Cyber Risk Management public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Caffeinated Risk

McCreight & Leece

Unsubscribe
Unsubscribe
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
Public Risk Management

Public Risk Management Association (PRIMA)

Unsubscribe
Unsubscribe
Monthly+
 
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

Unsubscribe
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork
 
Barry Kirby explores aspects of Human Factors, from practitioners in the field, through Processes and Tools that are useful (or not) and other Information and News that may be beneficial. For HF people to keep in touch and non-HF people to hear what we do.
  continue reading
 
Artwork
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
  continue reading
 
Artwork
 
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
TrendsMD Welcome to TMLT’s podcast series that explores growing issues within the health care, technology, and medical liability arenas. Hosted by Tony Passalacqua of TMLT, TrendsMD attempts to bring greater focus to issues that face the health care community in Texas and beyond. We also identify industry trends and help policyholders navigate their medical liability coverage. Our episodes are dedicated to educating medical and administrative personnel on technology-based themes, including t ...
  continue reading
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Tech for Leaders

Mazars in the UK

Unsubscribe
Unsubscribe
Monthly
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
Artwork

1
Beers & Bytes Podcast

Beers & Bytes Podcast

Unsubscribe
Unsubscribe
Monthly
 
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
  continue reading
 
Artwork

1
Moody's Talks - Focus on Finance

Moody's Investors Service, Ana Arsov, Danielle Reed, Mark Wasden, Bruno Baretta, Donald Robertson

Unsubscribe
Unsubscribe
Monthly+
 
Hosted by Danielle Reed of Moody's Financial Institutions team, Focus on Finance helps you keep on top of developments within the banking, insurance and asset management sectors — from the impact of tech disrupters and cyber risk to the ongoing effects of ESG and lower-for-longer interest rates. Published by Moody's Investors Service.
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Tech Uncensored, Crucial Analysis in Tech, is a bi-weekly podcast brought to you by Altitude Accelerator. Hosted by Hessie Jones, we explore emerging news, and relevant topics that startups care about. We speak to subject matter experts, founders and advisors in Investment: Venture Capital, Equity Crowdfunding, and across Industry: Clean Tech, Biotech, Generative AI, Blockchain, Web3, Privacy, Security etc. who weigh in on the challenges that startup founders face today, as well as the profo ...
  continue reading
 
Join Ryan Whybrow, an experienced insurance broker, as he chats with industry experts and local business owners in East Anglia and across the UK. Each episode dives into the world of general insurance, offering insights, advice, and real-world experiences to help you protect your business. Discover how to safeguard your assets, navigate insurance complexities, and ensure peace of mind for your enterprise. Tune in to stay informed, stay secure, and learn from the best in East Anglia! 📧 For mo ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

Unsubscribe
Unsubscribe
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Conversations with Thailand is a bi-monthly podcast series by Deloitte Thailand. Listeners can expect to hear insights from subject matter experts across the different business domains that will benefit both organisations and individuals navigate through complexities of today's VUCA world.
  continue reading
 
Artwork

51
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Monthly
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

Unsubscribe
Unsubscribe
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
  continue reading
 
Loading …
show series
 
Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers…
  continue reading
 
In this episode… Sarfraz Shaikh shares his unique journey from working in marketing and communications to leading the IT department at One Mesa. With an educational background in IT, Sarfraz was able to leverage his technical knowledge and communication skills to help shape the company’s IT strategies during a time of growth. Starting in a loosely …
  continue reading
 
On this episode, David Beardshaw, CISO of 3VRM, joins Yonatan Lipschitz. They discuss the importance of third-party risk management (TPRM) and its role in securing organizations. They explore the definition of TPRM and the risks associated with third-party relationships. They also discuss the challenges of questionnaire-based assessments and the ne…
  continue reading
 
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
  continue reading
 
In This Episode In this episode, Matthew Connor hosts Christos Ruci, CIO of Limbach, as they discuss the critical overlap between infrastructure and cybersecurity. Christos shares his unique career path—from AOL customer support to CIO of a national building solutions provider—highlighting how each role shaped his approach to IT leadership. At Limb…
  continue reading
 
👉🏻Get a Digital Copy of Tame the Tech Beast https://www.onestepsecureit.com/ttb-beyond-cyber One Step Secure IT Your path to strong IT and Cybersecurity starts here: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode of One Step Beyond Cyber, host Scott Kreisberg, CEO of One Step Secure IT, sits down with…
  continue reading
 
Send us a text Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas. He is an Adjunct Professor at Webster University's Masters in Cybersecurity Program, Founder of Orlando, Florida-based firm Counterintelligence Institute, LLC, and author of …
  continue reading
 
