Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Join Query CISO Neal Bridges and VP - Distinguished Engineer Jonathan Rau as they explore the world of SecDataOps. What is it? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
A disgraced CISO (Greg Kinnear) gets a call from a Miami journalist (Erin Moriarty) who needs help investigating a series of scams targeting terminally ill patients. He begrudgingly accepts… But in a world of swindling and deceit, where nothing is what it seems – their findings are just the tip of the iceberg.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
…
continue reading
The Cloud Frontier podcast by simplyblock brings you topics around the founding of early-stage cloud infrastructure startups, entrepreneurship and taking visionary ideas to market. Explore their fundraising journeys, go-to-market strategies, and the challenges of finding product-market fit. Tune in to discussions on AI, machine learning, and the future of cloud technologies. Whether you're a tech enthusiast, aspiring entrepreneur, or industry professional (CTO, CIO, CISO, VP of Infrastructur ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
1
Digital Wild West: Greed, Chaos, and the Cyber Arms Race
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09
From water bills held hostage to artists losing their savings, this week's cyberattacks expose our digital vulnerabilities. We unpack the motives, the players, and the tech shaping this digital battleground. Plus, what you can do to protect yourself.By CISO Marketplace
…
continue reading
1
AI, Cloud Security, and Resilience: Highlights from N TX ISSA - CSC 12
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27
In This Episode: We cover a range of timely topics, including: • Matt Walker, Managing Director of Security and Compliance at Goosehead Insurance: Discusses the challenges of threat exposure management and strategies for cloud security. • Dr. Harvey Castro, ER Doctor and Keynote Speaker: Shares his journey of integrating AI into healthcare, from re…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole continues the conversation on key trends that every Chief Information Security Officer (CISO) should be aware of. Building off the last episode where he discussed AI regulations, zero trust, and cyber numbness, Dr. Cole shifts focus to critical topics like metrics, communication, leadership, cloud se…
…
continue reading
1
🚨 Ex Uber CISO asks for Fair Trial, Air Gapped Networks Breached, Patch Tuesday Recap, MSFT 0Day
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10
🚨 Ex Uber CISO asks for Fair Trial, Air Gapped Networks Breached, Patch Tuesday Recap, MSFT 0Day 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Ex Uber CISO Joe Sullivan asks for a Fair trial in new filing with more news below: Air Gapped Netwo…
…
continue reading
1
The value of resilient manufacturing with Suvabrata Sinha, CISO in Residence
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37
Factories face unique and seemingly insurmountable cybersecurity challenges in the increasingly digitalized landscape, but there is a light at the end of the tunnel where leaders can deliver reliable production, secure supply chains, and availability of products and services. Discover how zero trust fits in a world of operational tech, legacy proce…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
Cary Johnson has developed a fully managed phishing awareness and auditing program that provides true value to phishing simulations. Legacy phishing simulators lack a performance measurement framework that undeniably measures impact. His innovative performance measurement framework establishes true baselines and resets them monthly to provide objec…
…
continue reading
1
Does Burying Your Head in the Sand Count as a Security Posture? (LIVE in Boca Raton, FL)
45:54
45:54
Play later
Play later
Lists
Like
Liked
45:54
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Eduardo Ortiz, vp, global head of cybersecurity, Techtronic Industries. Joining us is Adam Fletcher, CSO, Blackstone. In this episode: Keeping our eyes on new risks The hiring disconnect Mental h…
…
continue reading
In this episode of CISO Tradecraft, hosted by G Mark Hardy, you'll learn about four crucial tools in cloud security: CNAPP, CASB, CSPM, and CWPP. These tools serve various functions like protecting cloud-native applications, managing access security, maintaining cloud posture, and securing cloud workloads. The discussion covers their roles, benefit…
…
continue reading
1
The GC+CISO Connection: Understanding the GC's Role in Protecting the Organization Against Cyber Risk
34:27
34:27
Play later
Play later
Lists
Like
Liked
34:27
Welcome to the GC+CISO Connection Show with host Shawn Tuma. In this very first episode of the Show, Shawn talks with Dena DeNooyer Stroh, General Counsel and Ethics Officer at North Texas Tollway Authority, to learn her perspectives on the legal department's role in cybersecurity, collaboration between the GC and the IT and InfoSec Teams, and tips…
…
continue reading
In this episode, Jeffrey talks to Evelin Biro, a CISO advisor and cybersecurity expert. They discuss movies where a character goes through a significant life change, the role risk acceptance plays for CISOs and the difficult disconnect between regulatory requirements and business expectations.By Jeffrey Wheatman
…
continue reading
Episode Summary: In this episode of The New CISO, host Steve Moore is joined by Nicola Sotira, head of CERT at Poste Italiane. Nicola shares his journey from working on cryptographic devices in the pre-internet era to leading security teams today. His early work with assembly language, hardware security, and cryptanalysis offered unique challenges,…
…
continue reading
1
Episode 143: Is Decentralized Proof of Security Leveraging Blockchain the future of Cybersecurity?
49:46
49:46
Play later
Play later
Lists
Like
Liked
49:46
In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography. How the Naoris Protocol establishes decentralized trust for compute e…
…
continue reading
1
AI & Human Error: How Technology Secures the Future with MGM Resorts International SVP & CISO Stephen Harrison
27:19
27:19
Play later
Play later
Lists
Like
Liked
27:19
On the 18th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Stephen Harrison, Senior Vice President and Chief Information Security Officer at MGM Resorts International. MGM Resorts International is a global hospitality and entertainment leader, operating some of the most …
…
continue reading
1
Week in Review: Neuberger’s insurance warning, instant identification sunglasses, Salt Typhoon dangers
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Quincy Castro, CISO, Redis. Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
…
continue reading
1
Typhoons and Blizzards: Cyberespionage and national security on front burner
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09
Three Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge…
…
continue reading
1
Data Privacy: Crossing Borders in the Digital Age
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07
Ever order takeout online? You're thinking about food, not data, right? But somewhere a company is processing your order, your address, and even your payment information, possibly sending it across borders. This podcast is your crash course on data privacy laws and cross-border data transfers. Learn how GDPR, CCPA, LGPD, and PIPL impact you and wha…
…
continue reading
Ever get the feeling like someone's listening in on your digital life? Well, Texas has heard you! In this episode, we break down the Texas Data Privacy and Security Act (TDPSA), a game-changing law designed to give Texans more control over their personal data.By CISO Marketplace
…
continue reading
1
Coker’s Internet Security plan, hurricane scams, Firefox zero day
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
White House prioritizes secure internet routing, using memory safe languages Federal Trade Commission and CISA warn of hurricane-related scams Mozilla warns of Firefox zero day: patch now Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security re…
…
continue reading
1
🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46
🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Internet archive data breach with more news below: Fortinet Exploit in the Wild AI Powered Cybercr…
…
continue reading
1
CISO's on Trial: Cybersecurity's Legal Battlefield
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59
Explore landmark legal cases like USA v. Sullivan and SEC v. SolarWinds and learn about the evolving responsibilities of CISOs and the impact of cyber security on financial stability.By CISO Marketplace
…
continue reading
1
The Lurking Dangers of Neglected Security Tools
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, VP and deputy CISO - Gaming, Microsoft. Joining us is Adam Fletcher, CSO, Blackstone. In this epi…
…
continue reading
1
Australia's cybersecurity bill, Qualcomm zero-day, Russia bans Discord
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
Australian Parliament introduces standalone cybersecurity law Qualcomm zero-day used to target Android devices Russia and Turkey ban Discord Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
…
continue reading
Learn what it takes to be a Chief Information Security Officer in this deep dive into building a security culture.By CISO Marketplace
…
continue reading
1
Why “Always Be Collaborating” Should Overshadow “Always Be Closing” in Security Sales
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17
In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience.…
…
continue reading
This week, we discuss something near and dear to our hearts - RDP Shortpath! What is it, even? TCP and UDP? Get out of here! We touch on the current enterprise landscape, the need for BYOD, Microsoft's remote working capabilities, and how RDP Shortpath rules them all. Mostly. Also, Tobi asks Jussi an unexpected question. (00:00) - Intro and catchin…
…
continue reading
1
A Cybersecurity Program to Emulate? A Powerful Formula with Jason Shockey
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
Jason Shockey, CISO of Cenlar FSB, and 25 year veteran of cybersecurity, has a formula for running an excellent cybersecurity program. He studied a great deal in his various cybersecurity roles before leaping into a CISO role, and the studying paid off! Jason and Allan and Drew discuss the following: Identifying Common Pitfalls Promoting Team Well-…
