show episodes
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
CMMC Compliance Guide

CMMC Compliance Guide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
Artwork

1
RCA Radio

Regulatory Compliance Associates

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
RCA Radio covers the latest news and challenges in regulatory, compliance, and quality assurance facing the medical device, pharmaceutical, and biologic industries. In each episode, join Regulatory Compliance Associates® (RCA) and industry thought leaders as we navigate the issues that matter to you most.
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Artwork

1
ITSPmagazine Podcasts

ITSPmagazine, Sean Martin, Marco Ciappelli

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
  continue reading
 
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
  continue reading
 
Artwork

1
(mis)Conduct, Money & Reputation

Lansons Team Farner, Katten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
CMMC News by Jun Cyber

Wilson Bautista Jr.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
  continue reading
 
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
  continue reading
 
Artwork
 
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices - including barristers chambers.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Loading …
show series
 
De NIS2-richtlijn hervormt het cybersecuritylandschap van Europa, met als doel een hoog gemeenschappelijk beveiligingsniveau te bereiken tegen toenemende cyberdreigingen. Deze aflevering duikt in de essentiële technische implementatierichtlijnen en biedt praktisch advies voor organisaties om cyberrisico's effectief te beheren en te voldoen aan de v…
  continue reading
 
In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
  continue reading
 
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk. AI is driving a seismic transformation in business operations, with executive teams rapidly deplo…
  continue reading
 
Latin America has become a hotspot for cyber activity, with countries like Chile, Mexico, and Colombia experiencing significant data breaches and ransomware attacks on critical infrastructure. This widespread vulnerability is often fueled by frequently outdated cybersecurity measures, a talent gap, and a pervasive lack of awareness at high levels o…
  continue reading
 
Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rodgers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI e…
  continue reading
 
Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
  continue reading
 
Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
  continue reading
 
⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episode’s Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corpora…
  continue reading
 
América Latina se ha convertido en un objetivo principal para los ciberdelincuentes, siendo considerada la región menos preparada globalmente a pesar de su rápida digitalización, lo que ha expuesto a empresas y gobiernos a un aumento exponencial de ciberataques. Exploraremos incidentes críticos como el ataque de ransomware Conti en Costa Rica, las …
  continue reading
 
This episode delves into how Hong Kong is bolstering its cybersecurity through landmark legislation like the Protection of Critical Infrastructures (Computer Systems) Bill, which sets strict security protocols and reporting obligations for essential services. We explore the city's extensive collaborative initiatives, from the Cyber Security and Tec…
  continue reading
 
This episode uncovers how global digital ID systems, paired with stringent age verification and online surveillance laws, are systematically eroding personal privacy and online anonymity. We delve into the comprehensive collection of biometric and behavioral data, examining how it creates a "digital twin" of every individual and enables cross-borde…
  continue reading
 
Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recu…
  continue reading
 
Join me as I chat with Nat about the transition from managed services to building an AI-driven solution for ticket management and documentation. Nat shares candid insights from the PitchIT bootcamp, talks integrations with IT Glue and other platforms, and reveals their vision for empowering techs and boosting MSP margins. Whether it’s learning how …
  continue reading
 
What trade-offs are you willing to make in cybersecurity? In this episode of Security & GRC Decoded, host Raj Krishnamurthy is joined by Trupti Shiralkar, a seasoned cybersecurity leader and Advisory Board Member at Backslash Security, to explore how risk, ROI, and real-world constraints shape modern security programs. With decades of experience ac…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Our rapid response team had three specialized roles on it: Duncan – Pen Testing Eric – IT Alan – Privacy The first step in responding to this incid…
  continue reading
 
Dive into the revolutionary world of Brain-Computer Interfaces (BCIs) and their incredible potential to connect human thought directly with technology. This podcast unravels the alarming vulnerabilities of these cutting-edge devices, exploring how they can be subjected to "neural hacking" through remote manipulation, AI-powered attacks, and sensiti…
  continue reading
 
Send us a text In this episode of Secure Insights, host Rosie talks with Gomboc's CEO Ian about the biggest challenges in cloud security. Ian shares how Gomboc’s platform helps security teams cut through the noise with clear, frictionless remediation. They break down how Infrastructure as Code (IaC) is reshaping how we build secure systems from the…
  continue reading
 
What does it really mean to sell your MSP and stay in the game? On this episode, I chat with Paco LeBron—fresh off selling a majority stake in ProdigyTeks and stepping up as CEO for MSP Owners Group. Paco drops hard-won insights on leadership, the pitfalls of transactional M&A, and why a company’s soul matters more than just financials. If you want…
  continue reading
 
The journey ends with me getting a Cloud Security position. When I started, I really was not sure how this would end. But I got the job. Heres how. SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US …
  continue reading
 
The metaverse is rapidly transforming into a new digital frontier where immersive experiences meet real-world value, driven by cryptocurrencies and NFTs. However, this exciting evolution has opened a new battleground for sophisticated cybercrimes, including virtual identity theft, deep fake impersonation, NFT hacking, and pervasive social engineeri…
  continue reading
 
I sit down with cybersecurity thought leader David Meister, who leads global MSP efforts at Check Point Software, to talk big trends and smart strategies for MSPs in 2025. We dissect Checkpoint’s new ransomware report, the rise of AI-powered phishing emails, and why attackers are shifting focus to extortion. David gets candid about the challenges o…
  continue reading
 
Guest Introduction James Barrell is the Chief Information Officer at Atlanta Mission, the largest and oldest homeless services provider in the Southeast. His career spans insurance, consulting, and corporate CRM systems before he transitioned to the nonprofit world in search of greater purpose and family balance. At Atlanta Mission, James has led a…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google’s Project Zero and Deepmind team up…
  continue reading
 
In this episode of RCA Radio, host Brandon Miller is joined by cybersecurity experts Jason Tugman of Regulatory Compliance Associates® and Mustanger Ali of BSI to unpack the evolving landscape of cybersecurity in medical devices. Together, they explore the latest FDA and EU guidance, the growing expectations for connected device security, and the t…
  continue reading
 
From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
  continue reading
 
Jiphun Satapathy has built and scaled security organizations at AWS, Snowflake, and now Medallia. In this episode, he joins our host Raj to explore the evolving role of CISOs as strategic business leaders. They discuss the importance of treating security as a service organization, how to handle vendor noise, and why insider risk is often overlooked…
  continue reading
 
Email remains the most common form of non-verbal communication in organizations worldwide. It’s where our professional and personal lives often collide – making it a prime target for malicious actors. While the junk mail of the digital age – spam – has mostly faded into the background, the threats haven’t gone away. In fact, they’ve grown far more …
  continue reading
 
Guest: Avani Desai, CEO and President, Schellman & Company Website: https://www.schellman.com/ LinkedIn: https://www.linkedin.com/in/avanidesai/ Twitter: https://twitter.com/avanidesai Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s S…
  continue reading
 
Governance, risk, and compliance (GRC) has long been burdened by heavy manual processes, slow assessments, and limited visibility. In this Brand Story episode, Sean Martin and Marco Ciappelli are joined by Anders Søborg, Co-Founder of Eve, and Mark Humphrey, who brings two decades of fraud and cybersecurity experience to the team. Together, they un…
  continue reading
 
This podcast delves into the escalating cybersecurity threats facing modern medical devices, from Bluetooth-enabled pacemakers and insulin pumps to sophisticated patient monitors, revealing how vulnerabilities can lead to dire consequences for patient safety and data integrity. We explore the ethical frontiers of this challenge, examining how advan…
  continue reading
 
Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
  continue reading
 
In this episode of the Pipeliners Podcast, Sarah Magruder Lyle of the Common Ground Alliance returns to discuss 811 Day and the latest insights from the annual DIRT report. The conversation explores systemic challenges in underground utility damage prevention, including inconsistent regulations, outdated mapping, and underutilized technology. Liste…
  continue reading
 
In this episode, host KJ Burke speaks with Frances Edmonds, head of sustainable impact at HP Canada, about the intersection of sustainability and technology. They discuss the importance of a circular economy, the role of procurement in sustainability, and the challenges organizations face in implementing sustainable practices. Frances shares insigh…
  continue reading
 
Why are zero-day exploits becoming a bigger threat to enterprises? In this episode, Accenture CISO Kris Burkhardt and Ryan Whelan, who leads Cyber Intelligence for Accenture Security, explore what security professionals need to know about zero days. Learn about common threat actors, the hidden zero-day economy, targets, trends, mitigation, and resi…
  continue reading
 
At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy. Granick draws from decades of…
  continue reading
 
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — …
  continue reading
 
Digital risk is no longer confined to the enterprise perimeter. Executives and board members—along with their families—are increasingly targeted outside of work, in personal settings, and online. Dr. Chris Pierson, Founder and CEO of BlackCloak, joins Sean Martin and Marco Ciappelli to discuss the current state of digital executive protection and w…
  continue reading
 
What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition.” With support from 130 students acro…
  continue reading
 
The Internet of Bodies (IoB) promises a revolution in personalized health and convenience by collecting intimate data directly from our bodies, ranging from heart rate to potential future capabilities like reading thoughts. However, this widespread data collection introduces profound privacy challenges, including unclear data ownership, bypassed in…
  continue reading
 
Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syn…
  continue reading
 
In this episode we sit down with Sid Trivedi, Partner at venture capital firm Foundational Capital and host of the Inside the Network podcast. Sid brings great insights around cybersecurity market trends, industry events such as Black Hat and the impact that AI is having on the startup and venture capital ecosystem.…
  continue reading
 
Guest Introduction Kyle Draisey serves as the Chief Information Security Officer and Head of Cybersecurity at Sagent, a leading fintech company specializing in mortgage servicing technology. With a military and intelligence background, Kyle has navigated high-stakes environments from tactical SIGINT missions in Iraq to cybersecurity leadership role…
  continue reading
 
The Internet of Bodies (IoB) and Human Digital Twins promise a revolution in personalized health and daily convenience by collecting intimate data directly from our bodies. But as these technologies become more widespread, they introduce profound privacy challenges, from unclear data ownership and bypasses of informed consent to the creation of exp…
  continue reading
 
As machine identities exponentially outnumber human ones, creating a vast and vulnerable attack surface by 2025, organizations face unprecedented cybersecurity challenges. This podcast explores how artificial intelligence (AI) and advanced automation are becoming critical for managing the lifecycle of these digital credentials, from detecting anoma…
  continue reading
 
I just read an article by Chris Hughes called: GRC is Ripe For a Revolution. The name alone pissed me off. but as i read it, I realized he has some great points.. - https://www.resilientcyber.io/p/grc-is-ripe-for-a-revolution He talks about GRC being outdated, antiquated, and ineffective. There are too many frameworks and its too slow. It needs to …
  continue reading
 
This episode explores the critical juncture where human behavior meets technological defense in cybersecurity, highlighting how a significant 68% of breaches are human-driven due to factors like ineffective training and a poor security experience. We delve into the growing imperative for organizations to shift from complex "tool sprawl" with dozens…
  continue reading
 
Submit any questions you would like answered on the podcast! Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap Is CMMC just one of many hats you wear at your company? You’re not alone and you’re not out of luck. In this episode of the CMMC Compl…
  continue reading
 
​ @professorblackops-cybersec1168 and I talk about GRC, AI, and Cloud. We are both contractors working for the US govt. There are many changes happening in real time. Not gonna lie, 2025 is batshit crazy! And its not slowing down. Here are some of the topics: I just passed the AWS CCP & AZ900? What cloud skills and tech should sharpen? What is the …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play