Subscribe
Sign in
Home
Podcast
Notes
Chat
Archive
About
Latest
Top
Discussions
Navigating the Future of Cybersecurity: Insights from William (Bill) Welser IV
Discover what lies ahead in cybersecurity with technology expert Bill Welser IV. Gain insights into AI's influence, key skills needed, and ways to…
Sep 5
•
Christophe Foulon
38:02
Cybersecurity Entrepreneurship: Real-World Advice from Serial Founder Sinan Eren
In this episode of "Breaking into Cybersecurity," we sat down with Sinan Eren, a seasoned cybersecurity professional, entrepreneur, and founder. Sinan’s…
Sep 3
•
Christophe Foulon
and
Sinan Eren
1
50:43
How to Build a Security Culture with Data-Driven Reporting
Foster a true security-first culture by mastering effective cloud security reporting. Learn to translate technical risk into business impact for…
Sep 1
•
Christophe Foulon
2
August 2025
Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program
Measure, Monitor, and Mature Your Program with Actionable Metrics: Use data-driven KPIs to track progress, demonstrate value, and guide continuous…
Aug 25
•
Christophe Foulon
1
Perk of being a paid subscriber, a chat discuss challenges and opportunities!
A private space for us to converse and connect
Aug 23
•
Christophe Foulon
1
The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack
Unmasking the "low and slow" identity attacks where threat actors lie in wait within your cloud accounts, and how to fight back before they strike.
Aug 20
•
Christophe Foulon
2
Data-Centric Security: Protect Your Cloud Data with Microsoft Defender
Leverage Defender for Cloud and Microsoft Purview to discover sensitive data, analyze attack paths, and focus your remediation efforts on the risks that…
Aug 18
•
Christophe Foulon
The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration
🚀 Transform Your Cybersecurity Approach! 🚀Join me on a journey through "The Phantom Workforce," where I delve into combating state-sponsored IT…
Aug 13
•
Christophe Foulon
2
Develop and Enforce Robust Remediation Policies and SLAs
Strengthen your organization's security response with robust Remediation Policies and SLAs! Discover how to transform your vulnerability management…
Aug 11
•
Christophe Foulon
2
From Psychology to Cybersecurity: Craig Taylor's Impact
In this episode of Breaking into Cybersecurity, host Chris welcomes Craig Taylor, CEO of Cyber Hoot, as he shares his inspiring journey into the…
Aug 8
•
Christophe Foulon
2
35:08
Navigating the Cybersecurity Career Path: Insights from CISO Tradecraft with Guest Christophe Foulon
In a recent episode of CISO Tradecraft, host G Mark Hardy sat down with cybersecurity expert Christophe Foulon to explore the intricacies of entering…
Aug 5
•
Christophe Foulon
and
CISO Tradecraft
3
44:34
Embed Security into the DevOps Lifecycle (DevSecOps)
Learn to "shift left" with DevSecOps. Discover how to integrate security into your development lifecycle, from Infrastructure as Code (IaC) scanning to…
Aug 5
•
Christophe Foulon
1
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts