Reduce Cyber Risk Podcast - Cyber Security Made Simple

Auteur(s): Shon Gerber vCISO CISSP Cyber Security Consultant Author and Entrepreneur
  • Résumé

  • Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Threat, Operational Technology (OT) Security, Cyber Security Awareness Training, Cyber Security Training for Employees, Cyber Security Courses for the CISSP, and much, much more. You will receive immediate and actionable information that you can put into practice immediately to protect your business, no matter the size. Need direct and immediate assistance, Shon can also provide you with his “high touch” consulting approach with his various cyber security services.

    © 2025 Reduce Cyber Risk Podcast - Cyber Security Made Simple
    Voir plus Voir moins
Épisodes
  • RCR 157: Strategic Fortification Against Cyber Intrusions - Understanding the Fundamentals
    Jan 21 2025

    Uncover the secrets to mastering cybersecurity amidst a booming demand for IT professionals. Join me, Shon Gerber, as we tackle the thrilling landscape of tech opportunities, where U.S. tech unemployment has reached a two-year low. Discover how certifications like CompTIA can launch your career in this high-stakes field, and learn why experience is becoming more critical than formal degrees in certain roles. We also spotlight hiring trends at industry giants like Amazon and Deloitte, showing why now is the perfect time to step into the world of IT and cybersecurity.

    Dive into the mind of a cyber attacker as we dissect their motivations, from government-backed nation-state operatives to curious script kiddies. Understanding these varied personas and their goals is vital for businesses safeguarding valuable intellectual property. We explore the financial, social, and disruptive motives driving cyber threats, shedding light on the broader implications for global financial stability as highlighted by the International Monetary Fund. This knowledge is crucial for businesses to develop strategies that fortify their defenses against potential cyber threats.

    Prepare yourself for potential cyber threats with strategies inspired by elite air-to-air combat training. Specialized training, operational exercises, and robust cybersecurity frameworks like NIST CSF and ISO 27001 are essential to bolstering your organization's security posture. We emphasize the critical need for comprehensive business resiliency plans and well-developed incident response strategies. Equip yourself and your team with the necessary tools and know-how to withstand cybercriminals, ensuring your digital defenses are more formidable than ever before.

    Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

    Voir plus Voir moins
    43 min
  • RCR 156: Navigating Cybersecurity: From B-1 Bomber WSO to CISO at Global Multi-National Corporation
    Jan 15 2025

    From the cockpit of a B-1 bomber to the nerve centers of global cybersecurity, I, Shon Gerber, invite you to explore the thrilling transition that shaped my career and mission. Discover the unexpected parallels between flying high-stakes missions and safeguarding billion-dollar enterprises from cyber threats. This episode offers a personal narrative of my journey, highlighting my experiences on the US Air Force Red Team and the critical role these played in forging a path into the world of cybersecurity. You'll hear about the moments that defined my career, my insights on balancing family life, and my commitment to making cybersecurity accessible and effective for businesses everywhere.

    Join me as we navigate the complex challenges of managing security for a Koch Industries company, where I held the reins as Chief Information Security Officer. Learn how I tackled the intricacies of protecting intellectual property and global operations, and why I believe that preparedness is the strongest defense against cyber threats. We'll discuss my transition to consulting, my teaching experiences at Wichita State University, and the pressing need for businesses to fortify their defenses against hackers. Through this episode, I aim to empower you with the knowledge and tools to reduce cyber risks, ensuring your organization's resilience in the face of potential attacks.

    Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

    Voir plus Voir moins
    23 min
  • RCR 155: Identity Unlocked: Unraveling Identity Management (Domain 5)
    Oct 16 2023

    Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. We'll tackle the big three – identity management, federated identity management, and credential management systems. Believe me when I say, by the end, you'll be navigating these concepts like a pro!

    Are you ready to discover the true value of identity and access management? We all know security is paramount, but have you considered the benefits to productivity, user experience, and cost savings? Let's uncover these hidden perks together! The aim isn't just to understand but to utilize this knowledge effectively. We'll discuss the crucial importance of timely user removal and how to tackle challenges head-on when the system breaks. The big bonus? We'll also dig into how IAM aids in meeting those pesky compliance requirements and how automating processes can really save you a penny or two.

    No cybersecurity journey would be complete without a deep dive into SAML, OAuth2, and OpenID Connect. Sounds complicated? Not for long! I'll be your guide as we examine these protocols and their roles in transferring authentication and authorization data. By the end, you'll understand SAML assertions, OAuth2's tokens, and how OpenID Connect is built on top of OAuth2. And, because we believe in value beyond theory, we'll explore real-world examples too. But that's not all! Stick around as I share how you can access free CISSP questions online and why joining the CISSP cyber training community is a game-changer. So, are you ready to revolutionize your understanding of identity and access management? Let's rock and roll!

    Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

    Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

    Voir plus Voir moins
    39 min

Ce que les auditeurs disent de Reduce Cyber Risk Podcast - Cyber Security Made Simple

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.