Prabh Nair

Prabh Nair
Prabh Nair
Nieuwste aflevering

Beschikbare afleveringen

5 van 71
  • How Become an CISO Step By Step Process
    Dr. Eric Cole is one of the world’s leading cybersecurity experts, a former CIA cyber operative, CTO of McAfee, and founder of Secure Anchor. He has advised Fortune 500 companies, governments, and high-profile CISOs worldwide.https://www.youtube.com/watch?v=NlNsJzB7Lt8&list=PLXBue4eLfnFQDt-B4hyb7iivc7920DPSD&index=1CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#CISO #cisorole #cisoseries #cisos
    --------  
    51:42
  • Get Your DREAM Cyber Job with These 3 Proven Strategies
    Confused about where to start in cybersecurity—or how to move from beginner to your first role? In this episode, I and Chintan break down a practical, human-first roadmap: how to choose the right domain, whether a master’s is worth it, how to make internships count, set SMART goals and OKRs, build a weekly learning plan, and prepare for real interviews. Chintan Profile https://www.linkedin.com/in/chintangurjar/https://chintangurjar.com/kickstartcareer/Here are all the files for your YouTube video details...Entry-Level Job Roles - Overview of entry-level cybersecurity roles, duties, and job titles.https://chintangurjar.com/files/entry-level-job-roles.pdfWeekly Learning Resources - Curated weekly resources to support structured cybersecurity learning.https://chintangurjar.com/files/weekly-learning-resources.xlsxWeekly Learning Timetable- A practical timetable to organize and track weekly study sessions.https://chintangurjar.com/files/weekly-learning-timetable.xlsxGoal Setting - SMART goals and OKRs tailored for entry-level pentesters and SOC analysts.https://chintangurjar.com/files/goal-setting-sample-document.pdfResume Sample- Professional resume showcasing 13+ years of offensive security expertise.https://chintangurjar.com/files/resume-sample.pdfEffective Communication - Visual guide on improving communication skills for cybersecurity roles.https://chintangurjar.com/files/effective-communication.pngWhat you’ll learnCybersecurity pathways: key disciplines, entry roles, and progressionMaster’s vs skills: when degrees help and when hands-on winsInternships that matter: commercial tools, people, process, soft skillsSMART goals + OKRs: templates for interns and entry-level rolesPortfolio + LinkedIn basics: what to show before you applyWeekly learning system: threat intel, vuln mgmt, detections, notesCommunication for beginners: reduce fear, speak with clarityInterview prep: JD analysis, role-specific topics (SOC, AppSec, Red Team)Company research: legit checks, culture signals, application strategyKey takeawaysUse the 10-question framework to pick your domain before buying coursesClarify internship scope, duration, outcomes, and reporting rhythmTrack goals weekly; log risks; publish progress to build credibilityDon’t rely on generic roadmaps—align study to real JDs you’ll apply forBuild a minimal portfolio: 2–3 proof projects tied to the role you wantPractice communication: concise updates, STAR stories, clear stakeholder languageWho this is forStudents, freshers, and career-switchers targeting cyber rolesInterns and entry-level analysts who want structure and momentumAnyone stuck between “more certs” vs “build real proof of skill”Suggested action itemsDownload or recreate a one-pager map of domains and target rolesDraft 3 SMART goals and 1 OKR for the next 30 daysBuild a weekly learning calendar and stick to it for 4 weeksPick one role (e.g., SOC Analyst) and tailor your CV to 3 live JDsShip one portfolio proof (lab, detection, or write-up) this weekSOC ANALYST LEARNING VIDEOhttps://www.youtube.com/watch?v=KxVEJ1GPgss&t=364sCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzStudy with MeTelegram Grouphttps://t.me/Infoseclearning#CybersecurityCareer #CyberJobs #CyberSecurityRoadmap #Internships #SMARTGoals #OKR #InterviewPrep #SOC #AppSec #ThreatIntel #VulnerabilityManagement #CyberLearning #Portfolio #LinkedInTips #CoffeeWithPrabh
    --------  
    51:42
  • Generative AI Security: What CISOs Must Know in 2025
