• Home
  • Newsletters
  • Videos
  • Articles
  • Podcasts
  • Twitter
    Twitter
Crime, Terrorists, and The Future of Digital Privacy with EJ Hilbert
Crime, Terrorists, and The Future of Digital Privacy with EJ Hilbert

E.J. Hilbert is the founder of KCE Cyber Consulting. EJ has over 2 decades of experience in the Cyber Security field. E.J. spent 8 years as a Special Agent for the FBI where he was the lead case agent for numerous cyber-crime, white-collar, and count...

Read More
Nov 25, 2020
Security Strategy with Stephen Semmelroth. When Strategy Meets Execution.
Security Strategy with Stephen Semmelroth. When Strategy Meets Execution.

Introduction: Stephen Semmelroth is both a West Point and Ranger School graduate, served in Afghanistan, led both a red team and a threat intelligence team while in the Army's Cyber Corps, founded and sold a Veteran-focused cyber recruiting company,...

Read More
Nov 18, 2020
SaaS Security with Robert Vail. How to protect a 100% Cloud Enabled Company
SaaS Security with Robert Vail. How to protect a 100% Cloud Enabled Company

Robert (Bob) Vail, Citrine’s Director of Security, is a Certified Information Systems Security Professional (CISSP) with over 20 years of experience in the financial services, software, and cybersecurity industries. Started his journey as a helicopte...

Read More
Nov 04, 2020
Defending Creators and Changers with Tazin “Taz” Khan Norelius - Democratizing Security with Cyber Collective
Defending Creators and Changers with Tazin “Taz” Khan Norelius - Democratizing Security with Cyber Collective

Taz is the founder of the Cyber Collective an organization focused on protecting the voice of content creators and influencers. Email: hello@cybercollective.orgTwitter: @TechWithTazInstagram: @TechWithTaz

Read More
Oct 07, 2020
Security Marketing with Amy Looper - Be Heard and Understood
Security Marketing with Amy Looper - Be Heard and Understood

Security products are how most practitioners protect their organizations, but most security startups are unable to breakthrough and be heard slowin down innovation in the security market. Security startups are at the heart of security innovation and...

Read More
Sep 23, 2020
Building the Team With Stuart Mitchell – How to Find and Keep the Best Security Talent
Building the Team With Stuart Mitchell – How to Find and Keep the Best Security Talent

Hiring and keeping security talent in a marketplace where there is a negative unemployment rate, and over 3 million roles going unfilled every year is a top challenge for security leaders. In this episode Stuart Mitchell the Head of Security Recruitm...

Read More
Sep 23, 2020
AppSec With James Chiappetta – Never Too Little Never Too Late
AppSec With James Chiappetta – Never Too Little Never Too Late

Security for startups, if you deploy code you need an AppSec program. In a long form conversation James Chiappetta the VP of Security at CLEAR talks us through the importance of AppSec and why it is needed to maintain trust with customers, integrity...

Read More
Sep 16, 2020
Offensive Security With Raxis – Test. Verify. Test Again. A Red Team’s Perspective on Defense in Depth
Offensive Security With Raxis – Test. Verify. Test Again. A Red Team’s Perspective on Defense in Depth

The attacker seems to always have the upper-hand, the only way to defend against them is to think, plan and act like them. Penetration testing and Red team exercise are how the good guys act like the bag guys so security leaders can more effectively...

Read More
Sep 16, 2020
Physical Meets Cyber – Defending Layer 1 With CyberSecureIPS
Physical Meets Cyber – Defending Layer 1 With CyberSecureIPS

CyberSecureIPS is the global leader in unified cyber-physical protection. They are a an organization with the singular mission of defending critical infrastructure from physical attacks. From nation-state actors to government led cyber espionage the...

Read More
Sep 16, 2020
  • «
  • 1
  • 2
  • 3
  • 4
  • »
Twitter

The Innovators Letter

Delivered to your inbox every Friday.


Subscribers and receive exclusive tools, tips, and resources directly from Conor and the most most influential figures in cyber, digital, and physical security.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.