Gå offline med appen Player FM !
Why a Data-Driven cybersecurity Defense Will Protect Your Organization With Special Guest, Roger Grimes
Manage episode 353027955 series 3291585
Loved this episode? Please leave us a review and rating on your favorite podcast platform!
After leaving the CPA industry and becoming a computer trainer, Roger worked his way into the cybersecurity industry, Roger Grimes, a data-driven evangelist, is determined to protect organizations from malicious social engineering attacks, but finds that even his advanced tools are no match for the crafty hackers.
"Organizations need to defend their infrastructure by identifying their critical data to recognize and respond to threats. Utilizing a data driven defense allows you to detect and respond to threats more quickly and accurately than traditional methods." -Roger Grimes
Roger Grimes is a cybersecurity expert and data driven defense evangelist for KnowBe4. He has held a variety of roles throughout his career, and his focus is on fixing the internet and protecting organizations from social engineering attacks.
In this episode, you will learn the following:
1. How did Roger Grimes go from being a CPA to becoming a cybersecurity expert?
2. What was it like to work with John McAfee?
3. How did Roger Grimes successfully bluff his way into the cybersecurity industry?
About Roger Grimes, CPA, CISSP
- LinkedIn: https://www.linkedin.com/in/rogeragrimes/
- eMail: rogerg@knowbe4.com
- Twitter: https://twitter.com/rogeragrimes
Show Notes / Links:
- Cuckoo’s Egg book - https://www.amazon.com/dp/B0083DJXCM?ref_=cm_sw_r_cp_ud_dp_FK52CJS8J6DAJ6JMZJTF
- Data Killers, John McAfee - https://www.amazon.com/dp/031202889X?ref_=cm_sw_r_cp_ud_dp_7N07KYGNG9GGSKMW5Q07
- FidoNet - https://www.fidonet.org/index.html
- Peter Norton’s Guide to the IBM PC - https://www.amazon.com/dp/0136619010?ref_=cm_sw_r_cp_ud_dp_FJ7E13ENVAFXZWR139YD
- CISA’s Known Exploited Vulnerabilities Catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions - https://propodcastsolutions.com/
ShowNotes created with Capsho (
Kapitler
1. Introduction (00:00:00)
2. Entry into cybersecurity (00:01:43)
3. Working with John McAfee (00:07:20)
4. Keeping up with all the events and technology changes? (00:16:32)
5. Keeping Up With Technology (00:16:35)
6. Dealing with Stage Fright (00:19:39)
7. Public Speaking Tip (00:22:21)
8. Data-Driven Defense (00:23:59)
9. Third Edition of Data-Driven Defense Book (00:30:37)
10. Two to Four Percent (00:33:31)
11. Greatest Failure & Life Lesson (00:36:31)
12. Greatest Threat (00:41:25)
13. Conclusion / Wrap-up (00:42:10)
39 episoder
Manage episode 353027955 series 3291585
Loved this episode? Please leave us a review and rating on your favorite podcast platform!
After leaving the CPA industry and becoming a computer trainer, Roger worked his way into the cybersecurity industry, Roger Grimes, a data-driven evangelist, is determined to protect organizations from malicious social engineering attacks, but finds that even his advanced tools are no match for the crafty hackers.
"Organizations need to defend their infrastructure by identifying their critical data to recognize and respond to threats. Utilizing a data driven defense allows you to detect and respond to threats more quickly and accurately than traditional methods." -Roger Grimes
Roger Grimes is a cybersecurity expert and data driven defense evangelist for KnowBe4. He has held a variety of roles throughout his career, and his focus is on fixing the internet and protecting organizations from social engineering attacks.
In this episode, you will learn the following:
1. How did Roger Grimes go from being a CPA to becoming a cybersecurity expert?
2. What was it like to work with John McAfee?
3. How did Roger Grimes successfully bluff his way into the cybersecurity industry?
About Roger Grimes, CPA, CISSP
- LinkedIn: https://www.linkedin.com/in/rogeragrimes/
- eMail: rogerg@knowbe4.com
- Twitter: https://twitter.com/rogeragrimes
Show Notes / Links:
- Cuckoo’s Egg book - https://www.amazon.com/dp/B0083DJXCM?ref_=cm_sw_r_cp_ud_dp_FK52CJS8J6DAJ6JMZJTF
- Data Killers, John McAfee - https://www.amazon.com/dp/031202889X?ref_=cm_sw_r_cp_ud_dp_7N07KYGNG9GGSKMW5Q07
- FidoNet - https://www.fidonet.org/index.html
- Peter Norton’s Guide to the IBM PC - https://www.amazon.com/dp/0136619010?ref_=cm_sw_r_cp_ud_dp_FJ7E13ENVAFXZWR139YD
- CISA’s Known Exploited Vulnerabilities Catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions - https://propodcastsolutions.com/
ShowNotes created with Capsho (
Kapitler
1. Introduction (00:00:00)
2. Entry into cybersecurity (00:01:43)
3. Working with John McAfee (00:07:20)
4. Keeping up with all the events and technology changes? (00:16:32)
5. Keeping Up With Technology (00:16:35)
6. Dealing with Stage Fright (00:19:39)
7. Public Speaking Tip (00:22:21)
8. Data-Driven Defense (00:23:59)
9. Third Edition of Data-Driven Defense Book (00:30:37)
10. Two to Four Percent (00:33:31)
11. Greatest Failure & Life Lesson (00:36:31)
12. Greatest Threat (00:41:25)
13. Conclusion / Wrap-up (00:42:10)
39 episoder
Alle episoder
×Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.