The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
The purpose of the Skeptical Analyst podcast is to offer my opinions, remarks, and contemplations about issues impacting insurance cyber commercial clients, specifically the issues at the intersection of the insurance industry, technology, and cyber risks.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join Marsh colleagues, risk professionals, C-suite executives, and others for conversations about the major risks businesses face today and how you can better understand and more effectively manage them.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Experiments in Risk Science
…
continue reading
Barry Kirby explores aspects of Human Factors, from practitioners in the field, through Processes and Tools that are useful (or not) and other Information and News that may be beneficial. For HF people to keep in touch and non-HF people to hear what we do.
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Our goal for this series is to bring to listeners the latest insights on trending topics, delivered by specialists from Guy Carpenter and other organizations on the forefront of thought leadership.
…
continue reading
TrendsMD Welcome to TMLT’s podcast series that explores growing issues within the health care, technology, and medical liability arenas. Hosted by Tony Passalacqua of TMLT, TrendsMD attempts to bring greater focus to issues that face the health care community in Texas and beyond. We also identify industry trends and help policyholders navigate their medical liability coverage. Our episodes are dedicated to educating medical and administrative personnel on technology-based themes, including t ...
…
continue reading
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
A series of interviews with our staff speaking on some of the hot topics embedded within the heart of Mobius Group.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
1
Moody's Talks - Focus on Finance
Moody's Investors Service, Ana Arsov, Danielle Reed, Mark Wasden, Bruno Baretta, Donald Robertson
Hosted by Danielle Reed of Moody's Financial Institutions team, Focus on Finance helps you keep on top of developments within the banking, insurance and asset management sectors — from the impact of tech disrupters and cyber risk to the ongoing effects of ESG and lower-for-longer interest rates. Published by Moody's Investors Service.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Tech Uncensored, Crucial Analysis in Tech, is a bi-weekly podcast brought to you by Altitude Accelerator. Hosted by Hessie Jones, we explore emerging news, and relevant topics that startups care about. We speak to subject matter experts, founders and advisors in Investment: Venture Capital, Equity Crowdfunding, and across Industry: Clean Tech, Biotech, Generative AI, Blockchain, Web3, Privacy, Security etc. who weigh in on the challenges that startup founders face today, as well as the profo ...
…
continue reading
Join Ryan Whybrow, an experienced insurance broker, as he chats with industry experts and local business owners in East Anglia and across the UK. Each episode dives into the world of general insurance, offering insights, advice, and real-world experiences to help you protect your business. Discover how to safeguard your assets, navigate insurance complexities, and ensure peace of mind for your enterprise. Tune in to stay informed, stay secure, and learn from the best in East Anglia! 📧 For mo ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Conversations with Thailand is a bi-monthly podcast series by Deloitte Thailand. Listeners can expect to hear insights from subject matter experts across the different business domains that will benefit both organisations and individuals navigate through complexities of today's VUCA world.
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
…
continue reading
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
1
Insider Threats & Third Party Risk: How to Manage Security Threats
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58
Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers…
…
continue reading
1
2024 NCSAM Week 5 - Cyber Security Hygiene And The Public Sector
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38
2024 NCSAM Week 5 - Cyber Security Hygiene And The Public SectorBy Public Risk Management Association (PRIMA)
…
continue reading
1
Crafting an Agile IT Strategy: Sarfraz Shaikh on Risk Management and Driving Continuous Improvement
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44
In this episode… Sarfraz Shaikh shares his unique journey from working in marketing and communications to leading the IT department at One Mesa. With an educational background in IT, Sarfraz was able to leverage his technical knowledge and communication skills to help shape the company’s IT strategies during a time of growth. Starting in a loosely …
…
continue reading
1
The Importance of Third-Party Risk Management (TP3M) in Cyber Security: David Beardshaw, CISO
45:15
45:15
Play later
Play later
Lists
Like
Liked
45:15
On this episode, David Beardshaw, CISO of 3VRM, joins Yonatan Lipschitz. They discuss the importance of third-party risk management (TPRM) and its role in securing organizations. They explore the definition of TPRM and the risks associated with third-party relationships. They also discuss the challenges of questionnaire-based assessments and the ne…
…
continue reading
1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading
1
Christos Ruci on Building Resilient Cybersecurity for Critical Infrastructure
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
In This Episode In this episode, Matthew Connor hosts Christos Ruci, CIO of Limbach, as they discuss the critical overlap between infrastructure and cybersecurity. Christos shares his unique career path—from AOL customer support to CIO of a national building solutions provider—highlighting how each role shaped his approach to IT leadership. At Limb…
…
continue reading
1
S2 Finale: Tame the Tech Beast: A Complete Guide for Business Owners
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04
👉🏻Get a Digital Copy of Tame the Tech Beast https://www.onestepsecureit.com/ttb-beyond-cyber One Step Secure IT Your path to strong IT and Cybersecurity starts here: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode of One Step Beyond Cyber, host Scott Kreisberg, CEO of One Step Secure IT, sits down with…
…
continue reading
1
What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58
In this episode, Jeffrey talks to Cindy Seipert, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.By Jeffrey Wheatman
…
continue reading
1
EP 097 Peter Warmka former CIA Intelligence Officer and Author of 'Confessions of a CIA SPY'
1:03:01
1:03:01
Play later
Play later
Lists
Like
Liked
1:03:01
Send us a text Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas. He is an Adjunct Professor at Webster University's Masters in Cybersecurity Program, Founder of Orlando, Florida-based firm Counterintelligence Institute, LLC, and author of …
…
continue reading
1
Fo[RE]sight Ep10: BUSINESS EMAIL COMPROMISE: WAKING UP TO A SLEEPER THREAT
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23
In this episode of Fo[RE]sight, Guy Carpenter’s Jess Fung, Managing Director and North American Cyber Analytics Lead, and Carol Aplin, Senior Vice President and Principal Cyber Modeler at Marsh McLennan’s Cyber Risk Intelligence Center, discuss their report, Cyber's Sleeper Threat: Business Email Compromise. We’ll talk about the threats of business…
…
continue reading
1
Building a Safety Culture: Lessons from Aviation for Risk Management with James Benham
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29
On the latest episode of Risk Management: Brick by Brick, Jason Reichl is joined by James Benham, founder of JBKnowledge and experienced pilot, who shares insights on innovation in insurance technology, aviation safety practices, and the importance of education in risk management. In this episode, Jason and James explore how AI and automation are t…
…
continue reading
1
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
38:45
38:45
Play later
Play later
Lists
Like
Liked
38:45
In this episode, we dive deep into the newly released Microsoft Digital Defense Report 2024, which offers a comprehensive look at the latest trends in the global cybersecurity landscape. From evolving cyber threats and attack strategies to Microsoft's analysis of the most vulnerable sectors, we break down the key findings and what they mean for bus…
…
continue reading
1
Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17
In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecu…
…
continue reading
1
Risk Management - People, Process, Technology
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57
As we wrap up Cybersecurity Month, I had a chance to sit down with Wayne Selk, VP of CompTIA Cybersecurity Programs and Executive Director of CompTIA ISAO, to discuss Risk Management and its role in cybersecurity—flashback to the late 90s and the changes we have seen that bring us to today. --- Support this podcast: https://podcasters.spotify.com/p…
…
continue reading
As startups evolve from small, agile teams to growth-oriented organizations, the need for strategic human resources management becomes critical. While startups often focus on product development, market penetration, and financial viability, at the early stages, once they’ve established market viability, people strategy becomes equally important. Wh…
…
continue reading
1
CYFIRMA Research- APT Quarterly Highlights- Q3 2024
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11
Our Q3 2024 APT Quarterly Highlights Report reveals intensified cyber activities from APT groups in Iran, Russia, China, and North Korea, indicating heightened espionage efforts. Iran’s MuddyWater and APT34 leveraged custom malware like BugSleep, while Russia’s APT29 and APT28 capitalized on zero-day vulnerabilities for sophisticated infiltration. …
…
continue reading
1
DtSR Episode 625 - Cyber Ghost Stories to Tell in the Dark
39:27
39:27
Play later
Play later
Lists
Like
Liked
39:27
Send the hosts a message - try it now! TL;DR: On this week's episode, Jim, James, and I sit down to a Halloween "scary story" episode. You know the feeling... that sinking feeling of dread when you can't quite put your finger on what's wrong but something is definitely wrong. Something scary, and nefarious is happening... and usually it's coming fr…
…
continue reading
With over 80% of international trade transported by sea, ports and terminals are essential components of the global supply chain. However, they face a range of risks — including natural disasters, operational challenges, cyberattacks, and workforce disruptions — that can lead to significant disruptions with far-reaching effects on the global econom…
…
continue reading
1
Inside the Mind of ‘The Gibson’: Ethics, Activism, and the Evolution of Hacking
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30
Join Kali Fencl as she dives deep into a conversation with cybersecurity veteran The Gibson. With 25+ years in InfoSec, The Gibson shares his journey from coding as a child to shaping threat intelligence and privacy-first technology today. In this episode, they discuss hacker ethics, the influential hacker groups Loft and Cult of the Dead Cow, the …
…
continue reading
1
