In the Cipher Podcast, you will find intelligent discussion on cybersecurity topics and more.
Our team of information security experts are dedicated to addressing incidents and security best practices in this recurring podcast.
The Basics of Governance, Risk and Compliance | Planning effective processes and technology to both enhance an organization’s capability and keep it safe from threat actors can be accomplished with effective Governance, Risk and Compliance (GRC) practices.
DoD CMMC and Executive Orders Explored | The digital world is a battleground for the US Government. President Biden and others are laying out guidelines for how organizations can and should protect themselves. We look at the details and nuances of this effort in this podcast.
How to Protect Digital Assets in the Metaverse | Protecting digital assets like cryptocurrency, tokens, and NFTs is important. Scammers have seen the value of digital assets explode and they are on the attack.
Adversary Emulation | Emulating a cyberattack can reduce response time and increase efficiency by fine-tuning how software, people, and processes detect the attack and respond. SCYTHE is a platform that helps organization do this. We discuss the concept and tool with their CTO.
Cybersecurity in 2021 Recapped | The top trends and stories from 2021 in the world of cybersecurity and related topics are covered in this episode. We look at what people were searching for as a basis for the recap.
Security and the C-Suite | The non-technical dynamics of an organization can have a big impact on how prepared an organization is to confront cyber threats. LogRhythm Chief Security Officer and VP of R&D James Carder joins the episode to give his expert insights.
The SASE Leader Explains Secure Access Service Edge | SASE has become a popular term to describe a set of cybersecurity solutions. In this podcast episode, we look at what it’s all about. Our guest for this episode is Nate Smolenski. He is the Head of Cyber Intelligence Strategy at Netskope.
Securing Active Directory | Active Directory (AD) helps organizations manage user identities, privileges, and much more. The power that AD has means threat actors are often targeting it to execute attacks. Tenable’s Christopher Keller discusses the topic in this episode.
Social Engineering | The root cause of untold cyber attacks is the age-old technique of social engineering. KnowBe4 Security Evangelist James McQuiggan joins the Cipher Podcast to lend his expert analysis and insight.
The New Rules of Risk Management | Security and risk management used to just mean guns, gates, and guards. Today, the digital world must be taken into account.
Zero Trust Cybersecurity | The inherent trust given to people and processes can be used by hackers to cause harm. This episode looks at what the concept of Zero Trust Cybersecurity is with AppGuard Chief Product Officer Kristen Gandhi.
Cyber Threats to Energy Sector | Cipher investigated the actions taken by the US Government and energy sector following the Colonial Pipeline hack. Learn more about our findings.
Ensure Secure Digital Connections | We present an overview of top cybersecurity threats to organizations and methods they can employ to mitigate the damage. Threats included phishing, malware, and credential fraud.
Breaking Down Supply Chain Compromise | The SolarWinds supply chain hacking incident has caused waves of concern around the world. In this episode, we break it all down.
Cybersecurity for Healthcare Panel Discussion | Cipher joined forces with the American Health Information Management Association (AHIMA) to present a panel discussion on cybersecurity for healthcare.
The Future of Connected Devices | IoT devices are growing more common and in the future, they will be ubiquitous. We discuss what this means for security in the podcast.
Deep Dive into Business Email Compromise | We welcome a FireEye Cybersecurity Engineer to the episode to discuss Business Email Compromise and how Cipher stops it.
Proactive Vulnerability Alerting with Cipher | In this episode, we discuss how to get alerted of software vulnerabilities in your IT environment in a matter of hours, not days by using Cipher’s Proactive Vulnerability Alerting solution.
DoD Cybersecurity Maturity Model Certification | We look at the new CMMC framework in this episode and what is means for 300,000+ companies that do business with the DoD.
Interview with Admiral Danelle Barrett | Retired Admiral Barrett covers digital transformation, thinking like the enemy and how to explain cybersecurity to non-technical people.
Proactive Cybersecurity – Inside Strategies and Tactics | A retired Air Force Lieutenant Colonel joins the show to discuss how to manage the team that defends an organization from cyber-threats in this episode.
