The Rising Cyber

by Chadi Saliby Australia

Simplifying complex cyber security technologies into smaller bits and bytes, that you can listen while on the go.

Cyber security Strategies - Cyber Warfare Tactics - Cybersecurity Awareness - Incident Response and Digital Forensics "DFIR".

Chadi Saliby (CISSP, SSCP, CASP+, CySA+, CIGE, MS Certified Cybersecurity Architect Expert). An accredited cyber security architect and an established cyber security strategist ... 

 ...  Read more

Podcast episodes

  • Season 3

  • Cyber Security Engineering

    Cyber Security Engineering

    Cybersecurity engineering is the tool used to create this futuristic better state, in a scientific and most important measurable way. Security architects set the vision for security systems so to speak, and Security engineers figure out how to put this vision into practice, while Collaborating with other IT professionals to ensure that security solutions are integrated with other systems. They are responsible for identifying and mitigating security threats, Monitoring systems for security breaches, and responding to incidents when they occur. Security cannot be an add-on, it has to be integrated in every aspect of your solution, otherwise it will be just a waste of time trying to secure a solution. NIST SP 800-160 Vol 1 Rev 1 Engineering Trustworthy Secure Systems https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final NIST SP 800-160 Vol. 2 Rev. 1 Developing Cyber-Resilient Systems https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final Disclaimer: The views and opinions expressed on this Podcast are solely those of the individual creator and do not necessarily reflect the official policy or position of any organisation, company, or institution that the creator may be associated with.

  • Cyber Security Strategy

    Cyber Security Strategy

    Cyber security strategy is the plan to achieve an objective. This objective is the desired future state for the organisation security posture and level of risk. This strategy guides the blend of people, process and technology employed to protect organisations, computers and data from theft and/or destruction. According to The European Union Agency for Cybersecurity (ENISA), cyber security strategy is a plan of actions designed to improve the security and resilience. Its main objectives is to reduce business risks from cyber-attacks by maintaining confidentiality, availability and integrity. Disclaimer: The views and opinions expressed on this Podcast are solely those of the individual creator and do not necessarily reflect the official policy or position of any organisation, company, or institution that the creator may be associated with.

  • Cybercriminals 2024 Modus Operandi

    Cybercriminals 2024 Modus Operandi

    2024 will be the year of major transitions on so many levels, economics, social, culture and political and cyber security is not immune. Ransomware groups are all competing on the same portion of the same market, and you can already observe what would that means. Don’t be the lowest hanging fruit in any kill chain, get your basic cyber hygiene in order and keep an eye on the fast moving threat landscape. Disclaimer: The views and opinions expressed on this Podcast are solely those of the individual creator and do not necessarily reflect the official policy or position of any organisation, company, or institution that the creator may be associated with.

  • Cyberterrorism

    Cyberterrorism

    According to the FBI terrorism is defined as Violent, criminal acts committed by individuals and/or groups who are inspired by, or associated with foreign terrorist organizations or nations (state-sponsored), or motivated by ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature. Cyberterrorism is a premeditated, politically motivated cyberattack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. It is simply the use of computers or any digital device, networks or the internet in order to launch a terrorist attack. Australian security and counter terrorism: https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Completed_Inquiries/pjcis/securityleg/report/chapter5 Disclaimer: The views and opinions expressed on this Podcast are solely those of the individual creator and do not necessarily reflect the official policy or position of any organisation, company, or institution that the creator may be associated with.

  • Corporate Cyber Espionage

    Corporate Cyber Espionage

    Espionage is the practice of spying to obtain information about the plans and activities especially of a foreign government or a competing company. Corporate or industrial espionage is spying and exfiltrating of key information that has economical values. Details of a competitor’s new project, a detailed list of clients, research and development (R&D) data or any information with potential economic value. While the rational for corporate espionage is different of that of military espionage, it often involves the same techniques. Such as monitoring, copying of files, and compromising members of the organisation. CISA for Asset Identification: https://www.cisa.gov/sites/default/files/publications/CRR_Resource_Guide-AM.pdf Australian Espionage Act: https://www.education.gov.au/guidelines-counter-foreign-interference-australian-university-sector/templates-and-tools/australian-government-legislation-and-codes Disclaimer: The views and opinions expressed on this Podcast are solely those of the individual creator and do not necessarily reflect the official policy or position of any organisation, company, or institution that the creator may be associated with.