Share

THE S.COM PODCAST

Powered by Core to Cloud


Latest episode

  • 9. Unveiling the Illusion of Security Preparedness

    51:16
    This episode explores cyber threats and the misconceptions surrounding security preparedness. Kelly and Andy go beyond discussing the latest cyber threats or the advanced techniques employed by hackers.It's also about understanding how past cyberattacks, such as the 1999 attack on NASA, can teach us valuable lessons about cybersecurity preparedness in the era of cloud computing.Tune in now! ---------------------------------------------------------------------------------------------------Chapters: 00:00 Introduction and Background07:27 Cloud Security Posture23:16 The Importance of Detection Capabilities30:13 The Evolving Nature of Cybersecurity and the Need for Continuous Learning39:36 Career Opportunities in Cybersecurity46:09 Engaging with the Cybersecurity Community---------------------------------------------------------------------------------------------------Key Takeaways:1: Danger of Security Illusions: The NASA cyber attack in 1999 shows the risks of overestimating security preparedness.2: Cloud Security: Effective cloud security requires a mindset shift, best practices, and third-party tools.3: Detection Capabilities: Uncovering unknown vulnerabilities and backdoors despite compliance is essential.4: Talent Shortage: Upskilling and leveraging automation/AI are needed to address the cybersecurity talent gap.

More episodes

View all episodes

  • 8. Navigating Insider Threats with Human Intelligence

    01:09:18
    Join Kelly as she sits down for an illuminating conversation with none other than James Moncrieff, the Global Cyber Risk Lead at GFK, who shares his journey from being a police officer to transitioning into the information security field. The two discuss James' childhood dream of becoming a firefighter and how he accidentally ended up in the police force. James also highlights his challenges in entering the cybersecurity industry and the importance of persistence and self-belief. In this conversation, James discusses the importance of understanding the risk of shadow IT and the need to shift from a culture of exception to accountability in cybersecurity. He highlights the complexity of insider threats and the different types of insiders that businesses must be aware of. James also stresses the limitations of security controls and the importance of preventing small attacks from escalating. He explains the role of human intelligence in cybersecurity and the process of sanitising intelligence for protection. Finally, we explore the importance of creating a culture of trust and protection and the opportunities available in cybersecurity.
  • 7. How to Advance Diversity and Inclusion in Tech through AI Innovation

    56:52
    SummaryIn this episode, Kelly meets with Jamie McAnsh, who shares his inspiring journey from a challenging childhood to becoming a successful entrepreneur and speaker. Jamie discusses the importance of overcoming obstacles and finding purpose in life. We also explore AI's potential for promoting inclusion and levelling the playing field for individuals with neurodiversity. In this conversation, Jamie discusses the use of AI in communication and writing, highlighting its benefits in improving efficiency and inclusivity. He emphasises the importance of embracing diversity in problem-solving, particularly in industries like cybersecurity. Jamie also explores the role of AI in idea generation and the potential for AI to create more opportunities for diverse talent. He addresses the challenges of ensuring ethical and unbiased AI and emphasises the need for diverse people to monitor and input non-biased information. The episode concludes with Jamie's advocacy for a work environment that values and invests in its employees, promoting equity over equality.TakeawaysAI can be a valuable tool in communication and writing, improving efficiency and inclusivity.Diversity is crucial in problem-solving, particularly in industries like cybersecurity.AI can enhance idea generation and provide opportunities for diverse talent.Ensuring ethical and unbiased AI requires a diverse group of people to monitor and input non-biased information.A work environment that values and invests in its employees promotes equity and creates a better future.Chapters00:00 Introduction and Background06:41 Overcoming Challenges and Finding Purpose28:16 The Use of AI in Communication and Writing31:12 The Role of Diversity and Inclusion in Problem Solving36:11 The Benefits of AI in Problem Solving and Idea Generation37:57 Ensuring Ethical and Unbiased AI47:02 Creating a Better Work Environment through Diversity and Equity52:51 The Importance of Equity over Equality55:31 The Future Outlook for Diversity and Tech
  • 6. Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers

    01:02:47
    SummaryJoin Lisa Ventura, founder of Cybersecurity Unity, as she takes us on a journey through the dynamic world of cybersecurity. In this episode, Lisa delves into:Her personal journey into cybersecurity and the vital role of collaboration and information sharing.The impact of generative AI on cybersecurity, focusing on the challenges of identifying phishing emails and addressing biases in AI-generated content.The importance of early education and awareness in safeguarding individuals from cyber threats.Addressing the gender gap in cybersecurity and advocating for inclusivity and diversity.Lisa's insights on neurodiversity and how it can be a superpower in the cybersecurity field.This enlightening conversation covers a wide array of topics, including workplace challenges, managing stress, overcoming imposter syndrome, and identifying narcissistic personality traits. Tune in to gain valuable insights into creating inclusive work environments and enhancing communication in interviews.
  • 5. Navigating the Frontlines of Cybersecurity:

    48:31
    Chris Hodson shares his journey into cybersecurity, driven by curiosity and a passion for understanding how things work. He emphasises the importance of gaining visibility and control in today's interconnected landscape. Chris also discusses the integration of AI in cybersecurity and the need for security products to solve real problems. He highlights the significance of effective communication and the need to bridge the gap between technical jargon and business understanding. The conversation covers various topics related to cybersecurity, including crisis simulation, the importance of understanding the business impact of cybersecurity, cloud security, effective communication to leadership, and the future of cybercrime. The key takeaway is the need for cybersecurity professionals to focus on the 'why' of cybersecurity solutions and to effectively communicate the business risks and impact to leadership. Additionally, there is a need for scenario-oriented and frequent security education and a focus on foundational strategies for managing and monitoring the cloud.
  • 7. Women Leading the Way in Cybersecurity

    50:58
    Gonxhe and Ilvana from Sense Cyber Research Centre share their inspiring journeys into the cybersecurity industry. They talk about the importance of having more women in cybersecurity and provide practical tips to bridge the gender gap. They also discuss the challenges women face in the industry and offer strategies to overcome barriers to entry. The conversation encourages critical thinking and inspires women to join the field.
  • 4. The Crucial Intersection of Community and Cybersecurity

    48:28
    In this conversation, Kelly Allen and Stephen Mann discuss the importance of community in cybersecurity. They explore the challenges of building diverse and inclusive communities, the role of community in building resilience, and the benefits of sharing experiences and knowledge within a community. They also discuss the challenges of networking and vendor experiences at events and explore potential solutions to improve these interactions. In this conversation, Kelly Allen and Stephen Mann discuss various topics related to personal routines, communication, transparency in business, the future of community in cybersecurity, supporting others in the cybersecurity community, and the reasons to join the cybersecurity industry.TakeawaysDiversity, equity, and inclusion are important in cybersecurity, and there is a growing pool of diverse talent ready to enter the field.Community plays a crucial role in building resilience in cybersecurity, providing support, knowledge sharing, and opportunities for growth.In-person interactions and networking are still valuable in the digital age, as they allow for deeper connections and more meaningful conversations.Creating inclusive and collaborative events can help overcome challenges in networking and vendor experiences, fostering a sense of community and providing value for participants. Having a consistent bedtime routine can contribute to better sleep and overall well-being.Managing personal commitments and communication can be challenging, but setting boundaries and being transparent can help.Transparency and honesty in business are important for building trust and maintaining strong relationships.The future of community in cybersecurity involves providing diverse and accessible opportunities for learning and networking.Supporting and helping others in the cybersecurity community is crucial for personal and professional growth.The cybersecurity industry offers diverse career opportunities and the chance to make a meaningful impact in society.Chapters00:00 Introduction and Background03:09 Diversity and Inclusion in Cybersecurity10:25 The Importance of Community in Cybersecurity16:10 Building Resilience through Community21:55 The Challenges of Building and Engaging Communities28:53 Creating Inclusive and Collaborative Events35:45 Improving Networking and Vendor Experiences40:36 Bedtime routines and personal schedules41:22 Managing personal commitments and communication42:09 Transparency and honesty in business43:34 The future of community in cybersecurity49:49 Helping and supporting others in the cybersecurity community53:29 Why join the cybersecurity industry54:37 Contacting Stephen Mann