Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Building and Maintaining Trust in the Digital Age w/ Paul Dwyer

Trust is a fundamental aspect of our existence, influencing our choices and shaping the world around us. Join us in this captivating video as we explore the depths of trust and its profound significance in our lives. Renowned expert Paul Dwyer joins the conversation, offering his unique insights into the complex nature of trust.

The Dark World of Cybercrime and the Illusion of Cyber Insurance | James Rees

James Rees, the cybersecurity expert from Razorthorn Security, delves into the intricate workings of cybercrime groups and the challenges they pose to organizations worldwide. James sheds light on the independent nature of these groups, comprising affiliates, access brokers, and analysts, who operate with alarming efficiency. He reveals how analysts assess a company's vulnerability and potential payout based on various factors, including cyber insurance coverage. Prepare to be shocked as James delivers a harsh reality check on the efficacy of cyber insurance in today's ever-evolving threat landscape.

The Impact of Government Legislation on Cybersecurity | James Rees, Razorthorn Security

Join us as we sit down with James Rees, cybersecurity expert from Razorthorn Security, to discuss the ever-changing landscape of government legislation and its impact on cybersecurity. James shares his insights on the challenges faced by cyber security professionals due to prolonged discussions and delayed releases of legislation. With examples from Europe and the UK, he highlights the need for timely action in the face of rapidly evolving cyber threats. Don't miss this eye-opening conversation that sheds light on the struggles faced by security teams and the urgency to stay ahead of the game in a constantly evolving digital world.

We Need Diversity In Cyber Security - Paul Dwyer

Paul Dwyer talks about diversity in cyber security. Paul Dwyer Paul C Dwyer stands among the world’s leading cybersecurity, risk, and compliance authorities. As CEO of Cyber Risk International, he excels in corporate and enterprise security, crafting cyber defence programs, and safeguarding business operations for clients. He also serves as the founder and President of the ICTTF International Cyber Threat Task Force, leading a community of over 30,000 professionals in their mission to combat cyber threats and promote industry diversity.

Unveiling the Ethics of Morality in AI: Who Determines What's Right? - Paul Dwyer

In this thought-provoking video, we delve into the pressing issue of ethics within AI development. Join us, Paul Dwyer and James Rees, as we explore the questionable decisions made by a small group of individuals, often young programmers in California, who dictate what is considered ethically correct in software development. We examine real-life examples, such as image search engines favoring certain races and even identifying different ethnic groups as distinct species. It's absurd that such biases persist. But the ethical concerns don't end there.

Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer

Welcome to Razorwire, where I have the pleasure of interviewing cyber security legend Paul Dwyer, president of the International Cyber Threat Task Force and CEO of Cyber Risk International. In this episode, we delve into a variety of topics within cyber security. Paul shares his extensive background and experience in the industry, highlighting the need for a cultural shift towards cyber security.

Understanding the Intelligence Cycle for Cybersecurity: Building a New ICT Infrastructure

In this video, we dive into the intelligence cycle specifically tailored for cybersecurity. With a focus on protecting digital assets, we explore the stages of Direction, Collation, Analysis, and Dissemination within the context of building a new ICT infrastructure. Starting with the initial direction, we discuss the need for a secure network architecture capable of defending against cyber threats.

Mastering Cyber Security The Sun Tzu Approach

Progress your cyber security career with our masterclass from James Rees, MD of Razorthorn Security. In part 1, we take a deep dive into one of the oldest and most highly regarded texts in history - Sun Tzu's "The Art of War" - to uncover valuable insights for information security professionals. We can't stress enough just how useful this text is for anyone in the field, and if you haven't had the opportunity to read it before, we highly recommend doing so.

Cybersecurity Risk Mitigation: Understanding the Limitations of Reducing a £2 Million Risk

We discuss a scenario where a £2 million risk can potentially be mitigated to £100,000 through a £50,000 investment. However, it's crucial to comprehend the inherent limitations of risk reduction in the cybersecurity realm. As seasoned cybersecurity professionals, we acknowledge that no company, solution, or defense mechanism can guarantee 100% protection against emerging threats. Stay updated and empowered with the latest insights to safeguard your digital assets effectively.

Mastering Cyber Security - Overcoming Professional Challenges

Part 1 – Overcoming professional challenges Despite the high demand for information security professionals, the path to a successful career in this field is not without its challenges. Those who choose to pursue a career in information security must be prepared to face a range of difficulties and obstacles, from the pressure to stay up-to-date with the latest technology and trends, to the constant threat of cyber attacks.