CISO Tradecraft®  By  cover art

CISO Tradecraft®

By: CISO Tradecraft®
  • Summary

  • Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
    Copyright 2024 All rights reserved.
    Show more Show less
Episodes
  • #183 - Navigating the Cloud Security Landscape (with Chris Rothe)
    May 27 2024

    This episode of CISO Tradecraft features a conversation between host G. Mark Hardy and Chris Rothe, co-founder of Red Canary, focusing on cloud security, managed detection and response (MDR) services, and the evolution of cybersecurity practices. They discuss the genesis of Red Canary, the significance of their company name, and the distinctions between Managed Security Service Providers (MSSPs) and MDRs. The conversation also covers the importance of cloud security, the challenges of securing serverless and containerized environments, and leveraging open-source projects like Atomic Red Team for cybersecurity. They conclude with insights on the cybersecurity labor market, the value of threat detection reports, and the future of cloud security.

    Red Canary: https://redcanary.com/

    Chris Rothe: https://www.linkedin.com/in/crothe/

    Transcripts: https://docs.google.com/document/d/1XN4Bp7Sa2geGCVaHuqMRmJckms4q7_L6

    Show more Show less
    44 mins
  • #182 - Shaping the SOC of Tomorrow (with Debbie Gordon)
    May 20 2024

    This episode of CISO Tradecraft, hosted by G Mark Hardy, features special guest Debbie Gordon. The discussion focuses on the critical role of Security Operations Centers (SOCs) in an organization's cybersecurity efforts, emphasizing the importance of personnel, skill development, and maintaining a high-performing team. It covers the essential aspects of building and managing a successful SOC, from hiring and retaining skilled incident responders to measuring their performance and productivity. The conversation also explores the benefits of simulation-based training with CloudRange Cyber, highlighting how such training can improve job satisfaction, reduce incident response times, and help organizations meet regulatory requirements. Through this in-depth discussion, listeners gain insights into best practices for enhancing their organization's cybersecurity posture and developing key skill sets to defend against evolving cyber threats.

    Cloud Range Cyber: https://www.cloudrangecyber.com/

    Transcripts: https://docs.google.com/document/d/18ILhpOgHIFokMrkDAYaIEHK-f9hoy63u

    Chapters

    • 00:00 Introduction
    • 01:04 The Indispensable Role of Security Operations Centers (SOCs)
    • 02:07 Building an Effective SOC: Starting with People
    • 03:04 Measuring Productivity and Performance in Your SOC
    • 05:36 The Importance of Continuous Training and Simulation in Cybersecurity
    • 09:00 Debbie Gordon on the Evolution of Cyber Training
    • 11:54 Developing Cybersecurity Talent: The Importance of Simulation Training
    • 14:46 The Critical Role of People in Cybersecurity
    • 21:57 The Impact of Regulations on Cybersecurity Practices
    • 24:36 The Importance of Proactive Cybersecurity Training
    • 26:26 Redefining Cybersecurity Roles and Training Approaches
    • 30:08 Leveraging Cyber Ranges for Real-World Cybersecurity Training
    • 36:03 Evaluating and Enhancing Cybersecurity Skills and Team Dynamics
    • 37:49 Maximizing Cybersecurity Training ROI and Employee Engagement
    • 41:40 Exploring CloudRange Cyber's Training Solutions
    • 43:28 Conclusion: The Future of Cybersecurity Training
    Show more Show less
    45 mins
  • #181 - Inside the 2024 Verizon Data Breach Investigations Report
    May 13 2024

    In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predominance of hacking and malware. The report identifies the top methods bad actors use for exploiting companies, including attacking VPNs, desktop sharing software, web applications, conducting phishing, and stealing credentials, emphasizing the growing sophistication of attacks facilitated by technology like ChatGPT for phishing and deepfake tech for social engineering. The episode touches on various cybersecurity measures, the omnipresence of multi-factor authentication (MFA) as a necessity rather than a best practice, and the surge in denial-of-service (DDoS) attacks. Hardy also discusses generative AI's role in enhancing social engineering attacks and the potential impact of deepfake content on elections and corporate reputations. Listeners are encouraged to download the DBIR for a deeper dive into its findings.

    Transcripts: https://docs.google.com/document/d/1HYHukTHr6uL6khGncR_YUJVOhikedjSE

    Chapters

    • 00:00 Welcome to CISO Tradecraft
    • 00:35 Celebrating Milestones and Offering Services
    • 01:39 Diving into the Verizon Data Breach Investigations Report
    • 04:22 Top Attack Methods: VPNs and Desktop Sharing Software Vulnerabilities
    • 09:24 The Rise of Phishing and Credential Theft
    • 19:43 Advanced Threats: Deepfakes and Generative AI
    • 23:23 Closing Thoughts and Recommendations
    Show more Show less
    25 mins

What listeners say about CISO Tradecraft®

Average customer ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Can't get enough

If you are looking to learn how to be a CISO this is your show. It's not a talk show or recent events. It teaches the how for you to become knowledgeable on important cyber topics

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!