Buzzword? Architecture? Perhaps a true security approach for modern organizations? Join us as we chat with organizations of all types and sizes to learn about their Zero Trust adoption journey and as we answer these questions along the way.
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
…
continue reading
Where Automation Meets Security
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Enterprise networking isn’t boring. This stuff is real life, from the retail store of the future to the latest public safety technologies. We chop it up with experts from around the globe and various industries — leaving no stone unturned in a mutual quest for the securest, most reliable network possible. SD-WAN and 5G. SASE and zero trust. Stories from the data center to the most far-flung IoT deployments imaginable. (Podcast brought to you by Cradlepoint, part of Ericsson.) cradlepoint.com
…
continue reading
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Cybersecurity in space! Join us as we talk about protecting assets in space, hardening existing assets, and models for the new space ecosystem. Hosted by Dave Pearah, CEO of SpiderOak and SpiderOak Mission Systems.
…
continue reading
The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.
…
continue reading
Join MEF CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling enterprise digital transformation forward. Each episode delves into leading-edge business insights from top network, cloud, and technology executives and industry analysts—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster. Executives at the Edge explores topics such as: What is SD-WAN and SASE and what does market grow ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led a leader in the field: Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" and "Zero Trust and Third-Party Risk: Reduce the Blast Radius")
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Kelly O'Dwyer-Manuel & David Brossard discuss the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect A ...
…
continue reading
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
…
continue reading
"Net Zero: What’s innovation got to do with it?" is a limited podcast series which includes interviews with experts – from scientists to business leaders – about the role of a critical ingredient in tackling the climate crisis: innovation. In each episode, hosts Simon Retallack and Nina Foster from the Carbon Trust’s Net Zero Intelligence Unit quiz guests about how they’ve deployed innovation to drive urgent change. The series will explore how innovation has unlocked other urgent global prob ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
My name is Zero Ash and I speak about music stuff. Album reviews included.
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
Follow Veeam Podcasts to stay on top of the recent virtualization news and VMware and Hyper-V data-protection best practices. Join us now to become an Always-On Business™!
…
continue reading
AGA is the member organization for government financial management professionals. We lead and encourage change that benefits our field and all citizens. Our training events, professional certification, publications and ongoing education help members build their skills and advance their careers.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
A bi-weekly podcast where pressing cybersecurity and information technology issues are discussed.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
The business of providing professional advice is changing. Today, anyone can go online and access a wealth of information about any topic, from legal and medical advice to financial planning and accounting suggestions. This blog is designed to offer ideas, guidance, and perspectives on how to effectively navigate a perpetually shifting professional landscape, with a unique focus on the legal industry and the technology that is driving its evolution.
…
continue reading
Techie & the Biz is a podcast series that explains and simplifies business technology, how it’s changing and how it can help your organization. Hosts Max and Erika Silber discuss with experts a wide range of business technologies from Microsoft Teams and Mobile tech to AI, IoT, SD-WAN and SASE network security – in a (mostly) serious manner (except when it’s not) befitting a business podcast (to real people).
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
…
continue reading
SC Media, and our sponsor RegScale, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Sto ...
…
continue reading
Eric Maddox is the Army interrogator who, while attached to a Delta Force team in Tikrit, Iraq, collected the intelligence which led to the capture of Saddam Hussein. He subsequently became the first civilian interrogator for the Defense Intelligence Agency and went on to conduct over 2700 interrogations. Eric has repeatedly been able to influence those who have zero trust in him, to make the decision to give him information, even more than he asked, without using torture. Eric honed his sys ...
…
continue reading
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Here I interview people around the World that share their tips about Crypto and Blockchain technology. We discuss NFT's , regulation as well as the best Crypto investments. I ask my guests how to avoid blockchain fraud as well as what wallets and Exchanges do they use and why. We also discuss Mining in the Crypto World. According to Listennotes this Podcast is now in the Top 1% of Podcasts. Thank you to all my listeners.
…
continue reading
A podcast to help you start and grow a gutter maintenance business
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
A totally genius analysis of the week’s political news from two certified brains. Ready to resist, progressive AF. Podcast posted weekly since 2012.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
DDoS hosts get arrested, but is it really a legit punishment? Cisco has an issue with remote access and a level 10 vuln, uh oh! Deepfakes are up over 1000% in countries with elections in 2024! And Snowflake adds MFA, after their issue, hurray! Buckle up!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 41: Firmware SBOMs, Zero Trust, And IoT Truth Bombs
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26
For the last twenty years we’ve invested in software security without parallel development in firmware security. Why is that? Tom Pace, co-founder and CEO of NetRise, returns to Error Code to discuss the need for firmware software bills of materials, and why Zero Trust is a great idea yet so poorly implemented. As in Episode 30, Tom is a straight s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
E18 – Building a Secure Network with the Zero Trust Blueprint
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07
Introduction: Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity. Episode Overview: Discussion on Zero Trust security. Segment 1: Conference Recap Anthony's recent attendance at the IT conference for South Carolina co-ops. Key takeaway: Importance o…
…
continue reading
On this episode, we chat with Chris Horton and Brendan Bowers from RMA about Zero Trust! What's that? Tune in and find out. Some great resources are here as well:OMB Memorandum M-22-09: https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf CISA Guidance: https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.p…
…
continue reading
I spoke with Steve Orrin, the Federal Chief Technology Officer for Intel Corporation, where he leads Intel's Federal and Public Sector Solution Architecture, Strategy, and Technology engagements. We discussed how public and private sector organizations are dealing with the rise in cybersecurity attacks, how they can enhance their security controls …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
TechNet Cyber: Removing Ambiguity in Zero Trust
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32
Zero Trust is becoming a critical pillar of the department of Defense’s cybersecurity strategy. The strategy, embodied by the motto of “never trust, always verify,” demands a new outlook on cybersecurity. Randy Resnick discusses why Zero Trust is so important, how his office is working to reshape the way DOD employees view zero trust, and how clear…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Unstoppable Phish: A Discussion with Vivek Ramachandran
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09
Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and fina…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Convocoures Podcast: Zero Trust Explained
1:12:06
1:12:06
Play later
Play later
Lists
Like
Liked
1:12:06
https://youtube.com/live/l_jx9KjeJkI http://convocourses.net The Zero Trust security model is a cybersecurity framework that operates on the principle of "never trust, always verify." Unlike traditional security models that rely on a strong perimeter defense, Zero Trust assumes that threats can come from both outside and inside the network. Therefo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cellular Story: A Robot Dog and a Private 5G Network Walk into a Rail Factory
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03
Hitachi Rail upgraded its manufacturing from “smart” to “brilliant.” In Hagerstown, Maryland, the team combined the power of a private 5G network with the versatility and precision of advanced robotics to improve the flow of operations on the factory floor, enable meticulous inspections, and keep workers safe. So, how did they do it? We met with Hi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
7/22/24 - Unburdened by What Has Been
1:06:13
1:06:13
Play later
Play later
Lists
Like
Liked
1:06:13
It's a Presidential chaos spectacular! Listen, we’d write a rundown, but it’s not worth it. Just listen. Brain Trust Live is Lila Nordstrom and Brent Thornburg's look at the week in electoral and political news. Join the millions of falling phones, sirens, helicopters, barking dogs, and computer beeps who love our podcast and tell your friends abou…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bonus E2 – CrowdStrike Crisis: An IT Nightmare Unfolds
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
Introduction: - Welcome back to a bonus episode of Off the Wire.- Highlight of the week: a bad patch pushed out by CrowdStrike caused worldwide outages. Initial Impact: - Anthony's experience: dealing with server and workstation blue screens.- Timeline of the incident: starting at 12:09 AM with alerts coming in around 12:40 AM.- Initial thoughts an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep5: CrowdStrike's faulty update shuts down global networks
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Three Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and t…
…
continue reading
Send us a Text Message. Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
An Introduction to Capability-Based Planning
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55
Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategically deciding what is needed and how to effectively achieve it. Both business and government acquisition domains use CBP for financial success or to design a well-balanced defense system. The definitions understa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trends Driving the Need for Content Collaboration and Real-Time Engagement
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
I spoke with Adrienne Lester, the Senior Director of Business Services at ShareFile. We discussed the trends driving the need for more content collaboration and real-time engagement, how ShareFile's solutions help law firms keep pace with changes in the practice of law, where legal professionals are leveraging technology to support their compliance…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Christina Shannon, CIO, KIK Consumer Products. Joining us is Andrew Cannata, CISO, Primo Water. In this episod…
…
continue reading
Meter’s Co-founder and CEO, Anil Varanasi, envisions the future of enterprise networking when cutting-edge Network-as-a-Service (NaaS) seamlessly integrates ISP procurement and management with premium hardware, cloud-based software and solutions, and SD-WAN. This approach closes the divide between campus networks and cloud services. At what point w…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why Stack the Pixels Game will Change the Gaming Industry - Yaakov Sash
1:12:30
1:12:30
Play later
Play later
Lists
Like
Liked
1:12:30
Yaakov Sash is the Founder & CEO of Novospir, an innovative gaming ecosystem that introduces a groundbreaking new genre of massively multiplayer social puzzle games. ================ All Episodes can be found at www.thecryptopodcast.org Podcast Coaching + All Social Media + Donations link https://bio.link/podcaster Our Facebook Group can be found a…
…
continue reading
Climate change is a complex and multifaceted problem that no actor can address alone. How can governments understand the impact of various actors in their jurisdiction and ensure that solutions are rolled out effectively and sustainably? Dawn Thomas joins the show to discuss her work using ecosystem models to examine New Orleans’ efforts to tackle …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Can I Best Proactively Secure My SaaS?
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36
In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder & CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution. Impactful M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Security Strategies for the Finance Industry
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
HealthCast: Exploring the Link Between Climate Change and Public Health
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48
Climate change has a major impact on public health, especially for vulnerable communities. Rising temperatures, severe storms and other severe events can negatively affect health outcomes. Agencies are increasingly using data and technology for programs and tools to boost health equity. Dr. John Balbus, director of the Office of Climate Change and …
…
continue reading
A recap of the past week in a guttering business including a broken van and dealing with setbacks in your schedule. Also briefly talk about educating clients by providing options instead of a hard face to face sale. Comments or questions: johnny@gutterjunk.co.ukBy Johnny Smyth
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hypori Halo: Redefining Mobile Device Security with Brian Kovalski
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58
In this episode, Jacob speaks with Brian Kowalski, Senior Vice President of Federal at Hypori. In the episode they discuss Hypori's origin story and its innovations in the mobile security space. Here are some highlights from the episode: Hypori's origin story and its roots starting as an NSA Commercial Solutions for Classified Program (CSfC) produc…
…
continue reading
I spoke with Andrea Miskolczi, the Founder and Director of InterAlia Consulting, a strategy and transformation advisory boutique for legal leaders. We discussed best practices for promoting the adoption of new tools in a legal organization, how lawyers are adopting AI, and whether there is a fear of AI in legal.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Board and CEO Understanding of CyberSecurity as CISOs Grapple with the C-Suite - BSW #356
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55
In the leadership and communications section, The Board’s understanding of cybersecurity, What does your CEO need to know about cybersecurity?, As CISOs grapple with the C-suite, job satisfaction takes a hit, and more! Show Notes: https://securityweekly.com/bsw-356
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Convocourses Podcast: Getting into Cyber from NOTHING (open topics)
1:49:05
1:49:05
Play later
Play later
Lists
Like
Liked
1:49:05
http://convocourses.netBy Bruce Brown
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
1:06:15
1:06:15
Play later
Play later
Lists
Like
Liked
1:06:15
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hermès CIO Charts the Evolution of Retail IT | Techie & the Biz
45:11
45:11
Play later
Play later
Lists
Like
Liked
45:11
On Episode 9 of Techie and the Biz with hosts Erika Silber and Max Silber of MetTel, guest Ken Feyder, CIO, Hermès Americas, discusses the evolution of retail IT and how omnichannel shopping is keeping the store relevant it is keeping
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep4: The AT&T mega-breach, iPhone mercenary spyware, Microsoft zero-days
1:11:39
1:11:39
Play later
Play later
Lists
Like
Liked
1:11:39
Three Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
USDS measures its impact in longevity, not just raw numbers
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13
By Federal News Network | Hubbard Radio
…
continue reading
In this conversation I discuss the Confucius Institute, cybersecurity search engines, ransomware defense evasion tactics, the GOP platform on protecting critical infrastructure, the OpenAI breach, cybersecurity concerns in the automotive industry, the White House's push for increased cyber funds, and the healthcare industry's pushback against cyber…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
*Special Episode* Featuring Caroline Hill, Editor-in-Chief of Legal IT Insider, on Charting Change in Legal Ep 27
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13
In this 27th episode of Charting Change in Legal, Caroline Hill, Editor and Publisher of Legal IT Insider, and I discussed litigation trends, AI applications, self-service training, and ILTACON.By Ari Kaplan
…
continue reading
Join host Max Havey on the latest episode of Security Visionaries as he sits down with guest Jadee Hanson, CISO at Vanta. Jadee offers an in-depth and insightful look at the intertwining roles of CIOs and CISOs in the high-stakes world of cybersecurity. Tune in to listen to Jadee's journey, learn about the strategies she’s used to build bridges bet…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing the future of software with Francis Ofungwu, Global Field CISO at GitLab
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30
"How do you drive trust in a digital first or software first world?" This is the question that Francis Ofungwu, Global Field CISO at GitLab, helps customers answer every day. Securing software development is unlike enterprise security, where CISOs have strong visibility into the environment and can exercise direct control. To secure software, leade…
…
continue reading
This episode showcases a mix of innovation highlights from the CXO Experience at Zenith Live '24 in Las Vegas last month. Listen to four Zscaler executives cover the value and technical details behind data fabric, breach prediction, application segmentation, and zero trust SIM.By Zscaler, Inc
…
continue reading
![Artwork](/static/images/128pixel.png)
1
There's No 'Plant the Flag' Moment in Cybersecurity
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47
Send us a Text Message. When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent Manufacturing Threat Landscape report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys acces…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
With UNO, Army intends to stop battling its own network
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59
By Federal News Network | Hubbard Radio
…
continue reading
![Artwork](/static/images/128pixel.png)
1
TribalNet Reshare: Building the Tribal IT Dream Team with Paula Starr
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26
If you're looking to learn how to combine tribal cultural values with IT best practices and help your technology team keep pace with technological progress all the while delivering high-quality services and solutions with a tribal technology dream team....then this episode is for YOU! Listen in as Cherokee Nation Government CIO, Paula Starr, talks …
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Shirley Salzman, CEO and co-founder, SeeMetrics. In this ep…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Revolutionizing Airport Security: The Role of IDMS in Compliance and Staff Vetting
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07
Ever wondered how airports manage to keep their vast and complex operations secure? Discover the key to robust airport security and ID management as we chat with industry experts Duane Foote and Yves Massard. They share eye-opening insights on the necessity of thoroughly vetting and validating staff, from baristas to tarmac workers, to ensure they …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
VeeamON 2024 Shorts with Craig Dalrymple, Inside Solution Architect at 11:11 Systems | SOTTC Episode #19
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13
In this episode of "The Sound of Tech to Come," hosted by Anthony Spiteri, Craig Dalrymple, Inside Solution Architect at 11:11 Systems and Veeam Vanguard, joins the podcast live from VeeamON 2024. Craig shares his experiences at the event, his role at 11:11 Systems, and the importance of networking and community engagement at VeeamON. The conversat…
…
continue reading