Privacy and international business
Noriswadi Ismail of Breakwater Solutions and the Humanising 2030 campaign joins us to talk about privacy regarding international business.
Attack surface managers and the state of attack surfaces
Learn about the state of attack surfaces, the strengths and shortcomings of attack surface managers and why something we refer to as a “soft” skill might be the hardest skill of all! Plus, we touch on shadow IT.
The importance of API security and PII
Giora Engel of NeoSec talks about securing APIs, why APIs are the new network, why their very nature makes them vulnerable to abuse and how to position yourself as an authority in the ever-growing field of API security.
Corporate data breaches and security awareness training
Mathieu Gorge of VigiTrust talks about the Marriott Hotel data breach and why once-per-year security awareness training isn’t enough.
Overcoming challenges to build a cybersecurity career
Dr. Chanel Suggs, the Duchess of Cybersecurity®, discusses her incredibly challenging upbringing and how she built a successful career in cybersecurity.
What’s it like to work in emergency response?
Learn all about emergency response — and the myriad techniques and skills that term implies — from Christopher Tarantino, CEO of Epicenter Innovation.
Securing operational technology: ICS, IoT, AI and more
Learn about working with operational technology (OT) and internet-connected devices with Francis Cianfrocca, CEO of Insight Cyber Group.
Cybersecurity project management: A peek behind the curtain
What is the day-to-day work of a cybersecurity project manager? Jackie Olshack of Dell and Ginny Morton of Deloitte return to answer your live questions!
OWASP Top 10: What cybersecurity professionals need to know
The OWASP Top 10 got a big overhaul in late 2021. John Wagnon explains what changed, why and the impact on different cybersecurity careers.
Your personal data is everywhere: What can you do about it?
Your personal information is available for free (and for sale) on the internet. Mark Kapczynski explains the dangers — and what you can do about it.
Keeping your inbox safe: Real-life BEC attacks and email fraud careers
Today’s episode is all about email fraud. John Wilson of Agari discusses Business Email Compromise (BEC), spearphishing, whaling, romance fraud and more.
Cybersecurity has a marketing problem — and we’re going to fix it
Alyssa Miller returns to break down some of the clichés used in cybersecurity — and explain why they’re hurting the cybersecurity industry.
What does a secure coder do?
Secure coders are responsible for developing code in a way that protects against security vulnerabilities like bugs, defects and logic flaws.
Cybersecurity jobs: How to better apply, get hired and fill open roles
Diana Kelley discusses her work as a board member of the Cyber Future Foundation and the goings-on at this year’s Cyber Talent Week.
Ethical user data collection and machine learning
Ché Wijesinghe of Cape Privacy talks about the safe and ethical collection of user data when creating machine learning or predictive models.
What does a penetration tester do?
Penetration testers are responsible for planning and performing authorized, simulated attacks within an organization’s information systems.
Working as a privacy manager
A Privacy Manager is responsible for the development, creation, maintenance and enforcement of the privacy policies and procedures of an organization.
What does a cybersecurity beginner do?
A beginner role focuses on foundational skills and knowledge that will allow anyone to take the first step towards a cybersecurity career.
What does an ICS security practitioner do?
Industrial control system (ICS) security practitioners are responsible for securing mission-critical SCADA and ICS information systems.
A public discussion about privacy careers: Training, certification and experience
Join Infosec Skills authors Chris Stevens, John Bandler and Ralph O’Brien as they discuss the intersection of privacy and cybersecurity.
The importance of cyber threat research
Moshe Zioni of Apiiro talks about cyber threat research and how to properly report discovered code vulnerabilities.
What does a security engineer do?
Security engineers are responsible for implementing and continuously monitoring security controls that protect computer assets and networks.
What does an information risk analyst do?
Information risk analysts conduct objective, fact-based risk assessments on existing and new systems and technologies.
Long-term cybersecurity career strategies
Maxime Lamothe-Brassard, founder of LimaCharlie, talks about thinking about your long-term career strategies.
Free cybersecurity training resources!
Infosec recently developed 12 role-guided training plans — all backed by research into skills requested by employers and a panel of cybersecurity subject matter experts. Cyber Work listeners can get all 12 for free — plus free training courses and other resources.
Weekly career advice
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Booz Allen Hamilton, CompTIA, Google, IBM, Veracode and others to discuss the latest cybersecurity workforce trends.
Q&As with industry pros
Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level.