show episodes
 
Finding happiness and success living my dreams as a stock video producer. This podcast will include interviews and my thought and goals as a full-time video/photo producer. I also run an growing and active youtube channel that I feel will bring you a lot of value! https://www.youtube.com/channel/UCwoU327B927MD49NNf16gxw/featured?view_as=subscriber
  continue reading
 
Artwork

1
Motor1.com Podcast Network

Motor1.com Podcast Network

Unsubscribe
Unsubscribe
Weekly
 
The http://Motor1.com Podcast Network is your one stop for everything automotive. Listen to Rambling About Cars every Friday to get up to speed on the biggest car stories of the week. Or, reserve your table at the http://Motor1.com Test Car Happy Hour on Mondays, for reports on all the supercars, EVs, SUVs, and trucks we've been driving this week.
  continue reading
 
SC Media, and our sponsor Semperis, are proud to present this month's CISO Stories podcast. Hosted by Jessica Hoffman, Deputy CISO & HIPPA Security Officer for the City of Philadelphia. This is the show where Chief Information Security Officers share tales from the cybersecurity trenches and unpack leadership lessons learned along the way. Listen to previous CISO Stories podcast episodes at cisostoriespodcast.com.
  continue reading
 
SC Media is proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Stories podcast episodes at cis ...
  continue reading
 
Welcome to “One Move at a Time,” the US Chess podcast in which Dan Lucas, the Senior Director of Strategic Communication, talks to people who are advancing the US Chess mission statement to “Empower people, enrich lives, and enhance communities through chess.”
  continue reading
 
Artwork
 
UP NEXT: the voice of the next generation With Gabrielle Bosché Gabrielle interviews up-and-coming leaders shaping the future of entrepreneurship, media, government, church, and non-profit. Get ready for a raw conversation about life, faith, and what it takes to inspire change. We will feature real stories of Millennial leaders coming of age in today’s fast-changing world. Listeners will be encouraged by stories of failure straight from survivors. They will be challenged by those daring enou ...
  continue reading
 
I bring together people who are interested in slowing down and understanding how the mind works and how we can live in greater connection to one another in a fast-paced, stressful world.
  continue reading
 
Artwork

1
PSA Biztech

Production Systems Automation

Unsubscribe
Unsubscribe
Monthly
 
PSA is a privately owned national engineering and custom manufacturing firm founded in 1985, with two locations in Pennsylvania. We are experienced engineering system integrators, providing services for turn-key capital projects, controls, PLC’s, HMI’s, drives, servo systems, safety systems, OSHA compliance safety solutions, custom machinery and robotic work cells including pick and place, palletizing, machine tending and end of arm tooling. Hosted on Acast. See acast.com/privacy for more in ...
  continue reading
 
Artwork
 
The podcast that investigates what makes coaches and leaders great! Travis takes a deep dive into the specifics of how elite leaders lead their programs or department. Our host is Travis Wyckoff. Travis coached college baseball for 11 years and currently runs Kingdom Coaching, where he partners with leaders to help them discover the strengths that propel them, the constraints that trip them up, and their unique style and voice.
  continue reading
 
Scarlet Passage is a podcast of sketch comedy and interviews done in the style of a 1940's radio suspense program. Performed by: Kelly Bolton, Caroline Neff, Brad Helm, Tony St. Clair written/produced/Edit: Brad Helm Art Work: Brad Oexeman Special Thanks: Columbia College Chicago, James Chafin, Brandon Campbell, Lacy Campbell, Dark Eyed Strangers, Brad Coxswain, Hansum Products
  continue reading
 
Depression is among the most common mental health problems faced by students. In this series of podcasts, we look at what depression is and how it can impact student life, and offer some ideas and techniques to help you through it. Drawing on cognitive behavioural therapy (CBT), an evidence-based approach for the treatment of depression, they provide a framework for thinking about ways in which depression and low mood can keep you stuck, and some practical tools you can try out either on you ...
  continue reading
 
Loading …
show series
 
In this episode of the PSA BizTech Podcast we are joined by Christelle Keefer, the Global Business Development Manager for Education at ABB Robotics. Christelle was recently named one of the 10 Women Shaping the Future of Robotics in 2024 by the International Federation of Robotics. She also serves on the Robotics Technology Strategy Board for A3 a…
  continue reading
 
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
  continue reading
 
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
  continue reading
 
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
  continue reading
 
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
  continue reading
 
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
  continue reading
 
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Visit …
  continue reading
 
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Show N…
  continue reading
 
In this episode of the PSA BizTech podcast we will be discussing the “business and technology” behind Education, Manufacturing and Robotics and how critical it is to align them all together. Joining the podcast is @Gabe McCready, president of Integrated Systems Technologies (IST). Gabe and the team at IST has one main goal; to connect #education an…
  continue reading
 
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
  continue reading
 
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
  continue reading
 
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
  continue reading
 
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
  continue reading
 
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
  continue reading
 
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
  continue reading
 
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
  continue reading
 
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
  continue reading
 
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
  continue reading
 
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
  continue reading
 
In this episode of the PSA BizTech Podcast where we will be discussing the “business and technology” behind @NEFF Automation, an Industrial Automation Distributor that also provides some integrated value-add solutions. Joining the podcast are two fellas from Neff Automation - @Matt Paioletti, Automation Product Sales Manager and @Ben Mintz, Sales T…
  continue reading
 
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Show Notes: https://cisostoriespodcast.com/csp…
  continue reading
 
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
  continue reading
 
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Show Notes: https://c…
  continue reading
 
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Visit https://cisosto…
  continue reading
 
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Show Notes: https://cis…
  continue reading
 
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Visit https://cisostori…
  continue reading
 
CISOs must prioritize the intelligent selection of cybersecurity products by considering the total cost of ownership (TCO) and whether point products or platforms are best suited. This includes the costs of deployment and operations for people, processes, and technology, as well as the ongoing maintenance and support of a product. By considering th…
  continue reading
 
CISOs must prioritize the intelligent selection of cybersecurity products by considering the total cost of ownership (TCO) and whether point products or platforms are best suited. This includes the costs of deployment and operations for people, processes, and technology, as well as the ongoing maintenance and support of a product. By considering th…
  continue reading
 
In this episode I speak to Norma Stevens, LCPC, the Director of Therapy Operations at Sunstone Therapies in Rockville, Maryland. Sunstone partners with companies like Beckley PsyTech, COMPASS Pathways, MindMed, MAPS (Lykos Theraputics), Reunion Neuroscience, and Usona to run studies that aim to establish the gold standard for psychedelic treatments…
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
  continue reading
 
Loading …

Quick Reference Guide