Artwork

Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Role of Security Leadership. Matthew Rosenquist Interview.

1:01:00
 
Compartir
 

Manage episode 427965403 series 3559123
Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.

Connect with Matthew:

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capíttulos

1. Role of Security Leadership. Matthew Rosenquist Interview. (00:00:00)

2. Origin Story (00:02:26)

3. Understanding Zero-Day Vulnerabilities (00:06:33)

4. Nation-State Attacks and the Value of Zero-Day Exploits (00:11:08)

5. The Threat of Supply Chain Attacks (00:17:37)

6. Investing in Cybersecurity in the Age of Zero-Day Exploits (00:22:17)

7. The Role of Security Leadership (00:26:48)

8. Measuring Cybersecurity Risk (00:28:21)

9. The Need for Unified Regulations (00:37:11)

10. The Importance of Privacy Education (00:46:36)

11. Impact of Quantum Computing on Encryption (00:51:11)

12. Cybersecurity Predictions for the Future (00:52:45)

221 episodios

Artwork
iconCompartir
 
Manage episode 427965403 series 3559123
Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks.

Connect with Matthew:

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capíttulos

1. Role of Security Leadership. Matthew Rosenquist Interview. (00:00:00)

2. Origin Story (00:02:26)

3. Understanding Zero-Day Vulnerabilities (00:06:33)

4. Nation-State Attacks and the Value of Zero-Day Exploits (00:11:08)

5. The Threat of Supply Chain Attacks (00:17:37)

6. Investing in Cybersecurity in the Age of Zero-Day Exploits (00:22:17)

7. The Role of Security Leadership (00:26:48)

8. Measuring Cybersecurity Risk (00:28:21)

9. The Need for Unified Regulations (00:37:11)

10. The Importance of Privacy Education (00:46:36)

11. Impact of Quantum Computing on Encryption (00:51:11)

12. Cybersecurity Predictions for the Future (00:52:45)

221 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida