undefined

Mandy Logan

Contributes to the discussion on ethics in cybersecurity, sharing personal experiences and insights.

Top 3 podcasts with Mandy Logan

Ranked by the Snipd community
undefined
Oct 10, 2024 • 2h 15min

The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846

Ed Skoudis, a cybersecurity educator and author, joins the discussion alongside Mandy Logan to dive into the ethics of cybersecurity. They explore the moral dilemmas faced by professionals and the significance of a solid ethical framework when dealing with sensitive information. Personal experiences highlight the importance of mentorship and the challenges of whistleblowing. The conversation also touches on vulnerabilities in outdated technologies and key developments in the cybersecurity landscape, emphasizing the urgent need for integrity in the field.
undefined
Sep 26, 2024 • 2h 59min

AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844

Kayla Williams, Chief Security Information Officer at Devo and advocate for SOC analyst wellness, tackles the pressing issue of burnout affecting 83% of IT professionals. She highlights how AI can alleviate stress for security teams. Additionally, Mandy Logan joins the conversation, adding her expertise on AI's role in enhancing cybersecurity measures. They explore the need for improved mental health support within the industry and proactive strategies for fostering analyst engagement, ultimately advocating for AI as a helpful partner in cybersecurity efforts.
undefined
Sep 19, 2024 • 2h 54min

Exploding Pagers - Tod Beardsley - PSW #843

Tod Beardsley, Vulnerability Analysis Lead at CISA, offers deep insights into the Known Exploited Vulnerabilities catalog. He explains its creation and practical usage in enhancing cybersecurity. The conversation also touches on the resurgence of pagers for secure communications, the implications of Android TV malware, and the complexity of supply chain vulnerabilities. Additionally, the group humorously explores the quirks of cryptography and the evolution of network security tools, blending technical analysis with engaging anecdotes.