¡Desconecta con la aplicación Player FM !
Podcasts que vale la pena escuchar
PATROCINADO
Why a Data-Driven cybersecurity Defense Will Protect Your Organization With Special Guest, Roger Grimes
Manage episode 353027955 series 3291585
Loved this episode? Please leave us a review and rating on your favorite podcast platform!
After leaving the CPA industry and becoming a computer trainer, Roger worked his way into the cybersecurity industry, Roger Grimes, a data-driven evangelist, is determined to protect organizations from malicious social engineering attacks, but finds that even his advanced tools are no match for the crafty hackers.
"Organizations need to defend their infrastructure by identifying their critical data to recognize and respond to threats. Utilizing a data driven defense allows you to detect and respond to threats more quickly and accurately than traditional methods." -Roger Grimes
Roger Grimes is a cybersecurity expert and data driven defense evangelist for KnowBe4. He has held a variety of roles throughout his career, and his focus is on fixing the internet and protecting organizations from social engineering attacks.
In this episode, you will learn the following:
1. How did Roger Grimes go from being a CPA to becoming a cybersecurity expert?
2. What was it like to work with John McAfee?
3. How did Roger Grimes successfully bluff his way into the cybersecurity industry?
About Roger Grimes, CPA, CISSP
- LinkedIn: https://www.linkedin.com/in/rogeragrimes/
- eMail: rogerg@knowbe4.com
- Twitter: https://twitter.com/rogeragrimes
Show Notes / Links:
- Cuckoo’s Egg book - https://www.amazon.com/dp/B0083DJXCM?ref_=cm_sw_r_cp_ud_dp_FK52CJS8J6DAJ6JMZJTF
- Data Killers, John McAfee - https://www.amazon.com/dp/031202889X?ref_=cm_sw_r_cp_ud_dp_7N07KYGNG9GGSKMW5Q07
- FidoNet - https://www.fidonet.org/index.html
- Peter Norton’s Guide to the IBM PC - https://www.amazon.com/dp/0136619010?ref_=cm_sw_r_cp_ud_dp_FJ7E13ENVAFXZWR139YD
- CISA’s Known Exploited Vulnerabilities Catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions - https://propodcastsolutions.com/
ShowNotes created with Capsho (
Capíttulos
1. Introduction (00:00:00)
2. Entry into cybersecurity (00:01:43)
3. Working with John McAfee (00:07:20)
4. Keeping up with all the events and technology changes? (00:16:32)
5. Keeping Up With Technology (00:16:35)
6. Dealing with Stage Fright (00:19:39)
7. Public Speaking Tip (00:22:21)
8. Data-Driven Defense (00:23:59)
9. Third Edition of Data-Driven Defense Book (00:30:37)
10. Two to Four Percent (00:33:31)
11. Greatest Failure & Life Lesson (00:36:31)
12. Greatest Threat (00:41:25)
13. Conclusion / Wrap-up (00:42:10)
39 episodios
Manage episode 353027955 series 3291585
Loved this episode? Please leave us a review and rating on your favorite podcast platform!
After leaving the CPA industry and becoming a computer trainer, Roger worked his way into the cybersecurity industry, Roger Grimes, a data-driven evangelist, is determined to protect organizations from malicious social engineering attacks, but finds that even his advanced tools are no match for the crafty hackers.
"Organizations need to defend their infrastructure by identifying their critical data to recognize and respond to threats. Utilizing a data driven defense allows you to detect and respond to threats more quickly and accurately than traditional methods." -Roger Grimes
Roger Grimes is a cybersecurity expert and data driven defense evangelist for KnowBe4. He has held a variety of roles throughout his career, and his focus is on fixing the internet and protecting organizations from social engineering attacks.
In this episode, you will learn the following:
1. How did Roger Grimes go from being a CPA to becoming a cybersecurity expert?
2. What was it like to work with John McAfee?
3. How did Roger Grimes successfully bluff his way into the cybersecurity industry?
About Roger Grimes, CPA, CISSP
- LinkedIn: https://www.linkedin.com/in/rogeragrimes/
- eMail: rogerg@knowbe4.com
- Twitter: https://twitter.com/rogeragrimes
Show Notes / Links:
- Cuckoo’s Egg book - https://www.amazon.com/dp/B0083DJXCM?ref_=cm_sw_r_cp_ud_dp_FK52CJS8J6DAJ6JMZJTF
- Data Killers, John McAfee - https://www.amazon.com/dp/031202889X?ref_=cm_sw_r_cp_ud_dp_7N07KYGNG9GGSKMW5Q07
- FidoNet - https://www.fidonet.org/index.html
- Peter Norton’s Guide to the IBM PC - https://www.amazon.com/dp/0136619010?ref_=cm_sw_r_cp_ud_dp_FJ7E13ENVAFXZWR139YD
- CISA’s Known Exploited Vulnerabilities Catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions - https://propodcastsolutions.com/
ShowNotes created with Capsho (
Capíttulos
1. Introduction (00:00:00)
2. Entry into cybersecurity (00:01:43)
3. Working with John McAfee (00:07:20)
4. Keeping up with all the events and technology changes? (00:16:32)
5. Keeping Up With Technology (00:16:35)
6. Dealing with Stage Fright (00:19:39)
7. Public Speaking Tip (00:22:21)
8. Data-Driven Defense (00:23:59)
9. Third Edition of Data-Driven Defense Book (00:30:37)
10. Two to Four Percent (00:33:31)
11. Greatest Failure & Life Lesson (00:36:31)
12. Greatest Threat (00:41:25)
13. Conclusion / Wrap-up (00:42:10)
39 episodios
همه قسمت ها
×
1 Security and Ethics: Collaborating Across Teams for Responsible AI with Special Guest Alison Cossette 50:12

1 Aligning Cybersecurity Strategy with Business Goals: A CISO's Perspective with Special Guest, Joseph Carson 52:50

1 Adventures in Cybersecurity: From Music to Botnets and Beyond, with special guest, Dave Lewis 49:10

1 Guarding the Digital Frontier, Navigating Privacy in the Age of Data with special guest Jack Rhysider 35:40

1 50 years of Evolution of Cybersecurity and Securing Software From Punch Cards and PKI to ChatGPT with Special Guest, Loren Kohnfelder 53:20

1 Evolving the CISO Role: Technologist, Translator, Strategist, with Special Guest, Dr. Lee Mangold 36:38

1 Developing a Positive Security Culture: Going Beyond Scaring People with Special Guest, Dr. Jessica Barker, PhD, MBE 46:08

1 Beyond Technical Skills: Beyond Technical Skills: Unlocking the Human Element in Cybersecurity, with Special Guest, Julie Haney 48:32

1 Instilling a culture of continuous learning in cybersecurity and the tips for breaking into cybersecurity with Special Guest, Naomi Buckwalter 45:18


1 Supercharge Your Cybersecurity Program by collaborating with a BISO with special guest Nicole Dove 47:38

1 Unleashing the potential of AI and Zero Trust in Cybersecurity and Data Protection with our special guest, Ian Garrett. 43:15

1 Reducing Risk by addressing the Threats to your Cybersecurity program through innovative platforms, with our special guest, Bryson Bort. 46:04

1 Security Awareness by Blending Entertainment and Education for Engaging Employees, with Special Guest, Rob McCollum 40:14

1 Automating your cyber security program for compliance and reducing risk with special guest Stas Bojoukha 39:52

1 Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, & Culture, with special guest, Joanna Burkey 45:32

1 Human-Based Cyber Risk In Building Trust & Security For Organizations with Special Guest, Alexandra Panaretos 39:53

1 Why a Data-Driven cybersecurity Defense Will Protect Your Organization With Special Guest, Roger Grimes 43:35


1 Understanding the role of a CISO to reduce the risk of an exposure for an organization with special guest Quentyn Taylor 37:59

1 Ways to secure your applications and reduce the risk of a cyber attack on your applications with special guest, Tanya Janca 41:09

1 Breaking down Blockchain and the Impact on Cybersecurity and Industries with Guest, Jean-Michel Azzopardi 48:28



Bienvenido a Player FM!
Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.