Cyber Security Sauna Podcast
1) 002| Breaking Into Infosec: Advice from an Ethical Hacker
Between zero day news flashes and stunt hacking reports, there are a lot of false conceptions about what it's like to be an infosec professional. So what should you focus on to get into the world of i...Show More
2) 086| Why showing value is more important for CISOs than ever
CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizations from constantly evolving cyber risks. Today, we are joi...Show More
3) 085| NIST Cyber Security Framework V.2 – Help or Hindrance?
The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it’s proven to be an invaluable tool, it’s gotten a bit long in the tooth for a cyber security landscape...Show More
4) 084| Let's Talk About Threats Baby
A successful cyber defense should protect an organization's critical assets from today's threats, not yesterday's. For this episode, we sat down with threat intelligence analysts Stephen Robinson and ...Show More
5) 083| Security by design for CISOs
The term Shifting Left has not been traditionally associated with cyber security. In this episode, WithSecure CISO Christine Bejerasco lays out the case for how shifting left can evolve beyond its ori...Show More
6) 082| Hyped and Hacked - AI in Cyber Security
As Mikko Hyppönen said recently, we are indeed in the midst of the hottest AI summer ever, and the hype level is off the charts. Yes, AI presents amazing opportunities, but unfortunately, also threats...Show More
7) 081| Mudge - the man, the myth, the mythbusting
We have the pleasure of being joined by the one and only Peiter "Mudge" Zatko, network security expert, open-source programmer, writer, and hacker, with a rapid-fire discussion on some myths in the cy...Show More
8) 080| The Power Of Putting Security Outcomes First
As security is primarily about stopping bad things from happening, victories are often silent. At the same time, failures are often very public, so how can organizations tell when their security i...Show More
9) 079|(Mind the) Detection and Response Gap
The time that an attacker spends on a network before attempting to achieve their objective is decreasing rapidly, making many organizations’ typical detection and response solutions ineffective. Speed...Show More
10) 078| John Grant on the relationship between sustainability and cyber security
The development of new sustainable technologies undoubtedly benefits society, but it also opens the door to new cyber security challenges. For this episode, we were on-site at SPHERE23 with author Joh...Show More
078| John Grant on the relationship between sustainability and cyber security
13:29 | Jun 26th, 2023