Channel Avatar

CISO Series @UC9ksdhUaDEEyltTxBc2AzfQ@youtube.com

5.8K subscribers - no pronouns :c

This is the home for CISO Series which examines the mutual d


03:04
Continuously Monitoring and Securing API Traffic With Vorlon
03:37
Addressing the Criticality of Data Security With Cyera (08-01-24)
06:49
PyPi package targets MacOS, Columbus, Ohio suffers cyber incident, Windows July update problems
26:05
Week in Review: CrowdStrike developments, LA court shutdown, MGM casino claims win
07:56
Microsoft Defender exploited, assassin’s encryption frustration, NK elite hackers
30:35
Cybersecurity Is a Communications Problem
07:22
CrowdStrike details, Chrome keeps cookies, BreachForums leaked
08:09
Wiz deal crumbles, CrowdStrike aftermath, dYdX exchange hack
03:06
Optimizing Security Operations with DirectDefense
39:12
Everyone Has a Zero-Trust Plan Until They Get Punched in the Face
08:46
CrowdStrike update, Russian criminals sanctioned, ransomware shuts down courts
03:26
Creating Layers of Protection With Threatlocker (7-23-24)
03:16
Get Help Managing Your Metrics With SeeMetrics - (07-25-24)
03:21
Join CISO Series Podcast LIVE in Seattle (08-21-24)
07:47
CrowdStrike hits Cloud PCs, criminals exploit CrowdStrike fix, CISA rebuked
31:10
Week in Review: Crowdstrike Microsoft outage, AT&T breach implications, CDK pays up
07:14
Windows outage, Fin7 sells malware, Synnovis blood shortage
04:00
Thanks to AI, Cyera Makes Context-Aware Data Labeling Possible (07-18-24)
26:48
Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?
07:44
UK ransomware reporting, Project Oscar, ransoms spike
08:16
Rite Aid update, AT&T ransom laundered, Hacktivists leak Disney data
03:10
The Future of Attack Surface Management with NetSPI
34:15
I Don’t Want Insider Risk. You Take It.
07:54
Wiz acquisition, AT&T paid hacker, Squarespace domain defaults
03:30
How Material Security Leverages APIs for Email Security
07:35
Rite Aid breach, AT&T breach implications, CDK paid ransom
02:35
Revolutionizing SOC Automation with Large Language Models
20:29
Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen
07:09
PHP vulnerability exploit, Auto Parts breach, dark patterns report
30:30
Telling Stories with Security Metrics
07:06
Australia targets foreign tech, banks sunset OTP, Veeam vulnerability exploited
03:55
How to Narrate Stories Based on Metrics with SeeMetrics (07-11-24)
07:40
Russian bot takedown, Burdensome cyber regs, Fujitsu data exposed
03:37
Getting Visibility into Your Cyber Horizon
38:45
How to Get the Most for Yourself Through Altruism
08:53
Billions of stolen passwords, cybersecurity regulations even trickier, Apple removes popular apps
02:17
Answering SEC's Question of Materiality of a Breach
07:16
Alabama Education breach, OpenAI secrets breach, Florida Health breach
06:36
Senator pressures CISA, Velvet Ant exploits Cisco, Europol crushes Cobalt
07:29
Evolve breach update, Patelco cyberattack, LockBit claims Croatian cyberattack
38:46
Who Owns AI Risk? NOT IT!
08:05
14 million Linux systems threatened, Critical patch for Juniper routers, Millions impacted by Pru...
07:28
TeamViewer breach update, HubSpot customer attacks, Cyber insurance problems
22:45
Week in Review: CDK Blacksuit developments, Criminal nuclear failures. U.S. Kaspersky ban
07:29
Gas chromatograph vulnerabilities, Cloudflare rebukes Polyfill, Evolve Bank breach
02:42
Enhancing Identity Defense through Browser-Based Telemetry with Push Security
32:33
Securing Identities in the Cloud
07:28
Snowblind Android, identity services leaks data, Polyfill.io supply chain attack
08:28
Julian Assange plea, Latest MOVEit bug, Neiman Marcus data sale
02:49
The Crucial Role of Network Segmentation in OT Environments with DirectDefense
40:19
How About This? Only Attack the Endpoints We Configured
08:39
Indonesia battles Lockbit, DOJ charges cybercrime group, SEC reports following CDK Global attack
04:24
How to manage security metrics with SeeMetrics - (06-13-24)
03:45
Modern Malware Creation and Mitigation Strategies with ThreatLocker
08:19
BlackSuit behind CDK, Microsoft spoofing bug, Nuclear compliance failures
30:43
Week in Review: Breach restoration breached, Vermont privacy debate, Qilin blames victims, posts ...
03:34
The Transformative Power of AI in Data Security with Cyera
07:01
CDK Global hacked again, LockBit activity, Kraken extorted for bug bounty
28:15
How AI Is Making Data Security Possible
08:21
Nvidia most valuable, Markopolo’s meeting infostealer, Medibank MFA blame