The Cybersecurity Institute Podcast, by Entrust

The Cybersecurity Institute Podcast by Entrust lets IT and business leaders listen in on smart cybersecurity conversations on what you need to know to protect, adapt and grow your enterprise. Episodes feature Entrust experts and guests speaking to topics ranging from ransomware and nation-state threats to unique perspectives on multi-cloud, zero trust, securing the supply chain, prioritizing infosec investments, decentralized identity, and more

Listen on:

  • Apple Podcasts
  • Podbean App
  • Spotify
  • Amazon Music
  • iHeartRadio
  • Podchaser

Episodes

Tuesday Jun 27, 2023

In this special post-quantum episode, guest host, Samantha Mabey, speaks with Dr. Sarah McCarthy, cryptographic strategist at evolutionQ and an affiliate of the University of Waterloo, and Anthony Hu, senior software developer at wolfSSL to discuss the impact of post-quantum on constrained devices from WIFI doorbells, to thermometers, to automotive tire pressure sensors and how these devices are going to manage algorithms that are at least 20x bigger and heavier than elliptic curve cryptography. 

Phishing, AI, Zero Trust

Thursday Jun 22, 2023

Thursday Jun 22, 2023

Entrust experts Mark Ruchie, Rishi Kaushal, and Greg Wetmore take on the evolution of phishing in our June Cybersecurity Institute podcast, going deep on phishing-resistant MFA, the impact of AI and ChatGPT, and more.

Friday May 19, 2023

Entrust experts Mark Ruchie, Rishi Kaushal and Greg Wetmore talk about the building blocks of a robust Zero Trust framework, the CISA maturity model and more. It’s clear from the discussion that today we find ourselves at a turning point – zero trust is now a priority and focus for leaders at the highest level of organizations and governments alike.

Monday Apr 24, 2023

In this special post-quantum episode, guest host, Samantha Mabey, speaks with Sandy Carielli, Principal Analyst at Forrester, for her insights on the recent uptick in government action that has been taking place – such as the Quantum Computing Cybersecurity Preparedness Act – and what that means non-federal agencies. She also discusses some of the challenges organizations will face when it comes to preparing for and migrating to post-quantum cryptography.

Monday Mar 20, 2023

In today's digital age, identity has become a powerful and valuable commodity. But who owns it, and how can we protect it? Join us in this episode of the Entrust Cybersecurity Institute podcast as we explore the future of identity with our team of experts. From the challenges of authentication and password security to the role of biometrics and digital government IDs, we'll delve into the key issues facing companies today. We'll also discuss the pros and cons of centralized vs. decentralized identity solutions, and share our predictions for what's to come.

Artificial Intelligence

Thursday Feb 02, 2023

Thursday Feb 02, 2023

Has artificial intelligence (AI) finally arrived in software development? What are the implications for cybersecurity and the way organizations do business today? Join our host Ken Kadet as he discusses the future of AI with leaders in software development at Entrust who provide their insights on the present state of and future potential uses of AI.

2023 Predictions

Tuesday Dec 06, 2022

Tuesday Dec 06, 2022

The cybersecurity arms race is accelerating. That’s the clear lesson of 2022 for those of us committed to protecting organizations from the perils of cyberattacks. But what about the year to come? Join our host Ken Kadet as he speaks to the experts to find out their predictions for cybersecurity in 2023.

Friday Sep 16, 2022

We talk with renowned quantum academic Dr. Michele Mosca, deputy director of the Institute for Quantum Computing, and founder and CEO of evolutionQ, and Mike Ounsworth, software security architect at Entrust, on the future of post-quantum cryptography: from the NIST competition, post-quantum digital certificates, and what organizations should do to prepare for and use PQC algorithms. From our Entrust Engage podcast’s Post Quantum Cryptography series, originally posted in September 2022.

Friday Jul 08, 2022

What is the current state of quantum computers, and what developments can we expect in the coming years? We talk with Richard Moulds, General Manager of AWS Bracket on the applications of quantum computers in coming years as well as how organizations are tapping into their capabilities today.  He also shares how he sees quantum computing playing out, and how the democratization of the technology could make quantum computing available for all. From our Entrust Engage podcast’s Post Quantum Cryptography series, originally posted in July 2022.

Wednesday Jun 15, 2022

We interview Duncan Jones, head of cybersecurity at Cambridge Quantum Computing, part of Quantinum, on the potential of quantum computers today, cryptographic keys, and harnessing quantum randomness for the development of random number generators (RNGs). From the Entrust Engage podcast Post Quantum Cryptography series, originally posted in June 2022.

Protect vs Detect

Tuesday Jun 07, 2022

Tuesday Jun 07, 2022

Every time you see a big cybersecurity crisis or incident -- like Colonial Pipeline, Solar Winds, log4j -- leaders and Boards rush out to invest more in monitoring and detection technologies … but are we neglecting the “roads and bridges” of data protection and access management? Why do investments in cryptography infrastructure and access and policy management that protect your organization and data remain a harder sell? Entrust CIO Anudeep Parhar and Dr. Pali Surdhar, Director of Product Security share their unique perspectives – and why enterprises must make the shift from rewarding the cybersecurity hero that saves the day to celebrating “no news is good news”. 
Background reading for this episode: 
Wired: A Year After the SolarWinds Hack, Supply Chain Threats Still Loom
ZDNet: Ransomware: Hackers are using Log4j flaw as part of their attacks, warns Microsoft
Forbes: Let Customers Know Their Data Is Safe: Cybersecurity As A Marketing Tool

Monday May 30, 2022

How will quantum computing impact security of the blockchain? Blockchain expert Jon Geater, Chief Product & Technology Officer at RKVST and Pali Surdhar, Director of Product Security at Entrust break down the migration of today’s distributed ledger technology to one that’s quantum resistant, and address how blockchain technology will be affected in a post-quantum world. From the Entrust Engage podcast Post Quantum Cryptography series, originally posted in May 2022.

Tuesday May 17, 2022

Host Samantha Mabey speaks with Greg Wetmore, Entrust VP of Software Development to offer a gentle introduction to quantum computing, the post-quantum threat to encryption, and what’s being done to prepare for the post-quantum world. From the Entrust Engage podcast Post Quantum Cryptography series, originally posted in May 2022

Tuesday May 17, 2022

Host Samantha Mabey interviews award-winning quantum physicist and CEO of Nu Quantum, Dr. Carmen Palacios-Berraquero on the science of quantum computing, the main technologies at play in the industry, and the opportunities our growing understanding of quantum physics will enable. From the Entrust Engage podcast Post Quantum Cryptography series, originally posted in May 2022.

Tuesday May 10, 2022

There’s no bigger story right now than the Russian war in Ukraine. And without putting aside the daily human tragedy … it’s also a cyberwar…one that could have far-reaching implications for enterprises and governments around the world. Entrust CIO Anudeep Parhar and CISO Mark Ruchie to talk about what’s happening, where we are today, and how you can help make your organization resilient in the face of attacks.
SC Magazine: Microsoft details rampant cyber warfare corresponding to Russian invasion
CISA’s Shield Up page
New York Times: U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks
Florida International University: How Ukraine has defended itself against cyberattacks – lessons for the US
The Free Press Journal: Russia-Ukraine conflict: 3 major types of cyber attacks detected so far

Copyright 2022 All rights reserved.

Version: 20241125