show episodes
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
Risk Parity Radio

Frank Vasquez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Security Management Highlights

ASIS International

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
The Cyberlaw Podcast

Stewart Baker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Integrity Risk

The Risk Advisory Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Integrity Risk is a podcast series by The Risk Advisory Group, a leading independent global risk consultancy. Senior members of our business intelligence teams share their deep sector and regional understanding of the risk to business from bribery and corruption, corporate crime and evolving legal regimes. The Integrity Risk series aims to provide decision-makers with clarity and insight in uncertain political, regulatory and commercial conditions, and advice on how to best protect their bus ...
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
People are often described as the largest asset in most organisations. They are also the biggest single cause of risk. This podcast explores the topic of 'human risk', or "the risk of people doing things they shouldn't or not doing things they should", and examines how behavioural science can help us mitigate it. It also looks at 'human reward', or "how to get the most out of people". When we manage human risk, we often stifle human reward. Equally, when we unleash human reward, we often ina ...
  continue reading
 
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
  continue reading
 
Welcome to Portfolio Perspective: Managing Risk & Seizing Opportunity, a podcast focused on the asset-based lending industry. Join Andrew Pace, Chief Client Experience Officer at Asset Compliant Solutions, as he interviews experts, shares insights, and explores strategies for managing risk, optimizing portfolio performance, and seizing opportunities in an ever-evolving financial landscape. From regulatory changes to technological advances, each episode provides actionable takeaways and deep ...
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork

1
STRAT

Mutual Broadcasting System LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
STRAT – Strategic Risk Assessment Talk, is a forum with a preparedness mindset. Mitigating risks, creating systems of prevention and recovery to deal with potential threats, and understanding the objectives of a Business Continuity Plan. This is the podcast for leaders who are committed to being prepared. The program is hosted by retired Marine Corps intelligence officer and strategic risk assessment professional Hal Kempfer and investment banker Mark Mansfield.
  continue reading
 
Artwork

1
AI Risk Reward

Alec Crawford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Loading …
show series
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
  continue reading
 
ACS CFO and CIO Greg Meyer joins host Andrew Pace for a deep dive into the operational backbone of modern recovery and collections. With nearly two decades of leadership at ACS, Greg discusses the growing overlap between finance, IT, and compliance—and what it means for lenders today. From securing sensitive data to building scalable frameworks for…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! This time, Accidental CISO is joined by guest host Dr. Gerald Auger, PhD. Gerald is the managing partner at Coastal Information Security Group, an adjunct professor of cybersecurity at…
  continue reading
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
In this episode we answer emails from Dave, Jeff and Peter. We discuss a new risk parity ETF, ALLW, a social security claiming question and considerations, and how a listener has been misled regarding so-called dividend investing by misinterpreting a misleading source. Links: Father McKenna Center Donation Page: Donate - Father McKenna Center ALLW …
  continue reading
 
What do people have to do with cybersecurity? A lot. As with other fields of human risk, it’s people that are typically the root cause of problems in the cybersecurity world. Which is where my guest’s expertise in behavioural design comes into play. On this episode, I’m speaking with Sarah Aalborg, a cybersecurity and behavioural design expert who’…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
Brian Liceaga is the SVP, Cybersecurity at Qubika, where they are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence. Join us as we discuss AI in cybersecurity, starting and exiting a business, and what a "carbon analyst" is (it may be related to V'Ger).…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them o…
  continue reading
 
Today, Steve Durbin and ISF Podcast Producer Tavia Gilbert are in conversation exploring the role of cybersecurity, governance and leadership in an age defined by rapid technological transformation. Artificial intelligence is now woven into daily business operations, risk models, customer engagement, and more. And while its benefits are significant…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
Brandon Payne, executive director for the National Council on School Facilities, joins this month’s episode of Security Management Highlights to discuss how to integrate security and safety into school facility planning and funding during both retrofits and new builds. Then, Kevin Jones, CPP, PCI, addresses key considerations for arming security pr…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
  continue reading
 
🚀 FINALLY UNDERSTAND AI: The Complete Beginner's Guide to ChatGPT, Claude & The Future Feeling overwhelmed by AI news? You're not alone! This comprehensive guide demystifies artificial intelligence for everyone. 📖 WHAT YOU'LL LEARN: • What ChatGPT, Claude, Gemini really are (and how they differ) • Why these aren't truly "intelligent" yet • How AI h…
  continue reading
 
Have you ever wondered how much of your success is down to luck? What if the world is far less fair and predictable than we’d like to think? On this episode, I explore the complex and fascinating role of luck in our lives and decisions with Dr. Chengwei Liu, Associate Professor of Strategy and Behavioural Science at Imperial College London. Chengwe…
  continue reading
 
In this episode we answer emails from Anonymous, Tim, Mark and Luc. We celebrate the overwhelming generosity of our listeners and discuss using risk parity style portfolios for intermediate savings, heavy metal, tax efficient portfolio management, and some investing and retirement resources. And THEN we our go through our weekly and monthly portfol…
  continue reading
 
Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
  continue reading
 
When Germany's Chancellor speaks out on international law violations by Israel, it signals a shift. We explore Germany’s evolving stance on Israel, and how Staatsräson shapes the line between political criticism and accusations of antisemitism. Plus, what Merz’s backing of Ukraine’s missile program says about his global ambitions — and how he aims …
  continue reading
 
The Cyberlaw Podcast is back from hiatus – briefly! I’ve used the hiatus well, skiing the Canadian Ski Marathon, trekking through Patagonia, and having a heart valve repaired (all good now!). So when I saw (and disagreed with ) Orin Kerr’s new book, I figured it was time for episode 502 of the Cyberlaw Podcast. Orin and I spend the episode digging …
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
Is it time to rethink SOC 2? (Spoiler: Adam thinks so—and he’s got the receipts.) In this insightful episode of Security & GRC Decoded, Adam Brennick, Director of Security Risk & Compliance at Cockroach Labs, joins Raj to challenge the status quo of SOC 2, compliance culture, and how GRC teams should operate in a modern, engineering-driven world. W…
  continue reading
 
From the ISACA Middle Tennessee conference, March 2025. Dan Houser is a vCISO; 2024 Chair of the Board, ISC2; advisory strategist board member, NACD Certified Director, and more. He enables the business to take on more risk, safely, to acquire new markets, open new countries of operation and make connections that were impossible before. He helps or…
  continue reading
 
All images and links can be found on CISO Series. Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Krista Arndt, associate CISO, St. Luke’s University Hea…
  continue reading
 
Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play