Displaying episodes 31 - 60 of 80 in total

Cybersecurity Ignores the Geopolitical at Its Own Peril With Mark Houpt of DataBank

Cybersecurity Ignores the Geopolitical at Its Own Peril With Mark Houpt of DataBank

Why is the geopolitical landscape critical to cybersecurity strategy? CISO Mark Houpt breaks it down in this episode. Mark also shares his advice to the college and hi...

From Construction to ER Nurse to Security Researcher With Alex Gatz of ThreatX

From Construction to ER Nurse to Security Researcher With Alex Gatz of ThreatX

How do you make the jump from ER nurse to SOC analyst? Alex Gatz did it, and he’s sharing his insights and tips with the eXecutive Security podcast audience. Don’t mis...

Your Network Matters More Than Your Resume With Mike Privette of Passport

Your Network Matters More Than Your Resume With Mike Privette of Passport

The job market has shifted dramatically in the past two years, and Mike Privette shares his thoughts on navigating it in this episode. He and Gene discuss things you c...

Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian

Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian

Key to a successful tech career? Re-inventing yourself every three years, says Faisal Bhutto, SVP of Cloud and Cybersecurity at Calian. Don’t go into tech if you’re no...

My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill

My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill

Corey Nenno (aka That Cyber Guy) just transitioned out of the military and into the cybersecurity industry in 2021 – so this is an ideal episode for those currently in...

From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security

From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security

Alfredo Hickman fought the war on terror in the early 2000s in the Marine Corps infantry in Iraq. He shares some intense stories from his military experiences overseas...

Using Social Media to Your Advantage With David Cross of Oracle

Using Social Media to Your Advantage With David Cross of Oracle

David Cross’ advice for breaking into cybersecurity? Strategic use of gift cards. Get details on his networking through social media ideas in this episode. David trans...

The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance

The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance

Key to career success according to Parham Eftekhari? Advocate for yourself, even if it doesn’t come naturally. He’s got great advice for those who feel uncomfortable w...

Debunking Myths About Cybersecurity Careers With Rick Doten of Centene

Debunking Myths About Cybersecurity Careers With Rick Doten of Centene

Cybersecurity has become unnecessarily intimidating, says Rick Doten in his podcast episode with Gene. He breaks down what it’s really like to work in cyber, and the s...

The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures

The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures

Thinking about cybersecurity marketing? Former Rapid7 CMO Carol Meyers debunks some myths surrounding that career choice in her eXecutive Security podcast episode. Car...

RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?

RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?

At the recent RSA Conference in San Francisco, we decided to take advantage of all the cybersecurity professionals gathered in one place to get some advice for those l...

Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot

Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot

It’s rough to start your career in an economic downturn, as many of our listeners are now finding out. Alyssa Robinson started her career in a down economy, but she fo...

Tips and Techniques: Lessons Learned From ThreatX Hiring

Tips and Techniques: Lessons Learned From ThreatX Hiring

We recently received more than 4,000 resumes for a job listing for an entry-level security position. How does this number make sense considering the cybersecurity skil...

Building a Personal Brand With Etan Basseri of Microsoft

Building a Personal Brand With Etan Basseri of Microsoft

Etan Basseri made a dramatic pivot mid-career from lawyer to high-tech professional. In this episode, he talks to Gene about his lessons learned from that journey. The...

Tips and Techniques: RSA

Tips and Techniques: RSA

New to RSA? Gene offers a few quick tips and some advice on navigating this massive cybersecurity conference for the first time.

How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX

How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX

What are hiring managers looking for in entry level cybersecurity candidates? Get it straight from a hiring manager in this episode. Gene recently sat down with his co...

Keys to Thriving as a Cybersecurity Executive With Ed Amoroso

Keys to Thriving as a Cybersecurity Executive With Ed Amoroso

As the former CISO of AT&T, the founder and CEO of Tag InfoSphere, and a cybersecurity university professor, Ed Amoroso has a lot of insights and advice for our listen...

Increasing the Awareness of Cybersecurity Careers With Julian Waits

Increasing the Awareness of Cybersecurity Careers With Julian Waits

Julian Waits never imagined he’d be a leader in the cybersecurity industry; in fact, he trained to become a professional jazz musician. Listen to his podcast episode t...

Preparing for the Executive Level With David Craigen of TK Elevator

Preparing for the Executive Level With David Craigen of TK Elevator

David Craigen worked his way up to the executive level and feels strongly that he needs to prepare and train those who work for him now to have his job later. He and G...

How Hacking Benefits the Rich and Powerful With Bruce Schneier

How Hacking Benefits the Rich and Powerful With Bruce Schneier

Hacking itself isn’t good or bad, but the intent behind it is. In his new book, internationally renowned security technologist Bruce Schneier takes hacking out of the ...

Tips and Techniques: Goal Setting

Tips and Techniques: Goal Setting

Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and...

Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon

Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon

Connie Matthews Reynolds is dedicated to making cybersecurity a stronger and more diverse industry and is an extremely valuable resource for those new in or looking to...

Tips and Techniques: Avoid This Phone Scam

Tips and Techniques: Avoid This Phone Scam

Criminals often use social engineering as a pre-cursor to exploiting cybersecurity vulnerabilities. But a recent popular criminal tactic is to use social engineering a...

Why Moving Beyond Transactional Behavior Is Key to Cybersecurity Success With Robert Rodriguez of SINET

Why Moving Beyond Transactional Behavior Is Key to Cybersecurity Success With Robert Rodriguez of SINET

Robert Rodriguez spent 22.5 years working as a Secret Service agent protecting presidents Reagan, Bush, and Clinton before founding SINET. He has a wealth of insights ...

Developing the Next Generation of Cybersecurity Professionals With Hayley Roberts of Distology

Developing the Next Generation of Cybersecurity Professionals With Hayley Roberts of Distology

We don’t have a cybersecurity skills gap, says CEO Hayley Roberts, we have an attitude gap. Hayley and Gene discuss what she means by that in her eXecutive Security po...

Amplifying Diverse Thought in Cybersecurity With Akira Brand

Amplifying Diverse Thought in Cybersecurity With Akira Brand

Ever noticed a lot of cybersecurity professionals have music backgrounds? Akira Brand has a theory. She and Gene discuss that theory and so much more in her recent pod...

Tips and Techniques: Networking

Tips and Techniques: Networking

In this Tips and Techniques episode, eXecutive Security podcast host Gene Fay shares his advice and best practices for networking. Learning how to make the best of net...

Empowering Women in Cybersecurity With Zenobia Godschalk

Empowering Women in Cybersecurity With Zenobia Godschalk

Zenobia Godschalk is not only SVP of Communications at Hedera Hashgraph, but also on the board of the Forte Group, a non-profit with a mission to provide career develo...

The Value of the Enlisted Mindset in Cybersecurity With Jennifer Reed of AWS

The Value of the Enlisted Mindset in Cybersecurity With Jennifer Reed of AWS

A big key to Jenn Reed’s successful career? The enlisted mindset, she says. In the military, you don’t have all the information you need to get the job done. You have ...

Aligning Business and Security With Brian Castagna of Seven Bridges

Aligning Business and Security With Brian Castagna of Seven Bridges

Brian Castagna, CISO at Seven Bridges, sits down with Gene to talk about his career path, his lessons learned, and his advice for those who want to join this industry....

Sign up for exclusive API protection tips!

Get the latest and greatest content from ThreatX delivered directly to your inbox.

checkmark Got it. You're on the list!