Executive Recruiter Scams with John Sidoti

When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating to be this skeptical, being cautious can protect you and your finances.
Phishing Attack Awareness and Training with Josh Bartolomie

Scammers know employees are busy and that they want to act promptly on requests, but they also understand it takes time to verify the validity of the email. How do we train employees to know what is real and what isn’t?
Challenges of Employee Onboarding and Offboarding with Craig Davies

Craig Davies started in banking, holding many roles including CSO. As the CISO and the Executive Director of Gathid Ltd., he is passionate about helping organizations strengthen access management without completely overhauling their people, processes, physical infrastructure, and technology.
Top 5 Supply Chain Risks with Kevin Kumpf

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.
Ever-Changing Cyber Crime with Raj Samani

Today’s guest is Raj Samani. Raj is the Chief Scientist for the cyber security firm Rapid7. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Raj has been recognized for his contributions to the computer security industry through numerous awards and has co-authored several books and has been a technical editor in others.
Ethical Hacking by Brian Self

Today’s guest is Brian Self. Brian is a certified Information Systems Security professional, ethical hacker, and professional speaker. He has the unique ability to take a complicated topic like network security and make it easy for a wide audience to understand. He has been in Information Security for over 15 years and in IT for over 20. He is a professional penetration tester doing offensive security, a compliance subject matter expert, an IT security architect, a security engineer, and a consultant in a variety of security domains.