
Episode 208 - All Good Things...
It's been 9 years and over 210 different content items since we started this thing in January of 2010. As much as we hate it we feel it's ti...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at www....

It's been 9 years and over 210 different content items since we started this thing in January of 2010. As much as we hate it we feel it's ti...

It's another Front Porch episode! Yvette talks to her friend Brandon Clark as his first novel "Ransomware" is about to be released. "Ransomw...

Episode 206 - The Front Porch…. Welcome to the first of an occasional series of episodes featuring conversations with a variety of interesti...

We recorded this episode as the closing keynote at BSides Atlanta on May 5th, 2018. We want to give a big round of thanks to the organizers,...

Episode 204 - Evaluating Your Security Program: Communications Plan Why Evaluate Your Program Part of annual policy review If you don't eval...

Show Notes Episode 203 - Evaluating Your Security Program: Threat Mapping Why Evaluate Your Program Part of annual policy review If you don'...

Episode 202 - Evaluating Your Security Program: Awareness & Education Why Evaluate Your Program Part of annual policy review If you don't ev...

We're going to use this episode to allow the cast to talk about reaching 200 episodes and you'll hear what *really* happened on the Lost Epi...

Episode 200 - Building A Security Strategy - Part III Recap Strategy vs Policy Understand the business of your Business Know who your stakeh...

Episode 199 - Building A Security Strategy - Part II Recap Strategy vs Policy Understand the business of your Business Know who your stakeho...

Episode 198 – Building a Security Strategy – Part 1 Strategy is the hardest thing a CISO will do in their career...except if they have to ex...

Episode 197 - After the Penetration Test We've kind of talked about how to choose your vendors, and we'll get more into services soon, but w...

SFS Podcast - Episode 196 Wannacry: Woulda, Coulda, Shoulda First and foremost: Why was medical hit so hard by WannaCry? See Episode 189 - M...

Episode 195 - Annual Policy Review - Making It Worthwhile Define policy vs. standards vs. procedures What is a Policy? It is a guiding princ...

Evaluating Security Product Vendors In light of recent news about "Vendors Behaving Badly" we want to talk about how a security professional...

Tonight's episode is all about those learning moments. CISOs and security orgs find new and interesting way to screw up all the time. Leavin...

Today's Topic: Security Waste - Buying new tools without maximizing use of current tool set It's not just a security problem but we often ad...

The Southern Fried Security Podcast - Episode 191 - Gone Phishin' Phishing your employees - Does it make them aware or do they feel mistrust...

Episode 190 - Burnout Intro Why the topic of burnout? Because it affects all of us, and yet it's not talked about much in this field Disclai...

In this inaugural bonus track we release the interview we did with Nick Selby (@nselby) on his experience validating the work of MedSec on S...

SFS Podcast Episode: 189 Medical Device Security Intro Hospital devices (infusion pumps, CT, MRI, etc) Personal devices (pacemaker, insulin...

Andy and Martin close out 2016 with a quick run through of the major stories of the year and look forward to what's to come in 2017. Thanks...

Martin, Steve, and Yvette discuss the recent DDoS of the DNS provider Dyn and what information security people should be considering in a wo...

Martin, Steve, and Yvette talk about recent events at Yahoo and the moral compass questions information security professionals and leaders m...

For the first time we can think of it's just Yvette and Martin on this episode. The two of them talk about what to think about and what you...

We interview Nick Selby (@nselby) about a recent blog post where he had a less than optimal experience with a managed security service provi...

Martin, Andy, and Steve talk about third party risk programs in light of breaches at Target, Banner Health, and other unfortunate souls.

Joseph is on sabbatical but the rest of the crew talks about how infosec professionals should focus on their problems and how to effectively...

Guillaume's last visit to the show: Episode 167 Last year's WWDC episode WWDC 2016 Security Rumors and Wishes Possible Touch ID changes Touc...

This evening, Martin sat down with Patrick Heim from Dropbox. Enjoy the interview, and the gang will be back next episode.

The 2016 DBIR OSVDB Thoughts on the DBIR Analyzing the 2016 Verizon Data Breach Investigations Report » Digital Shadows The DBIR's 'Forest'...

This evening, Martin, Steve, and Joseph talk about overhyped vulnerabilities, and how that affects communication with the business. Badlock’...

Tonight, Martin and Joseph sit down and talk about communicating cautionary tales without turning them into FUD. US-CERT advisory on ransomw...

InfoSec programs without money are like cereal but no milk, peanut butter but no jelly, Milli but no Vanilli… (Get over it, I’m old - Martin...

Episode 175 - RSAC Wrapup and More... Congrats to Risky Business for winning this year’s podcast of the year! RSA: Let’s get an update from...

We’ve been nominated for the 2016 Security Blogger Awards! Topic: Threat Intel Norse Corp disappears shortly after CEO is asked to step down...

We’ve been nominated for the 2016 Security Blogger Awards! Topic: Vendor Relationships Trend Micro AV gave any website command-line access t...

Topic: Security Awareness Some people think it's a waste of time: Why you shouldn’t train employees for security awareness Schneier on Secur...

Tonight, Martin, Joseph, Steve, and Andy got together and went over how their 2015 predictions went, and laid out what their predictions wer...

Check for signs of the apocalypse, everyone was here tonight... Comcast resets nearly 200,000 passwords In the era of GPS, Naval Academy rev...

This week, Andy's back! The FitBit "hack" The FBI's Advice on Ransomware? Just Pay The Ransom Find us on Twitter: @SFSPodcast @jsokoly @stev...

Dale Myers - 1Password Leaks Your Data AgileBits - When a Leak Isn't a Leak Jessy on Twitter Joseph on Twitter Steve on Twitter

Tonight, Steve and Joseph talked password managers and consumer reports for cybersecurity. LogMeIn now owns LastPass Troy Hunt's article on...

This week, Joseph and Guillaume Ross talked content blockers, phishing consequences, and home network monitoring. Back to Work Episode 239 A...

This week Martin and Joseph sat down and talked about stress, burnout, and why Martin took a break for a while.

Tweet from Ed Willson Chrome and Firefox dump Flash Netflix dumps antivirus Windows 10: Even When Told Not To, Windows 10 Can't Stop Talking...

This week's show notes: Vegas: BlackHat Day 1 Car Hacking BlackHat Day 2 Defcon Roundup @sawaba's BSides Talk Washington Post's Article on l...

No full episode this week thanks to Security Summer Camp, but Martin got to sit down and chat with good friend of the podcast Wendy Nather....

Life is Short. For some it may get shorter? Archuleta is out at OPM: Who didn't see that one coming? If you look for breaches, you might fin...

Tonight, Joseph and Steve tackled the Hacking Team breach: why it's interesting, what's happening, and some of the data that's come out so f...