A journey inside the mind of Cape Breton born Justin Finney who discusses pretty much whatever was on his mind the week before and his comedic take on life and current events. Each Episode wraps up in typical east coast fashion with "Story Time", a real story from Justin's life!
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading
1
Since When Do We Practice Talking? With Michael Santarcangelo
28:16
28:16
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:16
When do we get a seat at the big kids table and how do we know what to say when we get there? Our guest this week, The Security Catalyst, Michael Santarcangelo joins us to talk about how we can better prepare our teams for success and then prepare them to stay successful.George Finney
…
continue reading
1
We Need AI to Help Understand The Hype Cycle Around AI - With DJ Sampath
27:03
27:03
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:03
Artificial Intelligence is perhaps the second biggest buzzword in cybersecurity, behind Zero Trust...so how do you know whether a product is the next Skynet or just a thousand outsourced hourly employees in another country? My guest this week helps break down fiction from reality when it comes to AI/ML in Cybersecurity tools. DJ Sampath is the Co-f…
…
continue reading
1
Responsible Disclosures - with Ted Harrington
28:01
28:01
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:01
How do you hack a car and not get sued for it? Application security is probably at the forefront of people's minds for 2022 and rightly so! My guest this week, Ted Harrington, has answers. Ted was a part of one of the first groups that hacked a car and is currently the Executive Partner at Independent Security Evaluators (ISE), the company of ethic…
…
continue reading
1
Getting into the "Flow" of Threat Modeling - With Adam Shostack
23:26
23:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:26
Threat Modeling isn't the newest fashion craze hitting the Paris catwalks. It's the process you go through to understand what you're protecting yourself from before you decide what controls need to be in place. And our guest this week, Adam Shostack, literally wrote the book on Threat Modeling. Get the whitepaper here, no registration required: htt…
…
continue reading
1
Culture Isn't A Buzzword - with Kate Brett Goldman
21:32
21:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:32
There's a lot of marketing hype out there about how to create a culture of cybersecurity, but we wondered...can you change your culture with security awareness training? To find out, we asked Kate Brett Goldman, CEO of The Cybermaniacs what works and what doesn't when it comes to working with your humans.…
…
continue reading
1
This Is Not A Podcast About Decption - With Rob Black
29:44
29:44
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:44
Ok, it is a podcast about deception. And we think Deception is something that doesn't just belong to the history books or the battlefield, it belongs on your network. Rob Black is the deputy director of the UK National Cyber Deception Laboratory and is passionate about making deception something that everyone can do in their networks.…
…
continue reading
1
Helping Veterans Land in Cybersecurity - With Jeff Schilling
28:26
28:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:26
There are a huge number of job openings in cybersecurity right now...but there are also a huge number of veterans out there looking to get their start in the civilian world. Jeff Schilling, Global CISO for Teleperformance joins us this week to talk about his own journey from being in the Army to being a CISO, and has some tips for hiring managers f…
…
continue reading
1
What Does Zero Trust Even Mean??? With John Kindervag (Part 2)
29:10
29:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:10
What does Zero Trust mean? Who better to answer the question than the guy who created it...John Kindervag, currently the SVP for Cybersecurity Strategy at On2IT who offers the worlds first Zero Trust as a Service (ZTaaS) offering.George Finney
…
continue reading
1
What Does Zero Trust Even Mean??? With John Kindervag (Part 1)
26:45
26:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:45
What does Zero Trust mean? Who better to answer the question than the guy who created it...John Kindervag, currently the SVP for Cybersecurity Strategy at On2IT who offers the worlds first Zero Trust as a Service (ZTaaS) offering.George Finney
…
continue reading
1
Cybersecurity for Small Businesses - with Scott Schindler
23:42
23:42
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:42
How do we break the Cybersecurity Poverty Line? We asked Scott Schindler, vCISO Director for Tracepoint, who specializes in supporting security for small to medium enterprises to find out whether it's really just about lack of funding...or if there's something more fundamental that's needed to protect smaller organizations.…
…
continue reading
1
What Does Cybersecurity Culture Even Mean??? With Dr. Keri Pearlson
28:49
28:49
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:49
Everyone talks about Cybersecurity Culture, but if you asked 100 people for a definition, you'd probably get 200 answers. Which is why this week we're talking to Dr. Keri Pearlson, Executive Director of the research group Cybersecurity at MIT Sloan (CAMS) who has focused her research around cybersecurity culture at organizations across the globe.…
…
continue reading
1
We Want YOU For A Career in Cybersecurity!