How secure is your food: Cybersecurity threats and careers | Guest Jonathan Braley
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Jonathan Braley from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag ISAC) delves into the critical security challenges i…
…
continue reading
1
Cybersecurity in Healthcare: J.D. Whitlock on Protecting Patient Data
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02
In this episode, Matthew Connor engages with J.D. Whitlock, Chief Information Officer of Dayton Children’s Hospital, to explore the unique demands of nonprofit healthcare technology. J.D. shares his career journey from Navy officer to healthcare administrator, and finally to CIO, where his strategic approach drives the hospital’s technological and …
…
continue reading
1
InfoSec Beat: How to Balance Real-Time Intelligence with System Availability
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55
Are organizations in control of updates to their environments? The July 2024 CrowdStrike disruptive update has many asking this question. Patches are essential to security, but this event and others before it have organizations asking how to strike a balance in protecting quickly with the need to be resilient? Join me and Jacky Fox, Accenture Secur…
…
continue reading
How does Thom also do the episode notes? This week in infosec was about a EULA Rant of the week https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html Billy Big Balls https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/ Some news articles from in…
…
continue reading
In this episode of Insurance Matters - Product Focus: Motor Trade, Maxine Murray from Konsileo | East Anglia and Louis Rudd from AXA provide valuable insights into the world of Motor Trade insurance. They explore coverage options, discuss the importance of tailored policies, and highlight potential risks for businesses in the motor trade industry. …
…
continue reading
1
CYFIRMA Research- CVE-2024-7593 Vulnerability in Ivanti Virtual Traffic Manager: Vulnerability Analysis and Exploitation
3:54
3:54
Play later
Play later
Lists
Like
Liked
3:54
Ivanti Virtual Traffic Manager (vTM) users – A critical authentication bypass flaw (CVSS 9.8) is now being actively exploited! This vulnerability allows unauthenticated attackers to gain admin control over your systems. Patch now to prevent unauthorized access, data theft, or malware deployment. Public exploit code is already circulating. Stay secu…
…
continue reading
1
Deviance Normalization & Risk Management with Marco Ayala
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05
Technological change is inevitable and often one of the aspects that attracts people toward careers in information and operational technology. Although risk management is a part of navigating advancement in any area, the fundamental flaw in any management system is our human tendencies. This episode explores how organizations can make slow, steady …
…
continue reading
1
Bank funding of private credit grows in rapid step with sector capital-raising
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35
Moody’s Ratings Banking team AMD Fadi Massih discusses key highlights from our survey of banks actively engaged with private credit. Speaker: Fadi Massih, Associate Managing Director-Banking at Moody's Ratings Host: Danielle Reed, VP-Senior Research Writer; Michael Porta, VP-Senior Research Writer Related research: Private Credit – Global: Bank fun…
…
continue reading
1
(Replay) How To Actually Protect Credentials
43:31
43:31
Play later
Play later
Lists
Like
Liked
43:31
In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professiona…
…
continue reading
1
193. Rogue Hackers and the Internet Archive Breach: 31 Million Accounts Exposed!
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
In this episode of Breaking Badness, Kali, Tim, and Taylor discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers are exploiting Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, r…
…
continue reading
In this episode, Jeffrey talks with Keren de Via, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition …
…
continue reading
1
VP of Partnerships & Strategy: Embracing Technology, Elevating Customer Value & Strategic Partnerships in Risk Management
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49
In this Greatest Hits episode of Risk Management: Brick by Brick, Jason Reichl has a guest, Sharon Fox, who is an expert in insurance. Sharon holds the position of Vice President of Partnerships & Strategy at TrustLayer, where she plays a crucial role in driving the company's growth and success. She focuses on creating programs that aid channel, st…
…
continue reading
1
EP 096 Paul Evans CEO Carlisle Support Services: 'The Life of a CEO in challenging times'
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00
Send us a text Paul Evans, Chief Executive Officer at Carlisle Support Services Paul joined Carlisle Support Services in 2015 as Managing Director and was promoted to Chief Executive Officer in January 2019. During his tenure, he has overseen the transformation of the business. With over two decades of experience in the facilities management sector…
…
continue reading
1
Episode 280 Deep Dive: Mary D'Angelo | The Power of Dark Web Threat Intelligence
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34
In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural…
…
continue reading
We have discussed what happens when a vendor is just gone. What happens when a vendor has an outage or some business disruption? Do you jump to another vendor? Do you plan to weather the storm, or do you pivot? Eric Hanson of Inland Productivity Solutions and I sit down and discuss the challenges faced with business disruptions and failures that mi…
