Chief of Cybersecurity

PODCAST · technology

Chief of Cybersecurity

Welcome to the Chief of Cybersecurity Podcast hosted by Dewayne Hart where we provide learning and discuss relevant information concerning the cybersecurity workforce, business development, and best practices. You can find more information about SEMAIS at www.semais.net and a list of authored publications at www.DewayneHart.com

  1. 66

    Technology is integral to a child’s life

    They will see it everywhere from birth and will inevitably grow up using it. It can be extremely educational, help build skills, and be a creative outlet. It can also be dangerous — predators, hackers, and other threats use technology to hurt others. We’ll teach you how to protect your children from the wide variety of threats out there, including the over-usage of technology itself. By knowing the risks and having the tools available, you can make technology work for you and your youngsters. This interview session will make digital parenting a success!

  2. 65

    Cybersecurity programs gain popularity with veterans

    As the U.S. military continues to expand its IT ranks, many employers have stepped up efforts to recruit military talent into their IT teams to better secure networks. As a result, online cybersecurity courses such as those at Western Governors University (WGU) have witnessed a growing interest among active-duty military students who are either looking to advance their training for military work or to break into civilian IT careers, according to Rick Benbow, a regional vice president at WGU.This interview will expand the thoughts and projections for veterans\' transition into the cybersecurity career field based on industry statistics and working knowledge of cybersecurity employment.

  3. 64

    Developing An End-to-End Vulnerability Management Process

    One of the critical programs that shape cybersecurity risks is having a process that helps remediates vulnerabilities. Most users and organizations utilize various tools, analytical platforms, reporting, and various teams to help reduce risks associated with CVEs, advisories, configuration management, and asset inventories – which can become challenging. With the increasing number of vulnerable applications, systems, and advancements in AI and cloud, Vulnerability Management has surfaced as a critical element when reducing exploits and risks.In this podcast, the discussion will dissect a vulnerability management program and its lifecycle process. Listeners will gain information on the E2E process related to identification, prioritization, patch and remediation, exceptions, reporting, and continuous risk scoring.

  4. 63

    Cyber Agency: Voting Software Vulnerable in Some States

    Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed. These vulnerabilities, for the most part, are not ones that could be easily exploited by someone who walks in off the street, but they are things that we should worry could be exploited by sophisticated attackers, such as hostile nation states, or by election insiders, and they would carry very serious consequences. This interview session will align how the vulnerabilities exist and what security controls are required to remediate issues outlined by the U.S. Cybersecurity and Infrastructure Agency, or CISA

  5. 62

    Cybersecurity Challenges for The Healthcare Sector

    Since data requirements and information sharing emerged, cybersecurity has undergone numerous developments. Policies and laws for privacy and information resource protection have transitioned the technology space to secure a variety of sectors, including healthcare corporations and government agencies. The increased need for healthcare information sharing has fueled interest in modernizing applications, clouds, data, infrastructure, and networking technologies.This podcast will discuss how the healthcare sector\'s security requirements have become more critical as information storage has shifted to electronic rather than hard copy. Various government agencies and healthcare organizations practices and standards will be discussed and aligned with security best practices. Listeners will gain firsthand knowledge of healthcare security standards and the cybersecurity roadmap that safeguards its resources.

  6. 61

    Building Security Engagements Into The Cyber Workforce

    Every security steward has been challenged to obtain multiple certifications, gain professional experience, and further their knowledge by attending educational institutions. Each resume includes various titles and certifications that demonstrate the cybersecurity professionals motivation and drive to succeed. Beyond the accolades and achievements, many stewards fail to roadmap and carry out project tasks.This podcast discusses those concerns by demonstrating workforce practices and their overall cybersecurity relationships. The podcast focuses on engaging security from initial employee onboarding to career progression. The outcome will balance learning, education, and career paths as a single contributor to career success.

  7. 60

    Developing A Successful Cybersecurity Maturity Model

    Many security environments will need to modernize and transform their cybersecurity programs. The need is driven by technological advancements, maturity requirements, and security readiness. Organizations, security auditors, assessors, and compliance teams can benefit from various frameworks, policies, and standards. Each is distinct and offers similar but distinct cybersecurity maturation strategies. The government has implemented CMMI and other frameworks. However, some industries have yet to adopt or are evaluating whether traditional practices can achieve cybersecurity maturity.  This podcast explores how cybersecurity maturity can help advance technology while assisting readiness programs. Each listener will gain firsthand knowledge of cybersecurity maturity through enablers such as technologies, processes, and people. The findings will highlight the importance of maturing cybersecurity programs using the \"Growth Mindset\"

  8. 59

    A Cultural Shift Defeats The Zero Risk Mentality

    Numerous challenges have been aimed at technologies and their security culture, ranging from risk reduction to determining security readiness. The risk profiles are evaluated and matured to compliance in each situation. Despite their progress and success, many organizations struggle to communicate that \"Zero Risk\"is a nebulous and risk-enabling concept. Various professionals grade risk based on events and compliance indicators. A precise and functional security culture remediates events and expands compliance. This podcast explains why and how \"Zero Risk\" cultures are prone to failure. Listeners will better understand risk profiling and effective strategies to evaluate visual and non-visual data. The results will highlight why success occurs when compliance is extended to a risk-based framework.

  9. 58

    Securing and Protecting The Cloud Environments

    The security involvement and protection standards align with various technology platforms, including the cloud. Many businesses and institutions have modernized and adopted cloud technologies and services. The underlying architect has made significant progress and overcome challenges, with security being a major discussion point.This podcast will examine cloud environments and their operational characteristics and highlight the cybersecurity position. Listeners will gain a more defined awareness of how cloud security operates; and be better positioned to understand its blueprint, operations, use, and protection requirements.

  10. 57

    Critical Infrastructure Protection and Cybersecurity

    Sustaining protection for the nation\'s infrastructure is a critical component that shapes our Quality of Life (QOL). The dire need to prevent infrastructure risks is evident based on historical challenges and ransomware attacks against the energy sector. Beyond the energy sector, the nation\'s infrastructure also depend on chemical, water, dams, healthcare, IT, transportation, and other sectors for the country. This podcast discusses and reinforces how the Department of Homeland Security, protection strategies, and government intervention have been challenged to remediate many weaknesses and sustain the nation\'s ability to operate. Listeners gain valuable information and awareness of the country\'s roadmap and cybersecurity involvement in Critical Infrastructure Protection (CIP).

  11. 56

    Interview with Dewayne Hart about the \"Cybersecurity Mindset.\"

    This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset\'s direction and goals. You can get a sense of my overall thoughts and the motivation behind why the publication was written. This is a must-hear episode!

  12. 55

    Lets Deploy Cybersecurity - Its Time See How It Operates

    This podcast session summaries Season I and bring some high-level discussion points into the format. Listeners gain insight and information to develop the cybersecurity picture and learn how security operates. The information discussed prepares listeners to understand the cybersecurity mindset and its relationship to cybersecurity and strategies to drive their solutions. It furthers an understanding and connection into Season II: Activating Cybersecurity.

  13. 54

    How To Build A Successful Cybersecurity Career

    There have been many concepts and information distributed concerning how to build a successful cybersecurity career. Some have had success, while others have left cybersecurity career-minded professionals with unanswered questions. This podcast session takes a high-level view of the cybersecurity career path and successful steps, actions, or strategies to become successful. It dissects resume writing, employment type, role assignments, and ideas to shape careers and perform as a security professional.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Welcome to the Chief of Cybersecurity Podcast hosted by Dewayne Hart where we provide learning and discuss relevant information concerning the cybersecurity workforce, business development, and best practices. You can find more information about SEMAIS at www.semais.net and a list of authored publications at www.DewayneHart.com

HOSTED BY

Dewayne Hart

URL copied to clipboard!