show episodes
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork
 
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays, Prof G Markets breaks down what’s moving the capital markets, teaching the basics of financial literacy so you can build economic security. Wednesdays, during Office Hours, Scott answers your questions about business, career, and life. Thursdays, Scott has a conversation with a blue-flame thinker in the innovation economy. And Scott closes ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

Unsubscribe
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
D-Ron provides comprehensive CCTV security cameras and video surveillance systems to secure facilities. For two decades, we have been a trusted specialist, delivering tailored CCTV camera solutions in Singapore. Our CCTV for offices packages feature scalable video management software, analytics, and the networking equipment needed.
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
BUILDINGS Podcast

Endeavor Business Media

Unsubscribe
Unsubscribe
Monthly+
 
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to buildingspodcast@gmail.com Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
  continue reading
 
Artwork
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Artwork

1
Security in Focus

Gallagher Security

Unsubscribe
Unsubscribe
Monthly
 
Our Security in Focus webinars provide an insight into the latest Gallagher developments as well as inform and educate on the security solutions available. The webinars are hosted by members of the Gallagher team across the globe and provide you with an opportunity to ask questions to our experts.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Artwork

1
CyberSound™

CyberSound Podcast by Vancord

Unsubscribe
Unsubscribe
Monthly+
 
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
  continue reading
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork

1
Polyglot Software Development

Krish Palaniappan and Varun Palaniappan

Unsubscribe
Unsubscribe
Weekly
 
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Monthly+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Industrial IoT Spotlight

Peter Rohde-Chen, Erik Walenza

Unsubscribe
Unsubscribe
Monthly+
 
The Industrial IoT Spotlight Podcast shines a light on digital solutions that are impacting businesses today. Our mission is to feature the companies that are building the next generation of enterprise technologies, from architecture design to data management to business model innovation. Our hosts, Peter Rohde-Chen and Erik Walenza, are friends and entrepreneurs based in Shanghai, China. The Industrial IoT Spotlight is produced by Asia Growth Partners, a group of technology experts and busi ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork
 
Veteran host Francis Rose gives Federal government decision-makers news and information about management, workforce, IT, and acquisition, to help those leaders do their jobs better.
  continue reading
 
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Everlake: Insightful Wealth Management Advice

Marc Westlake & John McNicholas (Everlake.ie)

Unsubscribe
Unsubscribe
Monthly+
 
At Everlake we build strong, long-term relationships with a core group of clients. We aspire to be the trusted wealth advisors to individuals, families, and businesses, guiding them towards financial security and fulfilment of their ambitions. Operating in an ethical and sustainable manner, and putting the interest of our clients first, our objective is to develop the future of financial planning in Ireland, setting the benchmark for integrity, innovation, and expertise. When you listen to t ...
  continue reading
 
Loading …
show series
 
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
  continue reading
 
Building better teams is a key goal across every organization. But all too many fail to put better data and insights into that team building process. A new book by COL Kris Saling, Data-Driven Talent Management, helps give people managers better tools to add to their team building toolkit, including considering what data is already available, how i…
  continue reading
 
Ivanti's Robert Waters welcomes Grand Bank CTO Robert Hanson for a wide-ranging conversation on the emerging field of exposure management and how you can proactively safeguard your organization, because every organization faces risk. What separates the vulnerable from the well-protected isn’t whether you have exposure — it’s how you manage it. Join…
  continue reading
 
When the UnitedHealthcare CEO was killed in New York City in early December 2024, executive protection and corporate security professionals worldwide had to grapple with increased fear, criticism, and demands. Chuck Tobin and Caleb Gilbert from the International Protective Security Board join the SM Highlights podcast to discuss close protection an…
  continue reading
 
Episode Summary In this episode of The Secure Developer, host Danny Allan sits down with David Mytton, founder and CEO of Arcjet, former CEO of Server Density, and co-founder of Console.dev. David shares his insights into bridging the “developer-security gap” with Arcjet, a cutting-edge middleware SDK designed to empower developers with advanced se…
  continue reading
 
Ken and Seth start with a demo and discussion on some newer tools that use integrated AI in both the code and workflow spaces. Specifically, use for code review and understanding is improving. This is followed by a wide-ranging discussion of false positives, where they come from, and how they affect application security. Seth gets up in arms about …
  continue reading
 
In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could …
  continue reading
 
Scott Galloway and Jessica Tarlov unpack the dramatic start of Donald Trump’s second presidency, including sweeping executive actions and controversial pardons. They also reflect on Joe Biden’s final days in office. Plus, the TikTok ban reversal: what it means for U.S.-China relations and the future of tech regulation. Follow Jessica Tarlov, @Jessi…
  continue reading
 
In today’s episode, Steve sits down with Paul Bartel, a senior intelligence analyst with PeakMetrics. Paul was previously with the Defense Intelligence Agency, and he speaks with Steve about his experience working in the government sector, how the public and private sectors can cooperate more effectively, and what businesses can do to protect thems…
  continue reading
 
Send the hosts a message - try it now! TL;DR: On this episode Amanda Berlin, Senior Product manager at Blumira, joins Jim and Rafal to talk about her career, the second edition of her book, and building products for SMBs that "don't suck". The unfortunate fact is that there aren't a lot of products designed for the unique challenges of companies th…
  continue reading
 
Tune in as hosts Sabrish Venugopal and Dean Matheson unveil the latest advancements in Command Centre v9.20, Gallagher Security's award-winning security site management software. This episode dives into the exciting integration with Microsoft Entra ID, enabling seamless synchronization of cardholders, centralized cardholder and access management, a…
  continue reading
 
We all know continued training is important for all kinds of trades and professions, but it’s hard to find the time—not to mention the funding. Dan Clapper, head of learner and business outcomes at Interplay Learning, joins the Buildings Podcast to discuss how to prioritize education in 2025.By Endeavor Business Media
  continue reading
 
Josh Bruyning is the Executive Producer and Co-Founder at Bruyning Media, where creative storytelling transforms technical jargon into engaging podcasts that resonate with audiences. His educational foundation in English and Information Security Systems from the University of Minnesota and Metro State University, respectively, underpins my approach…
  continue reading
 
ClearanceJobs Connect West is a networking and professional development event tailored for individuals and organizations associated with the national security and defense sectors. This event specifically targets professionals who hire for positions requiring security clearances. It serves as a platform for connecting cleared recruiters, HR professi…
  continue reading
 
Listen to the SAP Security & GRC podcast with host Emile Steyn – helping you on your journey to effective access risk management in SAP. The topic of discussion for this episode is - Navigating the SAP RISE Migration How can we streamline the Role Design and also make use of Fiori Spaces and Pages to help us with compliance resilience.  We are join…
  continue reading
 
Follow Prof G Markets: Apple Podcasts Spotify Scott and Ed open the show by discussing the latest inflation report, Meta’s next round of layoffs, and the uncertain future of TikTok. Then Scott breaks down United Health’s first earnings call since the killing of executive Brian Thompson, explaining why the company appeared to downplay its successful…
  continue reading
 
In this episode, ⁠Krish Palaniappan⁠ discusses the concept of “coffee badges” in the context of the return to office (RTO) debate. He explores the implications of commuting, productivity, and the quality of life for employees, particularly in the tech industry. The conversation highlights the challenges of mandatory office attendance and the potent…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
Seth and Ken return once again to talk through the overall effectiveness and purpose of Portswigger's Top 10 Web Hacking Techniques and how it benefits the community. A short discussion on some of the current crop of techniques up for polling. Spurred by recent revelations around Snyk's approach to identifying security issues in npm packages, the d…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post by Marc Ashworth, CISO at First Bank for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, vp, deputy CISO - Gaming, Microsoft. Joining us is Ken Athan…
  continue reading
 
Mel Robbins, an award-winning podcast host, New York Times bestselling author, and renowned expert on mindset, behavior change, and personal growth, joins Scott to discuss the transformative ‘Let Them Theory.’ She shares how this simple yet powerful concept can improve your life and strengthen your relationships. Her latest book, The Let Them Theor…
  continue reading
 
Andy chats with a real person (not an advisor) doing their own retirement planning. In this episode, Andy talks with Brian Alexander. They talk about a wide array of retirement planning topics such as investing, Social Security, when they got serious about retirement planning, funding potential long term care needs and more! Links in this episode: …
  continue reading
 
In this episode, we sat down with David Hirschfeld, Founder & CEO of Tekyz to explore how AI is reshaping the software development landscape, both internally and for client-facing solutions. David shared insights on adopting an AI-first philosophy, leveraging AI for operational efficiency, and integrating cutting-edge tools into products. We also d…
  continue reading
 
Tammy Klotz is a cybersecurity leader with over 20 years in IT and a decade as a CISO for global manufacturing firms. She has transformed cybersecurity programs, driven cultural change, and championed women in technology through mentorship and active involvement in groups like WiCyS and the Cloud Security Alliance. At Versum Materials, she develope…
  continue reading
 
In this episode of the Security Repo Podcast, we explore the fascinating and complex world of non-human identities (NHIs) with Jody Hunt from CyberArk. We discuss the challenges of authenticating machine workloads, delve into the "secret zero" problem, and consider how frameworks like SPIFFE are shaping the future of secure machine identity. Plus, …
  continue reading
 
Send us a text BIO Chris Middleton is a highly accomplished Chartered Security Director with over two decades of experience in driving strategic initiatives and safeguarding organizations of all sizes. His career has been marked by a commitment to excellence, challenging the status quo and driving positive change, along with a focus on giving back …
  continue reading
 
How do you prepare for both the expected and the unexpected in corporate security? Join Chuck Randolph, Cindy Marble, and Fred Burton in this roundtable discussion as they explore risk management strategies for natural disasters, critical incidents, and rising threats in 2025. This conversation is packed with insights to help you enhance preparedne…
  continue reading
 
In this Spotlight episode, host Paul Roberts speaks with David Kellerman, the Field CTO at Cymulate, about the growing demand for security validation technology, like Cymulate's, as organizations struggle to assess the utility and effectiveness of their security investments. The post Security Validation: A Deep Dive with Cymulate’s David Kellerman …
  continue reading
 
Today I am talking with Nelson, the Canadian Dividend Investor. He has been on the podcast before. We had a previous episode where we discussed his investing process. We also discussed two investing classics, the Snowball, Warren Buffett’s biography, and discussed the life of Peter Cundill. Today we’re going to catch up and talk about current marke…
  continue reading
 
Scott discusses GM’s outlook and then gives advice on transitioning into a management role in your company. He wraps up with more advice, to a high school senior gearing up for an exciting new chapter. Music: https://www.davidcuttermusic.com / @dcuttermusic Subscribe to No Mercy / No Malice Buy "The Algebra of Wealth," out now. Follow the podcast a…
  continue reading
 
In this episode, ⁠Xan Hong⁠, a no-code development expert, guides ⁠Krish Palaniappan⁠ through the process of building a simple to-do application using Bubble. They explore the user interface, create workflows, and discuss the transition from web-based to native app development. The conversation emphasizes practical application, collaboration, and t…
  continue reading
 
In this episode, ⁠Xan Hong⁠ shares his journey into the world of no-code development, highlighting the challenges faced by non-technical founders and the flexibility offered by platforms like Bubble. The conversation explores the evolving landscape of software development, the importance of creativity in problem-solving, and the impact of no-code s…
  continue reading
 
Are your docs part of your DevOps cycle? Richard chats with Mattias Karlsson about automating documentation for APIs, cloud resources, and more! Mattias talks about using tools to build text files that contain every Azure resource being utilized, hopefully per application, along with API info, NuGet packages, and more. He also digs into the differe…
  continue reading
 
What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-…
  continue reading
 
The Double Standards of Social Media Manipulation: Facebook vs. TikTok This episode delves into the contrasting treatment of Facebook and TikTok concerning data manipulation and national security. It highlights the documented case of Facebook's data misuse with Cambridge Analytica, affecting 87 million Americans, and questions why similar scrutiny …
  continue reading
 
Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators. I’ve been utilizing cryptography in the development of web applications since my …
  continue reading
 
Courtney Hans is the VP of Services for Amtrust Cyber. However, she wasn't always in cybersecurity. As an adventure travel guide, she traveled the world delivering bespoke, life-changing experiences. The flexibility, curiosity, and relentless customer-focus required have shaped my professional choices and achievements ever since. Join us as we disc…
  continue reading
 
Send us a text In this episode of CyberSound, Jason Pufahl, Michael Grande, and E-Rate expert Joe Pillo from E-Rate First dive into the evolving landscape of E-Rate funding as the 2025 application season kicks off. This $7.2 billion federal program continues to play a crucial role in helping schools and libraries nationwide enhance technology and e…
  continue reading
 
Scott Galloway and Jessica Tarlov break down the politics fueling Los Angeles’ record-breaking wildfires and the fallout from budget cuts, environmental policies, and political blame games. Then, they dive into Trump’s bold—and polarizing—agenda as he prepares for a second term, from cabinet picks to eye-popping proposals like buying Greenland. Fin…
  continue reading
 
We’re starting 2025 with a preview of the episodes ahead, featuring Steve in conversation with thought leaders and security experts from around the world. We look forward to sharing the full episodes with you this winter. Stay tuned! Featured: • Rear Admiral Brian Luther, president and CEO of the insurance firm Navy Mutual • Duncan Wardle, former h…
  continue reading
 
Today we’re listening to the second half of Steve’s recent Emerging Threats webinar for security leaders. In this episode, Steve responds to audience questions, covering everything from government regulation to supply chain to raising awareness within your organization. Steve Durbin’s Contact Information: steve.durbin@securityforum.org Steve Durbin…
  continue reading
 
Send the hosts a message - try it now! TL;DR: Kayla Williams, CISO of Devo, joins Rafal & James on this episode to talk about her career path, the importance of the "financial perspective" and the need for well-rounded security leaders who understand business first and foremost. A wonderful episode for leaders and those who want to be. YouTube Vide…
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Watch the video here: https://www.youtube.com/watch?v=OSZ1Qi-tzSE Today on Cyber Work, we welcome Gamuchirai Muchafa from Africa's CyberGirls program to discuss her journ…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play