CISO Guide: Cyber Resilience Titelbild

CISO Guide: Cyber Resilience

CISO Guide: Cyber Resilience

Von: Debra Baker
Jetzt kostenlos hören, ohne Abo

Über diesen Titel

Welcome to the CISO Guide to Cyber Resilience Podcast, your go-to resource for the latest in cybersecurity news, insights, and best practices. Hosted by Debra Baker, CISSP, CCSP, this podcast is designed to empower businesses and individuals with the knowledge and tools they need to stay ahead of evolving cyber threats. Each episode delves into real-world cyber incidents, explores the implications of emerging vulnerabilities, and provides actionable strategies to enhance your organization's cyber resilience. Tune in to stay informed, stay protected, and stay cyber resilient.Debra Baker
  • A CISO's Journey with David Gee
    Feb 13 2026

    Interview with the Aspiring CIO & CISO Book Author: Career Insights and Cybersecurity ChallengesIn this engaging episode, Debra interviews an accomplished author who has written several books aimed at aspiring CIOs and CISOs. The conversation covers the author's journey in writing his books, the inspiration behind them, and his career transition into retirement. They discuss the challenges and rewards of the CISO role, the evolution of cybersecurity, and the future impact of AI on the industry. The author shares valuable insights on mentoring, public speaking, and balancing career with personal life. Don't miss this in-depth discussion filled with practical advice and fascinating stories from the world of cybersecurity.

    00:00 Conversations with a CIO/CISO - Interview with David Gee

    00:30 Introduction

    00:46 Writing the First Book

    03:10 The Second Book Journey

    05:11 Working with Publishers

    08:49 The Third Book

    10:30 Retirement and Career Transition

    11:38 Consulting and Advisory Work

    12:48 Mentoring and Giving Back1

    7:19 Evolution of the CISO Role

    18:31 AI and Cybersecurity Challenges

    22:43 Favorite Stories from the Book

    26:49 Wrap Up

    Mehr anzeigen Weniger anzeigen
    28 Min.
  • Double Trouble: GitHub Secrets Leak + 3.2M Users Hit by Extension Hijack
    Apr 3 2025

    In this high-alert episode of CISO Guide to Cyber Resilience, hosts Debra Baker and Isabella Otero break down two massive supply chain cybersecurity threats shaking the industry:

    1️⃣ A GitHub Action compromise that leaked CI/CD secrets from over 23,000 repositories, exposing AWS keys, GitHub PATs, and more.

    2️⃣ A browser extension hijack that infected over 3.2 million users, turning trusted Chrome and Firefox extensions into tools for data theft and ad injection.

    💥 You’ll learn:

    • What went wrong with the tj-actions/changed-files GitHub Action (CVE-2025-30066)

    • Immediate mitigation steps for DevSecOps teams

    • The 16 compromised extensions you must remove now

    • Browser hygiene best practices to avoid future attacks

    🔐 Whether you're a developer, security leader, or just trying to stay safe online, this episode delivers urgent, actionable insights to help you protect your workflows and personal data.

    Mehr anzeigen Weniger anzeigen
    22 Min.
  • Lessons from the Treasury Hack and Biden’s Cybersecurity Executive Order
    Mar 4 2025

    In this episode of CISO Guide to Cyber Resilience, hosts Debra Baker and Isabella Otero dive into two critical cybersecurity developments:

    1. The December 2024 U.S. Treasury Hack – A deep dive into how state-sponsored attackers exploited a Zero-Day vulnerability, the impact on government systems, and key security lessons.
    2. President Biden’s January 2025 Cybersecurity Executive Order – A breakdown of new mandates for federal agencies and private-sector vendors, including zero-trust adoption, secure software requirements, and AI-driven cybersecurity advancements.
    • Proactive cybersecurity measures – The Treasury breach highlights the importance of penetration testing, secure-by-design development, and continuous monitoring.
    • Vendor security accountability – Strengthening third-party assessments can prevent supply chain attacks.
    • Zero-trust implementation – Federal agencies and private companies must adopt phishing-resistant authentication and robust identity management.
    • Future-proofing against emerging threats – Preparing for post-quantum cryptography and AI-based cyber threats.

    💡 Call to Action:
    Align your security strategy with NIST guidelines, improve vendor security assessments, and invest in cutting-edge cyber resilience strategies.

    🎧 Listen Now: Stay ahead of the latest cybersecurity challenges and build a resilient organization!

    Key Takeaways:

    Mehr anzeigen Weniger anzeigen
    21 Min.
Noch keine Rezensionen vorhanden