CYBRARY Podcasts

Tune in to industry leaders and cybersecurity professionals sharing their stories

We discuss a range topics from DevSecOps and Ransomware attacks to diversity and how to retain of talent. Entrepreneurs at all stages of their startup companies join us to share their stories and experience, including how to get funding, hiring the best talent, driving sales, and choosing where to base your business.

Subscribe to the Cybrary Podcast using your favorite app

Looking for a new Podcast?

Join thousands of other listeners to hear from the current leaders, experts, vendors, and instructors in the IT and Cybersecurity fields regarding DevSecOps, InfoSec, Ransomware attacks, the diversity and the retention of talent, and more. Gain the confidence, consistency, and courage to succees at work and in life.

Download our free media kit today to learn more.
Podcast image

Podcast Channels

All Episodes

401 Access Denied Podcast Ep. 41 | Unlocking the State of Cybersecurity with Quentyn Taylor
November 17, 2021

401 Access Denied Podcast Ep. 41 | Unlocking the State of Cybersecurity with Quentyn Taylor

If the security industry is booming, what does this mean for the state of cybersecurity and for humanity at large? Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products. Follow Quentyn's advice to make your organization not only more cyber-aware, but also resilient.

Disrupting the Adversary with MITRE's Threat-Informed Defense Approach | The Cybrary Podcast Ep. 73
November 10, 2021

Disrupting the Adversary with MITRE's Threat-Informed Defense Approach | The Cybrary Podcast Ep. 73

How can you build smarter cyber defense strategies that reduce your organization's risk against the threats you care about most? Let the subject-matter experts at MITRE teach you how to disrupt the adversary by employing a threat-informed defense approach. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques.

401 Access Denied Podcast Ep. 40 | Leveraging Data Science in Security with Kevin Hanes and Jon Ramsey
November 3, 2021

401 Access Denied Podcast Ep. 40 | Leveraging Data Science in Security with Kevin Hanes and Jon Ramsey

Cybersecurity is a growing, expansive industry that transcends the fields of technology and even security. How can organizations leverage the critical work of data scientists not only for machine learning automation, but also for diversifying threat detection strategies? In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence and machine learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.

Exploring Adversary Emulation with MITRE Cyber Engineer Michael Long | The Cybrary Podcast Ep. 72
October 27, 2021

Exploring Adversary Emulation with MITRE Cyber Engineer Michael Long | The Cybrary Podcast Ep. 72

Think you've got what it takes to replicate the real-world cyber attacks of threat actors like FIN7? Learn how ethical hackers are putting their skills to the test in MITRE ATT&CK TTP-based adversary emulations. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you're managing a red team or just getting into ethical hacking, you'll want to hear this discussion about the value of emulating adversaries and simulating malware. Stay tuned for Michael's upcoming MITRE adversary threat emulation course--only on Cybrary!

401 Access Denied Podcast Ep. 39 | Breaking Down Zero Trust Security with Dave Lewis
October 20, 2021

401 Access Denied Podcast Ep. 39 | Breaking Down Zero Trust Security with Dave Lewis

Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship.