Home

Search
Close this search box.

PODCAST EPISODES

EP 86: The CIA Triad – The Basis of Cybersecurity (Availability)

In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability.

Availability is when you like to use a system and it’s there ready for you to use, because no matter how secure a system is, if you cannot access it when you need to, it serves no purpose.

Kip explains how the way you think about availability is also going to change depending on the industry you’re in and the niche you interact with the most.

Edward Skipka, a vulnerability management analyst, goes over his experience and how he managed to double his pay in just over two and a half years. He highlights that doing your best and solving problems can take you to another level within your company.

Listen Now »

EP 85: The CIA Triad – The Basis of Cybersecurity (Integrity)

In this episode Kip and Jason discuss the second pillar of the CIA pentagram, Integrity.
The whole idea of integrity is making sure any entity that you interact with has not been modified after creation and exists where it needs to be.
Jason mentions how it’s not always a perfect balance between all the pillars of the pentagram but depending on the real-world situation, the solution tends to lean towards one or more of the pillars.
Kip explains how digital signatures work and what are the best use cases for them, while Jason dives in deep explaining how hashes work and how to best utilize them.

Listen Now »

EP 84: The CIA Triad – The Basis of Cybersecurity (Confidentiality)

In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality.

They break down the critically important confidentiality point and how it works in the real world, highlighting that it’s not about the information itself but more likely about where that information is in the flow.

They also mention how confidentiality is brought up in certification exams and how it’s always connected to encryption.

Listen Now »

EP 83: Automating NIST Risk Management Framework with Rebecca Onuskanich

In this episode, we go more in depth with the NIST RMF, answering extremely important questions about the different steps of the process and the checklist mentality that can be developed when implementing RMF.

Rebecca Onuskanich, CEO of International Cyber Institute, is here to share with us some of her knowledge gained throughout 20 years of experience with security compliance and how eMASS is used to implement RMF and its real-world adaptation.

Listen Now »

EP 82: From Truck Driver to Cybersecurity Analyst with Mike Hillman

In this episode, we get to learn about our guest’s inspirational story as he went from truck driver to Cybersecurity Analyst in less than 15 months.

Mike Hillman, former truck driver and current SOC Analyst, goes over his exact roadmap to transition into Cybersecurity without any previous experience, the certifications he acquired, and the courses he took.

Listen Now »

EP 81: How to Negotiate a Pay Raise with Edward Skipka

In this episode, we listen to Kip and Ed go over how Ed managed to get a 25% pay raise in a very short period of time and the whole details of his situation.

Edward Skipka, a vulnerability management analyst, goes over his experience and how he managed to double his pay in just over two and a half years. He highlights that doing your best and solving problems can take you to another level within your company.

Listen Now »

EP 80: Risk Management Framework with Drew Church

In this episode, Kip and Jason, along with special guest Drew Church, take a closer look at the NIST risk management framework to help facilitate selecting the right kind of security for your system and help clarify how to direct resources towards the right controls.

Drew Church, RMF expert and global security strategist at Splunk, is here to talk about the different steps of RMF, the importance of preparation work, and understanding the bigger picture of what you want your system to accomplish.

Listen Now »

EP 79: Mid-Career Transition Success Story with Steve McMichael

In this episode, Kip and Jason are joined by Steve McMichael who has rapidly climbed the cybersecurity career ladder. Within 2 years, Steve was able to move up to the position of Director of Governance, Risk, and Compliance for a large, publicly traded company after transitioning from a position in accounting and financing.

Listen Now »

EP 77: Get Into The Talent Pipeline With Max Shuftan And Winnie Yung

In this episode, Kip and Jason, with special guests Max Shuftan and Winnie Yung, talk about what a talent pipeline is and why hiring managers should be using a solid talent pipeline in order to bring in new people into the cybersecurity industry to meet their staffing needs.

Max Shuftan, director of Mission Programs and Partnerships at the SANS institute, is here to talk about how their organization helps people get into cybersecurity through the use of their talent pipeline. Our other guest, Winnie Yung, is a graduate of SANS Institute’s Diversity Cyber Academy who has now broken into the cybersecurity industry.

Listen Now »