Welcome to the Cybersecurity Readiness Podcast Site

Episodes

Cybersecurity in the Age of AI
July 11, 2023

Cybersecurity in the Age of AI

While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber-attacks. There is growing recognition of AI’s potential to fight cybercrim...

Listen to the Episode
Identity Orchestration Strategies and Best Practices
June 27, 2023

Identity Orchestration Strategies and Best Practices

Cloud migration and remote work requirements are forcing organizations to modernize their applications and identity systems. Making the transition is both time-consuming and expensive using traditional software development pr...

Listen to the Episode
Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage
June 13, 2023

Creating a Diverse Cybersecurity Workforce and Solving the Talent Sho…

Recent cybersecurity workforce study reports reveal that a) there’s still a global shortage of 3.4 million workers in this field, and b) only 25% of the global cybersecurity workforce are women. In this episode, I had an enga...

Listen to the Episode
Countering Insider Threats: Seven Science-Based Commandments
April 25, 2023

Countering Insider Threats: Seven Science-Based Commandments

Research finds that there was a 44% increase in insider threat incidents across all types of organizations, and 56% of the reported incidents were due to negligence. Equally alarming is that the average annual cost to remedia...

Listen to the Episode
Mitigating Risks from Unmonitored Communication Channels
April 13, 2023

Mitigating Risks from Unmonitored Communication Channels

Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and supervise communications. This crackdown on non-compliant communications is the ...

Listen to the Episode
Implementing Secure and Fast Authentication Processes
March 29, 2023

Implementing Secure and Fast Authentication Processes

Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If developments like FIDO2, WebAuthn, and passkeys are to be the cornerstones of a pa...

Listen to the Episode
Proactive Resilient Approach to Cybersecurity
March 14, 2023

Proactive Resilient Approach to Cybersecurity

It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and sustaining such an approach requires high commitment, preparedness, and disci...

Listen to the Episode
The Challenges and Best Practices of Cyber Security in Emerging Markets
Feb. 28, 2023

The Challenges and Best Practices of Cyber Security in Emerging Marke…

“While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes and governance, the complexity of global supply chains, the need to remain lo...

Listen to the Episode
Cybersecurity Perspectives of a Community College President
Feb. 14, 2023

Cybersecurity Perspectives of a Community College President

In this episode, Pamela Senegal, President, Piedmont Community College , shares several best practices, including having an information technology presence in each of the college-wide committees. I had the pleasure of meeting...

Listen to the Episode
From Law Enforcement Officer to Chief Information Security Officer
Jan. 31, 2023

From Law Enforcement Officer to Chief Information Security Officer

In this episode, Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School , shares his exciting but challenging journey from working as an engineering lab technician in...

Listen to the Episode
To trust or not to trust: the overwhelming challenge
Jan. 17, 2023

To trust or not to trust: the overwhelming challenge

Clinical psychologist Beatrice Cadet, Scientist Integrator at Netherland's Organization for Applied Scientific Research (TNO) , draws upon multiple concepts such as 'learned helplessness' to explain why people still fall for ...

Listen to the Episode
Useful Technology Should Be Attack Agnostic
Jan. 3, 2023

Useful Technology Should Be Attack Agnostic

In this episode, Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency , sheds light on the cybersecurity technology landscape and emphasizes the need...

Listen to the Episode
Do you see what attackers see? Threat modeling done right
Dec. 20, 2022

Do you see what attackers see? Threat modeling done right

Threat modeling is an intrinsic part of information security governance and needs to be done well. However, research finds that many organizations don't do it well, some are pretty haphazard or chaotic in their approach. In t...

Listen to the Episode
Implementing Phishing Resistant Multifactor Authentication
Dec. 6, 2022

Implementing Phishing Resistant Multifactor Authentication

The Cybersecurity and Infrastructure Security Agency (CISA) recently (Oct 31, 2022) released fact sheets urging all organizations to implement phishing-resistant multi-factor authentication (MFA). In this episode, George Gerc...

Listen to the Episode
How do SMBs protect themselves from ransomware attacks?
Nov. 22, 2022

How do SMBs protect themselves from ransomware attacks?

A recent Global SMB Ransomware survey finds that nearly half of small and medium-sized businesses (SMBs) have experienced a ransomware attack, yet the majority aren't sure they are a target, and most are not confident they ca...

Listen to the Episode
Cybersecurity As A Strategic Opportunity
Nov. 8, 2022

Cybersecurity As A Strategic Opportunity

In this episode, Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist , shares his vision of the future of cyber governance. According to him, the leadership mindset needs to change whereby ...

Listen to the Episode
Comprehensive Asset Discovery
Oct. 25, 2022

Comprehensive Asset Discovery

Comprehensive asset discovery is foundational to robust and proactive cybersecurity governance. The Cybersecurity and Infrastructure Security Agency recently issued a directive (BOD 23-01) requiring federal enterprises (civil...

Listen to the Episode
Is Cybersecurity A Moving Target at Academic Institutions?
Oct. 11, 2022

Is Cybersecurity A Moving Target at Academic Institutions?

In a highly engrossing and in-depth discussion, Tej Patel, Vice President, and CIO at Stevens Institute of Technology sheds light on the various information security challenges that plague academic institutions and how best t...

Listen to the Episode
Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience
Sept. 27, 2022

Securely Migrating to the Cloud -- Insights from the American Cancer …

As more organizations embrace cloud-based services, securely migrating to the cloud is becoming an important capability. Keith Weller , former Vice President, Enterprise Technology Services, American Cancer Society (ACS), sp...

Listen to the Episode
Detecting Malicious Insider Threats by Monitoring User Journeys
Sept. 13, 2022

Detecting Malicious Insider Threats by Monitoring User Journeys

 Insider threats are often considered the biggest risk for organizations because they can cause the most destruction. Survey reports, and studies, have found that organizations have spent millions of dollars to recover from ...

Listen to the Episode
Skilling Up for Security Operations Center Roles
Aug. 30, 2022

Skilling Up for Security Operations Center Roles

The Security Operations Center (SOC) is at the heart of an organization's cyber defense system. Highly skilled and motivated personnel must work in these centers. James Risler, Senior Manager, Cisco Learning and Certification...

Listen to the Episode
Bridging the Gap Between Intentions and Practicality in Cybersecurity
Aug. 16, 2022

Bridging the Gap Between Intentions and Practicality in Cybersecurity

Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka , firmly believes that CISOs have the very best of intentions -- "we all mean the best; we all want to protect the organization, and that is all we ...

Listen to the Episode
Preparing for the Future of Device Management
Aug. 2, 2022

Preparing for the Future of Device Management

With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping track of all of these devices, and ensuring that they are being used in a v...

Listen to the Episode
The State of Attack Surface Management
July 19, 2022

The State of Attack Surface Management

With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report on the state of attack surface management (ASM) finds security teams drownin...

Listen to the Episode