CyberSpeak with InfoSec Institute

CyberSpeak with InfoSec Institute

Getting started and moving up in IT and security

George McPherson, host of the “Blak Cyber” podcast, has an impressive background in IT and information...

Add to ... 

Protecting sensitive information: Growing data, regulations and risks

The amount of data organizations hold has exploded — along with the risk it poses. Today’s guest is Very...

Add to ... 

Red teamers arrested conducting a penetration test

The story of today's guests is ripped straight from the headlines. Gary DeMercurio and Justin Wynn, both of the...

Add to ... 

Starting a cybersecurity business and building a diverse workforce

Despite being told she was “too young, too inexperienced, and too naïve” to contribute anything to the...

Add to ... 

Cloud security best practices and career tips

What exactly is the cloud? And how do you secure infrastructure that is not your own? On today’s episode,...

Add to ... 

Job hunting tips for cybersecurity professionals

Learn all about cybersecurity job hunting with Eric Jeffery, senior managing consultant and solutions architect for...

Add to ... 

Get started in computer forensics: Entry-level tips, skills and career paths

This week we're excited to have back one of the major figures in digital forensics, Paraben CEO Amber Schroader....

Add to ... 

Getting into security architecture: Careers, skills and ransomware

Get a peek behind the curtain of security architecture careers from Pranshu Bajpai, a security architect with...

Add to ... 

Data privacy careers: GDPR, CCPA and the right to be forgotten

Whose responsibility is privacy, and what skills do you need to effectively implement and carry out new regulations...

Add to ... 

Computer forensics careers: Taking down a $1.2 billion Ponzi scheme

Few people know what it's like to help take down a $1.2 billion dollar Ponzi scheme, but that's exactly what today's...

Add to ... 

Threat modeling: Breaking the design with pen, paper and creativity

Go deep into the weeds of Threat Modeling with Infosec Skills author Geoffrey Hill. He shares his Arnold...

Add to ... 

NICE Cybersecurity Workforce Framework: Close your skills gap with role-based training

The demand for skilled cybersecurity professionals continues to grow, and effectively closing that gap requires a...

Add to ... 

API security, vulnerability research and LGBTQ+ representation

Alissa Knight returns as the first ever three-peat Cyber Work guest, and the topic this week is — herself!...

Add to ... 

LGBTQ+ representation in cybersecurity

Alissa Knight returns as the first ever three-peat Cyber Work guest, and the topic this week is — herself!...

Add to ... 

From network engineer to pentester: Tips for moving into cybersecurity

Today we're discussing a common career path, moving from networking to cybersecurity. Brad Pierce, Director of...

Add to ... 

Inside a purple team: Pentesting, vulnerabilities and other key skills

We love red teaming here at Cyber Work, and this week we're excited to explore a topic just few shades down the...

Add to ... 

How to become a malware analyst

Uncover the dark, sticky details of malware, ransomware and other nasties that reside one unguarded click away. On...

Add to ... 

Preparing the next generation of cybersecurity professionals

Students high school age and younger are getting fast-tracked into cybersecurity. Some are even learning concepts...

Add to ... 

Cyber threat intelligence: Learn to become a cybersecurity tactician

Take a deep dive into the world cyber threat intelligence with today's guest, Charles DeBeck of IBM’s X-Force...

Add to ... 

Offensive or defensive security: Which career is for you?

When it comes to your career, should you go red team, blue team or both? Today's guest is QuoLab Technologies...

Add to ...