…
continue reading
Scam hunters look for vulnerabilities. Ezra teaches Heidi where to look. Stay up-to-date on future episodes at scamhunters.io – SCAM HUNTERS is presented by Thoropass. Does your infosec compliance process sometimes feel like a mystery? You need Thoropass—the all in one infosec compliance delivery platform with seamless audits, airtight security, an…
…
continue reading
1
Building the Professional CISO: Gary Hayslip on Merging Risk, IT, and Business
35:59
35:59
Play later
Play later
Lists
Like
Liked
35:59
In this episode, David Malicoat interviews Gary Hayslip, Global Chief Information Security Officer (CISO) at SoftBank Investment Advisors. Gary shares his deep insights on the evolution of the CISO role, discussing how it’s becoming more integrated with risk management, business strategy, and AI. He reflects on his own career journey from the U.S. …
…
continue reading
1
Episode 104: Inside the First Year of a Cybersecurity Career
32:56
32:56
Play later
Play later
Lists
Like
Liked
32:56
In episode 104 of Cybersecurity Where You Are, Sean Atkinson is joined by Kennidi Ortega, Information Security Analyst at the Center for Internet Security® (CIS®). Together, they explore the experience of a first-year analyst and how they might make the most of getting started in a cybersecurity career. Here are some highlights from our episode: 01…
…
continue reading
1
GoldenJackal, LiteSpped Cache bug, Ukraine's milCERT
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23
GoldenJackal uses new tools against governments Cross-site scripting flaw found in major WordPress plugin Ukraine’s defense ministry launched military CERT Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire …
…
continue reading
Don’t let the perfect be the enemy of the good… it’s a challenge that architects and strategists often face. They may design a “perfect” architecture or strategy, only to see it overwhelmed by the realities of implementation. John Burke and Johna Johnson discuss the questions to ask to ensure that devotion to the perfect doesn’t... Read more »…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
…
continue reading
1
World's Fastest Distributed Database | Adam Szymański
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27
In this episode of Cloud Frontier, we chat with Adam Szymański, CTO and co-founder of Oxla, a fast and efficient distributed database. Adam shares his journey from Google to founding Oxla and how it's helping IoT and cybersecurity companies handle massive data more quickly and cost-effectively. He also touches on the challenges of competing with gi…
…
continue reading
1
🚨 American Water Shuts Down after Cyberattack, Russian State Media Cyberattack, ADT Breach
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41
🚨 American Water Shuts Down after Cyberattack, Russian State Media Cyberattack, ADT Breach 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as American Water Shuts Down after Cyberattack with more news below: Russian State Media Cyberattack Moneygra…
…
continue reading
This podcast provides a comprehensive overview of the essential cybersecurity laws that shape how we interact with data in the digital age. Listeners will gain a clear understanding of the key regulations, including GDPR, CCPA, HIPAA, and PCI DSS, and how these laws work in concert to protect personal and sensitive information. The podcast breaks d…
…
continue reading
1
Salt Typhoon attack, Cyberattack hits major U.S. water utility, Russia attacked on Putin's birthday
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
Salt Typhoon attack potentially exposes wiretap data Cyberattack hits major U.S. water utility A not- so- happy birthday present for Russia’s president Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Auto…
…
continue reading
Tired of the annual PCI scramble? This episode explores how to make PCI DSS part of your everyday security posture. We'll discuss practical tips, new technologies, and the evolving threat landscape, emphasizing that security is a journey, not a destination!By CISO Marketplace
…
continue reading
1
🚨 China Hacks US Wiretap systems in ISP Attack, Star Blizzard Dismantled, Comcast & Truist Bank Breach
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22
