The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brandon Krieger and do not necessarily represent those of Brandon Krieger's employer(s).
Ask Real Life CISO Mike Melo Your Cyber Security Questions | DailyCyber 265
In today’s DailyCyber Podcast I am fortunate to have Mike Melo CISO of LifeLabs on my DailyCyber stream. He answers real life questions to give you insight into the real world of Cyber Security. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
11/11/2023 • 1 hour, 25 minutes, 13 seconds
Brandon's Life In Cyber Security
In today’s DailyCyber Podcast Brandon discusses life in CyberSecurity and what you should expect. He also answers questions from the community. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
8/15/2021 • 1 hour, 8 minutes, 18 seconds
Why Go Into A Cyber Security Career?
In today’s DailyCyber Podcast Brandon discusses why you should go into Cyber Security. What are the things you need to know before you jump into a Cyber Security Career. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
6/4/2021 • 1 hour, 9 minutes, 6 seconds
Ask Real Life CISO Allan Alford Your Cyber Security Questions
Ask Real Life CISO Allan Alford Your Cyber Security Questions | DailyCyber 261 ~ Watch Now ~ https://youtu.be/CSMuUkv7j-o In today’s DailyCyber Podcast I am fortunate to have Allan Alford as a guest to answer real life Cyber Security questions that Cyber Security professionals want to know. https://allanalford.com/https://www.linkedin.com/in/allanalford/https://twitter.com/AllanAlfordinTX Recommended links we discuss through the stream: https://hackervalley.com/cyberranchhttps://www.linkedin.com/in/naomi-buckwalter/https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698 To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
5/14/2021 • 1 hour, 16 minutes, 31 seconds
Advance Life Hacks for Cyber Security Professionals Part 2
In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below #DailyCyber260, #BrandonKrieger, #Cybersecurity, #cybersecuritynews, #Cybersecurityawareness, #Cyberthreats,
5/7/2021 • 1 hour, 1 minute, 28 seconds
Advance Life Hacks for Cyber Security Professionals
In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/29/2021 • 1 hour, 28 minutes, 45 seconds
Life Hacks for Cyber Security Professionals with Brandon Krieger
In today’s DailyCyber Podcast Brandon is going to share some Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/17/2021 • 1 hour, 17 seconds
Cyber Security AMA with Brandon Krieger
In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/11/2021 • 1 hour, 16 minutes, 5 seconds
What is Cyber Threat Intelligence with Jim McKee
In today’s DailyCyber Podcast I have the fortunate opportunity to interview Jim McKee who is an expert in Cyber Threat Intelligence. We are going to dive in deep why Cyber Threat Intelligence is important to protect your business. Website: https://www.wapacklabs.comLinkedin: https://www.linkedin.com/in/jimckee/ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/27/2021 • 37 seconds
AMA with Brandon Krieger
In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/26/2021 • 59 minutes, 15 seconds
What is Data Breach Planning and Response with Debbie Reynolds
In today’s DailyCyber Podcast I have the fortunate opportunity to interview Debbie Reynolds who is an expert in the Cyber Security industry with data breach planning and response. We are going to dive in deep into how you can be prepared to respond to a breach. Website: https://www.debbiereynoldsconsulting.com/Linkedin: https://www.linkedin.com/in/debbieareynolds/YouTube: https://www.youtube.com/channel/UCVZ2nIE9bw43aH1QZVJh2UQ/videosTwitter: https://twitter.com/DebbieDataDiv To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/22/2021 • 1 hour, 3 minutes, 6 seconds
Passwordless Authentication with Simon Law
In today’s DailyCyber Podcast I interviewed Simon Law, CEO and Co-Founder of LoginID regarding Passwordless Authentication solution. To connect with Simon visit Website: https://LoginID.ioTwitter: @simoninnovates To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/22/2021 • 1 hour, 3 minutes, 41 seconds
New Toronto Lockdown 2020
New Toronto Lockdown 2020 | DailyCyber 242 ~ Watch Now ~ In today’s DailyCyber Podcast I discuss the new General Toronto COVID-19 Pandemic lockdown and how it is affecting the GTA. I Also go over what is going in the Cyber Security Industry. Articles I cover: 3 Steps CISOs Can Take to Convey Strategy for Budget Presentationshttps://www.darkreading.com/operations/3-steps-cisos-can-take-to-convey-strategy-for-budget-presentations-/a/d-id/1339337?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple How Retailers Can Fight Fraud and Abuse This Holiday Seasonhttps://www.darkreading.com/cloud/how-retailers-can-fight-fraud-and-abuse-this-holiday-season/a/d-id/1339470?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/22/2021 • 38 minutes, 31 seconds
How To Become a CISO with Dr. Eric Cole
In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. Today we are going to dive deep into how to become a CISO. You can connect with Dr. Eric Cole here: Website: https://secure-anchor.com/LinkedIn: https://www.linkedin.com/company/secure-anchor-consulting/Twitter: https://twitter.com/drericcoleYouTube: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
2/25/2021 • 1 hour, 1 minute, 30 seconds
Live Cybersecurity Career Q & A with Brandon Krieger
In today’s DailyCyber Podcast I host a live Cybersecurity Q & A answering numerous questions on a career in Cybersecurity. From how to break into the industry, certification, to what does an average day look like in the SOC To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
2/11/2021 • 1 hour, 2 minutes, 1 second
Becoming a InfoSec RockStar with Ted Demopoulos
In today’s DailyCyber Podcast I interview Ted Demopoulos about how to be a InfoSec Rockstar in the growing Cybersecurity industry.
2/4/2021 • 59 minutes, 53 seconds
Live Cybersecurity Career Advice
In today’s DailyCyber Podcast I answer Cybersecurity career questions from the community. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
1/28/2021 • 59 minutes, 17 seconds
5 Cybersecurity Best Practices
In today’s DailyCyber Podcast I am go over these two articles below and discuss the new changes with DailyCyber’s schedule. 5 Cybersecurity Best Practices For Planning Aheadhttps://securityintelligence.com/articles/five-cybersecurity-best-practices-for-planning-ahead/ CES 2021 Gadgets: Worst in Privacy and Security Awardshttps://threatpost.com/tractors-pod-ice-cream-lipstick-ces-2021-worst/163117/ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
1/23/2021 • 55 minutes, 53 seconds
Cloud Security with Robert McFeely from Octiga
In today’s DailyCyber Podcast I am fortunate to interview Robert McFeely from Octiga. We discuss what companies should be focusing on Cyber Security for 2021 and how to harden their cloud security Robert McFeely: Linked: https://www.linkedin.com/company/octiga/Twitter: https://www.Twitter.com/octiga_ioWebsite: https://www.Octiga.io To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
1/15/2021 • 55 minutes, 34 seconds
Strong Cyber Security Start for 2021
In today’s DailyCyber Podcast I first want to wish you a Happy 2021 and hope you, your family are healthy as well as safe. In this podcast I am going to covering my goals for 2021 and what I am seeing for this year in Cyber Security. Articles I cover: 2021 Cyber Security Predictions:https://cisomag.eccouncil.org/cybersecurity-predictions-2021/ CCIO Certificationhttps://ciso.eccouncil.org/cciso-certification/ Brandon’s Speaking Engagement https://brandonknss.krtra.com/t/qZwG0D7FJyXc To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
1/10/2021 • 50 minutes, 29 seconds
Happy Holiday DailyCyber Live
In today’s DailyCyber Podcast I discuss what I am working on, a few articles in the Cyber Security News and wishing you and your family a Happy Holiday! Articles I cover: Microsoft Warns CrowdStrike of Hackers Targeting Azure Cloud Customershttps://thehackernews.com/2020/12/microsoft-warns-crowdstrike-of-hackers.html Windows Zero-Day Still Circulating After Faulty Fixhttps://threatpost.com/windows-zero-day-circulating-faulty-fix/162610/ Why cybersecurity tools fail when it comes to ambiguityhttps://www.techrepublic.com/article/why-cybersecurity-tools-fail-when-it-comes-to-ambiguity/#ftag=RSS56d97e7 To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
12/31/2020 • 48 minutes, 58 seconds
How to Think Like a CISO with Dr. Eric Cole
In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. He helps companies and CISO protect their organizations. You can connect with Dr. Eric Cole here: Website: https://secure-anchor.com/LinkedIn: https://www.linkedin.com/company/secure-anchor-consulting/Twitter: https://twitter.com/drericcoleYouTube: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
12/24/2020 • 1 hour, 3 minutes, 33 seconds
SolarWinds Cyber Security Breach
SolarWinds Cyber Security Breach | DailyCyber 243 ~ Watch Now ~In today’s DailyCyber Podcast I discuss how are things going in the Pandemic in the GTA. I also go through the SolarWinds and FireEye Breach. Microsoft, FireEye confirm SolarWinds supply chain attackhttps://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack The CyberWire DailyBriefing For 12.14.20[https://thecyberwire.com/newsletters/daily-briefing/9/239] Cozy Bearhttps://en.wikipedia.org/wiki/Cozy_Bear To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
12/19/2020 • 39 minutes, 37 seconds
November 2020 Cyber Security News
In today’s DailyCyber Podcast I share what I have been working on, new Meetup group, CISSP study group…etc I also discuss what I am finding in the news. See articles below Toymaker Mattel Hit by Ransomware Attackhttps://threatpost.com/mattel-hit-by-ransomware/160947/ Endpoint Security Extends to the Cloudhttps://cisomag.eccouncil.org/endpoint-security-cloud/ What is the “Cyberchology of Human Error” in Cybersecurity?https://cisomag.eccouncil.org/human-error-in-cybersecurity/ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
11/12/2020 • 35 minutes, 46 seconds
Cyber Security Success or Failures Through the Pandemic
In today’s DailyCyber Podcast I discuss the successes and failures of Cyber Security through the Pandemic. New Normal Effect! 85% of Organizations Say Cybersecurity is More Important than Everhttps://cisomag.eccouncil.org/new-normal-effect-85-of-organizations-say-cybersecurity-is-more-important-than-ever/ Security Officers, Are Your Employees Practicing Good Habits from Home?https://www.darkreading.com/vulnerabilities---threats/security-officers-are-your-employers-practicing-good-habits-from-home/a/d-id/1338986?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple Netflix: The Social Dilemma https://www.netflix.com/ca/title/81254224 Guide: Scale or Fail — Why MSSPs Need Multitenant Security Solutions**https://thehackernews.com/2020/10/multitenant-cybersecurity-solution.html To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
10/29/2020 • 47 minutes, 53 seconds
Neal Bridges Discusses Cyber Security Posture Through The Pandemic
In today’s DailyCyber Podcast I have a good friend of mine Neal Bridges on the Podcast to discuss the current Cyber Security posture companies should be looking at through the Pandemic. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
10/26/2020 • 1 hour, 4 minutes, 22 seconds
Cyber Security Legal Discussion
In today’s DailyCyber Podcast I dive into the legal side of Cyber Security and why it’s important to understand these principals. I also cover these news articles: https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadminexe-now/https://www.bleepingcomputer.com/news/security/new-jersey-hospital-paid-ransomware-gang-670k-to-prevent-data-leak/https://www.techrepublic.com/article/vulnerable-supply-chains-introduce-increasingly-interconnected-attack-surfaces/#ftag=RSS56d97e7https://cisomag.eccouncil.org/4-83-mn-ddos-attacks-reported-globally-in-h1-2020/https://www.securitymagazine.com/articles/93482-uhs-hospitals-hit-by-ryuk-ransomware-forced-to-shut-down-systemshttps://youtu.be/u0Q8OzTicnw To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
10/11/2020 • 47 minutes, 50 seconds
Deception Cyber Security Interview with Al White
In today’s DailyCyber Podcast I am fortunate to interview with Al White and discuss Deception Cyber Security. We all so discuss the state of Cyber Security and what companies need to know. To contact Al White his email address is awhite@wricanada.com
10/5/2020 • 1 hour, 8 minutes, 25 seconds
Update on Pandemic Cyber Security
In today’s DailyCyber Podcast I provide an update on what is going on with companies Cyber Security and what you should be aware of. Today I cover these Cyber Security articles: https://cisomag.eccouncil.org/under-attack-2000-magento-stores-hacked-in-a-magecart-campaign/https://www.darkreading.com/iot/more-printers-could-mean-security-problems-for-home-bound-workers/d/d-id/1338895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
10/1/2020 • 27 minutes, 30 seconds
Psychology of Human Error - Security Breaches
In today’s DailyCyber Podcast I have my guest host Neal Bridges Cyber Security influencer on my Podcast with me. We discuss what is going on in the industry, sales strategies and Cyber Security advice. Today we cover these three news articles to share what is going on in the industry: https://cisomag.eccouncil.org/cyber-insurance-claims/https://cisomag.eccouncil.org/implementing-zero-trust-network/https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/ To follow Neal check him out: https://www.twitch.tv/cyber_insecurityhttps://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kghttps://twitter.com/ITJunkie To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
9/26/2020 • 1 hour, 6 minutes, 53 seconds
Interview with Neal Bridges Cyber Security
In today’s DailyCyber Podcast is my first Live Stream with my friend and Cyber Security influencer Neal Bridges. We discuss what is going on in the industry, sales strategies and Cyber Security advice To follow Neal check him out: https://www.twitch.tv/cyber_insecurityhttps://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kghttps://twitter.com/ITJunkie To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
9/1/2020 • 1 hour, 47 minutes, 3 seconds
Building a Cyber Security Team with Jason Nickola
In today’s DailyCyber Podcast I get the opportunity to interview Jason Nickola and discuss the Cyber Security industry, building a team, education and so much more. This is an interview you don’t want to miss. To connect with Jason visit: Website: www.pulsarsecurity.comPodcast: Giac.org/podcasts To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
7/23/2020 • 1 hour, 35 minutes, 25 seconds
Interview with Karl Galbraith- vCISO Top Down Discussion
In today’s DailyCyber Podcast I interview Karl Galbraith vCISO. Karl shares his view from being a CISO and now a vCISO about what companies need to focus on to enhance their security posture in 2020. Karl Galbraith Website: http://galbraithandassociates.ca/Podcast:https://open.spotify.com/show/0dLJ2TpWljyb40omiunVZt?si=Hnuo2zPSTda6SDj-AwrPWQ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
7/17/2020 • 1 hour, 15 minutes, 16 seconds
Interview with Sumit Bhatia- Rogers Cybersecure Catalyst
In today’s DailyCyber Podcast I interview Sumit Bhatia from Rogers Cybersecure Catalyst. We discuss what is going on in the Cyber Security Industry. How Rogers Cybersecure Catalyst is helping the Cyber Security industry and so much more. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
7/11/2020 • 1 hour, 8 minutes, 51 seconds
How To Optimize Your Security Budget
In today’s DailyCyber Podcast I discuss two topics I keep hearing more about through my conversations with colleagues and through Cyber Security news: CISO Dialogue: How to Optimize Your Security Budget "There are many different approaches to managing a security budget, and CISOs organize and prioritize uniquely based on the company, industry, and threats. Three consistent areas of spending are identity and access management (IAM), global risk and compliance (GRC), and security operations,” Brett Wahlin CISO of Amazon Prime Video noting: * IAM is always a mess because no one wants to deal with access management, passwords, access sprawl, and so on. * GRC is difficult because there are always new regulations to remain compliant with; privacy, in particular, is an ongoing challenge.* With security operations, levels of effectiveness vary. Wahlin posed several questions for consideration. "Is it in-house? Are you outsourcing to an MSSP? How are you measuring effectiveness? It's an area where I often have to retool from a people, process, and technology standpoint." Top Tips for New CISOsBrett Wahlin concluded with a breakdown of the most important things he would recommend a new CISO look at, both budgetary and beyond:* Look at the three most problematic areas: IAM, GRC, and SecOps. You can always find things to fix, and it will give you some quick wins.* Know your industry and how your security program can help the company grow.* You need to be able to constantly communicate the value you're bringing to the table — it's how you'll get budget and, more importantly, it's how you keep it.* "Partnering with the business" is not just a catch phrase batted around at security conferences. Learn what it means for your company and be a good partner.* Think like an architect: As you build a program, how do the different functions interact with each other? How do you plan to grow based on shared communication?* Don't be afraid to pull something out if it's not raising the security bar for your company. https://www.darkreading.com/operations/ciso-dialogue-how-to-optimize-your-security-budget-/a/d-id/1338055 76.36% Believe Cloud Service Provider is Responsible for Security: CISO MAG Market Trends ReportFrom CISO Mag’s Cloud Security survey then found76.36% said that cloud service providers (CSP) is entirely responsible for the security of the cloud23.64% they said 40% in the article - stated the responsibility is on the cloud consumer Looking at these numbers you can tell that the “Shared Responsibility” as Amazon refers to it. Is not truly understood just by this survey alone. AWS defined a Shared Responsibility model that says “Security of the Cloud” is the responsibility of the CSP (Cloud Security Provider), but “Security in the cloud” is the responsibility of the customer. This model is gradually being accepted in the industry. https://www.cisomag.com/shared-responsibility-model/ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
6/19/2020 • 17 minutes, 2 seconds
Ransomware Threats Increase by 25% in 2020
