show episodes
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
  continue reading
 
Artwork

1
CMMC Compliance Guide

CMMC Compliance Guide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Tea & Trend

Trend Micro

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Lee Frazier and his team of experts bring you the latest in Cybersecurity, IT, and HIPAA HITECH news along with segments each episode covering their views and advice on topics such as mobile devices, PC recommendations, compliance issues such as HIPAA HITECH and PCI, cybersafety, emerging technologies, IT for healthcare, and listener questions. One episode each month is followed up with a free live webinar where podcast listeners/viewers can get more in depth info on the topic and bring thei ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
  continue reading
 
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
  continue reading
 
Artwork

1
CMMC News by Jun Cyber

Wilson Bautista Jr.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
  continue reading
 
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Cybernomics Radio!

Bruyning Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Cybernomics: Where we talk about the hidden costs, opportunities, and incentives that drive the Cyber Industry. Each episode features candid conversations with seasoned CISOs, visionary founders, investors, and industry experts who highlight the problems and solutions that drive the industry. Whether it’s vendor evaluations, budgeting for compliance, or assessing new cyber innovations—if it affects your budget, we cover it. We also keep you informed on critical cybersecurity news as it happe ...
  continue reading
 
Artwork

1
(mis)Conduct, Money & Reputation

Lansons Team Farner, Katten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
  continue reading
 
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
  continue reading
 
Loading …
show series
 
Artificial intelligence is rapidly transforming industries, but its increasing power necessitates robust governance and compliance. This episode delves into the evolving global regulatory landscape, exploring key frameworks like the EU AI Act and the NIST AI Risk Management Framework that aim to ensure AI systems are safe, transparent, and accounta…
  continue reading
 
In this episode of Compliance Conversations, Anurag Lal, CEO of NetSfere and former U.S. broadband official, explains why healthcare remains the top target for cybercriminals—and what you can do about it. What You’ll Learn: The evolving tactics behind healthcare cyberattacks How to identify insecure communication practices within your org What true…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic speaks with Bevan Lane, CEO of InfoSec Advisory Group. Bevan shares his journey from starting as an independent contractor to building a successful cybersecurity consultancy with offices in South Africa and London, and clients across five continents. Learn about his approach to sc…
  continue reading
 
In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
  continue reading
 
What are the real costs of cybersecurity implementation? Spoiler alert: it’s far more complex than it appears on the surface. Cybersecurity is a people and process problem, not a technology problem. Most of implementation costs come in the form of time, effort and coordination throughout the organization. In this episode, we reach back to classroom…
  continue reading
 
By Adam TurteltaubHow much is your cybersecurity program worth? Traditionally the thinking has kind of been: if we don’t have a breach it’s expensive but valuable, and if we do have one it’s both expensive and worthless.Eric Shoemaker of Genius GRC advocates for a different way to value cybersecurity efforts. Instead of just looking at what it prev…
  continue reading
 
By Adam TurteltaubRisk assessments are not new in healthcare, and in specific regulatory areas are required. But, that doesn’t mean things aren’t changing. More and more organizations are embracing enterprise risk assessments (ERM) as a way to assess the range of risks that they face, including legal and regulatory concerns.Getting the risk assessm…
  continue reading
 
It’s been one year of Socializing Security, and in this special anniversary episode, Brian and Milou reflect on what they've learned—and unlearned—about the evolving world of cybersecurity. From redefining what "security" even means, to unpacking the human element behind most breaches, they explore why security isn’t just a tech problem—it’s a team…
  continue reading
 
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
  continue reading
 
In this episode of the Pipeliners Podcast, Mike Kern joins the show to discuss the work of the AGA Transmission Operations Committee and the value of participating in industry trade groups. The conversation explores key committee initiatives, including regulatory awareness, white paper development on in-situ material testing, and the importance of …
  continue reading
 
Your cybersecurity posture is no longer just about protection; it's the cornerstone of obtaining effective cyber insurance coverage and managing rising costs in 2025. With threats becoming more sophisticated and regulatory landscapes shifting, insurers are scrutinizing security measures more closely than ever, often making basic safeguards prerequi…
  continue reading
 
What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
  continue reading
 
Hybrid and remote work arrangements, accelerated by recent events, have significantly increased the challenge of detecting and mitigating insider threats from trusted individuals like employees and contractors who have authorized access to organizational resources. Employee monitoring technologies, such as User Activity Monitoring (UAM) and User Be…
  continue reading
 
Getting ready for a CMMC Level 2 certification doesn’t have to drain your budget. In this episode, we break down a practical, cost-effective path to prepare for your C3PAO assessment without compromising quality. We discuss how to leverage CyberGap, a free self-assessment tool by Armada Cyber Defense, and how to streamline remediation using CyberCo…
  continue reading
 
Mergers and acquisitions are complex processes often driven by financial, operational, and positioning goals. However, critical cybersecurity risks, stemming from overlooked areas like integrating divergent security cultures, unknown user practices, and complex data separation, frequently go undiscussed during negotiations. This neglected perspecti…
  continue reading
 
This episode dives deep into the recent DragonForce ransomware attack that targeted an MSP using the SimpleHelp RMM tool, compromising both the provider and its clients. Uncle Marv is joined by Dave Sobel, host of MSP Radio and The Business of Tech podcast, to analyze what went wrong and how MSPs can avoid similar fates. The conversation covers the…
  continue reading
 
Submit any questions you would like answered on the podcast! Missed CEIC West 2025 in Las Vegas? We’ve got your insider recap. In this episode of the CMMC Compliance Guide, Austin and Brooke break down the most critical insights defense contractors need to know—from Katie Arrington’s keynote to real-world flowdown risks, mock assessment walkthrough…
  continue reading
 
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your …
  continue reading
 
The Imminent AI Job Crisis: Are You Prepared? This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Cherry Kent Cherry Kent | LinkedIn Incident Response Resources Incident Response | KirkpatrickPrice Find a Forensics Response Provider 24x7 Cyber I…
  continue reading
 
A tabletop exercise is a discussion-based simulation designed to help teams determine how to respond to a crisis. These exercises provide a safe environment to test and refine an organization's incident response plan and identify weaknesses in processes. By engaging key personnel in simulated scenarios, tabletop exercises allow for practicing decis…
  continue reading
 
In this episode of Tea & Trend, Jonathan Lee sits down with Jill Broom, Head of Cyber Resilience at techUK, for a deep dive into the state of public sector cybersecurity and the evolving challenges shaping the UK's digital defence. Together, they explore Jill’s unique path into cyber strategy and her role at techUK, as well as the critical intersec…
  continue reading
 
In this episode, Kristie Pfosi, CISO at Marelli, discusses the evolving landscape of digital identity and cybersecurity, highlighting the significant role of AI in data analytics and risk identification. She talks about the current hesitations in fully adopting AI/ML capabilities, citing concerns over data transparency and control. Kristie also exp…
  continue reading
 
Evolving cyber threats are a significant business risk that boards and executives must oversee, moving beyond simply protecting systems to building resilience. This episode explores how a focus on preparedness, including robust incident response plans and regular testing, combined with continuous management like ongoing monitoring and adapting stra…
  continue reading
 
By Adam TurteltaubAs if ransomware and phishing attacks weren’t enough to keep us up at night, now AI is enabling a whole new range of cyber threats.Ryan Redman, Product Manager, Marketing and Brett Sommers, Director of GRC Products at Onspring warn that the nature of attacks is evolving. Vishing, in which criminals use technology to imitate the vo…
  continue reading
 
Startups in the DACH region are heating up — from AI unicorns to VC mega-funds. In this monthly startup news roundup, we unpack the most important trends in Germany, Austria, and Switzerland’s tech ecosystem. Learn how Parloa became Germany’s second unicorn of the year, how Quantum Systems secured €160M to dominate aerial AI, and how the EIB’s €70B…
  continue reading
 
Uncle Marv welcomes back Lisa Shorr, a leading authority on personal branding and client experience for IT businesses, for a lively and insightful discussion on video meeting etiquette. After breaking down the latest cybersecurity threats, the conversation shifts to the “new normal” of remote and hybrid work, where your camera is your connection to…
  continue reading
 
Watch the video here: https://www.youtube.com/watch?v=VSQ4kIIBbRQ === Join Uncle Marv and Rob Rae as they preview Pax8 Beyond 2025, the can’t-miss conference for managed service providers. Rob shares the inside story of how this event has grown into a global phenomenon, with plans for expansion into Europe and Southeast Asia. Listeners get a sneak …
  continue reading
 
Episode 26 - Trust No Link: Modern Email Threats Exposed! In this eye-opening episode, we break down the most common types of email security threats—phishing, spear phishing, spoofing, and more. 🕵️‍♂️ Learn how to spot red flags in suspicious emails 📬, what to do immediately 🚨 if you receive one, and how to protect yourself and your organization fr…
  continue reading
 
