CSO Perspectives (public)

By N2K Networks

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by N2K Networks

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 19
Reviews: 0
Episodes: 99

Description

Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.

Episode Date
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford.
May 07, 2024
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]
May 06, 2024
Bonus: Examining the current state of security orchestration. [CyberWire-X]
Jan 15, 2024
Veterans Day Special.
Nov 12, 2023
Best practices for MITRE ATT&CK(R) mapping.
Aug 26, 2023
Cybersecurity risk forecasting.
Aug 21, 2023
Distributed Denial of Service prevention: Current state.
Aug 14, 2023
Quantum computing: A threat to asymmetric encryption.
Aug 05, 2023
First principle strategies with CJ Moses.
Jul 31, 2023
Zero trust in an app centric world with Okta.
Jun 03, 2023
Bonus: Memorial Day special.
May 29, 2023
Cybersecurity moneyball: First principles applied to the workforce gap.
May 22, 2023
Bonus Episode: 2023 Cybersecurity Canon Hall of Fame Inductee: Superforecasting: The Art and Science of Prediction by Dr Phil Tetlock and Dr Dan Gardner.
Apr 26, 2023
Bonus: 2023 Cybersecurity Canon Hall of Fame inductee: This Is How They Tell Me the World Ends by Nicole Perlroth.
Apr 25, 2023
Bonus: 2023 Cybersecurity Canon Hall of Fame inductee: "The Hacker and the State" by Ben Buchanan.
Apr 24, 2023
Resilience Case Study: Chaos Engineering.
Mar 13, 2023
Resilience Case Study: Colonial Pipeline attacks of 2021 (Cyber Sandtable).
Mar 06, 2023
Intelligence sharing: A Rick the Toolman episode.
Feb 27, 2023
Software Defined Perimeter (SDP): A Rick the Toolman episode.
Feb 13, 2023
Two-factor authentication: A Rick the Toolman episode.
Feb 06, 2023
Single Sign-On: A Rick the Toolman episode.
Jan 30, 2023
A Rick the Toolman Episode on the current state of SBOMs.
Jan 23, 2023
Andy Greenberg Interview: Tracers in the Dark.
Jan 16, 2023
History of Infosec: a primer.
Jan 09, 2023
Security infrastructure as code.
Dec 19, 2022
Kill chain models.
Dec 12, 2022
Vulnerability Management: An essential tactic for zero trust from the Rick the Toolman Series.
Dec 05, 2022
Cyber sand table series: 2014 OPM hack.
Nov 28, 2022
Pt 2 – Supply chains around the Hash Table.
Nov 21, 2022
Pt 1 – Supply chains.
Nov 14, 2022
Pt 2 – Students of the game: What are the Hash Table’s go-to information sources for 2022?
Nov 07, 2022
Pt 1 – Students of the game: What are your go-to information sources for 2022?
Oct 31, 2022
Pt 2 – Mitre ATT&CK: from the Rick the Toolman Series.
Oct 17, 2022
Pt 2 – XDR: from the Rick the Toolman Series.
Oct 10, 2022
Pt 1 – XDR: from the Rick the Toolman Series.
Oct 03, 2022
Pt 1 – Introducing Rick the Toolman Series: Mitre ATT&CK.
Sep 26, 2022
Introducing the cyberspace sand table series: The DNC compromise.
Sep 19, 2022
Security compliance around the Hash Table.
Sep 12, 2022
Security compliance and cybersecurity first principles.
Sep 05, 2022
Adversary playbooks around the Hash Table.
Aug 22, 2022
Adversary playbooks and cybersecurity first principles.
Aug 15, 2022
Orchestrating the security stack around the Hash Table.
Aug 08, 2022
Orchestrating the security stack and cybersecurity first principles.
Aug 01, 2022
Enterprise backups around the Hash Table.
Jul 25, 2022
Enterprise backups and cybersecurity first principles.
Jul 18, 2022
Enterprise encryption around the Hash Table.
Jul 11, 2022
Enterprise encryption and cybersecurity first principles.
Jul 04, 2022
CxO professional development.
Jun 27, 2022
How to buy security products.
Jun 20, 2022
New CISO responsibilities: supply chain.
Jun 13, 2022
New CISO responsibilities: identity.
Jun 06, 2022
New CISO responsibilities: IoT.
May 30, 2022
Security in different verticals: Energy.
May 23, 2022
Security in different verticals: Healthcare.
May 16, 2022
Security in different verticals: Finance.
May 09, 2022
Third party cloud platforms around the Hash Table.
May 02, 2022
Third party cloud platforms and cybersecurity first principles.
Apr 25, 2022
Google Cloud Platform around the Hash Table.
Apr 18, 2022
Google Cloud Platform and cybersecurity first principles.
Apr 11, 2022
Amazon AWS around the Hash Table.
Apr 04, 2022
Amazon AWS and cybersecurity first principles.
Mar 28, 2022
Microsoft Azure around the Hash Table.
Mar 21, 2022
Microsoft Azure and cybersecurity first principles.
Mar 14, 2022
SolarWinds through a first principle lens: around the Hash Table.
Mar 07, 2022
SolarWinds through a first principle lens.
Feb 28, 2022
CISO evolution - around the Hash Table.
Feb 07, 2022
CISO evolution.
Jan 31, 2022
SOAR - around the Hash Table.
Jan 24, 2022
SOAR - a first principle idea.
Jan 17, 2022
Securing containers and serverless functions: around the Hash Table.
Jan 10, 2022
Securing containers and serverless functions.
Jan 03, 2022
SD-WAN: around the Hash Table.
Dec 27, 2021
SD-WAN: What’s the big deal for security leadership?
Dec 20, 2021
Season 2 wrap.
Nov 15, 2021
Red team blue team operations: around the Hash Table.
Nov 08, 2021
Red team, blue team operations: a first principle idea.
Nov 01, 2021
Identity Management: around the Hash Table.
Oct 25, 2021
Identity Management: a first principle idea.
Oct 18, 2021
Data loss protection: around the Hash Table.
Oct 11, 2021
Data loss protection: a first principle idea.
Oct 04, 2021
Incident response: around the Hash Table.
Sep 27, 2021
Incident response: a first principle idea.
Sep 20, 2021
Security operations centers: around the Hash Table.
Sep 13, 2021
A CSO's 9/11 Story: CSO Perspectives Bonus.
Sep 11, 2021
Security operations centers: a first principle idea.
Sep 06, 2021
Cybersecurity first principles: end of season summary.
Jul 12, 2021
Cybersecurity first principles: Intelligence operations.
Jul 05, 2021
Cybersecurity first principles: Risk assessment.
Jun 28, 2021
Cybersecurity First Principles: DevSecOps.
Jun 21, 2021
Cybersecurity First Principles: Resilience.
Jun 14, 2021
Cybersecurity First Principles: Intrusion kill chains.
Jun 07, 2021
Cybersecurity First Principles: Zero trust.
May 31, 2021
Cybersecurity First Principles.
May 24, 2021
Dark web and TOR: What kind of intelligence can you find there?
May 17, 2021
Metrics and risk: All models are wrong, some are useful.
May 10, 2021
Four cybersecurity novels to distract you from the current zombie apocalypse.
May 03, 2021
Alexa, are you actually self-aware? (And, does it matter?)
Apr 26, 2021
Your security stack is moving: SASE is coming.
Apr 19, 2021
Introducing CSO Perspectives
Apr 14, 2021