show episodes
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

Unsubscribe
Unsubscribe
Monthly
 
Buzzword? Architecture? Perhaps a true security approach for modern organizations? Join us as we chat with organizations of all types and sizes to learn about their Zero Trust adoption journey and as we answer these questions along the way.
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Enterprise networking isn’t boring. This stuff is real life, from the retail store of the future to the latest public safety technologies. We chop it up with experts from around the globe and various industries — leaving no stone unturned in a mutual quest for the securest, most reliable network possible. SD-WAN and 5G. SASE and zero trust. Stories from the data center to the most far-flung IoT deployments imaginable. (Podcast brought to you by Cradlepoint, part of Ericsson.) cradlepoint.com
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.
  continue reading
 
Join MEF CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling enterprise digital transformation forward. Each episode delves into leading-edge business insights from top network, cloud, and technology executives and industry analysts—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster. Executives at the Edge explores topics such as: What is SD-WAN and SASE and what does market grow ...
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led a leader in the field: Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" and "Zero Trust and Third-Party Risk: Reduce the Blast Radius")
  continue reading
 
Kelly O'Dwyer-Manuel & David Brossard discuss the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect A ...
  continue reading
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
"Net Zero: What’s innovation got to do with it?" is a limited podcast series which includes interviews with experts – from scientists to business leaders – about the role of a critical ingredient in tackling the climate crisis: innovation. In each episode, hosts Simon Retallack and Nina Foster from the Carbon Trust’s Net Zero Intelligence Unit quiz guests about how they’ve deployed innovation to drive urgent change. The series will explore how innovation has unlocked other urgent global prob ...
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Artwork

1
Ask the CIO

Federal News Network | Hubbard Radio

Unsubscribe
Unsubscribe
Monthly+
 
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
  continue reading
 
AGA is the member organization for government financial management professionals. We lead and encourage change that benefits our field and all citizens. Our training events, professional certification, publications and ongoing education help members build their skills and advance their careers.
  continue reading
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
  continue reading
 
The business of providing professional advice is changing. Today, anyone can go online and access a wealth of information about any topic, from legal and medical advice to financial planning and accounting suggestions. This blog is designed to offer ideas, guidance, and perspectives on how to effectively navigate a perpetually shifting professional landscape, with a unique focus on the legal industry and the technology that is driving its evolution.
  continue reading
 
Techie & the Biz is a podcast series that explains and simplifies business technology, how it’s changing and how it can help your organization. Hosts Max and Erika Silber discuss with experts a wide range of business technologies from Microsoft Teams and Mobile tech to AI, IoT, SD-WAN and SASE network security – in a (mostly) serious manner (except when it’s not) befitting a business podcast (to real people).
  continue reading
 
Artwork

1
Federal Executive Forum

Federal News Network | Hubbard Radio

Unsubscribe
Unsubscribe
Monthly
 
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
  continue reading
 
SC Media, and our sponsor RegScale, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Sto ...
  continue reading
 
Eric Maddox is the Army interrogator who, while attached to a Delta Force team in Tikrit, Iraq, collected the intelligence which led to the capture of Saddam Hussein. He subsequently became the first civilian interrogator for the Defense Intelligence Agency and went on to conduct over 2700 interrogations. Eric has repeatedly been able to influence those who have zero trust in him, to make the decision to give him information, even more than he asked, without using torture. Eric honed his sys ...
  continue reading
 
Artwork
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Here I interview people around the World that share their tips about Crypto and Blockchain technology. We discuss NFT's , regulation as well as the best Crypto investments. I ask my guests how to avoid blockchain fraud as well as what wallets and Exchanges do they use and why. We also discuss Mining in the Crypto World. According to Listennotes this Podcast is now in the Top 1% of Podcasts. Thank you to all my listeners.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Loading …
show series
 
For the last twenty years we’ve invested in software security without parallel development in firmware security. Why is that? Tom Pace, co-founder and CEO of NetRise, returns to Error Code to discuss the need for firmware software bills of materials, and why Zero Trust is a great idea yet so poorly implemented. As in Episode 30, Tom is a straight s…
  continue reading
 
Introduction: Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity. Episode Overview: Discussion on Zero Trust security. Segment 1: Conference Recap Anthony's recent attendance at the IT conference for South Carolina co-ops. Key takeaway: Importance o…
  continue reading
 
On this episode, we chat with Chris Horton and Brendan Bowers from RMA about Zero Trust! What's that? Tune in and find out. Some great resources are here as well:OMB Memorandum M-22-09: https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf CISA Guidance: https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.p…
  continue reading
 
I spoke with Steve Orrin, the Federal Chief Technology Officer for Intel Corporation, where he leads Intel's Federal and Public Sector Solution Architecture, Strategy, and Technology engagements. We discussed how public and private sector organizations are dealing with the rise in cybersecurity attacks, how they can enhance their security controls …
  continue reading
 
Zero Trust is becoming a critical pillar of the department of Defense’s cybersecurity strategy. The strategy, embodied by the motto of “never trust, always verify,” demands a new outlook on cybersecurity. Randy Resnick discusses why Zero Trust is so important, how his office is working to reshape the way DOD employees view zero trust, and how clear…
  continue reading
 
Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and fina…
  continue reading
 
https://youtube.com/live/l_jx9KjeJkI http://convocourses.net The Zero Trust security model is a cybersecurity framework that operates on the principle of "never trust, always verify." Unlike traditional security models that rely on a strong perimeter defense, Zero Trust assumes that threats can come from both outside and inside the network. Therefo…
  continue reading
 
