Episode 19 - Dressed for Success in Cyber with Ashley Tolbert

Episode 19 - Dressed for Success in Cyber with Ashley Tolbert

In this episode Ashley Tolbert joins Chris and Ron to discuss fashion in Cybersecurity. Fashion tribes, Attire, and Style Preferences are all points to consider when making an impression.

Jaksot(389)

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics

7 Heinä 201917min

Episode 4 - Layer 8 Fitness, Diet, Focus

Episode 4 - Layer 8 Fitness, Diet, Focus

In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.

22 Kesä 201942min

Episode 3 - All Things Threat Intelligence

Episode 3 - All Things Threat Intelligence

In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!

22 Kesä 201927min

Episode 2 - Layer 8 Level Up Career, Life, and Self

Episode 2 - Layer 8 Level Up Career, Life, and Self

In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.

22 Kesä 201916min

Episode 1 - Cybersecurity Alchemy

Episode 1 - Cybersecurity Alchemy

Alchemy - "A seemingly magical process of transformation, creation, or combination" In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows. Link to blog: https://secdevops.ai

19 Kesä 201915min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-vegaaneista-tykkaan
aamukahvilla
rss-narsisti
rss-valo-minussa-2
adhd-podi
rss-duodecim-lehti
aloita-meditaatio
psykologia
jari-sarasvuo-podcast
rss-tripsteri
queen-talk
ilona-rauhala
rss-lasnaolon-hetkia-mindfulness-tutuksi
rss-laadukasta-ensihoitoa
rss-vapaudu-voimaasi
puhutaan-koiraa
rss-luonnollinen-synnytys-podcast