Coming soon this summer, 2024... Season 3 of F-Sides. The Cyber humanity podcast that also just happens to be the most money-losing not-for-profit venture this side of owning office real estate.
Have you ever thought that Cybersecurity focuses on the wrong things?
Every two weeks, listen in as two CISOs discuss how to move the elephant (“human psychology”) in Cyber. If you work in Cyber, are affected by it, or are interested in it, you’ll find that our discussions, debates, and interviews with thought leaders across domains apply to Cyber and business in surprising ways.
Chief Information Security Officer
Jason Loomis is an experienced Chief Information Security Officer with extensive experience in e-commerce, banking and finance, and healthcare among other verticals. Jason has a BS in MIS from the University of San Francisco and an MBA from the University of Oregon. Jason is; CISSP, CISM, CISA, multiple GIAC, and SCUBA certified.
While Cybersecurity may be his chosen career path, his passion, drive, and intellectual curiosity are in leadership, organizational decision making, and giving to those who have less through national and international disaster relief. He also frequently argues the case with himself that it’s these very interests that make him a better Cybersecurity practitioner…it’s not entirely clear who is winning that argument or why he bothers debating with such a frustrating individual.
Erika McKellar is a human experience consultant with over 15 years of hands-on strategy development and execution. She is a self-proclaimed serial entrepreneur, with an MBA in Entrepreneurship, and an MS in Conflict Resolution Studies.
Whether she’s working with a tech startup or a heritage brand, Erika collaborates with leaders to solve real business problems by focusing on the core values that unite employees, partners, and customers. Above all, she believes that a positive employee experience is the key driver of business success.
“Personally, I believe in radical self-awareness, vulnerability based-trust, and continuous learning. Professionally, I believe that better collaboration and transparency can solve most if not all, business challenges.”
Chief Information Security & Privacy Officer
Paul Love is the Chief Information Security & Privacy Officer for a financial services company and has been in the Information Security field for almost 30 years. Paul has an MSc in Network Security, has been an author of nine books with major publishers on multiple topics, including security, Linux, and other topics. Paul has been a part of many different organizations in multiple security roles, including the US Marine Corps, Schlumberger, Microsoft, Ernst & Young, Cetera Financial, 5/3 Bank, Ally Bank, Freddie Mac, and an internet startup. He enjoys helping others through his work on books and in addition to writing, he has been a tech editor for many books covering security topics, Unix, Oracle, and other technical and non-technical subjects. Paul has over 20 certifications including CISSP, CISA, CISM, CCSP, FIP, CIPP/US, CIPP/E, CIPP/C, CIPT, CIPM, ITIL Foundations, Security+, and many others.
He has extensive experience in Information Security in Financial Services, Government, Software as a Service, consulting, and startups.
Paul has been passionate about Information Security since creating his first disk operating program in the 80's on an Atari XE that included security components. His goal is to demystify security and share with leadership and others how to be effective in security protections. Paul is also passionate about process improvement and simplifying complexity. As a security practitioner, he has seen many things that work and don't work, but is in a constant improvement mode and looking to hear insight from others,… Read More
Join us for our last episode of this half-season as we close out the year with some cool Q and A with the hosts. From how to learn as much from horrible bosses as you can from great bosses to …
DEI...and we're bringing the party. Listen in as we speak to our favorite guest, James Warren, recruiter extraordinaire, about Diversity, Equity, and Inclusion, also known as representation, fair treatment, and allowing peopl...
Skill Swam Meets. Wisdom Exchanges. More commonly known as mentorship programs have been around since our ancestors realized only having one person knowing how to create fire was a bad idea.... Listen in as we talk pros, cons...
Cybersecurity conferences. They are packed full of Whitehats - Ethical hackers who typically adhere to ethical guidelines and legal norms and aim to discover and fix security vulnerabilities to improve systems and protect use...
On this episode, our third last of Season 2...or maybe second last, we really don't know yet..are you confused as we are? Ok. Let's try this. On this LAST-ISH episode of Season 2 we talk about Incident Response in the …
No! Non! Nein! Niet! Or in multiple languages, what a lot of people call the Cybersecurity department. If you're tired of hearing podcasts, conference talks, or CISOs prattle (disclaimer: this was written IN London - apologie...