In today’s DailyCyber Podcast I discuss the 25% increase in Ransomware in the first quarter in 2020. What to know and what should you do.Here are some facts for you from the Beazley Breach Insight Report: -Manufacturing Sector 156 % increase off incidents quarter to quarter-Financial Sector and Healthcare continue to be the most affected which together account to almost 50% of all ransomware attacks reported in Q1 of 2020 Q1 2020 Ransomware incidents:26% Financial Institution 24% Healthcare 9% Manufacturing 7% Professional services 6% Retail6% Education For more information https://www.cisomag.com/ransomware-attacks-rise-q1-2020/ How to protect you and your company:1. Security systems are up to date2. Work from home systems 1. Are up to date and patched 2. Have up to date endpoint and/or anti-virus protection 3. Home network is secure 4. VPN connect to work 5. Family members on the home network are secure as well3. Cyber Security Awareness training 1. For employees and their families who are using the home network4. Corporate polices are up to date 1. Acceptable Use Policy 2. Disaster Recovery 3. Business Continuity 4. Incident Response 5. Breach Response To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
6/12/2020 • 19 minutes, 19 seconds
The Biggest Cyber Security Challenges for Companies for the Next 12 Months
In today’s DailyCyber Podcast I discuss what are the biggest Cyber Security challenges for companies for the next 12 months. Digital Transformation “DX” (DX spending globally is estimated at $7.4 trillion between 2020 and 2024)Digital Transformation VulnerabilitiesRansomware attack costs on average $80,000 to restore dataThe biggest challenge that will impact organizations within the next 12 months is cyberthreats (32%). Shortage of skills to implement technology (30%) and meeting changing customer needs (29%) were also cited as key hurdles.Lack of staff to work on new initiatives (42%) was cited as the most impactful data protection challenge organizations currently have. Lack of budget for new initiatives and lack of visibility on operational performance were also cited.Over a third (39%) of respondents said the ability to improve the reliability of backups is the most likely reason to drive their organization to change its primary backup solution.Over a quarter (27%) of organizations’ data is backed up to the cloud by a Backup as a Service (BaaS) provider. 14% of data across organizations globally is not backed up.Over two in five (43%) organizations plan to leverage cloud-based backup managed by a BaaS provider within the next two years. https://www.cisomag.com/cyberattacks-on-business-2020/ To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
6/5/2020 • 17 minutes, 17 seconds
Are Law Firms Under Cyber Security Attack?
In today’s DailyCyber Podcast I discuss are Law Firms under Cyber Security Attack? On May 12, 2020 we started to see news articles that Grubman, Shire Meiselas & Sack was compromised. They hackers stole 756 gigabytes of data, including celebrity contracts and personal emails. Reported by BBC News https://www.bbc.com/news/technology-52632729 With COVID-19 and the increase of Cyber Attacks up 140% since the Pandemic started companies need to protect themselves. Things Companies need to focus onSecurity Awareness trainingBusiness ContinuityCost Cutting MeasuresComplianceAssessments to validate your security posture To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
5/28/2020 • 21 minutes
Cyber Security COVID-19 Update
In today’s DailyCyber Podcast I catch up with you to see how you and your family are doing through this COVID-19 Pandemic. I also share what Cyber Security challenges I am seeing through this COVID-19 Pandemic. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
5/15/2020 • 20 minutes, 49 seconds
Red Team Discussion with Joe Vest
In today’s DailyCyber Podcast Joe Vest and I discuss his book Red Team Development and Operations. This is such a import conversation as companies work hard to maintain businesses through the pandemic. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below To purchase the Red Team Development and Operation book visit http://threatexpress.com/
5/9/2020 • 1 hour, 2 minutes, 3 seconds
How To Protect Your Brand Discussion with David Stitt
In today’s DailyCyber Podcast David Stitt and I discuss how to protect your brand through the COVID-19 Pandemic. This is such a import conversation as companies work hard to maintain businesses through the pandemic. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/24/2020 • 1 hour, 8 minutes, 29 seconds
COVID-19 Cyber Security Discussion with vCISO Dominic Vogel
In today’s DailyCyber Podcast I have the pleasure to speak to Dominic Vogel who is an expert vCISO. His company is helping small to medium business stay protected through the COVID-19 Pandemic. We discuss tips and strategies to help people through this stressful time. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below Dominic’s website: www.cyber.sc
4/19/2020 • 44 minutes, 17 seconds
COVID-19 Mental Health Discussion with Catherine Moore
In today’s DailyCyber Podcast I have the pleasure to speak to Catherine Moore who is a Social Worker about the Mental Health issues she is seeing durning the COVID-19 Pandemic. We discuss tips and strategies to help people through this stressful time. Follow Catherine Moore on Instagram: @SocialWokersRise To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/5/2020 • 30 minutes, 57 seconds
Enterprise Resource Planning (ERP) Discussion with Diogène Ntirandekura
In today’s DailyCyber Podcast I have the pleasure to speak to Diogène about Enterprise Resource Planning (ERP) and what companies need to look at through this COVID-19 Pandemic. Diogène Ntirandekura Website: https://consultinglifestyle.fm To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
4/3/2020 • 57 minutes, 13 seconds
Coronavirus - COVID-19 Insurance Discussion with Aun Japanwala
In today’s DailyCyber Podcast I have the pleasure to catch up with Aun Japanwala. A friend and colleague who specializes in the insurance industry for small to medium size businesses. We discuss what is going on in the industry with Cyber Security Insurance, COVID-19 and much more. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/29/2020 • 1 hour, 7 minutes, 1 second
COVID- 19 Discussion with Two Ontario Nurses
In today’s DailyCyber Podcast I discuss what is going on with the COVID 19 Pandemic with two GTA Nurses Sara and Amie. They host their own podcast called The Gritty Nurse Podcast where they share their experiences asnurses, former co-workers, and friends. Together they tackle hot topics related to nursing and healthcare, with grit! Listen to The Gritty Nurse Podcast on Apple Podcasts. https://podcasts.apple.com/ca/podcast/the-gritty-nurse-podcast/id1493290782 To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
3/25/2020 • 1 hour, 11 minutes, 50 seconds
Coronavirus - COVID-19 Panel Discussion
In today’s DailyCyber Podcast I am fortunate to have a panel discussion regarding the COVID-19 Pandemic. I have Dr. April Moreno - PhD health and informatics, Monica Noy - Osteopathic Manual Practitioner, Drew Prescott - Financial Advisor, and Joseph Carnevale - Partner & Managing Director of Sales. All to discuss what is COVID-19, what we need to think about and recommended actions we should take. This is a podcast you don't want to miss. Dr. April Moreno - PhD Public Health and InformaticsWebsite- www.doctoraprilwellness.podbean.comQuestions: 1)What do we need to know about COVID-19? 2)Why do I need to quarantine myself? 3)Can you tell us about Autoimmune diseases? What do we need to know about them?4)What resources would you recommend to people for the lay person? Monica Noy - Osteopathic Manual Practitioner Website-https://www.monicanoy.com/Questions : 1)Why do I need to self quarantine?2)Why do healthy people have to go through this process?3)What do we need to focus on?4)What are the responsibilities of health practitioners in this pandemic?5)What are your recommendations we can do durning this Pandemic? Drew Prescott - Financial AdvisorPodcast- https://soundcloud.com/collar-city-financial-strategiesWebsite- www.collarcityfs.comQuestions:1)Do you know if people can collect Temporary Aid or Unemployment benefits if they have been laid off due to the corona virus? 2)What would you say to someone who is invested at this time and may be a little nervous? 3)Obviously hind sight is 20/20 but what are some good practices for the listeners to work on going forward? So that they can be better prepared for an even like this in the future? 4)What would you say to that person who is concerned they are short for their current bills? Joseph Carnevale - Insurance BrokerWebsite: https://brokerstrust.ca/about/team/joseph-carnevale/Questions: 1) What is the current challenges people are facing with insurance personally as well as professionally?2) What do people need to know?3) What should they do going forward? This question is to help reduce the state of panic that everyone is in.
3/23/2020 • 1 hour, 21 minutes, 53 seconds
Coronavirus - Cyber Security
In today’s DailyCyber Podcast I discuss the basics about the Coronavirus. What I am hearing companies are starting to do ie. restrict travel, work from home, educate their employees to not go to events with more than 10 people and much more. "Coronaviruses (CoV) are a large family of viruses that cause illness ranging from the common cold to more severe diseases such as Middle East Respiratory Syndrome (MERS-CoV) and Severe Acute Respiratory Syndrome (SARS-CoV). A novel coronavirus (nCoV) is a new strain that has not been previously identified in humans. Coronaviruses are zoonotic, meaning they are transmitted between animals and people. Detailed investigations found that SARS-CoV was transmitted from civet cats to humans and MERS-CoV from dromedary camels to humans. Several known coronaviruses are circulating in animals that have not yet infected humans.Common signs of infection include respiratory symptoms, fever, cough, shortness of breath and breathing difficulties. In more severe cases, infection can cause pneumonia, severe acute respiratory syndrome, kidney failure and even death. Standard recommendations to prevent infection spread include regular hand washing, covering mouth and nose when coughing and sneezing, thoroughly cooking meat and eggs. Avoid close contact with anyone showing symptoms of respiratory illness such as coughing and sneezing.”Reference: https://www.who.int/health-topics/coronavirus "Researchers first isolated a coronavirus in 1937. They found a coronavirus responsible for an infectious bronchitis virus in birds that had the ability to devastate poultry stocks.Scientists first found evidence of human coronaviruses (HCoV) in the 1960s in the noses of people with the common cold. Two human coronaviruses are responsible for a large proportion of common colds: OC43 and 229E.The name “coronavirus” comes from the crown-like projections on their surfaces. “Corona” in Latin means “halo” or “crown.”Among humans, coronavirus infections most often occur during the winter months and early spring. People regularly become ill with a cold due to a coronavirus and may catch the same one about 4 months later.This is because coronavirus antibodies do not last for a long time. Also, the antibodies for one strain of coronavirus may be ineffective against another one.SymptomsCold- or flu-like symptoms usually set in from 2–4 days after a coronavirus infection and are typically mild. However, symptoms vary from person-to-person, and some forms of the virus can be fatal.Symptoms include:sneezingrunny nosefatiguecoughfever in rare casessore throatexacerbated asthmaScientists cannot easily cultivate human coronaviruses in the laboratory unlike the rhinovirus, which is another cause of the common cold. This makes it difficult to gauge the impact of the coronavirus on national economies and public health.There is no cure, so treatments include self-care and over-the-counter (OTC) medication. People can take several steps, including:resting and avoiding overexertiondrinking enough wateravoiding smoking and smoky areastaking acetaminophen, ibuprofen, or naproxen for pain and feverusing a clean humidifier or cool mist vaporizerA doctor can diagnose the virus responsible by taking a sample of respiratory fluids, such as mucus from the nose, or blood."Reference: https://www.medicalnewstoday.com/articles/256521#types Preventative Measures: -Wash your hands frequently -Practice Good respiratory hygiene -How to deal with stress https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public See all article here: https://www.who.int/health-topics/coronavirushttps://www.medicalnewstoday.com/articles/256521https://www.medicalnewstoday.com/articles/256521#typeshttps://www.who.int/emergencies/diseases/novel-coronavirus-2019https://www.who.int/health-topics/coronavirushttps://covid19info.live/
3/6/2020 • 23 minutes, 31 seconds
Separation of Duties -Cyber Security
Separation of Duties - Cyber Security | DailyCyber 216 ~ Watch Now ~In today’s DailyCyber Podcast I discuss separation of duties and why it is so important to have a layered approach in your business. This video is because of Barbara Corcoran lost $400,000 USD from her staff being tricked by an email scam. See article here: https://www.cnn.com/2020/02/27/business/barbara-corcoran-email-hack-trnd/index.html
2/28/2020 • 15 minutes, 43 seconds
What I've Been Working On
In today’s DailyCyber Podcast I discuss what I have been working on over the last few weeks. I’ve really excited to share with you and get your feedback.
2/26/2020 • 12 minutes, 57 seconds
Cybersecurity First Quarter of 2020
In today’s DailyCyber Podcast I discuss a quick look at Cyber Security in the first quarter of 2020. What are companies looking at and why: -Cloud Security-2 Factor Authentication “2FA”-Security Triad - SEIM, NDR, EDR-Data Security -Security Awareness Training
2/14/2020 • 32 minutes, 41 seconds
Scott Schober: Cybersecurity Is Everyone's Business
In today’s DailyCyber Podcast I am excited to have the opportunity to interview Scott Schober. Scott is the author of Hacked Again, Cybersecurity Is Everyone’s Business and he has a third book coming out this year.Scott and I chat about why Cybersecurity is everyones business and things everyone should know to be able to protect themselves.
2/11/2020 • 1 hour, 51 minutes, 3 seconds
Tim Medin: Understanding Penetration Testing
In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more. If you are interested in Penetration Testing this is a Podcast you don’t want to miss. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below Join me for the ride by subscribing to the channel and don't forget to say hi on my social links below! ► SOCIALWebsite: https://www.DailyCyber.caLinkedin: https://www.linkedin.com/in/brandonkrieger/Twitter: https://www.Twitter.com/BrandonKriegerInstagram: https://www.Instagram.com/BrandonKrieger ► GEAR & FAVORITESCamera 1: https://amzn.to/31qb1yrFuture Camera 2: https://amzn.to/2B8YjJKCamera Mic: https://amzn.to/2KG2MsqPodcast Mic: https://amzn.to/2QDlepu Music by from: www.Artlist.io This video is not sponsored.All products I purchase myself unless otherwise stated in the video.This post contains affiliate links at no additional cost to you. They help to keep this channel up and running. I appreciate your support!!
2/7/2020 • 1 hour, 42 minutes, 42 seconds
A Brief Discussion About Scammers
In today’s DailyCyber Podcast I go through a brief discussion about different types of scams and scammers like messaging Scam and phone Scams:CRA/IRS scam Sick family member awayClaim your inheritance of Millions of dollars I also discuss about social media and how to protect your mental health. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
1/31/2020 • 40 minutes, 46 seconds
Why I Was On A Break
In today’s DailyCyber Podcast I share with you why I was on a forced break for about two months. Some security tips when traveling and what I am working on in 2020.
1/29/2020 • 26 minutes, 59 seconds
7 Simple Core Principals You Need To Know Before...
In today’s DailyCyber Podcast I discuss 7 simple core principals you need to know before you transition to a new career like Cyber Security or start a business. Know yourself Figure out your pathWrite out a plan S.M.A.R.T. goals Test to measurable results Be accountable Understand your finances To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
12/12/2019 • 36 minutes, 28 seconds
The 5 A's in Cyber Security You Need To Know About
In today’s DailyCyber Podcast I discuss the 5 A’s in Cyber Security you need to know about. Also, my up-coming interview with Scott Schober and his two books I am reading below to prepare for this interview. Hacked Again by Scott N. Schober - https://amzn.to/2YfxtKoCyberSecurity Is Everybody’s Business by Scott N. Schober https://amzn.to/360H1vw The Five A’s are:Accountability Authentication Authorization AccountingAssurance To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below
12/4/2019 • 18 minutes, 15 seconds
Ted Demopoulos: How To Be A Cyber Security Consultant
In today’s DailyCyber Podcast I am fortunate enough to interview Ted Demopoulos a Cyber Security Consultant with over 30 years of experience about what it takes to be a Cyber Security Consultant. Ted Demopouios Bio:Ted Demopoulos’ professional background includes over 30 years of experience in Information Security and Business, including over 25 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent speaker at conferences, conventions, and other business events, author of "Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far" and two other books. Ted conducts Leadership and Information Security Bootcamps for The SANS Institute, and is the principal of Demopoulos Associates, a consulting organization specializing in information security. We discuss these top 5 questions about being a Cyber Security Consultant and much more. 1) Are many people interested in infosec consulting and why?2) Why you? Why did you get started on this path?3) What is the most important thing you can tell someone who is considering consuting?4) What about clients - how do people find them?5) How does pricing usually work? To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below
11/29/2019 • 1 hour, 35 minutes, 8 seconds
How To Deal With a Compromise
In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise. Most of the time you will hear about the technical information but it’s rare you will hear about the mental and emotional aspect. To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below
11/22/2019 • 18 minutes, 27 seconds
Top Cyber Security Solution Providers
In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of: Top Cyber Security Solution Providers Beyond TrustBlack Berry - CylanceCarbon BlackCheck Point Cisco CrowdstrikeCyberArk Dark TraceForce Point FortinetKnowBe4 IBMPalo AltoProofPoint RSA NetworksSymantecSplunk SophosTransmit SecurityTrendMicroVectra Top Cyber Security solutions Categories: SoftwareHardware Services/Consulting Different Solutions: -Data Loss Prevention-Identity and Access Management - IAM-Priviedge Access Management - PAM-Risk and compliance management -Encryption-Unified Threat Management (UTM)-Firewall -Antivirus/Antimalware Solutions -Intrusion Detection Systems (IDS)-Intrusion Prevention Systems (IPS)-Network Detection System (NDS)-Network Prevention System (NPS)-Disaster Recover -Email Security -End Point Security -Network Detection Security -Security Information and Event Management (SIEM) -Advance Threat Protection (ATP)-Cloud Access Security Broker -Secure Web Gateway -Internet of Things Security (IoT)-Network Access Control (NAC) To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below
11/20/2019 • 25 minutes, 8 seconds
Disney Plus Was Hacked
