Security Operations: Hybrid SOC Delivery & Maturity
Cyber Security America
by Joshua Nicholson
4M ago
Tune in to episode 12 of Cyber Security America, airing live on Tuesdays at Noon ET on VoiceAmerica. In this week's discussion, we will continue the conversation from the previous episode and delve deeper into the topic of Security Operations Center (SOC) delivery models. Join Josh and special guest, Mr. Paul Dwyer, as they explore the best practices and lessons learned for optimizing SOC performance and maturity. As a former Global IBM Security Partner with vast experience in SOC implementation and optimization, Mr. Dwyer brings invaluable insights to the table. Don't miss this opportunity to ..read more
Visit website
Thought Leadership: Bruce Schneier on "A Hacker's Mind"
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to Cyber Security America, the podcast where we delve deep into the world of cybersecurity and provide insights on past trends, current challenges, and areas for improvement. Our goal is to help you stay informed and prepared for the next cyber threat. In this episode, we have a very special guest, Bruce Schneier, an internationally renowned security technologist, known as a security guru by The Economist. With over a dozen books and hundreds of articles and academic papers under his belt, Bruce is a true legend in the information security field. He's also the author of the latest book ..read more
Visit website
Security Operations: Adapting SOC Delivery to Threat Actors
Cyber Security America
by Joshua Nicholson
4M ago
At the center of your cyber security universe is the Security Operations Center (SOC). This is supposed to be part of your 24/7 Managed Detection & Response (MDR) capability. But how do you know if your security operations team is running in a mature and highly capable manner. This is where the rubber meets the road when identifying and respond to security threats within your environment. What are the different delivery models, lessons learned, and best practices for driving improvements? We will also explore the increasingly sophisticated tactics used by threat actors, including their use ..read more
Visit website
What Makes A Good Threat Intelligence Program In 2023?
Cyber Security America
by Joshua Nicholson
4M ago
In the world of Cyber Security, an essential component needed in the fight is a mature Threat Intelligence program tied to a strong Attack Surface Reduction (ASR) function. In this episode. We explore the world of Cyber Intelligence in the enterprise and in small business environments. We will learn from former military, intelligence, and NSA analysts working in the private sector now. What does good look like and what will the new year bring ..read more
Visit website
Encore Security Operations: Adapting SOC Delivery to Threat Actors
Cyber Security America
by Joshua Nicholson
4M ago
At the center of your cyber security universe is the Security Operations Center (SOC). This is supposed to be part of your 24/7 Managed Detection & Response (MDR) capability. But how do you know if your security operations team is running in a mature and highly capable manner. This is where the rubber meets the road when identifying and respond to security threats within your environment. What are the different delivery models, lessons learned, and best practices for driving improvements? We will also explore the increasingly sophisticated tactics used by threat actors, including their use ..read more
Visit website
Encore: Thought Leadership: Bruce Schneier on "A Hacker's Mind"
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to Cyber Security America, the podcast where we delve deep into the world of cybersecurity and provide insights on past trends, current challenges, and areas for improvement. Our goal is to help you stay informed and prepared for the next cyber threat. In this episode, we have a very special guest, Bruce Schneier, an internationally renowned security technologist, known as a security guru by The Economist. With over a dozen books and hundreds of articles and academic papers under his belt, Bruce is a true legend in the information security field. He's also the author of the latest book ..read more
Visit website
Artificial Intelligence: Automating SOC Workflows - Salem Cyber
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.com/learn/) Cyber Threat Intelligence (CTI) desk and the latest in cybersecurity innovation with Salem Cyber. Prepare for an informative and engaging discussion! #malware #informationsecurity #infosec #windows #cyberattack #ciso Host, Joshua R Nicholson (https://www.linkedin.com/in/joshuanicholson/) YouTube Channel: (https://www.youtube.com/channel/UCp94j2q_-F4SwvxgQYI_8Cg) Podcast Home Site: (https://www.voiceamerica.com/show/41 ..read more
Visit website
Cloud Security: AWS Essentials, Challenges, Best Practices
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to another episode of Cyber Security America with your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/). In this episode, we delve into the world of cloud computing and its impact on cybersecurity. We explore the major cloud platforms such as AWS, Azure, and GCP, along with their deployment and service models. Discover the benefits of cloud computing, including Infrastructure as a Service (IAAS), Platform as a Service (PAAS), and Software as a Service (SAAS). Podcast Home Site: (https://www.voiceamerica.com/show/4125), YouTube Channel: (https://www.youtube.com/chan ..read more
Visit website
Encore: Zero-Trust Paradigm: Secure Browsing Technology - Conceal.io
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to the Cyber Security America show, a platform for exploring the dynamic and ever-evolving world of cybersecurity and information technology. In episode 17, we delve deep into the topic of zero trust, a security model that assumes all users, devices, and applications are potentially hostile, and requires strict access controls and verification measures to prevent data breaches. We also discuss the national security situation surrounding Jack Teixeira and its impact on security controls in the future. #cybersecurity #zerotrust #nationalsecurity Our guest for today's episode is Gordon La ..read more
Visit website
Encore Artificial Intelligence: Cyber AI is the new Tesla of Security
Cyber Security America
by Joshua Nicholson
4M ago
Welcome to our podcast, where we explore the fascinating world of generative AI and its profound impact on various fields. Join us as we delve into the intricate details of different models designed for specific tasks, such as text generation, native speech processing, and image/video generation. We also address the pressing concerns surrounding privacy and security in the realm of AI technologies, including the potential risks of phishing emails and deep fake attacks. #malware #informationsecurity #infosec #windows #cyberattack #ciso (https://www.linkedin.com/in/joshuanicholson/) YouTube Chan ..read more
Visit website

Follow Cyber Security America on FeedSpot

Continue with Google
Continue with Apple
OR