www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:d13  Public Scan

URL: https://www.scmagazine.com/podcast-segment/should-we-be-concerned-about-quantum-computing-and-cybersecurity-now-richard-rus...
Submission: On June 16 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA



ADVERTISEMENT




The CISO Stories PodcastSubscribe
Network security, Cybercrime, Emerging technology


SHOULD WE BE CONCERNED ABOUT QUANTUM COMPUTING AND CYBERSECURITY NOW? – RICHARD
RUSHING – CSP #87

September 13, 2022


There has been much discussion lately about Quantum Computing and the future
threats to encryption and authentication it could cause. Should CISOs be
worried? Are there steps that should be taken now? Join us as we discuss Quantum
computing and the implications for the CISO – today. This segment is sponsored
by Wiz. Visit https://securityweekly.com/wiz to learn more about them!

SPONSORED BY



Full episode and show notes

GUEST

Richard Rushing
CISO at Motorola Mobility a Lenovo Company


Mr. Richard Rushing is the Chief Information Security Officer for Motorola
Mobility LLC.; Richard participates in several corporate, community, private,
and government Security Council’s and working groups setting standards,
policies, and solutions to current and emerging security issues. As Chief
Information Security Officer for Motorola Mobility, he has led the security
effort by developing an international team to tackle the emerging threats of
mobile devices, targeted attacks, and cyber-crime. He organized developed and
deployed practices, tools and techniques to protect the intellectual property
across the worldwide enterprise. A much-in-demand international speaker on
information security Richard has presented at many leading security conferences
and seminars around the world.

HOST

Todd Fitzgerald
Vice President, Cybersecurity Strategy at Cybersecurity Collaborative
https://www.cyberleadersunite.com

Todd Fitzgerald has built information Fortune 500/large company security
programs for 20 years. Todd serves as VP, Cybersecurity Strategy and Chairman of
the Cybersecurity Collaborative Executive Committee, was named 2016–17 Chicago
CISO of the Year, ranked Top 50 Information Security Executive, authored 4 books
including #1 Best Selling and 2020 CANON Hall of Fame Winner CISO COMPASS:
Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
(2019), ground-breaking CISO Leadership: Essential Principles for Success, as
well as contributions to a dozen others. Todd held senior leadership positions
at Northern Trust, Grant Thornton International, Ltd, ManpowerGroup, WellPoint
(Anthem) Blue Cross Blue Shield/ National Government Services, Zeneca/Syngenta,
IMS Health and American Airlines.


RELATED

Cloud security

WADING INTO THE WIDE WORLD OF WAF – DANIEL CORBETT – ESW #321

June 15, 2023

The WAF has a relatively long history with InfoSec. A few years back, we saw the
traditional architecture separated by new technologies and philosophies on the
best way to detect and stop web-borne attacks. In this episode with Daniel
Corbett, we'll take a deep dive into the latest on WAF capabilities, what it
means to be 'next-gen' in the WAF worl...
Cloud security

SECURITY @ SCALE: BUILDING TRUST, STARTING WITH CYBERSECURITY – ROB DUHART JR –
CSP #126

June 13, 2023

10,500 storefronts. 2.3 million associates worldwide. $572.8 billion in revenue.
Today’s cybersecurity landscape is complex, as attacks can deliver disruption in
the blink of an eye. The focus of Walmart’s Information Security team is to
secure our operating environment in the service of building and maintaining
trust with our customers, associates...
Careers

MASTERING PENETRATION TESTING: CRITICAL TASKS & ESSENTIAL TOOLS FOR SUCCESS –
PAULA JANUSZKIEWICZ – PSW #784

May 10, 2023

In this talk, Paula Januszkiewicz, renowned cybersecurity expert with years of
experience in the field, shares her insights on critical tasks that must be
included in any successful penetration testing checklist. She will offer the
listeners a sneak peek into her pentesting trick book, discuss the special tools
she is using, and highlight the impor...

ADVERTISEMENT



ADVERTISEMENT



X



--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies