023 |
Know Your Strengths: How to Lead with Skills You Already Have
|
Sep 07, 2023 |
What’s In a Word? Managing Your Message More Effectively
|
Aug 24, 2023 |
Confidence or Arrogance? Ego Problems and How to Solve Them
|
Aug 10, 2023 |
The 70-20-10 Rule: Steps You Can Take for Professional Growth
|
Jul 27, 2023 |
Security Engineer to CEO: Taking a Chance on Yourself
|
Jul 13, 2023 |
The ABCs of Threat Actors: How to Stop Attackers From Becoming Insiders
|
Jun 29, 2023 |
Great Minds Think Differently: Neurodiversity and Vulnerability in Leadership
|
Jun 15, 2023 |
The Power of Automation: Which Tools Can Help Your Security Team?
|
Jun 01, 2023 |
Taking Extreme Ownership: How 3 Common Excuses Hurt Security Leaders
|
May 18, 2023 |
How To Build Trust Within Your Team, Your Business, and Yourself
|
May 04, 2023 |
Be Comfortable Being Uncomfortable: Managing New Roles and Next Steps
|
Apr 20, 2023 |
The Patient Safety Model: Developing a Hospital’s Security Culture
|
Apr 06, 2023 |
What Would a Breach Cost You? Personal Risk vs. Reward as a CISO
|
Mar 23, 2023 |
Self-Sufficient Security: The Perks of Being a vCISO
|
Mar 09, 2023 |
5 Top Tips for Boosting Security Mindfulness
|
Feb 23, 2023 |
Are You Ready to be a CISO? Why Mentors Matter with Mark Weatherford
|
Jan 26, 2023 |
Be the One Who Gets the Call - The Keys to Landing New Opportunities
|
Jan 12, 2023 |
Learning From a Layoff: Career Growth, Change, and Opportunity
|
Dec 29, 2022 |
Protecting Your Revenue with Machine Learning and Data Science
|
Dec 15, 2022 |
Life After Breach: How Hospitals Can Protect Patient Data
|
Dec 01, 2022 |
Building Your Framework for Fulfillment
|
Nov 17, 2022 |
Bridging the Effectiveness Gap: A CISO's Perspective on New-Scale SIEM with Tyler Farrar
|
Nov 03, 2022 |
Storytelling For CISOs – How to Make Your Message Resonate with Tom August
|
Oct 20, 2022 |
Translating Your Military Skills for Security Success with Jason Hamilton
|
Oct 06, 2022 |
Broad Knowledge is Power: Building a Better Security Team with Bryan Willett
|
Sep 22, 2022 |
Success After CISO: How to Become Your Own Boss” with guest Aaron Bailey from The Missing Link
|
Sep 08, 2022 |
Leading with a Military Mindset: It’s We, Not Me with Steve Magowan
|
Aug 25, 2022 |
Landing a Seat in the C-Suite with Mike Woodson
|
Aug 11, 2022 |
Train the Way You Fight, Fight the Way You Train with Dr. Adrian Mayers
|
Jul 28, 2022 |
Trusting Your Tech to Tackle Human Problems with Dr. Adrian Mayers
|
Jul 14, 2022 |
Solving Security Puzzles with Kevin DeLange
|
Jun 30, 2022 |
Building The Right Relationships with Den Jones
|
Jun 16, 2022 |
Don’t Be Afraid to Break Things with David Lingenfelter
|
Jun 02, 2022 |
Investing in Your Security Team with Zane Gittins
|
Apr 14, 2022 |
Cybersecurity Trends and Practices
|
Mar 31, 2022 |
Management Training: Learning How To Manage Managers
|
Mar 10, 2022 |
Managing Your First Zero-Day Attack
|
Dec 23, 2021 |
Demonstrating the Value of Your Program to the 'Layman'
|
Nov 18, 2021 |
Don't Cut Corners When It Comes To Credentials
|
Nov 04, 2021 |
Invest in People as Much as Tools
|
Oct 21, 2021 |
Empowering People to Bring Their “Whole Self” to Work
|
Oct 08, 2021 |
Building Your First Cybersecurity Program
|
Sep 16, 2021 |
Knowing When It's Time to Move Onto New Challenges
|
Sep 02, 2021 |
Leading Cybersecurity as a Key Business Driver
|
Aug 19, 2021 |
Defending Data and Corporate Systems Without Sacrificing Revenue and Velocity
|
Aug 05, 2021 |
Growing Your Confidence as a Young Leader
|
Jul 26, 2021 |
Four Key Elements of a Security Strategy
|
Jul 08, 2021 |
Earning the Business’ Trust as the New CISO
|
Jun 24, 2021 |
Building an Insider Threat Program from Scratch
|
Jun 10, 2021 |
Why Teams Fail Building Resilience into your Security Program and Culture
|
May 27, 2021 |
Sugarcoating Security Data Doesn't Help Anyone
|
May 13, 2021 |
Getting the Job Done Doesn't Always Mean Getting Credit for It
|
Apr 29, 2021 |
Why Does Cybersecurity Mentorship Matter?
|
Apr 15, 2021 |
Why Great Teams Need "Lifelong Learners"
|
Apr 01, 2021 |
Don't Aspire to be a CISO
|
Mar 18, 2021 |
Exploring New Job Opportunities Amid a Global Pandemic
|
Mar 04, 2021 |
Four Key Questions Every CISO Should Ask Their Board
|
Feb 18, 2021 |
Influencing and Informing Non-Technical Business Partners on Security Issues
|
Feb 17, 2021 |
How Do Leaders Cultivate Diversity of Thought
|
Jan 21, 2021 |
Balance Budget and Tools by Rationalizing Your Security Stack
|
Jan 07, 2021 |
The Moments After a Major Breach
|
Dec 23, 2020 |
Building a Student-Run SOC to Meet Threats Head-On
|
Dec 10, 2020 |
2021 Cybersecurity Trends
|
Nov 26, 2020 |
Are Hiring Policies Driving the Cybersecurity Skills Shortage?
|
Nov 12, 2020 |
Translating Your Military Experience of Operationalizing Security into the Private Sector
|
Oct 29, 2020 |
Culture Eats…Security for Breakfast
|
Oct 15, 2020 |
Managing Risk While Building Trust in a Post - Breach Environment
|
Oct 01, 2020 |
Lessons Learned from the “First CISO” Part 2
|
Sep 17, 2020 |
Lessons Learned from the “First CISO” Part 1
|
Sep 03, 2020 |
The Benefits of Finding a Security Vendor Who Can Act as a Trusted Advisor
|
Aug 20, 2020 |
Why the “Shiny New Thing” in Cybersecurity Isn’t Necessarily the Best Solution
|
Aug 06, 2020 |
Making the Leap from Engineering to Cybersecurity Leadership
|
Jul 23, 2020 |
Is Our Understanding of who Owns Risk Driving CISOs to the Edge?
|
Jul 09, 2020 |
The State of the SOC in 2020
|
Jun 25, 2020 |
Determining Risk Tolerance for a 100-Million-User per Month Organization
|
Jun 04, 2020 |
Getting on With the Business of Security, by Building Trust
|
May 21, 2020 |
Recovering from a 'Bad CISO'
|
May 07, 2020 |
How Do You Measure the Success of Your Cybersecurity Program?
|
Apr 23, 2020 |
How Emotional Intelligence Fortifies Capability In the Midst of A Crisis
|
Apr 09, 2020 |
Strategies for Securing a Remote Workforce
|
Mar 26, 2020 |
No as a Service: Why Security Can Stifle Innovation and How to Prevent It
|
Mar 12, 2020 |
Losing Your Job as a CISO: Does the Cybersecurity Skills Shortage Extend to Executives?
|
Feb 27, 2020 |
Your First 90 Days As A New CISO
|
Feb 13, 2020 |
From the 'Basement' to the Board: Giving Cybersecurity Teams Greater Visibility
|
Jan 31, 2020 |
Lessons in Leadership: Taking a Step back and Learning to Trust the Experts on Your Team.mp3
|
Jan 17, 2020 |
Why 3rd Party Security Testing is the New Password Rotation
|
Dec 30, 2019 |
Unique Challenges, but More Opportunities for Women in Cybersecurity
|
Dec 13, 2019 |
2020 Cyber Security Trends
|
Nov 26, 2019 |
Partnering with Higher Education to Prepare Students for a Career in Cybersecurity
|
Nov 13, 2019 |
Assessing Security Reporting Structures
|
Oct 25, 2019 |
Digital Trust For Digital Transformation
|
Oct 11, 2019 |
Securing a Cybersecurity Organization
|
Sep 26, 2019 |
Understanding the Adversary
|
Sep 10, 2019 |
Contributing to the Cybersecurity Community
|
Aug 27, 2019 |
Does Security Training Really Work?
|
Aug 13, 2019 |
Winning Over the Board
|
Jul 29, 2019 |
What it Means to be an Honest Broker
|
May 20, 2019 |
The Ins and Outs of Budgeting
|
Apr 22, 2019 |
Lessons Learned from a Virtual CISO
|
Apr 10, 2019 |