In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. News: Disney Plus Accounts Are Already Being Hacked and Sold online On November 12th, 2019 the day Disney Plus went live user accounts where hacked. "Hijacked Disney+ accounts are being sold online just hours after Disney's new streaming service launched, reports have claimed.Many of these stolen accounts are being offered for free on hacking forums or are available for sale with prices ranging from $3 to $11, despite the fact that a legitimate Disney+ subscription only costs $7." “ Disney+ credentialsThe hackers behind these account takeovers were able to mobilize quickly to steal Disney+ account credentials and make them available for sale online. This suggests that they either gained access to these accounts by either using leaked credentials from past data breaches or by using info-stealing malware.Hacking forums now have thousands of Disney+ accounts available for sale but ZDNet also discovered that some forums were giving away these credentials for free so that the hacker community could use and share them with others. https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online Fundamental Principals of Cyber Security Personal Security Risk Management Business Continuity Laws, Regulations and Compliance Investigation and Ethics C.I.A - "Confidentiality, Integrity and Availability” Confidentiality - is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to people, places or things.Integrity - is the concept of protecting the reliability and integrity. Integrity protection prevents unauthorized alternation. Availability - Which means authorized subjects are granted timely and uninterrupted access. To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below
11/19/2019 • 24 minutes, 50 seconds
List of Careers in Cyber Security
In today’s DailyCyber Podcast which you can listen to on the go. I discuss different positions in Cyber Security to help you as you are researching for your career. I also share what questions I would recommend you should ask yourself.To learn more watch the video or listen to the podcast and comment below50 Cybersecurity Titles That Every Job Seeker Should Know AboutFrom: Cybercrime MagazineEditor: Steve Morganhttps://cybersecurityventures.com/50-cybersecurity-titles-that-every-job-seeker-should-know-about/ 1. Application Security Administrator – Keep software / apps safe and secure.2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime3. Automotive Security Engineer – Protect cars from cyber intrusions.4. Blockchain Developer / Engineer – Code the future of secure transactions.5. Blue Team Member – Design defensive measures / harden operating systems.6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.7. Cybersecurity Scrum Master – Watch over and protect all data.8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.10. Cloud Security Architect – Secure apps and data in the cloud. SANShttps://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs20 Coolest Cyber Security Jobs:1. Application Security Administrator– Keep software / apps safe and secure.2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.3. Automotive Security Engineer – Protect cars from cyber intrusions.4. Blockchain Developer / Engineer – Code the future of secure transactions.5. Blue Team Member – Design defensive measures / harden operating systems.6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.7. Cybersecurity Scrum Master – Watch over and protect all data.8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.10. Cloud Security Architect – Secure apps and data in the cloud. 2. Threat HunterFeatured top of the list for good reason, Threat Hunters are one of the most valuable jobs to the IT industry, with skills shown to improve the speed of threat detection and response more than two-fold, in comparison to teams without this dedicated resource. Enjoy job security by offering a 64% improvement in the detection of advanced threats, and a 63% reduction in investigation time according to the 2018 Threat Hunting Report.Related SANS courses and GIAC Certification: FOR578 (GCTI Certification), FOR572 (GNFA Certification), FOR508 (GCFA Certification), FOR526, FOR610 (GREM Certification) and SEC487 3. Penetration Tester"Penetration testing is the active circumvention of security features in networks, systems, and applications. This is where the penetration tester emulates threats by attempting to access alternative functionality. A penetration tester will also assess data or functionality in a manner not anticipated by the group designing that system. A good penetration tester will need to be highly technical and will also require a level of skill that enables meaningful communication of risk to management. Pen testing is a critical capability that most organisations will require, and it can also be quite fun, if not sometimes tedious. I love what I do, both as a tester and as an instructor for SANS."Adrien De Beaupre SANS SEC642 InstructorRelated SANS courses: SEC487, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification) 4. Forensic Computer AnalystAnalyst findings might be used as evidence in a criminal investigation, to resolve a business or legal dispute, to uncover specific targets or to detect suspicious activity.Related SANS courses: All FOR classes plus SEC504, (GCIH Certification), SEC401 (GSEC Certification) and SEC487 5. Incident ResponderWhen you're passionate about fighting cyber-crime, being an incident responder will bring a great deal of job satisfaction. Learn to discover the issue, mitigate the damages and investigate the situation from all angles.Related SANS courses: All FOR classes plus SEC504 (GCIH Certification), SEC501 (GCED Certification) and SEC487 6. Security ArchitectDesign, build and supervise the implementation of network and computer security. As a Network Security Architect, you will test for vulnerabilities and install firewalls, along with various security policies and procedures.Related SANS courses: SEC450, SEC503 (GCIA Certification), SEC511 (GMON Certification), SEC530, (GDSA Certification), FOR572 (GNFA Certification), SEC501 (GCED Certification) and MGT516 7. Malware AnalystFor those that like to fight the breach head on, a Malware Analyst will ensure the fast and effective response and containment to a cyber-attack.Related SANS courses: FOR610 (GREM Certification) 8. CISO/ISO or Director of SecurityAs a chief information security officer, you will be the balance between the IT department and the boardroom, with an equal understanding of both business and information security. Together with the ability to influence and negotiate, you will also have a thorough knowledge of global markets, policy, and legislation. With the ability to think creatively, the CISO will be a natural problem solver and will find ways to jump into the mind of a cyber criminal, discovering new threats and their solutions.Related SANS courses: SEC401 (GSEC Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification) 9. Security Software DeveloperAs a senior developer, this creative position requires the ability to design secure software using protected programming techniques, that are free from vulnerabilities which could be abused by hackers. You will have the ability to incorporate security analysis, defences and countermeasures in order to ensure strong and reliable software. Related SANS courses: MGT525 (GCPM Certification), DEV522 (GWEB Certification), DEV541, DEV544, and SEC540 (GIAC Certification coming soon) 10. Media Exploitation Analyst/Law Enforcement Computer Crime InvestigatorIf investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked or damaged, then this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence. Related SANS courses: FOR500 (GCFE Certification), FOR585 (GASF Certification), FOR518 and FOR498 11. Software Validation EngineerAs a software validation engineer, you will assess software in order to verify issues and log defects. You will be responsible for developing summary reports for tests performed and will review data with all team members. In summary, to fill this role you will be a qualified engineer responsible for managing, inspecting, testing and modifying the equipment and procedures used to manufacture various products. Related SANS courses: MGT525 (GCPM Certification) and SEC540 (GIAC Certification coming soon) 12. Security Operations Centre AnalystSOC Analysts work alongside security engineers and SOC managers, to provide situational awareness through detecting, containing, and resolving IT threats. Working closely with incident response teams, a SOC analyst will address security issues - when detected, quickly and effectively. Related SANS courses: SEC501 (GCED Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification) and SEC555 (GCDA Certification) 13. Vulnerability Researcher/Exploit DeveloperAs one of the fastest growing careers in the tech industry, this vital role is responsible for research and analysis of new exploits and will hold experience in penetration testing and writing exploit code. Related SANS courses: SEC460, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification) 14. Security Audit and Risk Management SpecialistAs the role responsible for identifying and assessing a company's potential risks to safety, reputation and financial prosperity, the security audit and risk management specialist will have strong problem solving and analytical skills together with an ability to negotiate and be diplomatic while working under pressure. Related SANS courses: SEC401 (GSEC Certification), MGT516, MGT525 (GCPM Certification), DEV522 (GWEB Certification) and SEC540 (GIAC Certification coming soon) 15. Cyber Security Analyst/EngineerAs one of the highest-paid jobs in the field, the skills required to gain footing in this role are advanced. You must be highly competent in threat detection, threat analysis, and protection, broken authentication, cross-site scripting and cross-site request forgery. This is a vital role in preserving the security and integrity of an organisation's data. Related SANS courses: SEC401 (GSEC Certification), SEC501 (GCED Certification), MGT516, MGT525 (GCPM Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification), SEC503 (GCIA Certification), SEC530 (GDSA Certification) and SEC555 (GCDA Certification) 16. Mobile Security ManagerTaking care of an organisation's mobile device safety, as a Mobile Security Manager you are responsible for monitoring and securing all of a companies' Smartphones, laptops, smartwatches, and other connected devices. Managing the collective tools, technologies, and processes that enable the securing of a mobile device or mobile computing environment, you will be part of a broader information security management policy that focusses mainly on mobile IT assets.Related SANS courses: FOR585 (GASF Certification), plus SEC575 (GMOB Certification) and MGT514 (GSTRT Certification) 17. Application Penetration TesterOne of the most exciting roles within the cyber security industry, you will be responsible for the penetration testing (or ethical hacking), of applications; a significantly vulnerable point. The objective is to find security weaknesses before a cyber criminal does.Related SANS courses: DEV522 (GWEB Certification) 18. Disaster Recovery/Business Continuity Analyst/ManagerLevel up your skills and earn your place as a disaster recovery manager, where you will be responsible for managing the design, implementation, and communication of organisations continuance and disaster recovery plans. Your processes will ensure the safeguarding of business data, technology, information systems, and databases.Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT514 (GSTRT Certification) and MGT516 19: Technical Director and Deputy CISOWould you like to train and develop future leaders in the cyber security department? You will be responsible for deciding on the costs needed to develop senior roles, on executing the security strategy consistently throughout the department and identifying and managing the skills and weaknesses of associates.Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification) 20: Intrusion Analyst"I've come to realise that network monitoring, intrusion detection, and packet analysis represent some of the very best data sources within our enterprise. These can be used to very rapidly confirm whether or not an incident has occurred, and allow an experienced analyst to determine, often in seconds or minutes, what the extent of a compromise might be. In a very real sense, I have found this to be the most important course that SANS has to offer. Not only will it cause you to think about your network in a very different way as a defender, but it is incredibly relevant for penetration testers who are looking to "fly under the radar." The concepts that you will learn in this course apply to every single role in an information security organisation!"David Hoelzer — SANS SEC503 InstructorRelated SANS courses: SEC503 (GCIA Certification) and SEC401 (GSEC Certification) 21: IoT/Critical Infrastructure Security DirectorA crucial role within today's world where cyber attacks to our critical infrastructure are increasing in risk. In an age where almost every devise or piece of machinery can be connected to the internet, they too are at risk of being hacked. The Internet of Things (IoT) has evolved so quickly that managing its security has become a minefield. When we look broadly into the matter, Critical Infrastructure is at risk to foul play. Power grids, chemical plants, and transportation systems are being attacked by hackers. In a report by Business Insider, ?A new front in cybersecurity', investigations found that companies operating critical infrastructure reported 295 cyber attacks in 2015. While technology is consistently evolving, so too will attacks to this industry.The role of security director to IoT and Critical Infrastructure is invaluable - some might say indispensable.Related SANS courses: All SANS ICS Courses and Certifications, plus MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs
11/16/2019 • 12 minutes, 22 seconds
How To Plan A Career in Cyber Security
In today’s DailyCyber which you can listen to on the go. I discuss how to plan a career in Cyber Security. What questions you need to ask yourself and so much more.
11/13/2019 • 15 minutes, 18 seconds
Daily Cyber Introduction with Brandon Krieger
Welcome to the DailyCyber Podcast My name is Brandon Krieger and this Podcast is to share with you my journey into and evolving as Cyber Security Professional.