Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading

1
How Critical Infrastructure Leaders Are Rethinking Cybersecurity
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity at Black and Veatch. The discussion centers around the philosophical and strategic approaches to handling incidents and breaches, especially in the ope…
…
continue reading

1
Prioritizing security while adopting AI agents
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58Michael Bargury, Co-Founder & CTO at Zenity, shares best practices for securely implementing AI agents.
…
continue reading

1
Shadows Within Shadows: How AI is Challenging IT Teams
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the …
…
continue reading

1
Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire Daily and Dr. Chase Cunningham AKA Dr. Zero Trust shared their unfiltered thoughts on the state of cybersecurity, AI, and government regulations. From…
…
continue reading

1
Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction with the Department of Justice's action against twelve Chinese nationals that includes mercenary hackers, law enforcement officers, and employees of a …
…
continue reading

1
CISO strategies: Modern challenges and how to overcome them
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31Jordan Avnaim, Chief Information Security Officer at Entrust, shares strategies CISOs can implement to overcome modern challenges.
…
continue reading

1
Predicting the year of cybersecurity ahead (minus regulations)
1:02:52
1:02:52
Play later
Play later
Lists
Like
Liked
1:02:52It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… there have been obvious impacts that have downstream effects. Regardless of regulatory changes, which we’ll cover as those impact our space, AZT brought t…
…
continue reading

1
Kicking Off Season 4 of Adoption Zero Trust (AZT)
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of trying out different formats and episodes, including at least an entire season terrorizing vendors for slapping Zero Trust on their box as if it were some…
…
continue reading
What threats do security leaders need to worry about? Answer this question and more with Corey Nachreiner, CISO at WatchGuard.
…
continue reading

1
Reducing the lifespan of digital certificates
14:33
14:33
Play later
Play later
Lists
Like
Liked
14:33Tim Callan, Co-Chair at CA/Browser Forum and Chief Compliance Officer at Sectigo, discusses the current state of digital certificate lifespans and explains the support for reducing them.
…
continue reading

1
How control rooms help organizations and security management
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Dan Gundry, Strategic Director at Barco Control Rooms, discusses how control rooms benefit organizations and security management.
…
continue reading

1
The key to growing a cybersecurity career are soft skills
50:38
50:38
Play later
Play later
Lists
Like
Liked
50:38In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity. This week, we chat with Courtney Hans, VP of Cyber Services at AmTrust Financial Services, and Evgeniy Kharam, author of Architecting Success: The Art of Soft Skills, who h…
…
continue reading

1
Behind the scenes of cybersecurity media and reporting
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported. You can read the show notes here. In the world of cybersecurity journalism, you can broadly divide it into four competing forces: reporters, communications teams, researchers, and readers. Each requi…
…
continue reading

1
Understanding and applying the zero trust mentality
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14Listen to Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, explain how to effectively apply a zero trust mindset in the workplace.
…
continue reading

1
GRC tool or spreadsheets, that is the question | GRC Uncensored Preview
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice? After this, we will be back to our regularly produced AZT episodes. The last episodes of our pilot for GRC Uncensored can be found on your favorite podcast app or newsletter on Substack…
…
continue reading

1
Multi-Site Mastery: Strategies for Effective Risk Assessments
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively.Sponsored by AMAROK
…
continue reading

1
Middle East Escalation, Humanitarian Law and Disinformation – Episode 25
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23In episode 25 of the Cybersecurity & Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.
…
continue reading

1
Proving physical security value across an organization
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization.
…
continue reading
Kelly Johnstone, Senior Security Advisor at International SOS, discusses the importance of taking a proactive stance against workplace violence.
…
continue reading

1
Podcast Preview: GRC Uncensored and the commoditization of compliance
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored. This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners…
…
continue reading

1
How to prepare your operations team for Zero Trust
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Zero Trust. Despite covering various aspects over three seasons, this crucial topic is addressed thoroughly. They explore pre-adoption preparation, ali…
…
continue reading

1
Balancing Risk and Innovation - A CISO Perspective
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective.
…
continue reading

1
Certifying secure access service edge solutions
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Pascal Menezes, CTO at MEF, discusses the importance of certifying secure access service edge (SASE) solutions.
…
continue reading

1
Log4j Continues to act as Organizational Vulnerability
47:56
47:56
Play later
Play later
Lists
Like
Liked
47:56Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries. Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growi…
…
continue reading

1
Why security professionals experience burnout
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Thomas Kinsella, Co-Founder & Chief Customer Officer at Tines, discusses the challenges contributing to burnout among security professionals.
…
continue reading

