Cyber Security Sauna
WithSecure™
Categories: Technology
Add to My List
Listen to the last episode:
CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizations from constantly evolving cyber risks. Today, we are joined by Cybersecurity Strategist and Eclipz.io Inc. CISO Matthew Rosenquist and WithSecure CISO Christine Bejerasco to discuss why making senior leadership and the board clear on the value that CISOs bring to the table.
Previous episodes
-
95 - 086| Why showing value is more important for CISOs than ever Wed, 03 Jan 2024 - 0h
-
94 - 085| NIST Cyber Security Framework V.2 – Help or Hindrance? Wed, 22 Nov 2023 - 0h
-
93 - 084| Let's Talk About Threats Baby Wed, 01 Nov 2023 - 0h
-
92 - 083| Security by design for CISOs Mon, 09 Oct 2023 - 0h
-
91 - 082| Hyped and Hacked - AI in Cyber Security Wed, 20 Sep 2023 - 0h
-
90 - 081| Mudge - the man, the myth, the mythbusting Mon, 28 Aug 2023 - 0h
-
89 - 080| The Power Of Putting Security Outcomes First Mon, 07 Aug 2023 - 0h
-
88 - 079|(Mind the) Detection and Response Gap Mon, 17 Jul 2023 - 0h
-
87 - 078| John Grant on the relationship between sustainability and cyber security Mon, 26 Jun 2023 - 0h
-
86 - 077| Jessica Berlin and Stephen Robinson on the cyber front Tue, 06 Jun 2023 - 0h
-
85 - 076| What we get wrong (and right) about APTs Mon, 08 May 2023 - 0h
-
84 - 075| Winning with outcome-based security Tue, 04 Apr 2023 - 0h
-
83 - 074| Do you even patch bro? Tue, 07 Mar 2023 - 0h
-
82 - 073| 2023 - Looking Forward Wed, 01 Feb 2023 - 0h
-
81 - 072| 2022 Wrap-Up Sun, 01 Jan 2023 - 0h
-
80 - 071| Deepfakin it: AI content in cyber attacks Mon, 05 Dec 2022 - 0h
-
79 - Cyber Security Sauna: Breaking Views – The Vastaamo case Wed, 09 Nov 2022 - 0h
-
78 - 070| Crowdsourcing Security with Bug Bounties Wed, 02 Nov 2022 - 0h
-
77 - 069| Cyber conflicts, Corporations and Collateral damage Mon, 03 Oct 2022 - 0h
-
76 - SPHERE SESSION | Johanna Småros on winning the algorithmic retail Mon, 26 Sep 2022 - 0h
-
75 - SPHERE SESSION | Matthew Rosenquist on why value is the cybersecurity blindspot Tue, 13 Sep 2022 - 0h
-
74 - 068|The other TTPs: Tools, technologies, and people Wed, 07 Sep 2022 - 0h
-
73 - SPHERE SESSION | Sari Stenfors on AI, humanness and positive futures Fri, 19 Aug 2022 - 0h
-
72 - SPHERE SESSION | Risto Siilasmaa on trust as the building block for businesses Tue, 09 Aug 2022 - 0h
-
71 - 067| How Mikko Hypponen learned to stop worrying and love the internet Thu, 14 Jul 2022 - 0h
-
70 - SPHERE SESSION | Christine Bejerasco on the development of ransomware Fri, 29 Jul 2022 - 0h
-
69 - SPHERE SESSION | Simone Giertz on building useless things Mon, 11 Jul 2022 - 0h
-
68 - SPHERE SESSION | Carole Cadwalladr on threats to democracy Thu, 30 Jun 2022 - 0h
-
67 - SPHERE SESSION | Philip Ingram on nation-state threats Mon, 13 Jun 2022 - 0h
-
66 - 066| Co-security: collaboration, cooperation and cyber security Tue, 05 Apr 2022 - 0h
-
65 - 065| Security for non-profit organizations Mon, 28 Feb 2022 - 0h
-
64 - 064| 2021, 2022 and beyond - Part 2 Mon, 24 Jan 2022 - 0h
-
63 - 063| 2021, 2022 and beyond - Part 1 Wed, 29 Dec 2021 - 0h
-
62 - 062| Log4j Zero Day: What It Means for Your Org Tue, 14 Dec 2021 - 0h
-
61 - 061| AppSec, According to Two Guys Named Antti Wed, 24 Nov 2021 - 0h
-
60 - 060| Biometrics: Privacy, Problems and Possibilities Tue, 02 Nov 2021 - 0h
-
59 - 059| Keeping Your Latest Tech from Becoming the Latest Threat Mon, 11 Oct 2021 - 0h
-
58 - 058| Paths to Infosec: From ER to IR Mon, 20 Sep 2021 - 0h
-
57 - 057| Dark Web: The Good, the Bad, and the Ugly Tue, 17 Aug 2021 - 0h
-
56 - 056| To Ban or Not to Ban? Ransomware Payment Regulation Thu, 15 Jul 2021 - 0h
-
55 - 055| When AI Goes Awry Wed, 23 Jun 2021 - 0h
-
54 - 054| Ransomware Incident Response and the Role of Readiness Thu, 27 May 2021 - 0h
-
53 - 053| How to Secure Networks and Influence People Wed, 28 Apr 2021 - 0h
-
52 - 052| Challenges in Cloud Security Tue, 06 Apr 2021 - 0h
-
51 - 051| Looking at Phishing Through the Intrusion Kill Chain Thu, 11 Mar 2021 - 0h
-
50 - 050| Getting the Most out of Infosec Conferences Thu, 18 Feb 2021 - 0h
-
49 - 049| Ransomware 2.0, with Mikko Hypponen Tue, 19 Jan 2021 - 0h
-
48 - 048| The Year in Cyber: 2020 Wed, 30 Dec 2020 - 0h
-
47 - 047| The Tangled Web of ID Theft Wed, 09 Dec 2020 - 0h
-
46 - 046| 10 Burning Mobile Security Questions, Answered Thu, 12 Nov 2020 - 0h
Show more episodes
5