In this episode of Fo[RE]sight, Guy Carpenter’s Jess Fung, Managing Director and North American Cyber Analytics Lead, and Carol Aplin, Senior Vice President and Principal Cyber Modeler at Marsh McLennan’s Cyber Risk Intelligence Center, discuss their report, Cyber's Sleeper Threat: Business Email Compromise. We’ll talk about the threats of business…
  continue reading
 
On the latest episode of Risk Management: Brick by Brick, Jason Reichl is joined by James Benham, founder of JBKnowledge and experienced pilot, who shares insights on innovation in insurance technology, aviation safety practices, and the importance of education in risk management. In this episode, Jason and James explore how AI and automation are t…
  continue reading
 
In this episode, we dive deep into the newly released Microsoft Digital Defense Report 2024, which offers a comprehensive look at the latest trends in the global cybersecurity landscape. From evolving cyber threats and attack strategies to Microsoft's analysis of the most vulnerable sectors, we break down the key findings and what they mean for bus…
  continue reading
 
In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecu…
  continue reading
 
As we wrap up Cybersecurity Month, I had a chance to sit down with Wayne Selk, VP of CompTIA Cybersecurity Programs and Executive Director of CompTIA ISAO, to discuss Risk Management and its role in cybersecurity—flashback to the late 90s and the changes we have seen that bring us to today. --- Support this podcast: https://podcasters.spotify.com/p…
  continue reading
 
As startups evolve from small, agile teams to growth-oriented organizations, the need for strategic human resources management becomes critical. While startups often focus on product development, market penetration, and financial viability, at the early stages, once they’ve established market viability, people strategy becomes equally important. Wh…
  continue reading
 
Our Q3 2024 APT Quarterly Highlights Report reveals intensified cyber activities from APT groups in Iran, Russia, China, and North Korea, indicating heightened espionage efforts. Iran’s MuddyWater and APT34 leveraged custom malware like BugSleep, while Russia’s APT29 and APT28 capitalized on zero-day vulnerabilities for sophisticated infiltration. …
  continue reading
 
Send the hosts a message - try it now! TL;DR: On this week's episode, Jim, James, and I sit down to a Halloween "scary story" episode. You know the feeling... that sinking feeling of dread when you can't quite put your finger on what's wrong but something is definitely wrong. Something scary, and nefarious is happening... and usually it's coming fr…
  continue reading
 
With over 80% of international trade transported by sea, ports and terminals are essential components of the global supply chain. However, they face a range of risks — including natural disasters, operational challenges, cyberattacks, and workforce disruptions — that can lead to significant disruptions with far-reaching effects on the global econom…
  continue reading
 
Join Kali Fencl as she dives deep into a conversation with cybersecurity veteran The Gibson. With 25+ years in InfoSec, The Gibson shares his journey from coding as a child to shaping threat intelligence and privacy-first technology today. In this episode, they discuss hacker ethics, the influential hacker groups Loft and Cult of the Dead Cow, the …
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Jonathan Braley from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag ISAC) delves into the critical security challenges i…
  continue reading
 
In this episode, Matthew Connor engages with J.D. Whitlock, Chief Information Officer of Dayton Children’s Hospital, to explore the unique demands of nonprofit healthcare technology. J.D. shares his career journey from Navy officer to healthcare administrator, and finally to CIO, where his strategic approach drives the hospital’s technological and …
  continue reading
 
Are organizations in control of updates to their environments? The July 2024 CrowdStrike disruptive update has many asking this question. Patches are essential to security, but this event and others before it have organizations asking how to strike a balance in protecting quickly with the need to be resilient? Join me and Jacky Fox, Accenture Secur…
  continue reading
 
How does Thom also do the episode notes? This week in infosec was about a EULA Rant of the week https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html Billy Big Balls https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/ Some news articles from in…
  continue reading
 
In this episode of Insurance Matters - Product Focus: Motor Trade, Maxine Murray from Konsileo | East Anglia and Louis Rudd from AXA provide valuable insights into the world of Motor Trade insurance. They explore coverage options, discuss the importance of tailored policies, and highlight potential risks for businesses in the motor trade industry. …
  continue reading
 
Ivanti Virtual Traffic Manager (vTM) users – A critical authentication bypass flaw (CVSS 9.8) is now being actively exploited! This vulnerability allows unauthenticated attackers to gain admin control over your systems. Patch now to prevent unauthorized access, data theft, or malware deployment. Public exploit code is already circulating. Stay secu…
  continue reading
 
Technological change is inevitable and often one of the aspects that attracts people toward careers in information and operational technology. Although risk management is a part of navigating advancement in any area, the fundamental flaw in any management system is our human tendencies. This episode explores how organizations can make slow, steady …
  continue reading
 
Moody’s Ratings Banking team AMD Fadi Massih discusses key highlights from our survey of banks actively engaged with private credit. Speaker: Fadi Massih, Associate Managing Director-Banking at Moody's Ratings Host: Danielle Reed, VP-Senior Research Writer; Michael Porta, VP-Senior Research Writer Related research: Private Credit – Global: Bank fun…
  continue reading
 
In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professiona…
  continue reading
 
In this episode of Breaking Badness, Kali, Tim, and Taylor discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers are exploiting Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, r…
  continue reading
 
In this episode, Jeffrey talks with Keren de Via, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition …
  continue reading
 
In this Greatest Hits episode of Risk Management: Brick by Brick, Jason Reichl has a guest, Sharon Fox, who is an expert in insurance. Sharon holds the position of Vice President of Partnerships & Strategy at TrustLayer, where she plays a crucial role in driving the company's growth and success. She focuses on creating programs that aid channel, st…
  continue reading
 
Send us a text Paul Evans, Chief Executive Officer at Carlisle Support Services Paul joined Carlisle Support Services in 2015 as Managing Director and was promoted to Chief Executive Officer in January 2019. During his tenure, he has overseen the transformation of the business. With over two decades of experience in the facilities management sector…
  continue reading
 
In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural…
  continue reading
 
We have discussed what happens when a vendor is just gone. What happens when a vendor has an outage or some business disruption? Do you jump to another vendor? Do you plan to weather the storm, or do you pivot? Eric Hanson of Inland Productivity Solutions and I sit down and discuss the challenges faced with business disruptions and failures that mi…
  continue reading
 
CYFIRMA's investigation uncovered a major data breach at Cisco, led by the notorious threat actor IntelBroker. On October 14, 2024, IntelBroker posted on BreachForum, revealing that critical data such as source code, hard-coded credentials, SSL certificates, API tokens, and confidential documents were stolen. This breach impacts Cisco's B2B clients…
  continue reading
 
Send the hosts a message - try it now! TL;DR: This week on the pod, Kevin Clark joins James and I to talk about his career, how his walked his journey to a successful security leader (spoiler alert, it's another roundabout path), and what we generally think of "security awareness month". Great conversation and I think you'll agree, we need Kevin ba…
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Join us on this episode of Cyber Work with Katie Paxton-Fear, an API hacker and technical marketing manager at Traceable, known for her YouTube channel InsiderPhD. Dive i…
  continue reading
 
Send us a text Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats de…
  continue reading
 
The proliferation of stealers, particularly those masquerading as open-source projects, poses significant risks to users. With capabilities to steal sensitive information, such as passwords, cryptocurrency wallets, and browser data, these malware variants not only threaten individual privacy but also create broader cybersecurity challenges. As deve…
  continue reading
 
The Israeli invasion of Lebanon began with the declared goal to remove Hezbollah's military infrastructure from the south of the country so that Israelis living in northern Israel could return to their homes, from which they have been driven by the low-intensity conflict raging on the border since Hamas' raid on Gaza last year. The Israeli army has…
  continue reading
 
What if the key to overcoming AI and ML integration challenges in enterprises lies with one visionary company? Join us as we chat with Gorkem Ercan, the CTO of Jozu, who is spearheading efforts to revolutionize the MLOps landscape. Gorkem shares his insights on how Jozu's open-source project, KitApps, could be the game-changer in seamlessly packagi…
  continue reading
 
In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, un…
  continue reading
 
On the latest episode of Risk Management: Brick by Brick, Jason Reichl is joined by Paul Hedgepath, Director of Virtual Construction at M. J. Harris Construction Services. In this episode, Jason and Paul explore virtual construction and building information modeling (BIM), as well as AI, advice for newcomers, and lean construction principles. To fi…
  continue reading
 
In this episode of Breaking Badness, we dive deep into the evolving world of Endpoint Detection and Response (EDR) and its critical role in modern cybersecurity. With threats advancing and the sheer volume of endpoint data skyrocketing, AI and deep learning are becoming gamechangers in threat detection and prevention. Join us as Carl Froggett, CIO …
  continue reading
 
In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity.…
  continue reading
 
In this episode, Spencer and Brad discuss a recent Trend Micro research project and associated white paper "Red Team Tools in the Hands of Cybercriminals and Nation States". Spencer and Brad dig into what red teaming is, what red team tools (often referred to as offensive security tools) are and why they are used. They also cover the abuse of red t…
  continue reading
 
In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP & GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shi…
  continue reading
 
Loading …

Quick Reference Guide