show episodes
 
Artwork

1
Mike Riddle, Creation Training Initiative (CTI)

Mike Riddle: International speaker and educator on Christian education and apologetics.

Unsubscribe
Unsubscribe
Monthly
 
The mission of Creation Training Initiative is to equip Christians worldwide to be effective teachers and speakers on the subject of biblical creation. So that the next generation can be trained to stand firm on biblical truth and defend their faith. In order to achieve this mission, CTI will provide basic level to in-depth, extensive training courses for Christian teachers and parents to effectively equip adults and youth to defend their Christian faith, and Biblical truth.
  continue reading
 
When Wagon Wheels Were Bigger is a weekly podcast that watches kids' TV from the eighties and casts a more cynical eye on the shows we used to love. Sometimes funny, usually disappointing, join your hosts Mark and Martyn and ruin a small part of your childhood week by week.
  continue reading
 
A podcast discussing a variety of commentaries of thought. Intended to spark personal re-development, and open up honest dialogue with ones self. Reverting from TV programming, back to the essence of oneness, through an illuminated outlooked reinforcing self enrichment with spiritual awareness.
  continue reading
 
SC Media, and our sponsor RegScale, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Sto ...
  continue reading
 
SC Media, and our sponsor RegScale, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Sto ...
  continue reading
 
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
  continue reading
 
On the Brevity Code podcast we’ll explore a wide range of topics from the very people that give form and color to our world. Through their actions they enrich us with their vision, creativity and bravery. Our guests have all been successful by flying in the face of conventional wisdom. We’ll learn from them, the ways in which we can apply that very knowledge to our own paths and towards our own self fulfillment.
  continue reading
 
Loading …
show series
 
Ring Raiders is a lesson for marketing departments everywhere - let at least one thirteen year old do a ten second innuendo check before spending any money on branding. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: w…
  continue reading
 
Prepare to be amazed as Tech Time Radio with Nathan Mumm brings you an action-packed episode brimming with the latest tech news and intriguing discussions! Elon Musk's ambitious goal to launch Grok 3, the world's most powerful AI by year-end, is bound to leave you pondering the future of artificial intelligence. Our special guest, cybersecurity exp…
  continue reading
 
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
  continue reading
 
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
  continue reading
 
Look, we've got a cool podcast. An ALF podcast! Remember ALF? He's back! In podcast form. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: whenwagonwheelswerebigger.com/w4bshop SUPPORT US FOR FREE: spread the word, spre…
  continue reading
 
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
  continue reading
 
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
  continue reading
 
We've watched a lot of terrifying puppets during the course of this podcast, but the puppets in the Rimini Riddle wouldn't look out of place in the Texas Chainsaw Massacre or The Hills Have Eyes. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUP…
  continue reading
 
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
  continue reading
 
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
  continue reading
 
He-Man was essentially just a child-friendly Conan the Barbarian rip-off, so it's a shame that when they eventually made a Conan cartoon for children it was forgettable boring rubbish. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WIT…
  continue reading
 
Unlock the secrets of emerging cyber threats and discover how grocery stores are embracing cutting-edge digital labels with TechTime Radio! Join Nathan Mumm and Mike Gorday for an action-packed hour where we also delve into NBC's revolutionary use of AI to clone the voice of legendary sports announcer Al Michaels for the Paris Olympics. With specia…
  continue reading
 
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
  continue reading
 
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
  continue reading
 
We debate the pros and cons of being a Highlander as we watch another cartoon based on a film that wasn't for children. It's a kind of magic that it even got made, but thankfully, there can be only one. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhi…
  continue reading
 
Curious about why flip phones are making a comeback? Discover the nostalgia behind these iconic devices and explore the trend of tech minimalism that’s captivating even the most devoted smartphone users. We'll also take a deep dive into the world of phone scams, offering you invaluable tips to safeguard your personal information and outsmart those …
  continue reading
 
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
  continue reading
 
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Show Notes: https://cisostoriespodcast.com/csp…
  continue reading
 
A boatful of research scientists routinely harrass a kaiju and befriend its ridiculous cowardly nephew, in the bizarre first part of our latest trilogy of cartoons for kids based on movies for grown ups, Godzilla (and Godzoooooooky). IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US O…
  continue reading
 
What happens when big tech swallows the little guys? Unveil the phenomenon of "Sherlocking" as we dissect how Apple has a knack for integrating third-party innovations into their own systems, potentially rendering those original products obsolete. We trace this back to the 1990s with the Sherlock vs. Watson saga and peel back the layers to reveal i…
  continue reading
 
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Show Notes: https://c…
  continue reading
 
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Visit https://cisosto…
  continue reading
 
