This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Cyber Security Effectiveness Podcast

By Mandiant Security Validation (formerly Verodin)

Cybersecurity experts from around the globe share experiences around their journey to increase security effectiveness. Do boards and business leaders understand the risks? Is security improving? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions.

  1. 1.
    Mandiant Security Effectiveness Report Takeaways and Predictions05/08/2020
    1:18:35
  2. 2.
    Mistakes That Linger04/06/2020
    24:54
  3. 3.
    Undergrad Experience04/06/2020
    13:31
  4. 4.
    Criminal Intentions04/06/2020
    24:08
  5. 5.
    The Value in Compliance04/06/2020
    23:50
  6. 6.
    The Path to Security Savviness04/06/2020
    21:18
  7. 7.
    The Automation Advantage for SOC04/06/2020
    22:17
  8. 8.
    Imagination Skills03/30/2020
    18:06
  1. 9.
    What Qualifies as Experience?03/30/2020
    21:21
  2. 10.
    Investing in the Right Relationship03/30/2020
    24:05
  3. 11.
    It’s All in the Evidence03/30/2020
    16:28
  4. 12.
    Addressing Talent Shortage with Abroad Education03/30/2020
    16:02
  5. 13.
    Women in the Workplace03/30/2020
    19:57
  6. 14.
    Keeping a Clear Focus: New Tech and Cyber Change03/30/2020
    18:27
  7. 15.
    No Quick Fix03/28/2020
    19:17
  8. 16.
    A Gamer’s Influence on DDoS03/28/2020
    28:25
  9. 17.
    Give and Take03/23/2020
    21:33
  10. 18.
    Conference Conversations03/23/2020
    18:44
  11. 19.
    Taking Control03/23/2020
    21:14
  12. 20.
    Plan and Recover03/23/2020
    20:36
  13. 21.
    Boost Your Security Confidence03/23/2020
    12:40
  14. 22.
    A Competitive Field03/21/2020
    19:29
  15. 23.
    Industries Alike03/21/2020
    25:11
  16. 24.
    The Demand for Soft Skills03/21/2020
    20:53
  17. 25.
    Maintaining Continuity in Critical Infrastructure03/16/2020
    24:03
  18. 26.
    Layers of Architecture03/16/2020
    19:51
  19. 27.
    Prison Breaking the System03/16/2020
    20:29
  20. 28.
    Bouncing Back: Advice for Minimizing Reputational Damage from a Breach03/16/2020
    23:20
  21. 29.
    Outside Experience03/13/2020
    22:45
  22. 30.
    Creating a Banking Ecosystem03/13/2020
    31:42
  23. 31.
    The Weakest Link03/13/2020
    17:55
  24. 32.
    From Breaking to Fixing03/13/2020
    20:25
  25. 33.
    People Skills: Making Change in the Community03/06/2020
    19:46
  26. 34.
    Psychology in Cyber03/06/2020
    21:08
  27. 35.
    Fast-Moving Threat Models03/06/2020
    18:13
  28. 36.
    The Evolving Educator03/06/2020
    24:47
  29. 37.
    Common Sense Risk Management03/06/2020
    19:59
  30. 38.
    The Dangers of Overlooking Medical Device Security03/06/2020
    21:50
  31. 39.
    Insightful Intelligence03/06/2020
    23:37
  32. 40.
    Find Your Tribe12/17/2019
    15:20
  33. 41.
    Model Application for the Evolving Threat Landscape12/03/2019
    16:24
  34. 42.
    Cloud Policy and Evolving Tools11/19/2019
    22:42
  35. 43.
    Cloud Migration: The Golden Rules11/05/2019
    23:45
  36. 44.
    A Teen’s Guide to Building Smart Cyber Habits10/07/2019
    9:16
  37. 45.
    If Not You, Then Who?10/03/2019
    17:35
  38. 46.
    Customer Trust in the Clouds10/01/2019
    17:12
  39. 47.
    The Wide World of Healthcare09/24/2019
    23:09
  40. 48.
    Fight Like You Train09/10/2019
    20:38
  41. 49.
    Strength in Numbers09/03/2019
    25:46
  42. 50.
    The Art of Cyber Deception08/15/2019
    17:17
  43. 51.
    Defending the State of Security07/30/2019
    17:47
  44. 52.
    Investing in the CISO07/16/2019
    15:51
  45. 53.
    Machine Learning & Automation: Trust But Verify07/02/2019
    19:43
  46. 54.
    The Supply Chain Ripple Effect06/18/2019
    26:11
  47. 55.
    The Power of Uncertainty in Cyber06/04/2019
    24:37
  48. 56.
    From the Ground Up05/21/2019
    23:58
  49. 57.
    Securing the Future Through Education05/14/2019
    25:32
  50. 58.
    A Proactive Approach to Incident Response04/30/2019
    25:21
  51. 59.
    Risky Business: Data Privacy and Compliance04/23/2019
    20:10
  52. 60.
    Safety Through Segmentation04/16/2019
    30:18
  53. 61.
    Blurring the Line Between Black and White04/02/2019
    24:51
  54. 62.
    A Case for Prioritizing Cybersecurity: A Litigator’s Perspective03/26/2019
    16:44
  55. 63.
    A Culture-Centric Approach to Managing Cyber Talent01/21/2019
    18:24
  56. 64.
    The Age of the Intelligent SOC01/03/2019
    19:10
  57. 65.
    A Higher Standard for Patient Safety12/06/2018
    13:05
  58. 66.
    Inside the Internet of Things (IoT)11/19/2018
    19:42
  59. 67.
    Budgets, Bureaucracies, and Behaviors11/05/2018
    20:51
  60. 68.
    Air Time with Dave Ockwell-Jenner10/19/2018
    18:44
  61. 69.
    Ada Lovelace, AC/DC, and Behavior Research09/17/2018
    13:34
  62. 70.
    Bang! A Chemical Reaction08/24/2018
    13:02

Listen to Cyber Security Effectiveness Podcast now.

Listen to Cyber Security Effectiveness Podcast in full in the Spotify app