

Secure Talk Podcast
Justin Beals
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance.
Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.
Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.
Episodes
Mentioned books

Apr 15, 2019 • 38min
João Couto, Director of Operations adaQuest Brazil
João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.

Mar 21, 2019 • 33min
The Rise of the Virtual CISO, with Hiram Machado
adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.

Mar 11, 2019 • 43min
Richard Lewis, Best Practices for Security Minded Organizations & Application Security Development
Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.

Mar 4, 2019 • 41min
Edward Walton Discusses Shadow IT
Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.

Feb 5, 2019 • 44min
Cecilia Jeong, Privacy Attorney
Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson & Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.

Jan 30, 2019 • 55min
Kip Boyle, Founder and CEO of Cyber Risk Opportunities
Kip Boyle, founder and CEO of Cyber Risk Opportunities. Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).
Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks.
https://www.cyberriskopportunities.com/
https://www.firedoesntinnovate.com/

Jan 19, 2019 • 37min
Andrea Fisher, Global Cyber Defense Specialist at Microsoft
Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.

Dec 27, 2018 • 31min
Hiram Machado, adaQuest CEO
adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.

Oct 1, 2018 • 33min
Andrea Fisher Provides an Overview of Windows 10
Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.

Aug 31, 2018 • 30min
Plurilock CEO Ian Paterson Talks About Post Login Authentication
Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.