🚨 China Hacks US Wiretap systems in ISP Attack, Star Blizzard Dismantled, Comcast & Truist Bank Breach 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as China Targets US Wiretaps in ISP Attack with more news below: Russian Star Blizzard Dismantled…
…
continue reading
1
Neuberger’s Insurance suggestion, Kaspersky PlayStore removal, Detroit suffers cyberattack
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42
Insurers should stop funding ransomware payments, says Neuberger Google removes Kaspersky antivirus software from Play Store Cyberattack hits Detroit-area government services Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With V…
…
continue reading
1
Navigating the Cybersecurity Wilderness: Your Guide to Choosing the Right Framework
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26
Feeling lost in a sea of acronyms like NIST, ISO 27001, and CIS? This podcast is your guide to understanding and choosing the right cybersecurity framework for your organization. We break down the jargon, explore the strengths of each framework, and help you ask the right questions to find the perfect fit for your size, industry, and budget. Join u…
…
continue reading
1
Cyber Insurance: Navigating the Digital Threat Landscape
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34
In a world driven by data, are you truly protected? Join us as we explore the complexities of cyber insurance, empowering businesses and individuals to make informed decisions in the face of evolving digital threats.By CISO Marketplace
…
continue reading
1
Week in Review: T-Mobile breach cost, Senate’s deepfake scam, Public records flaws
21:20
21:20
Play later
Play later
Lists
Like
Liked
21:20
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jonathan Waldrop, CISO, The Weather Company. Here’s a link to CISA’s Cybersecurity Awareness Month announcement, sent to us by Jonathan. Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know…
…
continue reading
1
Careto returns, IDA Pro pricing controversy, crypto's North Korea problem
1:30:38
1:30:38
Play later
Play later
Lists
Like
Liked
1:30:38
Three Buddy Problem - Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean c…
…
continue reading
1
Navigating the Cloud: Unveiling the Hidden Costs and Risks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34
In this compelling episode of Breakfast Bytes, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise servers. With insights from a newly recognized expert in the field, this episode promises to challenge conventional wisdom and offer fresh perspectives…
…
continue reading
Schools, hospitals, airports, and even a global energy giant weren't safe from cyberattacks this summer. Listen as we unpack the major events, new ransomware players, and the alarming trend of attacks on essential services.By CISO Marketplace
…
continue reading
1
Largest DDoS blocked, Adobe Commerce compromise, neural data law
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
Cloudflare blocks largest recorded DDoS attack Adobe Commerce and Magento stores compromised by CosmicSting bug DOJ and Microsoft take down 107 domains used in Star Blizzard phishing attacks Huge thanks to our sponsor, SpyCloud Ransomware continues to impact organizations. A new report released by SpyCloud shares insights from your peers in securit…
…
continue reading
In this new episode of Life of a CISO, Dr. Eric Cole dives into one of the biggest challenges faced by Chief Information Security Officers (CISOs): staying up to date with the rapidly changing trends in cybersecurity. With new technologies, products, and vendors emerging from conferences like RSA, it's crucial for CISOs to stay focused on key areas…
…
continue reading
1
Exploring the Future of CBDCs and AI in Central Banking
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47
In this episode of The Cash News Podcast, Tom Meehan and Shaun Ferrari explore key trends in Central Bank Digital Currencies (CBDCs) and the growing influence of artificial intelligence (AI) in the financial sector. From regulatory challenges to emerging use cases, they discuss how central banks are leveraging these technologies to shape the future…
…
continue reading
1
Suffolk County Cyberattack: A Preventable Disaster
14:30
14:30
Play later
Play later
Lists
Like
Liked
14:30
Millions in recovery costs. Chaos for residents. The Suffolk County cyberattack was a major wake-up call. Join us as we unpack the recent report revealing the perfect storm of missed warnings, systemic failures, and poor decisions that left Suffolk County vulnerable to attack.By CISO Marketplace
…
continue reading