…
continue reading
1
CYFIRMA Research- Data Breach Investigation on Cisco
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57
CYFIRMA's investigation uncovered a major data breach at Cisco, led by the notorious threat actor IntelBroker. On October 14, 2024, IntelBroker posted on BreachForum, revealing that critical data such as source code, hard-coded credentials, SSL certificates, API tokens, and confidential documents were stolen. This breach impacts Cisco's B2B clients…
…
continue reading
1
DtSR Episode 624 - Kevin Clark One Month A Year That Security Matters
45:19
45:19
Play later
Play later
Lists
Like
Liked
45:19
Send the hosts a message - try it now! TL;DR: This week on the pod, Kevin Clark joins James and I to talk about his career, how his walked his journey to a successful security leader (spoiler alert, it's another roundabout path), and what we generally think of "security awareness month". Great conversation and I think you'll agree, we need Kevin ba…
…
continue reading
1
Becoming an API security and bug bounty pro | Guest Katie Paxton-Fear
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Join us on this episode of Cyber Work with Katie Paxton-Fear, an API hacker and technical marketing manager at Traceable, known for her YouTube channel InsiderPhD. Dive i…
…
continue reading
1
Specialty Drug Trends In Workers Compensation
25:26
25:26
Play later
Play later
Lists
Like
Liked
25:26
Specialty Drug Trends In Workers CompensationBy Public Risk Management Association (PRIMA)
…
continue reading
1
Building Resilient, Secure Software: Lessons from DevSecOps Experts
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
Send us a text Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats de…
…
continue reading
1
CYFIRMA Research: The Will of D- A Deep Dive into Divulge Stealer, Dedsec Stealer, and Duck Stealer
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42
The proliferation of stealers, particularly those masquerading as open-source projects, poses significant risks to users. With capabilities to steal sensitive information, such as passwords, cryptocurrency wallets, and browser data, these malware variants not only threaten individual privacy but also create broader cybersecurity challenges. As deve…
…
continue reading
1
CYFIRMA Research- World on the Brink: War in The Middle East Threatens to Enter a New Destructive Phase
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15
The Israeli invasion of Lebanon began with the declared goal to remove Hezbollah's military infrastructure from the south of the country so that Israelis living in northern Israel could return to their homes, from which they have been driven by the low-intensity conflict raging on the border since Hamas' raid on Gaza last year. The Israeli army has…
…
continue reading
1
Revolutionizing MLOps: Gorkem Ercan on Jozu's Game-Changing Solutions for AI Integration
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11
What if the key to overcoming AI and ML integration challenges in enterprises lies with one visionary company? Join us as we chat with Gorkem Ercan, the CTO of Jozu, who is spearheading efforts to revolutionize the MLOps landscape. Gorkem shares his insights on how Jozu's open-source project, KitApps, could be the game-changer in seamlessly packagi…
…
continue reading
1
From NetApp INSIGHT – KB On The Go | Pravjit Tiwana, Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior ...
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45
In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, un…
…
continue reading
1
Transforming Construction Using Virtual Design and BIM with Paul Hedgepath of M. J. Harris Construction Services
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07
On the latest episode of Risk Management: Brick by Brick, Jason Reichl is joined by Paul Hedgepath, Director of Virtual Construction at M. J. Harris Construction Services. In this episode, Jason and Paul explore virtual construction and building information modeling (BIM), as well as AI, advice for newcomers, and lean construction principles. To fi…
…
continue reading
1
The Future of Endpoint Security: AI, EDR, and SOC Evolution
37:03
37:03
Play later
Play later
Lists
Like
Liked
37:03
In this episode of Breaking Badness, we dive deep into the evolving world of Endpoint Detection and Response (EDR) and its critical role in modern cybersecurity. With threats advancing and the sheer volume of endpoint data skyrocketing, AI and deep learning are becoming gamechangers in threat detection and prevention. Join us as Carl Froggett, CIO …
…
continue reading
1
What Better Time Than Now? (And Other Considerations for Aspiring Security Professionals)
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28
In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity.…
…
continue reading
1
Episode 111: Red Team Tools (OST) Managing Open-Source Threats
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04
In this episode, Spencer and Brad discuss a recent Trend Micro research project and associated white paper "Red Team Tools in the Hands of Cybercriminals and Nation States". Spencer and Brad dig into what red teaming is, what red team tools (often referred to as offensive security tools) are and why they are used. They also cover the abuse of red t…
…
continue reading
1
From NetApp INSIGHT - KB On The Go | Haiyan Song, Executive Vice President & General Manager, CloudOps and Sandeep Singh, Senior Vice President & General Manager, Enterprise Storage
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19
In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP & GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shi…
…
continue reading