Hitachi Rail upgraded its manufacturing from “smart” to “brilliant.” In Hagerstown, Maryland, the team combined the power of a private 5G network with the versatility and precision of advanced robotics to improve the flow of operations on the factory floor, enable meticulous inspections, and keep workers safe. So, how did they do it? We met with Hi…
  continue reading
 
It's a Presidential chaos spectacular! Listen, we’d write a rundown, but it’s not worth it. Just listen. Brain Trust Live is Lila Nordstrom and Brent Thornburg's look at the week in electoral and political news. Join the millions of falling phones, sirens, helicopters, barking dogs, and computer beeps who love our podcast and tell your friends abou…
  continue reading
 
Introduction: - Welcome back to a bonus episode of Off the Wire.- Highlight of the week: a bad patch pushed out by CrowdStrike caused worldwide outages. Initial Impact: - Anthony's experience: dealing with server and workstation blue screens.- Timeline of the incident: starting at 12:09 AM with alerts coming in around 12:40 AM.- Initial thoughts an…
  continue reading
 
Three Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and t…
  continue reading
 
Send us a Text Message. Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary c…
  continue reading
 
Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategically deciding what is needed and how to effectively achieve it. Both business and government acquisition domains use CBP for financial success or to design a well-balanced defense system. The definitions understa…
  continue reading
 
I spoke with Adrienne Lester, the Senior Director of Business Services at ShareFile. We discussed the trends driving the need for more content collaboration and real-time engagement, how ShareFile's solutions help law firms keep pace with changes in the practice of law, where legal professionals are leveraging technology to support their compliance…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Christina Shannon, CIO, KIK Consumer Products. Joining us is Andrew Cannata, CISO, Primo Water. In this episod…
  continue reading
 
Meter’s Co-founder and CEO, Anil Varanasi, envisions the future of enterprise networking when cutting-edge Network-as-a-Service (NaaS) seamlessly integrates ISP procurement and management with premium hardware, cloud-based software and solutions, and SD-WAN. This approach closes the divide between campus networks and cloud services. At what point w…
  continue reading
 
Yaakov Sash is the Founder & CEO of Novospir, an innovative gaming ecosystem that introduces a groundbreaking new genre of massively multiplayer social puzzle games. ================ All Episodes can be found at www.thecryptopodcast.org Podcast Coaching + All Social Media + Donations link https://bio.link/podcaster Our Facebook Group can be found a…
  continue reading
 
Climate change is a complex and multifaceted problem that no actor can address alone. How can governments understand the impact of various actors in their jurisdiction and ensure that solutions are rolled out effectively and sustainably? Dawn Thomas joins the show to discuss her work using ecosystem models to examine New Orleans’ efforts to tackle …
  continue reading
 
In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder & CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution. Impactful M…
  continue reading
 
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
  continue reading
 
Climate change has a major impact on public health, especially for vulnerable communities. Rising temperatures, severe storms and other severe events can negatively affect health outcomes. Agencies are increasingly using data and technology for programs and tools to boost health equity. Dr. John Balbus, director of the Office of Climate Change and …
  continue reading
 
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
  continue reading
 
In this episode, Jacob speaks with Brian Kowalski, Senior Vice President of Federal at Hypori. In the episode they discuss Hypori's origin story and its innovations in the mobile security space. Here are some highlights from the episode: Hypori's origin story and its roots starting as an NSA Commercial Solutions for Classified Program (CSfC) produc…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Three Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's…
  continue reading
 
In this conversation I discuss the Confucius Institute, cybersecurity search engines, ransomware defense evasion tactics, the GOP platform on protecting critical infrastructure, the OpenAI breach, cybersecurity concerns in the automotive industry, the White House's push for increased cyber funds, and the healthcare industry's pushback against cyber…
  continue reading
 
Join host Max Havey on the latest episode of Security Visionaries as he sits down with guest Jadee Hanson, CISO at Vanta. Jadee offers an in-depth and insightful look at the intertwining roles of CIOs and CISOs in the high-stakes world of cybersecurity. Tune in to listen to Jadee's journey, learn about the strategies she’s used to build bridges bet…
  continue reading
 
"How do you drive trust in a digital first or software first world?" This is the question that Francis Ofungwu, Global Field CISO at GitLab, helps customers answer every day. Securing software development is unlike enterprise security, where CISOs have strong visibility into the environment and can exercise direct control. To secure software, leade…
  continue reading
 
Send us a Text Message. When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent Manufacturing Threat Landscape report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys acces…
  continue reading
 
If you're looking to learn how to combine tribal cultural values with IT best practices and help your technology team keep pace with technological progress all the while delivering high-quality services and solutions with a tribal technology dream team....then this episode is for YOU! Listen in as Cherokee Nation Government CIO, Paula Starr, talks …
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Shirley Salzman, CEO and co-founder, SeeMetrics. In this ep…
  continue reading
 
Ever wondered how airports manage to keep their vast and complex operations secure? Discover the key to robust airport security and ID management as we chat with industry experts Duane Foote and Yves Massard. They share eye-opening insights on the necessity of thoroughly vetting and validating staff, from baristas to tarmac workers, to ensure they …
  continue reading
 
In this episode of "The Sound of Tech to Come," hosted by Anthony Spiteri, Craig Dalrymple, Inside Solution Architect at 11:11 Systems and Veeam Vanguard, joins the podcast live from VeeamON 2024. Craig shares his experiences at the event, his role at 11:11 Systems, and the importance of networking and community engagement at VeeamON. The conversat…
  continue reading
 
Loading …

Quick Reference Guide