Biggest cybercrime trends heading into 2023
Paul Giorgi of XM Cyber discusses the biggest cybercrime trends of 2022 — and what it means for cybersecurity professionals in 2023.
ISACA CISM changes: Less focus on management, more on security
Infosec Skills author Leighton Johnson talks about major changes to ISACA CISM certification, particularly the shift to a more security focus.
How SOCs are changing: Location, remote work and more
A.N. Ananth of Netsurion talks about security operations center (SOC) changes and what it means for the future of those who work in SOCs.
The changing roles of red teaming
Cyberis’ Matt Lorentzen talks all things pentesting, red teaming and the changing roles red teaming has in fine-tuning modern security.
How to keep symmetric and asymmetric cryptography straight
Want to hear a cool trick to keep symmetric and asymmetric cryptography straight in your head? Keatron Evans has one, and he told it to me.
US Cyber Games Season II: Behind the scenes with the head coach
Ken Jenkins talks about the US Cyber Games, what to expect in season 2 and what it’s like to coach the team.
Connecting cloud security, data privacy and cybersecurity
Ameesh Divatia, CEO of Baffle, Inc., talks about the perfect trifecta of cybersecurity skills: data privacy, data security and cloud security.
K-12 cybersecurity: Protecting schools from cyber threats
Michael Wilkinson leads the digital forensics and incident response team at Avertium. He talks about threat research, the threat of Vice Society, how schools can improve their security and much more.
Learning ≠ Education: How people really learn and what it means for security training
What drives employees to learn, and how can you truly change employee behavior? Learning and development vet Nick Shackleton-Jones explains.
Behind the scenes of ransomware negotiation
Tony Cook of GuidePoint Security talks about his role as a ransomware negotiator and how to get into the field.
CMMC has changed: Here’s what you need to know
Infosec’s Leighton Johnson talks about the latest updates to the Cybersecurity Maturity Model Certification (CMMC) framework.
Cybersecurity public speaking techniques
Lisa Tetrault of Arctic Wolf talks about the adhesives that hold cybersecurity together: communication, collaboration and strong teamwork.
Digital identity and cybersecurity are inseparable
Susan Morrow talks about security, ethical, practical and UX hurdles of current identity practices and gives us both an optimistic and pessimistic version of the digital identity practices in 10 years.
2022 – NCSAM Poster Giveaway
Don't end up on the hacker's leaderboard. Level Up! your cybersecurity game with our free poster kit. Scheduled a meeting today!
Bad data privacy protocols can become an identity fraud disaster
Learn about bad data privacy protocols, international privacy law and how to work as a data privacy officer from Ground Labs’ Stephen Cavey.
Privacy and international business
Noriswadi Ismail of Breakwater Solutions and the Humanising 2030 campaign joins us to talk about privacy regarding international business.
Attack surface managers and the state of attack surfaces
Learn about the state of attack surfaces, the strengths and shortcomings of attack surface managers and why something we refer to as a “soft” skill might be the hardest skill of all! Plus, we touch on shadow IT.
The importance of API security and PII
Giora Engel of NeoSec talks about securing APIs, why APIs are the new network, why their very nature makes them vulnerable to abuse and how to position yourself as an authority in the ever-growing field of API security.
Security awareness training: 4 employee behaviors that matter most
Level up your security awareness training program — and instill best practices in employees that will keep them (and your organization) secure year-round.
Corporate data breaches and security awareness training
Mathieu Gorge of VigiTrust talks about the Marriott Hotel data breach and why once-per-year security awareness training isn’t enough.
Overcoming challenges to build a cybersecurity career
Dr. Chanel Suggs, the Duchess of Cybersecurity®, discusses her incredibly challenging upbringing and how she built a successful career in cybersecurity.
What’s it like to work in emergency response?
Learn all about emergency response — and the myriad techniques and skills that term implies — from Christopher Tarantino, CEO of Epicenter Innovation.
Securing operational technology: ICS, IoT, AI and more
Learn about working with operational technology (OT) and internet-connected devices with Francis Cianfrocca, CEO of Insight Cyber Group.
Cybersecurity project management: A peek behind the curtain
What is the day-to-day work of a cybersecurity project manager? Jackie Olshack of Dell and Ginny Morton of Deloitte return to answer your live questions!