Send us a text In this episode of Security Masterminds, we explore the critical intersection of artificial intelligence, security, and development teams. Our distinguished guest, Alison Cossette, CEO and founder of Patron, Inc., shares her expertise on responsible AI development and the importance of transparency in data sourcing. Key Topics Covered: • The role of graph databases in understanding complex data relationships• Mitigating AI risks through transparent and trustworthy data sourcing...
All content for Security Masterminds is the property of Security Masterminds and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text In this episode of Security Masterminds, we explore the critical intersection of artificial intelligence, security, and development teams. Our distinguished guest, Alison Cossette, CEO and founder of Patron, Inc., shares her expertise on responsible AI development and the importance of transparency in data sourcing. Key Topics Covered: • The role of graph databases in understanding complex data relationships• Mitigating AI risks through transparent and trustworthy data sourcing...
Send us a text In this episode of Security Masterminds, we explore the critical intersection of artificial intelligence, security, and development teams. Our distinguished guest, Alison Cossette, CEO and founder of Patron, Inc., shares her expertise on responsible AI development and the importance of transparency in data sourcing. Key Topics Covered: • The role of graph databases in understanding complex data relationships• Mitigating AI risks through transparent and trustworthy data sourcing...
Send us a text This is the bonus part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Joe's Reponses: Favorite Cybersecurity Tool: Proxmark - https://proxmark.com/Cybersecurity Books: Cuckoo's Egg, Clifford Stoll - https://a.co/d/8wOahpMMikko Hypponen - If it’s smart it’s vulnerable - https://a.co/d/awJBupDApps: Phone AppMessaging / SMSCameraConnect ...
Send us a text In the rapidly evolving landscape of cybersecurity, staying ahead of emerging threats and technologies is crucial. This episode delves into the intricate world of cybersecurity with Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, as we explore the latest advancements and challenges in the field. With over three decades of experience, Carson shares valuable insights on the evolution of cybersecurity, from its humble beginnings as a subset of IT to its curre...
Send us a text This is the bonus part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Dave's Reponses: Cybersecurity Books: Andy Ellis - 1% Percentage Leadership - 1% Leadership: Master the Small, Daily Improvements that Set Great Leaders Apart - https://a.co/d/9C8OhbEMikko Hypponen - If it’s smart it’s vulnerable - https://a.co/d/awJBupDApps: ToDoIs...
Send us a text Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experience, spanning various industries and roles, offers valuable insights into the evolving landscape of cybersecurity and its critical importance in our everyd...
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Enjoy! Connect with Jack Rhysider DarkNet Diaries: https://darknetdiaries.com/X: https://x.com/JackRhysiderConnect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.comJames McQuiggan - https://www.linkedin.com/in/jmcquigganErich Kr...
Send us a text Want to strengthen your advocacy for privacy protection and cybersecurity awareness? Get ready to hear the solution that will help you achieve this result and empower you to make a difference. Let's dive into it! Jack Rhysider's cybersecurity journey is sparked by a deep concern for data privacy and a desire to advocate for its protection. Through his podcast, Darknet Diaries, Jack adeptly combines the art of storytelling with cybersecurity education, understanding its profound...
Send us a text The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/Designing Secure Software Book: https://a.co/d/07h5nQnaConnect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.comJames McQuiggan - https://www.linkedin.com/in/jmcquigganErich Kron: https://www.linkedin.com/in/erichkron/Music Composed by: Brian Sanyshyn - https://www.briansa...
Send us a text Do you want to gain a deeper understanding of how PKI, AI, and cryptography are shaping software development? Our special guest is Loren Kohnfelder Loren Kohnfelder's journey into the world of AI and cybersecurity began with an early exposure to mainframe programming at the age of twelve. His fascination with software development grew from experimenting with basic assembly language, COBOL, Basic, Fortran, and RPG. Over the years, he witnessed the evolution of programming ...
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Lee for not only his insights into cybersecurity, but a little bit of his personal life too! Enjoy! Connect with Dr. Lee Mangold LinkedIn: https://www.linkedin.com/in/leemangold/Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.comJames McQuiggan - https://www.linkedin.com/in/jmcquigganErich Kron: https://www.linkedin.c...
Send us a text If you're feeling overwhelmed and stressed out about keeping up with new cybersecurity technologies, then you are not alone! The constant flood of new technologies and emerging threats can make it feel like you're falling behind, leaving you feeling exhausted and frustrated. It's time to find a way to cut through the overwhelm and start making real progress in your cybersecurity efforts. Let's dive in and uncover some strategies to help you navigate the ever-changing landscape ...
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Jessica for not only her insights into cybersecurity, but a little bit of her personal life too! Connect with Dr. Jessica Barker, PhD, MBE LinkedIn: https://www.linkedin.com/in/jessica-barker/Twitter: https://twitter.com/drjessicabarkerDr. Jessica Barker on Amazon - Amazon Store LinkHacked - https://a.co/d/czga0PoConfident CyberSecurity - https://a.co/d/3vz3IdFConnect with us Websit...
Send us a text Uncover the Unexpected: Discover the Surprising Key to Enhanced Security Culture. Are you ready to discover the game-changing element that's transforming the cybersecurity industry? Get ready to challenge your perceptions and dive into the human side of cybersecurity with an unexpected twist that's reshaping the landscape. Are you curious to find out what it is? Stay tuned for the inside scoop that will leave you eager for more. Our special guest is Dr. Jessica Barker Dr. Jessi...
Send us a text Rachel Tobac, the CEO of Social Proof Security, takes us on a remarkable journey into the realm of cybersecurity and social engineering. Her introduction to the world of hacking came at Defcon, where she was initially hesitant to participate in a social engineering competition. Despite her lack of experience, Rachel's determination and "try-hard" attitude led her to secure second place, sparking her passion for cybersecurity. Throughout her engaging narrative, Rachel sheds ligh...
Send us a text Get ready to challenge your assumptions about security awareness as Julie Haney, head of Human Centered Cybersecurity at NIST, reveals the hidden struggles and attitudes of security professionals and non-experts. Just when you think you understand the root causes of cybersecurity challenges, a shocking twist leaves everything in doubt. Tune in to find out. Julie Haney, an esteemed leader at the National Institute of Standards and Technology, heads the Human Centered Cyber...
Send us a text Feeling the frustration of constantly battling memory-related vulnerabilities in your code? What if I told you there's an unexpected twist in the story that could change everything? Join me as we explore the captivating journey of transitioning to memory-safe languages in programming, and uncover the game-changing solution that awaits. But that's a story for another time... Our special guest is Loren Kohnfelder and joined by Roger Grimes. Loren Kohnfelder, a distinguished figur...
Send us a text Have you ever heard these myths about supply chain security, product security, and getting hired in cybersecurity? Myth #1: Supply chain security is not important unless you're a large organization. Myth #2: Product security is solely the responsibility of the manufacturer. Myth #3: Getting hired in cybersecurity requires a technical degree. Stay tuned as our guest, Naomi Buckwalter, reveals the truth behind these myths and offers valuable insights in our upcoming discussion. N...
Send us a text Discover the untold dangers of AI in cybersecurity as expert Clint Bodungen uncovers the dark side of generative AI. Is our reliance on technology putting us at risk? Find out in this eye-opening discussion that will leave you questioning the future of cybersecurity. "Technology, as much as we need it, enables complacency. The technology enables that complacency, and we've seen the consequences. We need a proper cybersecurity culture that aligns with our natural desire to do t...
Send us a text Discover the critical role of a Business Security Officer in aligning security with business goals. But what happens when this vital bridge between security and the organization finds themselves facing unexpected challenges? Find out in this intriguing episode of the Security Masterminds podcast. Nicole Dove, a cybersecurity expert with an intriguing career path, helps businesses navigate the intersection of risk and technology. Starting her career on Wall Street, she transitio...
Send us a text Protecting data in the age of cyber threats, cybersecurity expert Ian Garrett ignites a battle against ignorance, as he harnesses the power of AI and zero trust to defend organizations of all sizes from the lurking dangers of the digital world. Today's guest is Ian Garrett, the CEO and co-founder of Phalanx. With a background in computer science, he became an early adopter of AI application in cybersecurity and has been making waves in the industry ever since. Ian's ability to ...
Send us a text In this episode of Security Masterminds, we explore the critical intersection of artificial intelligence, security, and development teams. Our distinguished guest, Alison Cossette, CEO and founder of Patron, Inc., shares her expertise on responsible AI development and the importance of transparency in data sourcing. Key Topics Covered: • The role of graph databases in understanding complex data relationships• Mitigating AI risks through transparent and trustworthy data sourcing...