Beta
Logo of the podcast Cyber Leaders

Cyber Leaders (SANS Institute)

Explore every episode of Cyber Leaders

Dive into the complete episode list for Cyber Leaders. Each episode is cataloged with detailed descriptions, making it easy to find and explore specific topics. Keep track of all episodes from your favorite podcast and never miss a moment of insightful content.

Rows per page:

1–9 of 9

Pub. DateTitleDuration
05 Dec 2024SANS Cyber Leaders Podcast Trailer00:00:56

Join us for an unfiltered journey into the minds of the leaders shaping the future of cybersecurity. In each episode, we embark on a curiosity-driven exploration to uncover hidden truths, share unlearned lessons, and offer critical insights to help you enhance your knowledge, sharpen your strategies, and lead the way in a rapidly evolving digital landscape.

Contact:

Have questions or comments? Email us at ciso-network@sans.org

13 Dec 2024Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi00:46:22

In this episode, Ciaran and James are joined by Shashank Joshi, Defence Editor at The Economist, to discuss the geopolitics of cyber security. Shashank offers his expert analysis on critical cyber security events, strategies, and their global implications.

Highlights

[2:00] Entry into Cyber

[5:00] Iran-Israel Cyber Skirmishes

[8:00] The XZUtils Story

[11:00] Historical example highlighting the human side of technological advancement

[14:00] Cyber warfare and geopolitical tensions

[23:00] US-China cold tech war

[26:00] Domestic Cyber Vulnerabilities

[29:00] Counter-Terrorism Strategies

[32:00] Evolution of thought from the Intelligence Community

[41:00] Intelligence and Problem-Solving

[44:00] Simplifying Complex Topics

Links:

Financial Timesreview [paywall] | PDFversion

Economist article on Iran's Cyberwar

Economist article on XZUtils attack

BBC article on overlooked Polish Codebreakers

Keith Alexander's testimony

Easterly’s testimony | Congress video

BBC article on sanctions | Defence Production Act

NHS cyber incident update| British Library incident review.

RUSI commentary

James Babbage interview| Doctrine of cognitive effect

Dark Wire WSJ book review

Operation Lochbit video| Operation Endgame

Hannigan’s book

Contact:

Have questions or comments? Email us at ciso-network@sans.org

13 Dec 2024Leading Global Cybersecurity with Christine Bejerasco00:33:33

In this episode, Ciaran and James are joined by Christine Bejerasco, the CISO of WithSecure, for an insightful conversation about navigating the complexities of cybersecurity in today’s global landscape. Christine shares her experiences; from the wild early days of network worms and mobile malware, to the evolving role of the modern CISO and what it takes to lead cybersecurity experts towards a safer digital world.

Highlights:

[3:00] After GDPR: the regulations defining how organisations do privacy and security

[8:30] Thoughts from a Former Forbes Councils Member

[11:00] The Early 2000s: The Era of Network Worms and Mobile Malware

Links:

GDPR | GDPR Guidance and Resources

The Rise of loT Attacks: Endpoint Protection

DORA Regulation

NIS2 Directive | SANS NIS2 Resources

Let’s Stop Blaming Users For Our Bad Security Design

'After two decades in the cybersecurity industry, I have never been bored'

The Perfect Worm

10th Anniversary of the World's first Mobile Malware 'Cabir'

Maliciously Mobile: A Brief History of Mobile Malware

Ronald Reagan's famous speech: ‘I'm from the government and I'm here to help.’ 

Contact:

Have questions or comments? Email us at ciso-network@sans.org

20 Dec 2024Countering Ransomware with Jen Ellis00:41:48

In this episode, Ciaran and James meet Jen Ellis, founder of NextJenSecurity, to discuss the pervasive threat of ransomware, the power of cyber security advocacy and importance of security best practices. Jen shares her expertise on humanising security and working with governments to build robust defenses against cyber attacks. 

Highlights:
 
[3:00]
Overview of Jen’s achievements and engagements
[8:30] Legislating Cyber Crime
[11:00] Notable Ransomware Attacks
[18:00] Ransomware Task Force
[21:00] Global Counter Ransomware Initiative
[23:30] Debating Ransomware Payments
[26:00] Current Concerns
[30:00] Cybersecurity Collaboration

Links:

Rapid7 | Center for Cybersecurity Policy
National Cyber Strategy 2022 policy paper
Distilling Cyber Podcast
Jen testifying to the Senate on cyber crime [1:08:00 onwards]
DMCA exemption for security research
Department of Justice policy on Computer Fraud and Abuse Act
German Hospital Attack: Details of the attack.
Colonial Pipeline: Incident overview | White House remarks| CISA analysis
HSE Attack: Incident details | Post-incident review.
JBS Attack: BBC report.

Contact:

Have questions or comments? Email us at ciso-network@sans.org

27 Dec 2024Bridging the gap with Frank Kim00:34:38

In this episode, Ciaran and James welcome their first guest from the SANS Institute, Frank Kim, to share insights on bridging the gap between cybersecurity and business leadership. Frank unpacks why cybersecurity is often overlooked by business leaders and discusses effective strategies to elevate its importance in boardrooms and beyond.

Highlights:

[4:30] Cyber on the World Stage
[12:00]
Dispelling FUD and Finding What Resonates

Links:

Crowdstrike Outages
Fear, Uncertainty, and Doubt (FUD)

Contact:

Have questions or comments? Email us at ciso-network@sans.org

03 Jan 2025Breaking Barriers with Helen Rabe00:38:28

In this episode, Ciaran and James sit down with Helen Rabe, CISO for the BBC, to discover the challenges of breaking into the industry and her experiences leading security for one of the world’s largest broadcasters. Helen shares her expertise as a certified industry leader, discussing the rising tide of personal liability for CISOs and the intense media scrutiny that comes with managing incident responses in the public eye. 

Highlights: 

[8:30] The Evolution of Organizational Security Postures
[11:00]
CISOs and Personal Liability
[18:00]
The Challenges of Media Scrutiny in Incident Response

Links:

Why more transparency around cyber attacks is a good thing for everyone
The History of the General Data Protection Regulation
Impact of the GDPR on Cyber Security Outcomes
Backstory Of The World’s First Chief Information Security Officer
Former Uber security chief convicted for concealing a felony | Sentencing
SEC Charges SolarWinds and CISO with Fraud | Case Dismissed
MOVEit hack: BBC, BA and Boots among cyber attack victims
CL0P Ransomware Gang Exploits MOVEit Vulnerability
EDS, an HP Company 'Cat Herders' video 

Contact:

Have questions or comments? Email us at ciso-network@sans.org

10 Jan 2025The Booming Business of Cyber Crime with Geoff White00:38:29

In this episode, Ciaran and James sit down with investigative journalist and author, Geoff White, to explore the booming business of cyber crime. Geoff sheds light on this murky criminal underworld, its far-reaching consequences, and how cybersecurity has evolved in the public eye.

Highlights:

[1:30] Overview of Geoff’s notable work
[4:00] Cybersecurity in the Limelight
[10:15] Transformative Hacking Stories
[20:00] Global Cyber Criminals Overview
[30:00] Gripping Stories Covered by Geoff in his latest book, Rinsed
[45:00] National Crime Agency Efforts

Links:

Crime Dot Com - Crime Dot Com
The Lazarus Heist - Podcast | Book
Rinsed - Rinsed
World Economic Forum on Misinformation | World Economic Forum Annual  Meeting 2024
AlphaBay Shutdown
Snowden Leaks: The Guardian| BBC News
Anonymous Hacking: Britannica on Anonymous
Sony Pictures Entertainment Hacking: Vox | CCDCOE
Nation State Hackers: Nation State Hackers
Organized Cybercrime: Rise of Ransomware
Hacktivists: Hacktivism
Axie Infinity Hack: The Block
Tornado Cash: US DoJ | FBI
Money Laundering Sisters from Bury: GMP News | Bury Times
NCA on DDoS Attacks

Contact:

Have questions or comments? Email us at ciso-network@sans.org

17 Jan 2025FUD Special00:35:24

In this special bonus episode, Ciaran and James tackle one of their favorite cybersecurity acronyms: FUD – Fear, Uncertainty, and Doubt. Here our hosts break down what exactly FUD means for cybersecurity, why it matters, and the real-world risks it presents. 

Highlights:

Notable Example of FUD

- The Killer Drones story; FUD in action and then retraction

- Highlights from the RAeS Future Combat Air & Space Capabilities Summit

- BBC article on viral report 

Malware attacks 

- WannaCry Guidance for Users | NHS Case Study on WannaCry

- Lessons from the Colonial Pipeline Attack

- CFR Analysis of the Shamoon Attack | BBC Coverage of Shamoon Attack

Accidental IT failures

- UK Air Traffic Control Technical Failure: confusion over two DVLs. 

- BBC Report on ATC Failure | Regulator Review Following ATC Technical Failure

 The Ultimate FUD phrase

- Leon Panetta's Cyber Pearl Harbor Warning; fostering a climate of fear about the catastrophic consequences of cyber warfare.

- Panetta’s Speech on Cyber Threats | BBC Coverage of Panetta's Warning

Dousing the FUD Flames

- Ian Levy's Magic Amulet Speech to cyber security vendors in which he accused them of selling medieval witchcraft to the public. 

- The Register on Ian Levy's Speech

‘The World’s First Cyber Weapon’

- Stuxnet Computer Virus; the infamous worm aimed at Iran's nuclear facilities

- BBC Overview of Stuxnet | Kaspersky Resource on Stuxnet


Additional Resources:

- BBC Full Dossier on Iraq | Transcript of Andrew Gilligan's original report

- BBC Report on Iraq Dossier Controversy

Contact:

Have questions or comments? Email us at ciso-network@sans.org

31 Jan 2025Series One Roundup00:26:47

In this bonus episode, Ciaran and James ring in the new year with a look back at the standout guests and thought-provoking topics from series one. They also take a sneak peek at what 2025 holds for the ever-evolving world of tech security.

And to top it off, there’s a special announcement to chase away those January blues.

Highlights:
Typhoon Variants
Ciaran and James take a look at developing cyber threats from China, including:

New year, new legislation
As the U.S. pulls back on regulation, other nations are strengthening their
cybersecurity laws.

Additional Resources:

Cyber Leaders Series One Episodes
The myth of the 8-character password
Lazarus Heist: The intercontinental ATM theft that netted $14m in two hours
Cyber Threat Conference

Contact:

Have questions or comments? Email us at ciso-network@sans.org

Enhance your understanding of Cyber Leaders with My Podcast Data

At My Podcast Data, we strive to provide in-depth, data-driven insights into the world of podcasts. Whether you're an avid listener, a podcast creator, or a researcher, the detailed statistics and analyses we offer can help you better understand the performance and trends of Cyber Leaders. From episode frequency and shared links to RSS feed health, our goal is to empower you with the knowledge you need to stay informed and make the most of your podcasting experience. Explore more shows and discover the data that drives the podcast industry.
© My Podcast Data