Podchaser Logo
Home
mnemonic security podcast

mnemonic

mnemonic security podcast

A Technology, Business and News podcast
Good podcast? Give it some love!
mnemonic security podcast

mnemonic

mnemonic security podcast

Episodes
mnemonic security podcast

mnemonic

mnemonic security podcast

A Technology, Business and News podcast
Good podcast? Give it some love!
Rate Podcast

Best Episodes of mnemonic security podcast

Mark All
Search Episodes...
For this episode, Robby is once again joined by Eoin Wickens, Technical Research Director at HiddenLayer, an organisation doing security for Machine learning (ML) and Artificial Intelligence (AI). It is not too long ago since Eoin last visited
Data Brokers and Data Removal ServicesWhat does the process of removing your online presence look like? And how would you handle the data brokers that have collected your personal information with just a few clicks of the mouse to sell to other
For this episode, Robby is joined by Levi Gundert, Chief Security Officer at the cybersecurity company Recorded Future and author of the book The Risk Business – what leaders need to know about intelligence and risk-based security.Levi shares f
Ethical social engineeringEven the best pentesters out there can be fooled by a social engineering attempt under the right circumstances. But how do we treat the ones that have been tested and failed?Ragnhild «Bridget» Sageng, Senior Security A
How will AI impact the next generation of people working with computer science?This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help him nav
How does cybersecurity play a part in ensuring food security?As part of the ISACA series of the mnemonic security podcast, we’re welcoming Karianne Kjønås, Cyber & Privacy Associate at PwC Norway. Karianne recently won the ISACA master’s thesis
Conflictual coexistenceToday’s guest, Raymond Andrè Hagen, holds over 20 years of experience in cybersecurity and information security, and is currently researching advanced persistent threats for his PhD in Computer and Information Systems Sec
To join Robby for this episode on Russian cybercrime and ransomware, we’re welcoming Sam Flockhart, Cyber Threat Intelligence Manager at Santander UK.Sam has a background in military intelligence from the British army, where he has spent a larg
MetaversesHave you been to the metaverse yet? And are you among the 78% that believe the metaverse will provide a significant value to their organisation in the future?To join Robby for this episode, we’re welcoming Julia Hermann, Senior Techno
Defending EVE OnlineHow does combatting botting, hacking, and fraud in a virtual game relate to fighting real cybercrime?To share his take on this, Maksym Gryshchenko joins us to share how he works as a Security analyst at CCP Games, a leading
Last year, threat researchers all over the world got a sneak peek into the inner workings of the Russian defence contractor NTC Vulkan. The Vulkan files leak provided an interesting behind the scenes look at Russian cyber capabilities and scala
Cryptology is fundamental for the way the internet works today. But what exactly is modern cryptology, and what are the most common areas in which it’s being used?To guide us through this complex area, Robby’s joined by Bor de Kock, PhD. in Cry
Physical penetration testing | ISACA seriesFor this episode that is part of our ISACA series, we’re joined by Rob Shapland, Ethical Hacker/Head of Cyber Innovation at Falanx Cyber.Rob talks about what he’s learned from his 15 years of testing p
Artificial intelligence (AI) and machine learning (ML) models have already become incorporated into many facets of our lives. In this episode, we discuss what happens if these models are attacked.How can the models that AI and ML are built upon
What do you really know about your vendors? And about your vendors' vendors?To talk about supply chain attacks, and how to best mitigate and meet these risks, Robby is joined by a pair with a lot of experience on this topic: Roger Ison-Haug, CI
How to succeed with bug bountiesResponsible disclosure and vulnerability reporting have come a long way in recent years, and have gone from being feared and even something you took legal action against, to something that is appreciated for its
Influencing the boardWhat are some of the most effective methods of gaining a board’s support, and how do you maintain this trust and improve it over time?Our guest today has worked with a lot of boards, and joins us to share his experiences pr
KraftCERT trusselvurdering 2023 | In Norwegian onlyOur podcast guest this week is Espen Endal, previous mnemonic colleague and currently OT Security Analyst at the Norwegian energy sector CERT: KraftCERT/InfraCERT.InfraCERT is an ISAC (Informat
Avoiding overload and managing stress in cybersecurityFor today’s episode, Robby’s joined by Lisa Ventura, Cybersecurity Specialist, Author, and qualified Mental Health First Aider. After many years of experience from the industry, she’s become
Asset IntelligenceImagine a scenario where your organisation discovers that a threat actor currently possesses more knowledge about your environments than you do. Let’s find a way to make sure we don’t end up there - but how?For this episode, R
Operationalising Threat IntelligenceWhat can you do to get the most out of your threat intelligence initiatives?A good place to start, is picking Kyle Wilhoit’s brain. Kyle’s the Director of Threat Research at Palo Alto Network's Unit 42, and a
Crypto FinanceHow does a crypto finance agency work with security?To answer this question, and provide insight into security in the world of crypto, we’re joined by Dr. Dominik Raub. He has more than 10 years of experience from the financial in
Office IoT Can you say for certain that you have a full overview of the IoT devices that are set up in your office environment? Smart Lighting, thermostats, locks, appliances, security cameras, sensors... perhaps even a fish tank? To talk about
Passwords and their managersHow do you create your passwords? Do you get help from a password manager, or is your personal “system” bulletproof?Robby has invited two guests passionate about passwords, and how we manage them. Not surprisingly, t
DarkwebsMost of us have our ideas and perceptions of what the Dark Web is. But could it be more than just the dark side of the World Wide Web? To talk about the Dark Web, Robby is joined by Keven Hendricks, Dark Web Subject Matter Expert at The
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features