All Episodes
Episodes
#51 - New Kid in Town (with Rebecca Mossman)
When you first start a cybersecurity job, or hire someone into a cybersecurity job, there is a window of opportunity to see things with a new perspective. In this episode, we’re privileged to share ideas with Rebecca...
View Episode
#50 - Border Gateway Protocol (BGP)
A Border Gateway Protocol (BGP) misconfiguration is what took out Facebook on 4 October. Most IT folks don't understand how BGP works. This episode helps you gain a better understanding of the protocol that creates...
View Episode
#49 - Cyberlaw Musings (with Mark Rasch)
This is a special treat. On this episode of CISO Tradecraft you can hear Mark D. Rasch, JD, discuss legal and security topics that he's encountered in his more than 30 years of experience in cybersecurity law. We...
View Episode
#48 - Effective Meetings
We've all suffered through horrible meetings that felt like a total waste of time. As a security leader, you'll be convening your fair share of meetings with your staff. Don't be "that boss" who can't run an...
View Episode
#47 - More Risky Business with FAIR
In our 31 July 2021 Episode 42, Risky Business, we covered the basics of risk and risk assessment. This part 2 episode gets into the practical application of risk management using the FAIR model, or Factor Analysis of...
View Episode
#46 - Crisis Leadership with G Mark Hardy‘s 9/11 Experience
Have you ever faced a crisis? How well did you do? You should always want to improve your skills in case another happens. On the 20th anniversary of 9/11, G. Mark Hardy shares some of his experiences as the...
View Episode
#45 - Protecting your Crown Jewels (with Roselle Safran)
Traditional risk models focus on calculating loss frequency and magnitude, but don't go far enough in terms of modeling the most important assets in our organization, known as "crown jewels." This episode of CISO...
View Episode
#44 - Intro to Docker Containers and Kubernetes (K8s)
Containers are a lightweight technology that allows applications to deploy to a number of different host Operating Systems without having to make any modifications at all to the code. As a result, we're been seeing a...
View Episode
#43 - Cyber Deception (with Kevin Fiscus)
Join CISO Tradecraft for a fascinating discussion on how to build cyber traps for the bad guys that really work. By creating a deceptive environment that "booby-trap" your networks with fake services, enticing...
View Episode
#42 - Third Party Risk Management (with Scott Fairbrother)
Special Thanks to our podcast Sponsor, CyberGRX
On today’s episode, we bring in Scott Fairbrother to help tackle key questions with Third Party Risk Management:
How do you identify which vendors pose the highest risk...
View Episode
#41 - Got any Threat Intelligence?
Cyber Threat Intelligence is an important part of an effective CISO arsenal, but many security leaders don’t fully understand how to optimize it for their benefit. In this show, we examine why cyber threat...
View Episode
#40 - Risky Business
In this episode, we take a deep dive into that four-letter word RISK. Risk is measurable uncertainty. As a component of Governance, Risk, and Compliance (GRC), risk management is an important part of a security...
View Episode