KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices - including barristers chambers.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
…
continue reading
Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're new to cybersecurity or loo ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
With new legal risks and regulatory challenges constantly arising, how can we stay current and be best prepared? Join us for Compliance & Legal Risk, a podcast brought to you by Georgetown Law and EY. In each episode, host Ronald J. Coleman (“RJ”) will interview thought leaders in areas relating to legal risk and regulatory compliance, such as anti-corruption, privacy, cybersecurity, automation, and eDiscovery.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
…
continue reading

1
The Journey and Insights of a Successful Fractional CISO | Interview with Terry Ziemniak
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
…
continue reading

1
The AI Revolution in Human Risk Management: Beyond Compliance
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Traditional security awareness training (SAT) has often proven ineffective, with only 15% of participants actually changing their behavior and a significant majority of data breaches, predicted to be 90% in 2024, involving a human element. Artificial intelligence (AI) is fundamentally transforming SAT by enabling personalized learning experiences, …
…
continue reading

1
3366: Harvard Medical School: The Promise and Peril of CRISPR With Neal Baer
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21When we think about gene editing, the conversation often feels trapped between scientific journals and ethical debates too complex for public forums. In this episode, I spoke with Neal Baer, a rare voice who bridges both worlds. Known to many as an award-winning television showrunner for series like ER, Law & Order SVU, and Designated Survivor, Nea…
…
continue reading

1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading

1
Your Digital Shadow: Identity, Money, and Control
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Explore the rapidly emerging world of mandatory digital identity and financial tracking through Central Bank Digital Currencies (CBDCs), which are creating an unprecedented global infrastructure for monitoring, scoring, and controlling human digital interaction. Uncover how these systems are eroding privacy and anonymity, linking online activity to…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-missionBy KirkpatrickPrice
…
continue reading
Artificial Intelligence is reshaping the MSP landscape, and no one knows it better than Gregg Lalle of Synthreo. Tune in as Gregg breaks down how MSPs can move beyond automation to build intelligent AI agents that help clients grow their businesses and improve operational efficiency. Synthreo isn't just another AI tool. Gregg explains how their no-…
…
continue reading

1
2025 Job market Shocks AI tariffs Government cuts Economic Uncertainty
1:15:44
1:15:44
Play later
Play later
Lists
Like
Liked
1:15:44SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hac…
…
continue reading

1
Balancing Compliance and Cloud Strategy in Finance with Jean-Philippe Gerbi
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Guest Introduction Jean-Philippe Gerbi is the Chief Information Officer at Metropolitan Commercial Bank, where he oversees technology strategy in a highly regulated and security-sensitive environment. With deep experience in building scalable and secure infrastructures for financial institutions, Gerbi takes a pragmatic and risk-aware approach to d…
…
continue reading

1
3365: BlackLine on Why AI Is Changing the Nature of Tech Leadership
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25In this episode of Tech Talks Daily, I welcomed back Sumit Johar, CIO at BlackLine, for a timely conversation about how AI is transforming finance operations from the inside out. When we last spoke earlier this year, AI was still in the early stages of enterprise experimentation. Just a few months later, everything has shifted. Sumit shared how AI …
…
continue reading
Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off …
…
continue reading

1
Augment Code: AI Agents, Engineered to Ship (with Scott Dietzen)
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51AI isn’t just writing code—it’s joining the team. Scott Dietzen, Board Member at Augment Code, explains how Augment’s AI agents are changing the way enterprise software is built, secured, and scaled. These aren’t copilots for toy projects—they’re context-aware agents designed for real-world codebases and real production work. Scott: www.linkedin.co…
…
continue reading

1
The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05The most dangerous threats don't break down the door - they already have the keys. March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to …
…
continue reading

1
Shadows in the Stream: Detecting AI's Disinformation Game
1:01:03
1:01:03
Play later
Play later
Lists
Like
Liked
1:01:03This podcast delves into the complex world of AI-powered disinformation, exploring how sophisticated tactics like typosquatting are employed to clone legitimate media websites and disseminate false narratives at scale, as seen in campaigns like "Doppelgänger". We uncover how malicious actors leverage generative AI to produce convincing deepfakes, A…
…
continue reading

1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading

1
Convocourses Applying for Jobs Live
1:50:06
1:50:06
Play later
Play later
Lists
Like
Liked
1:50:06SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
Episode 399: Leadership in the High Reliability Organization with Mike Mercer
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of the Pipeliners Podcast, Russel Treat is joined by Mike Mercer from the High Reliability Group to explore what it means to be a high-reliability organization (HRO). The conversation covers how leadership, culture, and standardized processes contribute to safety and performance in high-consequence industries like nuclear and pipeli…
…
continue reading

1
3364: MongoDB Simplifies AI Development With Integrated Vector Search
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54In this episode of Tech Talks Daily, I sat down with Boris Bialek, VP and Field CTO at MongoDB, for a conversation that moved well beyond databases. As AI continues to accelerate across sectors, MongoDB is positioning itself at the intersection of modern data architecture and intelligent application development. Boris shared how his team is simplif…
…
continue reading

1
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this mas…
…
continue reading

1
From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients
1:00:28
1:00:28
Play later
Play later
Lists
Like
Liked
1:00:28Big news for the defense and MSP community: The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before publication in the Federal Register — and we’re expecting to see the final rule land by October with no 60-day delay. Translation? The phased rollout begins Q4 2025. If you work with defense contracto…
…
continue reading

1
Why Engineers Hate Compliance—And Why They’re Not Wrong
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Welcome to Part 1 of our Compliance Engineering Mini-Series, a focused look at what it means to build secure, auditable systems by design. In this kickoff episode, 38North Director of Engineering Larry Spector joins Chris Davis to talk about a familiar tension: engineers want to move fast, and compliance gets in the way. But what if the engineers a…
…
continue reading

1
The Guarded Agent: Securing AI in Every Operational Environment
21:14
21:14
Play later
Play later
Lists
Like
Liked
21:14Agentic AI systems significantly extend their capabilities by interfacing with diverse external environments through tools and function calls, including API access, code execution, databases, web browsers, and critical operational systems. However, each of these "agencies" introduces unique and severe security concerns, such as tool misuse (T2), pr…
…
continue reading

1
Driving the Future: Rivian’s Gerard Dwyer on Smarter Systems and Bold Innovation
1:11:25
1:11:25
Play later
Play later
Lists
Like
Liked
1:11:25Guest Introduction Gerard Dwyer serves as the Chief Information Officer at Rivian, a pioneering electric vehicle company reshaping automotive technology. With a global background that spans from Ireland to Silicon Valley, Gerard’s career journey includes executive roles at Google, Waymo, and Swisscom, as well as impactful work in South Africa durin…
…
continue reading

1
Application security Developers Guide to secure code
1:20:47
1:20:47
Play later
Play later
Lists
Like
Liked
1:20:47SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
3363: ABB on Building a Smarter and More Resilient Power Grid
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20When we think about innovation in technology, power grids rarely enter the spotlight. Yet, they are the foundation for everything from artificial intelligence to electric vehicles and data centers. In this episode, I spoke with Adrian Guggisberg, President of the Smart Power Division at ABB, to unpack the evolving role of electrical power distribut…
…
continue reading

1
3362: Inside LVT’s Mission to Deter Crime Before It Happens With Tech
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29In a digital-first world where cybersecurity often dominates headlines, the conversation around physical security can sometimes feel like an afterthought. But what if technology could bring a new level of intelligence, proactivity, and efficiency to protecting real-world environments? In this episode, I sat down with Ryan Porter, co-founder and CEO…
…
continue reading

1
DC3's Collaborative Edge: Safeguarding Cyberspace Through Strategic Partnerships
20:43
20:43
Play later
Play later
Lists
Like
Liked
20:43As a Federal Cyber Center and Center of Excellence, the Department of Defense Cyber Crime Center (DC3) proactively builds and leverages strategic partnerships across the globe to enable insight and action in cyberspace and beyond. These vital collaborations span U.S. government entities, international allies, law enforcement agencies, the private s…
…
continue reading

1
Applying for jobs in cybersecurity update 2025
1:35:11
1:35:11
Play later
Play later
Lists
Like
Liked
1:35:11SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
3361: Why AidKit Built a Tech Platform for Equitable Aid Distribution
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15In today’s episode of Tech Talks Daily, I connected with Brittany Christenson, CEO of AidKit, to explore how cutting-edge technology is being used not to disrupt markets or chase margins, but to deliver real, measurable social impact. AidKit is a public benefit corporation building infrastructure that helps vulnerable communities access aid quickly…
…
continue reading

1
The Brussels Effect: Exporting Digital Censorship
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31The EU's Digital Services Act (DSA) is presented as a comprehensive digital censorship law, ostensibly designed for online safety, but criticized for targeting core political speech, humor, and satire, even when not illegal. This report uncovers how European regulators leverage the DSA to compel American social media companies to change their globa…
…
continue reading

1
3360: How Certinia Is Bringing AI Agents Into Professional Services at Scale
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11When we talk about the future of enterprise software, AI is front and center. But behind the buzzwords, real transformation is happening in how businesses plan, execute, and deliver professional services. In this episode, I sat down with Raju Malhotra, Chief Product and Technology Officer at Certinia, to explore how AI is shifting from theory to pr…
…
continue reading

1
Resilient Cyber w/ Daniel Bardenstein - AI Supply Chain Security Risks
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In this episode, I sit down with Daniel Bardenstein, CTO & Co-Founder of Manifest Cyber. We discussed the AI supply chain security, including open source risks, AIBOMs, best practices for CISOs, and regulatory approaches in the U.S. and EU. We dove into: What is the same and different between the risks AI introduces across the enterprise compared t…
…
continue reading

1
Resilient Cyber w/ Christian Posta MCP, Agents & IAM in the age of LLMs
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44In this episode, we sit down with Christian Posta, the Field CTO at Solo.io and an industry author and leader on topics such as Microservices, AI, and IAM. We will explore the rise of Agentic AI and its supporting protocols, such as MCP and A2A, and the broader challenges and considerations of Identity security in the age of LLMs.…
…
continue reading

1
How Technology Quietly Powers Hospitality – With Stephen Ferraguti
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43Guest Introduction Stephen Ferraguti serves as Director of Information Technology at Hansen Properties, a historic and hospitality-rich organization that operates Normandy Farm Hotel, Blue Bell Country Club, and the Farmer’s Daughter restaurant in Pennsylvania. With a background rooted in both tech and customer service, Stephen focuses on the often…
…
continue reading
SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
3359: Exploring Legal Innovation with the National Association of Licensed Paralegals (NALP)
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42In this episode of Tech Talks Daily, I had the opportunity to sit down with Amanda Hamilton, patron and director at the National Association of Licensed Paralegals (NALP). While many of our discussions often focus on cutting-edge technology and digital transformation, today’s conversation tackled a very different kind of disruption, one happening q…
…
continue reading

1
The Ticking Time Bomb: Securing Our Hyper-Connected World
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11The 21st century's quiet revolution, the Internet of Things (IoT), has woven digital systems into our physical world, promising efficiency and convenience while simultaneously creating an attack surface of unparalleled scale and complexity. This episode delves into the inherent fragility of IoT, exploring how market pressures and design compromises…
…
continue reading

1
Visualizing MSP Workflows with Kanban Power (EP 884)
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Visual thinkers, this one's for you! On this episode, Wim Kerkhoff walks us through the evolution of project management in the MSP world—starting with sticky notes and ending with an intuitive, web-based Kanban board purpose-built for real IT teams. We talk about integration headaches, boosting technician engagement, and why color-coding and swim l…
…
continue reading

1
What You Missed: June Cyber AB Town Hall CMMC Highlights
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26Submit any questions you would like answered on the podcast! 48 CFR UPDATE: https://www.ecfr.gov/current/title-48/chapter-2/subchapter-A/part-204/subpart-204.75 Missed the June 2024 Cyber AB Town Hall? We’ve got you covered. In this episode of the CMMC Compliance Guide, Brooke and Austin break down the biggest takeaways — including how recent leade…
…
continue reading
Today we are talking to a Cloud Security Architect. This is a mentor and friend of mine, Rob Rodriguez, one of the most talented IT professionals I have ever worked with. Some of the questions: What do your daily and weekly responsibilities look like as a Cloud Security Architect? Which cloud platforms do you focus on the most—AWS, Azure, or GCP—an…
…
continue reading

1
3358: Pearson Research Challenges the Myth of AI Replacing Tech Jobs
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00What if the average UK tech worker could reclaim almost an entire workday each week without extra hours simply by harnessing AI tools like ChatGPT and robotic process automation more effectively? In this episode, I sit down with Oliver Latham from Pearson’s Enterprise Learning and Skills division, to unpack research revealing how intelligent automa…
…
continue reading