Discover
Secure Insights

Secure Insights
Author: Sennovate
Subscribed: 3Played: 18Subscribe
Share
© Sennovate
Description
Get. Set. Secured.
In this ever-changing digital world, here is the ultimate podcast channel "Secure Insights" by Sennovate where relevant cybersecurity insights are shared, where we welcome industry experts, influencers, and leaders from the cybersecurity sector to talk on specific topics and offer knowledge to educate individuals in the cybersecurity world that will help you to stay safe and secure.
Sennovate is a global Managed Security Services Provider (MSSP) that specializes in Identity and Access Management (IAM).
In this ever-changing digital world, here is the ultimate podcast channel "Secure Insights" by Sennovate where relevant cybersecurity insights are shared, where we welcome industry experts, influencers, and leaders from the cybersecurity sector to talk on specific topics and offer knowledge to educate individuals in the cybersecurity world that will help you to stay safe and secure.
Sennovate is a global Managed Security Services Provider (MSSP) that specializes in Identity and Access Management (IAM).
33 Episodes
Reverse
In this episode, we sit down with Jim Rutt, CISO at The Dana Foundation, to address one of the most pressing challenges in cybersecurity: the overwhelming number of tools and products in today’s landscape.
This candid conversation explores:
Why the rapid growth of cybersecurity tools is causing more confusion than clarity.
Common pitfalls organizations face when managing multiple products.
How Managed Security Service Providers (MSSPs) can simplify security operations.
Best practices to streamline cybersecurity toolsets for efficiency and effectiveness.
Whether you're a CXO, a startup founder, or simply passionate about cybersecurity, this episode offers actionable insights to help you cut through the noise and focus on what truly matters.
💡 Tune in for practical advice and strategies to navigate the complex world of cybersecurity products!
Join us for a captivating discussion with Keith Duemling, Senior Director of Cybersecurity Technology Protection at Cleveland Clinic. With over 20 years of experience in the field, Keith offers invaluable insights into the evolving world of cybersecurity.
In this episode, we delve into:
The intersection of technical and enterprise risk perspectives
Implementing robust cybersecurity strategies in complex healthcare environments
Staying ahead of emerging threats and vulnerabilities
The importance of collaboration between technical experts and business leaders
The role of emerging technologies in cybersecurity
Real-world examples of cybersecurity incidents and their impact
Whether you're a cybersecurity professional, a business leader, or simply interested in learning more about this critical topic, this episode offers valuable insights and practical advice.
Tune in now to gain a deeper understanding of the complex landscape of cybersecurity and discover how to protect your organization from emerging threats.
In this episode, we delve into the critical world of healthcare cybersecurity with industry expert, Vikrant Arora. As cyber threats continue to evolve, healthcare organizations face unprecedented challenges in protecting sensitive patient data and ensuring the safety of medical devices.
Join us as we explore the most pressing cybersecurity issues in healthcare, from the risks posed by connected medical devices to the complexities of safeguarding patient privacy in the age of telehealth. Vikrant shares invaluable insights on protecting against phishing attacks, managing security patches, and securing legacy medical equipment. We also discuss the intersection of healthcare cybersecurity and public health, as well as the role of AI in revolutionizing the industry.
Get ready to navigate the cybersecurity maze with us and discover how to safeguard the future of healthcare.
In this episode, we will explore the unprecedented Microsoft-Crowdstrike outage which shook the tech world!
Join us as we break down this complex event with industry leaders Arun Kumar Krishna, CTO at Sennovate and Anthony Garcia, Vice President, Sales at Sennovate.
From root causes to potential solutions, we explore the implications of this incident on businesses and individuals alike.
Tune in as we unravel the mystery behind the Microsoft-Crowdstrike outage!
#Microsoft #Crowdstrike #Sennovate
In this episode, we explore the critical world of application security with expert Derek Fisher. We break down the fundamentals - what it is, why it matters - and delve into the evolving landscape of threats and vulnerabilities.
Derek shares actionable insights on how organizations can protect themselves, including secure coding practices, DevSecOps integration, and compliance considerations. He also showcases real-world examples of the impact strong application security can have.
Listen in to learn:
The importance of application security for businesses and individuals
The latest trends shaping the AppSec landscape
How to combat today's biggest application threats
Secure coding principles for developers
The benefits of DevSecOps for application security
How compliance regulations like GDPR and HIPAA impact AppSec
Inspiring case studies of successful application security measures
What the future holds for application security
This episode is for you if:
You're interested in cybersecurity and data protection
You work in IT, development, or application management
You want to understand the importance of secure coding
You're curious about DevSecOps and its role in application security
You're concerned about compliance regulations and data privacy
🔒 Dive into the Cloud with Shobhit Mehta!
Join us on our new podcast dedicated to Cloud Security & Compliance. Shobhit, the Security & Compliance Director at Headspace, unravels the complexities of digital security.
Listen now for in-depth insights and discussions.
🎙️🔒 Ready to arm yourself against digital threats?
🎧 Tune in now to catch "Social Engineering: The Silent Threat Lurking in Your Digital Life." In this power-packed 23-minute session, Perry Carpenter, Chief Evangelist, and Strategy Officer at KnowBe4, shares real-world examples, expert insights, and practical tips to safeguard your digital presence.
🗣️ Join Perry as he unravels the secrets of social engineering and equips you with tools to fortify your defenses against cyber-attacks. Whether you're a professional or simply concerned about your online security, this episode is a must-listen!
Don't miss out on the chance to stay one step ahead of the ever-evolving digital landscape. 🚀🌐 Tune in now and empower yourself with knowledge to outsmart cyber threats!
Join us for an informative and engaging discussion with Professor Jon Garon as we delve into the alarming trend of data breaches in the healthcare industry.
Discover the latest strategies and techniques to protect your patient's data and reduce the risk of catastrophic security breaches.
In this captivating Part 2 of our podcast series, we equip you with the necessary skills to protect your organization from cyber threats, and safeguard your patient's sensitive information.
⚠️ From Small Breaches to Big Risks: The Urgent Need for Cybersecurity in Healthcare!
Introducing Part 1 of our eye-opening podcast episode on healthcare data breaches, featuring our guest speaker Jon Garon, Director of NSU Law's IP, Cyber, and Tech Program.
Discover the shocking reality of the rising threats facing healthcare providers, and crucial tips for protecting your patients' data.
A must-listen podcast - tune in now to stay ahead of the game!
Are you ready to bounce back from a cyber crisis?
In our latest and final episode of the Cyber Mayday Trilogy: Recover from the Cyber Mayday, experts share tips on how to recover and secure your business after a cyber attack.
Listen to Dan Lohrmann, CISO at Presidio and Senthil Palaniappan, CEO of Sennovate, as they discuss the critical steps organizations should take to minimize damage and regain control after a cyber incident.
Take charge of your cyber security journey with this must-listen podcast.
#cybersecurity #podcast #informationsecurity #cyberawareness #listennow #SecureRecovery #Sennovate
Preparing is half victory; Managing it is the other half!
The next episode of the Secure Insights podcast with Dan Lohrmann, CISO at Presidio is finally here- #CyberMaydayTrilogy Part 2: Manage the Cyber Mayday
In this second part, Dan will be discussing the importance of having a solid incident response plan in place, and how to effectively manage the aftermath of a cyber attack, tune in now.
Make sure you stay till the end for some exclusive tips by Dan on how to minimize the damage caused by a cyber attack.
Hackers are everywhere, it's time you stay prepared! 👾
Attention all cyber security professionals and enthusiasts, the highly anticipated latest episode of the Secure Insights podcast with Dan Lorhmann is finally here- #CyberMayday Part 1.
In this first part of the Cyber Mayday Trilogy, Dan will be sharing valuable insights and strategies on how to prepare for and respond to devastating cyber attacks.
Take advantage of all the crucial information, tune in now and stay tuned for parts 2 and 3 of the series.
There's more to come!
Social engineering attacks can be devastating for businesses. Don't let your organization fall victim to these cleverly disguised threats. Learn how to recognize and protect against common tactics like phishing, baiting, scareware, impersonation, and physical manipulation.
Don't fall for the tricks!
Protect yourself from social engineering attacks by staying aware and vigilant.
Get live insights in our podcast about Social Engineering with Mike Crandall
Much of the time, entrepreneurs are so busy with their day-to-day operations that they don’t have the time to architect scalable and secure IAM infrastructure.
It’s important to plan ahead. To build a platform that can scale with your business, without breaking your budget.
Using open source technology, we can help you build an easy to manage and cost-effective IAM system that can scale infinitely!
Get live insights in our podcast about IAM for startups with Kirk Sullivan
We hosted a Twitter Spaces event to celebrate Techies Day. What we talked about
The latest cybersecurity trends
See how next-generation technology can help with cybersecurity.
How can you protect your organisation from internal and external threats? and
We discussed all things tech and cybersecurity with our Sennovate techies.
Our most recent podcast, "Build secure open-source software with a security first approach," is now Live!!
Open source software can assist you in solving problems and improving your product for everyone, but it can also introduce vulnerabilities. Understand these risks and how to mitigate them throughout the development life cycle.
Let's listen to our guest speaker Santosh Yadav as he explains and educates us about the field
This podcast is all about the growing importance of cyber security in the Education Sector by Kirk Yamamoto, Regional Manager, College Technology Services at Los Angeles Community College District.
This podcast is all about the role of Identity and Access Management in Cloud Security with our returning speaker, Greg Foss, Principal Cloud Security Researcher at Lacework Labs.
We will discuss:
Start: 0:00
Preview: 0:10
Intro of the podcast: 1:10
What role does IAM play when it comes to protecting cloud assets from cybercrime: 1:54
How is the shift to cloud changing the way organizations implement IAM: 3:43
Suggested Resources to implement IAM and steps to get it enforced in the cloud: 5:55
How cybercriminals are abusing IAM to access the cloud resources: 8:09
Tools and techniques to help understand IAM cloud posture: 10:45
One thing all organizations are lacking while implementing IAM in Cloud: 18:16
Important governance rules that play an important role in Cloud space: 20:01
End: 22:03
This episode is Part 2 of the Cyber Insurance podcast and how you can use it to protect your businesses from cyber-attacks. Hear all about Cyber Insurance from Jim Rutt, the Chief Information Officer of Dana Foundation, an IT Strategist, and a leader with expertise in developing complex IT solutions.
Key Discussion Points:
In what situations does Cyber Insurance not cover you?
Will your Cyber Insurance protect you if an employee cost the attack?
Can Cyber-risks modelling be flawed?
and many more..
Start: 0:00
Growth of Cyber Insurance: 0:02
Intro of the podcast: 0:57
Situations Cyber insurance does not cover you: 1:42
Examples of the situations: 2:39
Will your Cyber Insurance protect you if the employee cost the attack: 5:32
Quantify Cyber risks in financial terms: 6:57
Can cyber risks modelling be flawed: 10:54
How big is the Cyber Insurance market: 13:21
Future of Cyber Insurance: 15:21
End: 18:05
So, let's get started!
This episode is all about Cyber Insurance and how you can use it to protect your businesses from cyber-attacks. Hear all about Cyber Insurance from Jim Rutt, the Chief Information Officer of Dana Foundation, an IT Strategist, and a leader with expertise in developing complex IT solutions.
Key Discussion Points:
Who needs Cyber Insurance?
Benefits of Cyber Insurance.
Choosing the right Cyber Insurance Partner.
So, let's get started!
Comments