    In this episode, Prabh Nair and Ross dive deep into the security implications of Generative AI in software development. As AI tools like ChatGPT transform developers into prompt engineers, new cybersecurity, compliance, and data privacy risks emerge.Ross Yonghttps://www.linkedin.com/in/mrrossyoung/https://owasp.org/www-project-threat-and-safeguard-matrix/We discuss:https://owasp.org/www-project-threat-and-safeguard-matrix/AI code security challenges – vulnerabilities in unvalidated AI-generated codeDefense-in-depth strategies for secure AI adoptionOWASP Threat & Safeguard Matrix (TSM/TASM) and its role in threat modelingBalancing productivity vs security in AI-enabled DevSecOps pipelinesCISO challenges – shadow AI, data security posture management, and data loss preventionAI governance frameworks – NIST AI RMF, EU AI Act, security-by-design and privacy-by-design practices💡 Key Takeaways:✔ Why organizations must scan and validate AI-generated code for vulnerabilities✔ How CISOs can embed AI security controls into CI/CD pipelines✔ The role of KPIs and business impact analysis in proving AI risk reduction to executive leadership✔ Best practices for integrating TASM into enterprise-wide threat modeling✔ Emerging tools like Encrypt AI for compliance scanningThis is a must-watch for CISOs, security architects, developers, and AI governance professionals preparing for the next wave of AI-powered cybersecurity risks.AI Governance https://www.youtube.com/watch?v=LgFBi5XD-Ow&pp=ygUNYWkgZ292ZXJuYW5jZdIHCQmyCQGHKiGM7w%3D%3DPractical ai governancehttps://www.youtube.com/watch?v=dQUML9vnlY4&t=542s&pp=ygUTYWkgZ292ZXJuYW5jZSBwcmFiaA%3D%3DAI Securityhttps://www.youtube.com/watch?v=JtkDwE_s178&pp=ygUVYWkgZ2VuIHNlY3VyaXR5IHByYWJo#genai #genaisecurity #infosec #cybersecurity
    --------  
    49:25
  • Gen AI Security in 2025
    Generative AI is reshaping industries in 2025 — but with this power comes unprecedented security risks. We’ll break down:✅ What is Gen AI Security — and why it matters in 2025✅ Core Pillars: Protecting models, securing data pipelines, and governing outputs✅ Major Risks: From prompt injection, hallucinations, and data leakage to deepfakes, supply chain attacks, bias, and compliance challenges✅ Enterprise Controls: Input/output filters, tool permission frameworks, retrieval allowlists, zero-trust agents, and kill switches✅ Human-in-the-Loop: Defining autonomy tiers and ensuring AI augments, not replaces, decision-makingAI Governance https://www.youtube.com/watch?v=LgFBi5XD-Ow&pp=ygUNYWkgZ292ZXJuYW5jZdIHCQmyCQGHKiGM7w%3D%3DPractical ai governancehttps://www.youtube.com/watch?v=dQUML9vnlY4&t=542s&pp=ygUTYWkgZ292ZXJuYW5jZSBwcmFiaA%3D%3Dhttps://youtube.com/playlist?list=PL0hT6hgexlYwHLdZR_oHvEKN_8IiAMBcU&si=yvT3Dhb_C_2G-e-6#genai #genaisecurity #artificialintelligence #machinelearning #cybersecurity
    --------  
    25:12
  • GDPR Data Processing Agreements Simplified Quickly
    Data Processing Agreements (DPAs) & GDPR Explained | Privacy Masterclass with VasanthkumarIn this episode, I joined by Vasanthkumar, Privacy Lead at Darwinbox, to dive deep into Data Processing Agreements (DPAs), GDPR compliance, and data protection best practices.They explore how organizations can structure DPAs, manage data retention, handle cross-border transfers, and meet GDPR obligations while ensuring contractual safeguards with vendors and processors.Link Download All Fileshttps://drive.google.com/drive/folders/1fvgBUHZMrRiJVVnziaa8hlxNkSNMgd3I?usp=sharingVasanth Linkedin https://www.linkedin.com/in/vasanth-kumar-9b1360257/What You’ll Learn in this Episode✅ What is a Data Processing Agreement (DPA) and why it matters✅ Key roles: controller, processor, sub-processor, and DPO✅ GDPR requirements for data processing, retention, and deletion✅ Best practices for vendor exit, data minimization, and proof of deletion✅ Standard Contractual Clauses (SCCs) vs Binding Corporate Rules (BCRs)✅ How to handle cross-border data transfers (EU ↔ India and beyond)✅ Rights of data subjects: consent, portability, correction, and deletion✅ Contract law essentials for SaaS vendors (jurisdiction, liability, breach notifications)✅ Annual security assessments, DPIAs, and privacy by design practices✅ Roles of CISO vs DPO in governance and compliance💡 Whether you’re a privacy officer, CISO, compliance lead, or startup founder, this episode gives you a practical roadmap to build, implement, and audit Data Processing Agreements that meet GDPR and global data protection laws.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWv#GDPR #DPA #DataPrivacy #Compliance #PrivacyLaws #DataProtection #PrabhNair #Vasanthkumar #CISO #DPO #PrivacyCompliance #CrossBorderData
    --------  
    1:18:56

Meer Technologie podcasts

Over Prabh Nair

Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou
Podcast website

Luister naar Prabh Nair, Hard Fork en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v8.1.1 | © 2007-2025 radio.de GmbH
Generated: 12/9/2025 - 1:59:39 PM