29:43
29:43
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:43
Want to know how to get started in your cybersecurity career? Want to hire some of those people getting started in cybersecurity? We asked our guest this week, Zach Vinduska US CISO for Credera, what we can do differently about recruiting the next generation of security talent and how we can sustain their careers for the next 30 years.…
…
continue reading
1
Beta Testing ENGAGE...with Decepticons?
31:49
31:49
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:49
You may have heard of the MITRE ATT&CK framework, which helps network defenders understand the methods attackers use to penetrate networks. But have you heard of ENGAGE? This week, we welcome back MITRE's chief mad scientist for deception, Dr. Stanley Barr, who talks about how MITRE is engaging the community to create a framework help defenders dis…
…
continue reading
1
People are the ONLY link - with Andy Bennett
23:07
23:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:07
"No security person really works in security,” says Andy Bennett, VP of Technology and CISO for the Apollo Information Systems. There's a reason we say People, Process, and Technology - people always come first. We build cars, we are bankers, we are educators...and being secure means knowing the business and building relationships with the other hu…
…
continue reading
1
The Cybersecurity Leadership Shortage - With Brian Mork
25:20
25:20
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
25:20
ISC2 last year reported that almost 70% of workers surveyed in the US and UK wouldn't want to work in security. This week, we discuss whether we have a cybersecurity skills shortage or whether what we actually have is a cybersecurity leadership shortage. My guest this week is Brian Mork, CISO for Westinghouse, advocate for Hacking Is Not A Crime (#…
…
continue reading
1
Episode 7 - "Welcome to the family"
18:58
18:58
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
18:58
Meeting the families , Deep fried socks and a cross bow crime.
…
continue reading
1
For CISOs By CISOs - With Randy Potts, Jamin Shah, and Cecil Pineda
24:53
24:53
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:53
The cybersecurity habit of the week is Community. Lots of conferences bill themselves as being "For CISOs, by CISOs" but many don't actually live up to the billing of being run or created by CISOs. Randy, Jamin, and Cecil are hoping to change that when it comes to cybersecurity conferences. And along the way, they're hoping to improve their communi…
…
continue reading
1
Aligning Security With The Business - With Jason Fruge
21:42
21:42
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:42
How do you know when you're in the Goldilocks zone when it comes to security? Not too much or not too little? We think it's by making sure security is aligned with the business. Our guest this week is Jason Fruge. Jason is the CISO for Rent-A-Center, and this is his 4th CISO role. Jason has held CISO roles at retail and healthcare technology compan…
…
continue reading
1
Securing The Future - With Val Mukherjee
25:57
25:57
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
25:57
There are millions of unfilled jobs in the cybersecurity industry today...what do we need to bridge that gap? Our guest this week is Val Mukherjee, Chairman and Founder of the Cyber Future Foundation. This week, CFF announced a partnership with Cybrary and Safal Partners to provide free training within Cybrary's platform. This partnership will enha…
…
continue reading
1
Episode 6 - The doppelganger effect
17:55
17:55
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:55
Bookstore bully , orangutans and the case of the missing dingy
…
continue reading
1
We Put The Success in Succession Planning - With Malcolm Harkins
28:37
28:37
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:37
We know that there's a huge talent shortage in cybersecurity, which leads to high turnover. This makes succession planning even more important because we know that we have to manage the "churn" on top of everything else. Veteran CISO and Cyber Luminary Malcolm Harkins joins the show to talk about how important succession planning really is, how to …
…
continue reading
1
Danger Will Robinson, Your Security Training Stinks
22:31
22:31
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:31
The biggest complaint I hear from people about security training is that it’s a waste of their time. And if you’re doing a 5 minute awareness video once a year to check a compliance box, you probably are wasting your employee’s time. Our guest this week, Ashley Rose, is the CEO of Living Security and her philosophy is to empower people to change th…
…
continue reading
1
Episode 5 - " I cant Tell a lie " - George Washington
17:52
17:52
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:52
A Mexican weasel , a snazzy vest and a rum induced tree chop
…
continue reading
1
Episode 4 - " Cans? "
19:10
19:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
19:10
Justin talks recent pandemic news and talks about a special episode coming up in May. This weeks story is a quick one that was brought to mind by a recent friends battle.
…
continue reading
1
Culture Eats Cybersecurtiy For Breakfast - with Jessica Nemmers
22:35
22:35
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:35
Fellow SMU Mustang and former Ballerina Jessica Nemmers joins the show this week to talk about how culture impacts cybersecurity. Jessica has been a CISO and Global IT leader for the past 24 years for Fortune 500 companies like Perot Systems and CMC. This week we also officially launched the beta test of the Well Aware cybersecurity personality ass…
…
continue reading
1
Your Career Path in Cybersecurity - with Patrick Benoit
22:28
22:28
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:28
How do you get started in Cybersecurity? Interested in being a CISO one day? Patrick Benoit, Global head of Governance, Risk, and Compliance at CBRE joins the show to talk about how you can use the habit of cybersecurity literacy and lifelong learning to find your path through any career in cybersecurity. We've gotten a ton of questions about caree…
…
continue reading
1
Episode 3 - " Two Body Guards , a Wrestler and a Cape Bretoner walk into a bar "
23:14
23:14
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:14
This week our host Justin Finney talks about bad days , a recent embarrassing encounter he had and a story of a far away land....Vegas.
…
continue reading
1
All Warfare is based on Deception - Dr. Stanley Barr and the MITRE Shield.
30:59
30:59
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:59
It's April Fool's day, so it's the perfect time to talk about why developing the habit of Deception is critical to a strong defense. Our guest this week is Dr. Stanley Barr, Principal Scientist, and Capability Area Leader for Cyber Denial, Deception, and Adversary Engagement at the MITRE Corporation. You've probably heard of the MITRE ATT&CK framew…
…
continue reading
1
Episode 2 - "Antifreeze Bowling"
17:30
17:30
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:30
Come Closer East Coaster Episode 2 begins with host Justin Finney unloading some recent thoughts and then tells this weeks story !
…
continue reading
1
Looking for Lt. Cmdr. Data - Your First 90 Days As a CISO
24:30
24:30
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:30
As Julius Cesar once said...Experience is the best teacher. This week's guest is no stranger to the CISO role...Sarah Hendrickson has been a CISO or deputy CISO at 5 different companies in multiple industries, and she shares her secret 90 day plan for jumping into a new CISO role.George Finney
…
continue reading
1
Episode 1 - "East Coast Kayak Debacle"
16:35
16:35
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
16:35
Episode 1 of Come Closer East Coaster with Justin Finney. Justin introduces the outlook of the podcast and dives into a story from his past
…
continue reading
1
Cloud Security is Hard
59:07
59:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
59:07
"SaaS is a black hole, a blind spot into a company's visibility into their security posture." Obsidian Security's Director of Systems Engineering, John Doetch and their CISO, Alfredo Hickman join hosts George Finney and Scott Schindler to talk about how we can move into the new world of SaaS security.…
…
continue reading
1
Threat Response and Protecting Our Communities
1:01:10
1:01:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:01:10
Our tinfoil hats are tingling! This week, we're talking Threat Response with Deepwatch's own Director of Solutions Architecture, Jamar Beall and Ian Schneller, CISO at RealPage! We'll talk frameworks, managed security services and what to look for (and what not to look for) in your security partners!…
…
continue reading
1
The SolarWinds and Zero Trust Conversation You've Been Waiting For
1:06:37
1:06:37
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:06:37
In this episode, recorded in front of a live virtual audience, Co-Hosts George Finney and Scott Schindler discuss the unprecedented security breach that has become known as Solarigate. And if that wasn't exciting enough, they are joined by an amazing panel, including interview Dr. Zero Trust himself, Dr. Chase Cunningham, Chief Strategy Officer for…
…
continue reading
1
Predictive Resliency using Emulation with Spirent
57:24
57:24
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
57:24
Do we live in the Matrix? In this live episode, sponsored by Spirent, George Finney and Scott Schindler discuss how maybe the whole Universe is an emulation instead of a simulation with special guests, Michael Jack, Sr. Director for Product Management at Spirent, and Brian Rowe, CISO for Rehrig Pacific.…
…
continue reading
1
Endpoint Protection with Sentinal One
1:01:30
1:01:30
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:01:30
In this live show...George Finney discusses modern endpoint protection with co-host Scott Schindler and guests... Listyanna Dowell Sr. Director, Information Security Management at SiriusXM, and Sentinel One's foremost expert on EDR, Ben Mungkornpanich.George
…
continue reading