www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::681a:d13
Public Scan
URL:
https://www.scmagazine.com/podcast-segment/should-we-be-concerned-about-quantum-computing-and-cybersecurity-now-richard-rus...
Submission: On June 16 via api from US — Scanned from DE
Submission: On June 16 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Log inRegister Topics Events Podcasts Research Recognition Leadership About CRA ADVERTISEMENT The CISO Stories PodcastSubscribe Network security, Cybercrime, Emerging technology SHOULD WE BE CONCERNED ABOUT QUANTUM COMPUTING AND CYBERSECURITY NOW? – RICHARD RUSHING – CSP #87 September 13, 2022 There has been much discussion lately about Quantum Computing and the future threats to encryption and authentication it could cause. Should CISOs be worried? Are there steps that should be taken now? Join us as we discuss Quantum computing and the implications for the CISO – today. This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! SPONSORED BY Full episode and show notes GUEST Richard Rushing CISO at Motorola Mobility a Lenovo Company Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world. HOST Todd Fitzgerald Vice President, Cybersecurity Strategy at Cybersecurity Collaborative https://www.cyberleadersunite.com Todd Fitzgerald has built information Fortune 500/large company security programs for 20 years. Todd serves as VP, Cybersecurity Strategy and Chairman of the Cybersecurity Collaborative Executive Committee, was named 2016–17 Chicago CISO of the Year, ranked Top 50 Information Security Executive, authored 4 books including #1 Best Selling and 2020 CANON Hall of Fame Winner CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (2019), ground-breaking CISO Leadership: Essential Principles for Success, as well as contributions to a dozen others. Todd held senior leadership positions at Northern Trust, Grant Thornton International, Ltd, ManpowerGroup, WellPoint (Anthem) Blue Cross Blue Shield/ National Government Services, Zeneca/Syngenta, IMS Health and American Airlines. RELATED Cloud security WADING INTO THE WIDE WORLD OF WAF – DANIEL CORBETT – ESW #321 June 15, 2023 The WAF has a relatively long history with InfoSec. A few years back, we saw the traditional architecture separated by new technologies and philosophies on the best way to detect and stop web-borne attacks. In this episode with Daniel Corbett, we'll take a deep dive into the latest on WAF capabilities, what it means to be 'next-gen' in the WAF worl... Cloud security SECURITY @ SCALE: BUILDING TRUST, STARTING WITH CYBERSECURITY – ROB DUHART JR – CSP #126 June 13, 2023 10,500 storefronts. 2.3 million associates worldwide. $572.8 billion in revenue. Today’s cybersecurity landscape is complex, as attacks can deliver disruption in the blink of an eye. The focus of Walmart’s Information Security team is to secure our operating environment in the service of building and maintaining trust with our customers, associates... Careers MASTERING PENETRATION TESTING: CRITICAL TASKS & ESSENTIAL TOOLS FOR SUCCESS – PAULA JANUSZKIEWICZ – PSW #784 May 10, 2023 In this talk, Paula Januszkiewicz, renowned cybersecurity expert with years of experience in the field, shares her insights on critical tasks that must be included in any successful penetration testing checklist. She will offer the listeners a sneak peek into her pentesting trick book, discuss the special tools she is using, and highlight the impor... ADVERTISEMENT ADVERTISEMENT X -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies