KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
RCA Radio covers the latest news and challenges in regulatory, compliance, and quality assurance facing the medical device, pharmaceutical, and biologic industries. In each episode, join Regulatory Compliance Associates® (RCA) and industry thought leaders as we navigate the issues that matter to you most.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices - including barristers chambers.
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading

1
NIS2 Uitgepakt: Technische Compliance voor een Veerkrachtig Europa
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05De NIS2-richtlijn hervormt het cybersecuritylandschap van Europa, met als doel een hoog gemeenschappelijk beveiligingsniveau te bereiken tegen toenemende cyberdreigingen. Deze aflevering duikt in de essentiële technische implementatierichtlijnen en biedt praktisch advies voor organisaties om cyberrisico's effectief te beheren en te voldoen aan de v…
…
continue reading

1
The Journey and Insights of a Successful Fractional CISO | Interview with Terry Ziemniak
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
…
continue reading

1
When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk. AI is driving a seismic transformation in business operations, with executive teams rapidly deplo…
…
continue reading

1
Latin America's Digital Reckoning: Breaches, Vulnerability, and Mexico's New Data Shield
17:17
17:17
Play later
Play later
Lists
Like
Liked
17:17Latin America has become a hotspot for cyber activity, with countries like Chile, Mexico, and Colombia experiencing significant data breaches and ransomware attacks on critical infrastructure. This widespread vulnerability is often fueled by frequently outdated cybersecurity measures, a talent gap, and a pervasive lack of awareness at high levels o…
…
continue reading

1
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rodgers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI e…
…
continue reading

1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading

1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading

1
The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves | Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative | A Musing On Society & Technology ...
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episode’s Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corpora…
…
continue reading

1
Ciberseguridad en LATAM: La Región Más Vulnerable y su Batalla por la Resiliencia Digital
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09América Latina se ha convertido en un objetivo principal para los ciberdelincuentes, siendo considerada la región menos preparada globalmente a pesar de su rápida digitalización, lo que ha expuesto a empresas y gobiernos a un aumento exponencial de ciberataques. Exploraremos incidentes críticos como el ataque de ransomware Conti en Costa Rica, las …
…
continue reading

1
Safeguarding the Smart City: Hong Kong's Cyber Resilience in the AI Era
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52This episode delves into how Hong Kong is bolstering its cybersecurity through landmark legislation like the Protection of Critical Infrastructures (Computer Systems) Bill, which sets strict security protocols and reporting obligations for essential services. We explore the city's extensive collaborative initiatives, from the Cyber Security and Tec…
…
continue reading

1
The Digital Panopticon: Your ID, Their Control
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20This episode uncovers how global digital ID systems, paired with stringent age verification and online surveillance laws, are systematically eroding personal privacy and online anonymity. We delve into the comprehensive collection of biometric and behavioral data, examining how it creates a "digital twin" of every individual and enables cross-borde…
…
continue reading

1
How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On Location Coverage with Sean Martin and Marco Ciappelli
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recu…
…
continue reading

1
Mizo: Revolutionizing MSP Workflows (EP 889)
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52Join me as I chat with Nat about the transition from managed services to building an AI-driven solution for ticket management and documentation. Nat shares candid insights from the PitchIT bootcamp, talks integrations with IT Glue and other platforms, and reveals their vision for empowering techs and boosting MSP margins. Whether it’s learning how …
…
continue reading

1
Cyber Economics and Keeping Up with Innovation ft Trupti Shiralkar (Cybersecurity Leader & Advisor)
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56What trade-offs are you willing to make in cybersecurity? In this episode of Security & GRC Decoded, host Raj Krishnamurthy is joined by Trupti Shiralkar, a seasoned cybersecurity leader and Advisory Board Member at Backslash Security, to explore how risk, ROI, and real-world constraints shape modern security programs. With decades of experience ac…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Our rapid response team had three specialized roles on it: Duncan – Pen Testing Eric – IT Alan – Privacy The first step in responding to this incid…
…
continue reading

1
Cognitive Control: Unpacking BCI Hacking
1:08:43
1:08:43
Play later
Play later
Lists
Like
Liked
1:08:43Dive into the revolutionary world of Brain-Computer Interfaces (BCIs) and their incredible potential to connect human thought directly with technology. This podcast unravels the alarming vulnerabilities of these cutting-edge devices, exploring how they can be subjected to "neural hacking" through remote manipulation, AI-powered attacks, and sensiti…
…
continue reading

1
Architecting Security Without Slowing Down Developers
42:05
42:05
Play later
Play later
Lists
Like
Liked
42:05Send us a text In this episode of Secure Insights, host Rosie talks with Gomboc's CEO Ian about the biggest challenges in cloud security. Ian shares how Gomboc’s platform helps security teams cut through the noise with clear, frictionless remediation. They break down how Infrastructure as Code (IaC) is reshaping how we build secure systems from the…
…
continue reading

1
MSP Owners Group: Culture Over Consolidation (EP 888)
1:04:01
1:04:01
Play later
Play later
Lists
Like
Liked
1:04:01What does it really mean to sell your MSP and stay in the game? On this episode, I chat with Paco LeBron—fresh off selling a majority stake in ProdigyTeks and stepping up as CEO for MSP Owners Group. Paco drops hard-won insights on leadership, the pitfalls of transactional M&A, and why a company’s soul matters more than just financials. If you want…
…
continue reading
The journey ends with me getting a Cloud Security position. When I started, I really was not sure how this would end. But I got the job. Heres how. SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US …
…
continue reading

1
Digital Deceptions, Real Dangers: Unmasking Crime in the Crypto Metaverse
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49The metaverse is rapidly transforming into a new digital frontier where immersive experiences meet real-world value, driven by cryptocurrencies and NFTs. However, this exciting evolution has opened a new battleground for sophisticated cybercrimes, including virtual identity theft, deep fake impersonation, NFT hacking, and pervasive social engineeri…
…
continue reading

1
MSPs vs Ransomware: Lessons from Check Point (EP 887)
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13I sit down with cybersecurity thought leader David Meister, who leads global MSP efforts at Check Point Software, to talk big trends and smart strategies for MSPs in 2025. We dissect Checkpoint’s new ransomware report, the rise of AI-powered phishing emails, and why attackers are shifting focus to extortion. David gets candid about the challenges o…
…
continue reading

1
From Data to Dignity: How Tech Powers Transformation at Atlanta Mission
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06Guest Introduction James Barrell is the Chief Information Officer at Atlanta Mission, the largest and oldest homeless services provider in the Southeast. His career spans insurance, consulting, and corporate CRM systems before he transitioned to the nonprofit world in search of greater purpose and family balance. At Atlanta Mission, James has led a…
…
continue reading

1
Risky Business #801 -- AI models can hack well now and it's weirding us out
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google’s Project Zero and Deepmind team up…
…
continue reading

1
Cybersecurity Challenges in Connected Medical Devices
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31In this episode of RCA Radio, host Brandon Miller is joined by cybersecurity experts Jason Tugman of Regulatory Compliance Associates® and Mustanger Ali of BSI to unpack the evolving landscape of cybersecurity in medical devices. Together, they explore the latest FDA and EU guidance, the growing expectations for connected device security, and the t…
…
continue reading

1
PP073: Identify Yourself: Authentication From SAML to FIDO2
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
…
continue reading

1
Why Security And GRC Teams Must Act Like Service Teams ft Jiphun Satapathy from Medallia
1:13:21
1:13:21
Play later
Play later
Lists
Like
Liked
1:13:21Jiphun Satapathy has built and scaled security organizations at AWS, Snowflake, and now Medallia. In this episode, he joins our host Raj to explore the evolving role of CISOs as strategic business leaders. They discuss the importance of treating security as a service organization, how to handle vendor noise, and why insider risk is often overlooked…
…
continue reading

1
17 - Cybercrime – Email Threats – Part 4/4
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Email remains the most common form of non-verbal communication in organizations worldwide. It’s where our professional and personal lives often collide – making it a prime target for malicious actors. While the junk mail of the digital age – spam – has mostly faded into the background, the threats haven’t gone away. In fact, they’ve grown far more …
…
continue reading

1
Leading Without Losing Yourself | A Conversation with Avani Desai | The Soulful CXO Podcast with Dr. Rebecca Wynn
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08Guest: Avani Desai, CEO and President, Schellman & Company Website: https://www.schellman.com/ LinkedIn: https://www.linkedin.com/in/avanidesai/ Twitter: https://twitter.com/avanidesai Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s S…
…
continue reading

1
Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Origin Story with Anders Søborg, Co-Founder of Eve, and Mark Humphrey
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47Governance, risk, and compliance (GRC) has long been burdened by heavy manual processes, slow assessments, and limited visibility. In this Brand Story episode, Sean Martin and Marco Ciappelli are joined by Anders Søborg, Co-Founder of Eve, and Mark Humphrey, who brings two decades of fraud and cybersecurity experience to the team. Together, they un…
…
continue reading

1
Connected Critically: The Cybersecurity of Medical Devices and the Human Mind
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55This podcast delves into the escalating cybersecurity threats facing modern medical devices, from Bluetooth-enabled pacemakers and insulin pumps to sophisticated patient monitors, revealing how vulnerabilities can lead to dire consequences for patient safety and data integrity. We explore the ethical frontiers of this challenge, examining how advan…
…
continue reading

1
Nasrin Rezai on the Frontlines of Cybersecurity
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
…
continue reading

1
Episode 400: Common Ground Alliance 811 Day and latest DIRT Report with Sara Magruder Lyle
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11In this episode of the Pipeliners Podcast, Sarah Magruder Lyle of the Common Ground Alliance returns to discuss 811 Day and the latest insights from the annual DIRT report. The conversation explores systemic challenges in underground utility damage prevention, including inconsistent regulations, outdated mapping, and underutilized technology. Liste…
…
continue reading

1
Sustainability in Technology: A New Era
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21In this episode, host KJ Burke speaks with Frances Edmonds, head of sustainable impact at HP Canada, about the intersection of sustainability and technology. They discuss the importance of a circular economy, the role of procurement in sustainability, and the challenges organizations face in implementing sustainable practices. Frances shares insigh…
…
continue reading

1
InfoSec Beat: Industrialization of Zero-day Exploits
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38Why are zero-day exploits becoming a bigger threat to enterprises? In this episode, Accenture CISO Kris Burkhardt and Ryan Whelan, who leads Cyber Intelligence for Accenture Security, explore what security professionals need to know about zero days. Learn about common threat actors, the hidden zero-day economy, targets, trends, mitigation, and resi…
…
continue reading

1
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli ...
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy. Granick draws from decades of…
…
continue reading

1
From Tokens to Trust: Microsoft’s Biggest Security Shift Yet
1:01:52
1:01:52
Play later
Play later
Lists
Like
Liked
1:01:52This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — …
…
continue reading

1
When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01Digital risk is no longer confined to the enterprise perimeter. Executives and board members—along with their families—are increasingly targeted outside of work, in personal settings, and online. Dr. Chris Pierson, Founder and CEO of BlackCloak, joins Sean Martin and Marco Ciappelli to discuss the current state of digital executive protection and w…
…
continue reading

1
Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat USA 2025 Conversation with Virginia Tech’s Alan Michaels and Jared Byers | On Location Coverage with Sean ...
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition.” With support from 130 students acro…
…
continue reading

1
Connected Bodies, Compromised Privacy: Navigating the IoB and Geopolitical Risks
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20The Internet of Bodies (IoB) promises a revolution in personalized health and convenience by collecting intimate data directly from our bodies, ranging from heart rate to potential future capabilities like reading thoughts. However, this widespread data collection introduces profound privacy challenges, including unclear data ownership, bypassed in…
…
continue reading
Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syn…
…
continue reading

1
Resilient Cyber w/ Sid Trivedi - Black Hat, Cyber and AI Opportunities
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this episode we sit down with Sid Trivedi, Partner at venture capital firm Foundational Capital and host of the Inside the Network podcast. Sid brings great insights around cybersecurity market trends, industry events such as Black Hat and the impact that AI is having on the startup and venture capital ecosystem.…
…
continue reading

1
Building a Threat-Informed Cyber Strategy in Fintech with Kyle Draisey
50:10
50:10
Play later
Play later
Lists
Like
Liked
50:10Guest Introduction Kyle Draisey serves as the Chief Information Security Officer and Head of Cybersecurity at Sagent, a leading fintech company specializing in mortgage servicing technology. With a military and intelligence background, Kyle has navigated high-stakes environments from tactical SIGINT missions in Iraq to cybersecurity leadership role…
…
continue reading

1
The Intimate Invasion: IoB, Digital Twins, and Your Privacy
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05The Internet of Bodies (IoB) and Human Digital Twins promise a revolution in personalized health and daily convenience by collecting intimate data directly from our bodies. But as these technologies become more widespread, they introduce profound privacy challenges, from unclear data ownership and bypasses of informed consent to the creation of exp…
…
continue reading

1
Beyond the Human: AI, Automation, and the Secretless Future of Machine Identity
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43As machine identities exponentially outnumber human ones, creating a vast and vulnerable attack surface by 2025, organizations face unprecedented cybersecurity challenges. This podcast explores how artificial intelligence (AI) and advanced automation are becoming critical for managing the lifecycle of these digital credentials, from detecting anoma…
…
continue reading

1
Convocourses podcast GRC is ripe for a Revolution
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31I just read an article by Chris Hughes called: GRC is Ripe For a Revolution. The name alone pissed me off. but as i read it, I realized he has some great points.. - https://www.resilientcyber.io/p/grc-is-ripe-for-a-revolution He talks about GRC being outdated, antiquated, and ineffective. There are too many frameworks and its too slow. It needs to …
…
continue reading

1
Cybersecurity: Unifying Defenses, Empowering Humans, and Optimizing Spend in 2025
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15This episode explores the critical juncture where human behavior meets technological defense in cybersecurity, highlighting how a significant 68% of breaches are human-driven due to factors like ineffective training and a poor security experience. We delve into the growing imperative for organizations to shift from complex "tool sprawl" with dozens…
…
continue reading

1
How to Make Real CMMC Progress: Even if Compliance Isn’t Your Full-Time Job
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Submit any questions you would like answered on the podcast! Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap Is CMMC just one of many hats you wear at your company? You’re not alone and you’re not out of luck. In this episode of the CMMC Compl…
…
continue reading

1
GRC vs AI vs Cloud Cybersec Pros Experience Convocourses Podcast
1:27:49
1:27:49
Play later
Play later
Lists
Like
Liked
1:27:49 @professorblackops-cybersec1168 and I talk about GRC, AI, and Cloud. We are both contractors working for the US govt. There are many changes happening in real time. Not gonna lie, 2025 is batshit crazy! And its not slowing down. Here are some of the topics: I just passed the AWS CCP & AZ900? What cloud skills and tech should sharpen? What is the …
…
continue reading