The Cybersecurity Readiness Podcast Series

By Dr. Dave Chatterjee

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Management

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 9
Reviews: 0
Episodes: 66

Description

The Cybersecurity Readiness Podcast Series serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level. Host Dr. Dave Chatterjee converses with subject matter experts, business and technology leaders, trainers and educators and members of user communities. He has been studying cybersecurity for over a decade. He has delivered talks, conducted webinars, consulted with companies and served on a cybersecurity SWAT team with CISO's. He is an Associate Professor of Management Information Systems at the University of Georgia and Visiting Professor at Duke University. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/

Episode Date
Securing the Future: Inside Student-Led Cybersecurity Clinics
May 05, 2024
Developing Resilient and Secure Mission Critical Facilities (Data Centers)
Apr 24, 2024
Securing Application Programming Interfaces (APIs)
Apr 10, 2024
The Last Line of Defense Against a Ransomware Attack
Mar 27, 2024
Overcoming the Stale Nature of Tabletop Exercises
Mar 13, 2024
Securing Artificial Intelligence (AI) Applications
Feb 28, 2024
Building a Resilient Disaster Recovery Infrastructure
Feb 14, 2024
Unraveling the Positive and Negative Impacts of Generative AI
Nov 22, 2023
Best Practices for Overcoming Troublesome Vulnerability Management Trends
Nov 01, 2023
Streamlining and Improving Security by Standardizing Identity Management
Oct 18, 2023
How Informed is the Board of Directors on Cybersecurity Risks?
Oct 03, 2023
Enhancing Incident Response Effectiveness
Sep 06, 2023
Cybersecurity in the Age of AI
Jul 12, 2023
Identity Orchestration Strategies and Best Practices
Jun 28, 2023
Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage
Jun 14, 2023
Countering Insider Threats: Seven Science-Based Commandments
Apr 26, 2023
Mitigating Risks from Unmonitored Communication Channels
Apr 14, 2023
Implementing Secure and Fast Authentication Processes
Mar 30, 2023
Proactive Resilient Approach to Cybersecurity
Mar 15, 2023
The Challenges and Best Practices of Cyber Security in Emerging Markets
Mar 01, 2023
Cybersecurity Perspectives of a Community College President
Feb 15, 2023
From Law Enforcement Officer to Chief Information Security Officer
Feb 01, 2023
To trust or not to trust: the overwhelming challenge
Jan 18, 2023
Useful Technology Should Be Attack Agnostic
Jan 04, 2023
Do you see what attackers see? Threat modeling done right
Dec 21, 2022
Implementing Phishing Resistant Multifactor Authentication
Dec 07, 2022
How do SMBs protect themselves from ransomware attacks?
Nov 23, 2022
Cybersecurity As A Strategic Opportunity
Nov 09, 2022
Comprehensive Asset Discovery
Oct 26, 2022
Is Cybersecurity A Moving Target at Academic Institutions?
Oct 12, 2022
Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience
Sep 28, 2022
Detecting Malicious Insider Threats by Monitoring User Journeys
Sep 14, 2022
Skilling Up for Security Operations Center Roles
Aug 31, 2022
Bridging the Gap Between Intentions and Practicality in Cybersecurity
Aug 17, 2022
Preparing for the Future of Device Management
Aug 03, 2022
The State of Attack Surface Management
Jul 20, 2022
Global Security and Post Breach Management Best Practices
Jul 06, 2022
How to Tackle Burnout in Cybersecurity
Jun 22, 2022
Actionable Threat Intelligence and the Dark Web
Jun 08, 2022
Reducing the Disconnect Between Security and Development Teams
May 25, 2022
Perspectives of a Global Chief Information Security Officer
May 11, 2022
Thinking Like A Hacker
Apr 27, 2022
Is Cybersecurity Regulatory Compliance Good Enough?
Apr 13, 2022
Is Cyber Insurance Necessary?
Mar 30, 2022
Dealing with Cyber Trauma
Mar 16, 2022
A Deep Dive into Ransomware Attacks and Negotiations
Mar 02, 2022
Making Cybersecurity Communication Effective
Feb 16, 2022
Securing the Smart Supply Chain
Feb 02, 2022
Reducing the Carbon Footprint
Jan 19, 2022
Role of Emotional Intelligence in Creating a Healthy Information Security Culture
Jan 05, 2022
Significance of the Human Element in Cybersecurity
Dec 22, 2021
Enhancing Organizational Readiness by Simulating Cyber Attacks
Dec 08, 2021
Cybersecurity is Patient Safety
Nov 24, 2021
Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management
Nov 10, 2021
Fly the Plane: A CIO's Approach to Cybersecurity Readiness
Oct 27, 2021
Passwordless Authentication: Myths and Realities
Oct 13, 2021
Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs)
Sep 29, 2021
What Does Good Cyber Governance Look Like? A Legal Perspective
Sep 15, 2021
Multidisciplinary and Integrative Approach to Cybersecurity Education
Sep 01, 2021
Holistic Approach to Cybersecurity Readiness
Aug 18, 2021
Being An Effective Chief Information Security Officer (CISO)
Aug 04, 2021
The Human Vulnerability Factor
Jul 21, 2021
Going Above and Beyond the Mandated Checklist
Jul 07, 2021
Protecting Academic Institutions from Ransomware and Other Forms of Cyber Attacks
Jun 23, 2021
Role of Top Management in Cybersecurity Governance
Jun 08, 2021
The Cybersecurity Readiness Podcast Trailer
May 20, 2021