The scarecrow is alive, the farm animals are stop-motion, and the local bird population are mostly hand puppets. Forget Me Not Farm might not be growing "normal" crops if you know what I mean... IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPP…
  continue reading
 
Is Elon Musk about to ignite a Silicon Valley showdown? Tune in to this thrilling episode of Tech Time Radio with Nathan Mumm as we uncover the mysterious disappearance of the New York Times source code, rumored to be linked to 4chan hackers. Elon Musk's bold critique of Apple's spyware sets the stage for a tech industry clash. Gwen Way joins us in…
  continue reading
 
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Show Notes: https://cis…
  continue reading
 
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Visit https://cisostori…
  continue reading
 
Mike Amatt had a dog and a cat, and apparently that was enough to get TV shows commissioned in the eighties. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: whenwagonwheelswerebigger.com/w4bshop SUPPORT US FOR FREE: sp…
  continue reading
 
What happens when facial recognition technology gets it wrong? We unravel the cases of innocent people being misidentified as shoplifters. We'll touch on ChatGPT’s recent downtime, and the steps developers are taking to restore its functionality. For our European listeners, we'll detail how you can opt out of AI training using your social media pos…
  continue reading
 
CISOs must prioritize the intelligent selection of cybersecurity products by considering the total cost of ownership (TCO) and whether point products or platforms are best suited. This includes the costs of deployment and operations for people, processes, and technology, as well as the ongoing maintenance and support of a product. By considering th…
  continue reading
 
CISOs must prioritize the intelligent selection of cybersecurity products by considering the total cost of ownership (TCO) and whether point products or platforms are best suited. This includes the costs of deployment and operations for people, processes, and technology, as well as the ongoing maintenance and support of a product. By considering th…
  continue reading
 
Historically, there were loads of musketeers, but only four of them were noteworthy, and only three get any credit. The fifth one is rubbish. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: whenwagonwheelswerebigger.co…
  continue reading
 
Can former President Donald J. Trump really stop all electric car sales if re-elected? Join us on Tech Time Radio with Nathan Mumm as we scrutinize this audacious claim, picking apart its feasibility and implications for the automotive industry. We also dive into the wacky world of AI mishaps, including Google’s strange and humorous errors like sug…
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
  continue reading
 
Animals dress up as humans and assume human-like lives in The Get Along Gang, which teaches lessons about friendship and teramwork and how to kill off all the humans probably. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHAN…
  continue reading
 
Unlock the secrets of safeguarding your family's digital privacy and get a glimpse into the future of brain-computer interfaces with our expert guest, James Riddle. In this episode, we tackle the risks of sharing children's photos online and the implications on their security, contrasting today's oversharing culture with the past's more private fam…
  continue reading
 
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
  continue reading
 
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
  continue reading
 
Chips Comic was a show about a comic called Chips Comic, not to be confused with Chips, the comic in Whizzer and Chips comic. Also there's a bloke in a dog costume for some reason. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH ME…
  continue reading
 
Who says you can't mix the old with the new or the whimsical with the downright serious? Buckle up, listeners, because we're about to stir the pot with everything from the questionable comeback of cassette tapes—yep, you heard it, Taylor Swift's bringing them back—to the brain-tickling topic of spies hiding in plain sight. Our discussion on Europol…
  continue reading
 
As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting esse…
  continue reading
 
As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting esse…
  continue reading
 
In the 1980s, everyone had puppets living next door. Borrowing your sugar, commenting when you wash your car, and confusing the human toddlers in the neighbourhood. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: whenw…
  continue reading
 
Prepare for a wild ride through the digital cosmos as we celebrate the legacy of space pioneer Alan Shepard and probe the depths of a software engineer's browser tab galaxy! From the gripping narrative of a Finnish hacker's cyber extortion to exploring whether AI can truly replicate the soulful lyricism of legendary rappers, this episode is a tapes…
  continue reading
 
Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and …
  continue reading
 
Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and …
  continue reading
 
Some animals keep a man as a pet and make him sing and dance in the street for pennies, in this grim post-apocalyptic tale about the horrors of slavery or something. IF YOU LIKE WHAT WE DO AND WANT TO HELP US CONTINUE; SUPPORT US ON PATREON: patreon.com/spreadthewhimsy SUPPORT US ON KO-FI: ko-fi.com/spreadthewhimsy SUPPORT US WITH MERCHANDISE: when…
  continue reading
 
Embark on a technological safari as we harness the power of AI to rekindle the bond between an orphaned orca calf and her family. Feel the pulse of human emotions intersecting with innovations, where even the glitz of Party Robots at posh events doesn't outshine the ingenuity behind Hollywood's latest trick—digital clones. Joined by our co-host hum…
  continue reading
 
Loading …

Quick Reference Guide