
ISG's Jeff Orr on Moving Beyond Perimeter Defense to Dynamic Security

Meta's Oded Anderman on Preventing Unauthorized Data Collection

Maltego's Ben April on Using Commander's Intent for Remote Team Success

The Cyber Hut's Simon Moffatt on Transforming Identity Security from Static to Dynamic Defense

Zoom's Lee Ramsey on Transforming Customer Service Skills into Cybersecurity Success

Google’s James Brodsky on Securing AI and Building Security Ecosystems
.avif)
Justin Jettòn: Balancing Human Analysis and Automation in Threat Intel
.avif)
Inside the Mind of a Threat Hunter Roundtable
.avif)
GigaOm’s Howard Holton on Cyber Threats Facing Small Businesses
.avif)
Ryan Link: Building a Culture of Continuous Learning

Deb Radcliff: Intersection of Fiction and Cybersecurity

Threat Hunter Ryan Chapman on Critical Security Mistakes Against Ransomware

T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method

Marsh’s Gregory Van den Top on Understanding Cyber Risk in Business Strategy

Splunk’s David Bianco on Differentiating Threat Hunting and Red Teaming

S&P Global’s Eric Hanselman on Integrating Threat Intelligence into Business Strategy

Church & Dwight’s David Ortiz on Building Effective Cyber Risk Management Strategies

Rackspace Technology’s Kristof Riecke on Navigating Cloud Security Challenges

Venable LLP’s David Patariu on Building Trust Through Effective Privacy Policies

CyberBellum’s Jim Tiller on Mastering the Role of a Fractional CISO

ExtraHop’s Rafal Los on Avoiding Strategic Advisement Mistakes

The Futurum Group’s Krista Case on the Importance of Resilience in Cybersecurity (Black Hat Edition)

ZScaler’s Brett Stone-Gross on the Tactics of the Dark Angels Ransomware Group (Black Hat Edition)
.avif)
Online Business Systems’ Jeff Man on Demystifying Cybersecurity Solutions (Black Hat Edition)

Black Kite’s Jeffrey Wheatman on How Cybersecurity Is Not A Technical Problem But A Business Problem (Black Hat Edition)

EMA’s Christopher Steffen on the Importance of Open Source Solutions in Threat Intelligence (Black Hat Edition)

Cybersecurity Threat Detection Engineer & Expert Wade Wells on Innovative Deception Strategies for Blue Teams (Black Hat Edition)

Juniper Networks’ Drew Simonis on Empathy and Leadership in Cybersecurity

Andrew Gontarczyk on Avoiding Common Pitfalls in Cybersecurity Leadership

Ryerson’s Joe Mariscal on Navigating Cyber Risks in the Metals Industry

ADT’s Rick DeLoach on Essential Skills for Future Security Professionals

Ventas Inc.’s Brian Palmer on Managing Cybersecurity Challenges in Real Estate

WithSecure’s Mikko Hypponen on Ethical Challenges for AI in Cybersecurity

Elanco’s Matthew Bull on Navigating Cybersecurity Challenges and Opportunities in the Life Sciences Field

Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure

EQT's João Pedro Gonçalves on the Importance of Establishing Cybersecurity Steering Committees
.avif)
Ingersoll Rand’s Noah Davis on Mastering Security Meetings with the BBG Approach

H&R Block's Joshua Brown on Addressing Underlying Policy and Cultural Issues in Cybersecurity

PENN Entertainment's David Lingenfelter on How Changing Regulations Have Affected the Gaming Industry's Risk Appetite
.avif)
Tarleton State University's Chris Copeland on Raising Awareness on Cybercrime Through Education

Eric Adams of Federal Cyber Defense Solutions on Controls, Context, and Compliance

Cyberbit's Nat Prakongpan on Building Systems for Security Resilience and Recovery

The Council of Europe's Alexander Seger on Building Cybercrime Capacity Around the Globe

Postman's Joshua Scott on How Security Protects APIs and Builds Customer Trust

INTERPOL's Craig Jones on How to Reduce the Impact of Cybercrime Worldwide

Verizon's Bob Carver on Building a Culture of Security

LinkedIn's Evan Blicker on Understanding and Developing Your Approach to the Dark Web

The Benefits of Sponsoring RISE and the Underground Economy: A Conversation with Miranda Bruce and Steve Santorelli

NYU's Carolyn Kissane on Preparing for the Future of Cyber Risk in Global Affairs

ASK Integrity Solutions's Assaf Kipnis on Standing Up to Adversaries with Better Threat Intelligence

Cybersecurity Myths and Misconceptions Author Roundtable with Dr. Eugene H. Spafford, Dr. Leigh Metcalf, and Dr. Josiah Dykstra

IBM's Andy Piazza on the Importance of Integrating Security into Business Operations

USF's Jordan Howell on How to Train Well-Rounded Practitioners for the Future of Cybersecurity

Grobstein Teeple's Erik Rasmussen on How to Improve Your Security Consulting, Client Relationships, and Leadership

Experian's Brian Stack on How to Protect Customers Through Dark Web Intelligence

Proofpoint's Selena Larson on How to Approach Threat Intelligence with Curiosity, Empathy, and Critical Thinking

Europol's Philipp Amann on Building Better Methods of Information Sharing to More Effectively Combat Cybercrime

Special Episode: Now Introducing Pure Signal Scout with Team Cymru's Josh Picolet and Wassim Tawbi

Computer Forensic Services's Mark Lanterman on Bringing Justice Through Digital Forensics

BullWall's Troels Oerting on Keeping the World Safe from Cyber Crime

Journalist Renee Dudley on Writing About the Hunters and the Hackers

Protecting Your Manufacturing OT Environments from Cyber Threat with Carrier's Brian Kime

The Intersection of Cyber Risk and Data Privacy with Guild Education's Julie Chickillo

Roundtable Episode: Tom Cross & Lewis Heuermann Go Inside the Mind of a Threat Hunter

Building a Sales Mentality for Effective Security and Risk Management

Adapting Risk Management to Today's Tech Changes

Leading Security and Managing Risk with Humana's CISO Aman Raheja

Omnicon's Norman Levine on Auditing, AI, and Advancing Your Skill Set

Cassio Goldschmidt Talks About Being a CISO for a Vertical SaaS B2B Company

CISO Stephen Fridakis Talks About Governance, Risk, and Compliance

Charles Nwatu of Netflix: Why He's Focused on Quality Control and Quality Assurance in Cyber Risk Management

Andrew Cormack on his Framework to Approach Risk through Policy and Technology

Navigating Compliance Audits with Brian Honan, founder of BH Consulting
