Tracking developer behavior can augment DevSecOps | Guest Nir Valtman
Nir Valtman, CEO and co-founder of Arnica, discusses developer behavior-based security.
Cybersecurity team cohesion in remote settings | Cyber Work Hacks
Learn more about managing a cybersecurity team remotely.
CompTIA Data+ certification: Is it a good fit for your career? | Guest James Stanger
James Stanger, chief technology evangelist at CompTIA, walks through their new Data+ certification.
Sorry, Terminator fans, ChatGPT is not going to become Skynet
Learn what artificial intelligence and malware are doing these days, from Inversion6 CISO Jack Nichelson.
Breaking down digital forensics certifications
Amber Schroader, CEO of Paraben, explains the different ways to pursue a career in digital forensics.
A deep dive into GitHub’s security strategy
Jacob DePriest, the VP and deputy chief security Officer at GitHub, talks about development security.
Goodbye (ISC)² CAP, hello new CGRC certification
The Certified Authorization Professional (CAP) is now Certified in Governance, Risk and Compliance (CGRC). Learn why the name changed and what it means.
Asset visibility and vulnerability detection
Learn about CISA’s operational directive for non-military federal agencies to adopt a strict set of asset visibility and vulnerability detection system.
Inside the Pentagon’s new zero-trust policy
Learn about the Pentagon’s new zero-trust policy with Venafi solutions architect Steve Judd.
Biggest cybercrime trends heading into 2023
Paul Giorgi of XM Cyber discusses the biggest cybercrime trends of 2022 — and what it means for cybersecurity professionals in 2023.
ISACA CISM changes: Less focus on management, more on security
Infosec Skills author Leighton Johnson talks about major changes to ISACA CISM certification, particularly the shift to a more security focus.
How SOCs are changing: Location, remote work and more
A.N. Ananth of Netsurion talks about security operations center (SOC) changes and what it means for the future of those who work in SOCs.
The changing roles of red teaming
Cyberis’ Matt Lorentzen talks all things pentesting, red teaming and the changing roles red teaming has in fine-tuning modern security.
How to keep symmetric and asymmetric cryptography straight
Want to hear a cool trick to keep symmetric and asymmetric cryptography straight in your head? Keatron Evans has one, and he told it to me.
How to set up a digital forensics lab
Paraben founder and CEO Amber Schroader talks about how to quickly and inexpensively set up your own home digital forensics lab.
US Cyber Games Season II: Behind the scenes with the head coach
Ken Jenkins talks about the US Cyber Games, what to expect in season 2 and what it’s like to coach the team.
Connecting cloud security, data privacy and cybersecurity
Ameesh Divatia, CEO of Baffle, Inc., talks about the perfect trifecta of cybersecurity skills: data privacy, data security and cloud security.
K-12 cybersecurity: Protecting schools from cyber threats
Michael Wilkinson leads the digital forensics and incident response team at Avertium. He talks about threat research, the threat of Vice Society, how schools can improve their security and much more.
Behind the scenes of ransomware negotiation
Tony Cook of GuidePoint Security talks about his role as a ransomware negotiator and how to get into the field.
CMMC has changed: Here’s what you need to know
Infosec’s Leighton Johnson talks about the latest updates to the Cybersecurity Maturity Model Certification (CMMC) framework.
Cybersecurity public speaking techniques
Lisa Tetrault of Arctic Wolf talks about the adhesives that hold cybersecurity together: communication, collaboration and strong teamwork.
Digital identity and cybersecurity are inseparable
Susan Morrow talks about security, ethical, practical and UX hurdles of current identity practices and gives us both an optimistic and pessimistic version of the digital identity practices in 10 years.
Bad data privacy protocols can become an identity fraud disaster
Learn about bad data privacy protocols, international privacy law and how to work as a data privacy officer from Ground Labs’ Stephen Cavey.
Privacy and international business
Noriswadi Ismail of Breakwater Solutions and the Humanising 2030 campaign joins us to talk about privacy regarding international business.
Free cybersecurity training resources!
Infosec recently developed 12 role-guided training plans — all backed by research into skills requested by employers and a panel of cybersecurity subject matter experts. Cyber Work listeners can get all 12 for free — plus free training courses and other resources.
Weekly career advice
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Booz Allen Hamilton, CompTIA, Google, IBM, Veracode and others to discuss the latest cybersecurity workforce trends.
Q&As with industry pros
Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level.
Level up your skills
Hack your way to success with career tips from cybersecurity experts. Get concise, actionable advice in each episode — from acing your first certification exam to building a world-class enterprise cybersecurity culture.