This episode delves into the essential methodologies and services organizations use to assess their cybersecurity posture. We explore techniques like Enterprise Risk Assessments, Threat Analysis, Vulnerability Management and Assessment, and Penetration Testing. Learn how understanding attacker tactics and human behavior through methods like Social …
  continue reading
 
We’re coming to you LIVE from Riskworld 2025! In this episode of Brick by Brick, Jason Reichl sits down with Lianne Appelt, Enterprise Risk Management lead at Salesforce, to explore the hidden world of 'Shadow AI' - the unauthorized AI tools employees use that put companies at risk. Lianne shares her journey from traditional tech companies like Ora…
  continue reading
 
Can we secure generative AI before it outpaces our ability to defend it? Welcome back to Razorwire, where we have our finger on the pulse of cybersecurity’s most urgent dilemmas and future threats. I’m your host, Jim and in this episode, I sit down with Ante Gojsalić, CTO and co-founder of SplxAI, to unpick the tangled challenges of securing the ne…
  continue reading
 
Uncle Marv welcomes Syncro’s CEO Michael George and Chief Product Officer Dee Zepf for an in-depth conversation about the all-new XMM platform. Listeners get an insider’s look at how Syncro is addressing the biggest pain points for MSPs—integrating Microsoft 365 management, automating security baselines, and streamlining workflows within a single p…
  continue reading
 
How do you talk to security? While at NDC Melbourne, Richard chatted with Sarah Young about her approaches to helping folks work with the security team. Often seen as an impediment to business, Sarah talks about what motivates security teams, how to use language to help them understand that you are taking security seriously, and how to get more thi…
  continue reading
 
Uncle Marv sits down with Nancy Henriquez, CEO of Sibyl Consulting Group and a force for change in the MSP community. Nancy shares her journey from launching a break-fix shop at 22, building and selling her own MSP, working with SuperOps, and finally founding Sibyl Consulting. She explains the origin of her company’s name, rooted in Greek mythology…
  continue reading
 
Adapt or Replace: How AI is Changing Entry-Level Job Markets AI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more ef…
  continue reading
 
Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we ne…
  continue reading
 
By Adam TurteltaubThese are fractious times, and it’s often difficult to figure out what to do, what comes next and keep people with divergent views working together.Despite these challenges, Anna Romberg, Executive Vice President, Sustainability, Legal and Compliance for Getinge, doesn’t believe that things are hopeless. In an article she co-autho…
  continue reading
 
Large language models present new security challenges, especially when they leverage external data sources through Retrieval Augmented Generation (RAG) architectures . This podcast explores the unique attack techniques that exploit these systems, including indirect prompt injection and RAG poisoning. We delve into how offensive testing methods like…
  continue reading
 
What happens when an FBI-trained negotiation coach brings elite sales psychology into the startup world? You get a masterclass in influence, integrity, and investor persuasion. Today’s episode of Startuprad.io features Matthias Bullmahn, a crisis negotiation expert, former Accenture executive, and storytelling coach — here to show founders how to n…
  continue reading
 
In this episode of Socializing Security, the hosts discuss their experiences at the RSA Conference with guest Bharat Jogi, a seasoned attendee. They explore the evolution of the conference, the importance of networking, and share valuable tips for first-time attendees. The conversation also touches on the role of AI in cybersecurity and the signifi…
  continue reading
 
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
  continue reading
 
⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
  continue reading
 
The financial sector is a frequent target for cyberattacks, facing a staggering rise in cases and significant costs from data breaches. Preparing for these threats requires understanding ransomware-as-a-service (RaaS), phishing, and other malicious activities, as well as implementing robust cybersecurity programs and incident response plans. This e…
  continue reading
 
The 2025 Worldwide Threat Assessment by the Defense Intelligence Agency describes a rapidly changing global security environment where national security threats are expanding, fueled by advanced technology. It identifies key regional security flashpoints, including threats to the U.S. Homeland and Southern Border, China's assertiveness in the Indo-…
  continue reading
 
2025 saw unprecedented international law enforcement efforts shatter major cybercrime networks like the LummaC2 infostealer, the Cracked and Nulled forums, the 8Base ransomware gang, and the Zservers bulletproof hosting service. These coordinated operations, involving over 20 nations and resulting in thousands of server seizures, disrupted criminal…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play