1
Overturning of Chevron Deference’s Impact on Cybersecurity Regulation
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations? Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Welcome back to Adopting Zero Trust or AZT. In our latest episode, we assembled a distinguished panel to dig into a timely topic affecting the cybe…
…
continue reading

1
Applying Vulnerability Management to Zero Trust
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk. Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Every organization relies on some form of technology to run, and each tool you add…
…
continue reading

1
Cybersecurity at the Paris Summer Olympics
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Mark Manglicmot, SVP of Security Services at Arctic Wolf, discusses how individuals and businesses can defend against cyber threats during the Olympics.
…
continue reading

1
The Money Laundering Machine: Inside the global crime epidemic - Episode 24
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06In episode 24 of the Cybersecurity & Geopolitical Discussion, our trio of hosts discuss paradoxes surrounding money laundering and the reasons it’s so popular, particularly among well-establish organized criminal gangs.
…
continue reading

1
The Unstoppable Phish: A Discussion with Vivek Ramachandran
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and fina…
…
continue reading

1
Geopolitical, cyber and security implications of upcoming British election - Episode 23
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02In episode 23 of the Cybersecurity & Geopolitical Discussion, our trio of hosts debate pull apart the scenario of the upcoming UK election to uncover what the impact could be on national and global security.Watch the video version here.
…
continue reading
Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.
…
continue reading

1
Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. L…
…
continue reading

1
Navigating political polarization in the workplace
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, discusses the challenges security leaders face when navigating political polarization in the workplace.
…
continue reading

1
Decoding Emerging Threats: MITRE, OWASP, and Threat Intel
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Every few weeks, and occasionally every few days, we hear report of a new novel techn…
…
continue reading

1
Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary discuss navigating the latest broad-sweeping regulations. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes h…
…
continue reading
In this episode of The Security Podcasts featuring Chaim Mazal, Chief Security Officer at Gigamon, we discuss the challenges modern day CISOs face with evolving regulatory requirements and compliance standards.
…
continue reading
Taylor Matthews, Director of IT/Network/Security at OptConnect, discusses the IoT threat landscape as well as best practices for protecting IoT devices.
…
continue reading
Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not? Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Ransomware: To Pay or Not to Pay? It’s an easy ques…
…
continue reading
Felipe Fernandez, Chief Technology Officer at Fortinet Federal discusses the challenges and opportunities for enterprise security professionals in the scope of national security.
…
continue reading

1
The Cybersecurity and Geopolitical Discussion — The real space race: Inside geopolitics and security of a $1.8T industry— Episode 22
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56In Episode 22 of the Cybersecurity & Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media debate the geopolitical and security dimensions of the current global space industry.Watch the video version here.…
…
continue reading

1
Cyber Insurance: Sexy? No. Important? Critically yes.
1:14
1:14
Play later
Play later
Lists
Like
Liked
1:14Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. There are many aspects of cybersecurity that are not classified…
…
continue reading

1
How do security leaders protect PII and other important data?
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00Shiva Nathan, Founder and CEO of Onymos, provides insight to recent government requirements for PII protection and how security leaders can implement them.
…
continue reading

1
The Current and Future State of Zero Trust With Forrester’s David Holmes
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you c…
…
continue reading

1
Navigating the identity security landscape
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.
…
continue reading

1
The Cybersecurity and Geopolitical Discussion — Changing global influence in a year of elections — Episode 21
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45In Episode 21 of the Cybersecurity & Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media discuss how modern forces manifest, how much power is truly being wielded, and what effect it is likely to have on a year when some of world’s biggest and m…
…
continue reading

1
Canva's Kane Narraway on Building a Zero Trust MVP
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. This week on Adopting Zero Trust (AZT) we chat with Kane Narraway, the head of Head of Enterprise Security at Canv…
…
continue reading
Advancing technology such as artificial intelligence has created more intricate cyber threats, including zero-day attacks. How can security leaders prepare for the unexpected? Answer this question and more with Cody Aston, Solutions Consultant, Networks & Cybersecurity at Rockwell Automation.
…
continue reading

1
The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54In Episode 20 of the Cybersecurity & Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte of Red Goat Security and Philip Ingram MBE of Grey Hare Media, discuss how, from the outside, China appears very different. However, is this really the case?Watch the video version here.…
…
continue reading
Larry Whiteside, Jr., CISO at RegScale and Co-Founder and President at Cyversity, discusses the importance of diversity within the security workforce and how critical mentorship is when it comes developing talent.
…
continue reading