Cybersecurity Considerations for Video Surveillance | Monitoring use is on the rise with 5G unleashed and empty buildings resulting from COVID-19 restrictions. We discuss how to keep it cyber-secure.
Cloud Security Tech Talk | Cloud-connected systems are everywhere. The very term Cloud has become ubiqitious. In this episode, we present a recording of a session we held with three Cloud Cybersecurity experts.
Secrets to Becoming PCI Compliant | If a company processes or accepts credit cards, they must ensure the data is safe by following the PCI regulations. Learn the ins and outs of compliance.
Remote Workforce Challenges and Tips from an Enterprise CISO | ADM CISO Tom Dager joins the podcast to give an expert view on how he manages both his team and the company’s cyber posture.
Proactive, Reactive and Recovery Services | Disaster recovery and business resiliency are the topic for the episode. Listen to learn how ransomware and other threats can be handled.
Effective Cybersecurity Operations | The tools of the trade and techniques for stopping hackers are covered in this episode. We talk about how the MITRE attack framework and other resources help companies prevent attacks.
Behind the Scenes of Blue Team Operations | Hackers receive a lot of attention. What about the people that detect and stop them? In this episode, we dive into Blue Team operations.
Cybersecurity Tips from a Penetration Tester | Penetration testing a wide-ranging topic. In this episode, we break down the elements of the practice and provide tips to stay cyber-secure.
Intersection of Cyber and Physical Security Risk Management | Physical devices like entry control and video cameras have a digital footprint. We cover how to properly secure these Internet of Things (IoT) devices.
Cyber Risk Management | Risk describes the possibility of a threat impacting a business. This episodes covers cyber risk and how it relates to compliance, certifications, law and different frameworks.
Top Cybersecurity Skills in Demand | Cybersecurity is an attractive industry for many job-seekers. This podcast episode goes over what soft and hard skills a person needs to succeed in the industry.
Flexible Cybersecurity in Uncertain Times | There is an unprecedented amount of unknowns with regards to workforce size, remote work, business demand and more. At the same time, cybersecurity risk has increased. Learn how to adapt by listening to the episode.
What’s the Deal With MDR? | This episode focuses on what Managed Detection & Response (MDR) solutions offer and how they differ from Managed Security Services (MSS). We cut through the jargon to get answers on if it makes sense for your company.
Cipher and Prosegur: Customer Service Past, Present and Future | This episode looks at Cipher and Prosegur’s internal structure and services, and how this enables 360° security needs for companies.
Debunking COVID-19 Cures on the Dark Web | We look at what is happening on the Dark Web first-hand to exploit COVID-19. Disinformation, fake cures and offers to sell masks abound in the network of protected websites.
Cyber Intelligence to Augment your Security Program | In the podcast, we break through the jargon to talk about what cyber intelligence really is and how it helps companies.
Server and Cloud Hardening | Poor access controls, configurations and out-of-date patches can leave a system vulnerable to attack. That is where “hardening” comes in. Listen to the aspects of hardening in our podcast.
Cybersecurity Challenges for the Internet of Things (IoT) | When a device gets connected to the Internet, it is open to the world. We cover the security implications of IoT devices with Cipher’s Global CTO Francisco Rente.
Remote Workforce Challenges and Tips from an Enterprise CIO | How will remote work change things? We sat down with the CIO of Prosegur to hear his thoughts on the pros and cons of this shift.
Exploring the Cybersecurity Prevention Bias | There are three stages of information security operations: Prevention, Detection, and Response. Of the three, it is usually prevention that gets the most attention.
Enable Cloud Security with CipherBox | This episode covers information on how to keep your Cloud services and devices secure and configured properly. Poor security practices can result in data breaches and worse.
Cybersecurity Considerations in Response to Coronavirus | This episode provides recommendations to business leaders on how to address the cybersecurity challenges due to COVID-19 to ensure continuity of operations and continued success.