An SCCE Podcast
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Lee Frazier and his team of experts bring you the latest in Cybersecurity, IT, and HIPAA HITECH news along with segments each episode covering their views and advice on topics such as mobile devices, PC recommendations, compliance issues such as HIPAA HITECH and PCI, cybersafety, emerging technologies, IT for healthcare, and listener questions. One episode each month is followed up with a free live webinar where podcast listeners/viewers can get more in depth info on the topic and bring thei ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Cybernomics: Where we talk about the hidden costs, opportunities, and incentives that drive the Cyber Industry. Each episode features candid conversations with seasoned CISOs, visionary founders, investors, and industry experts who highlight the problems and solutions that drive the industry. Whether it’s vendor evaluations, budgeting for compliance, or assessing new cyber innovations—if it affects your budget, we cover it. We also keep you informed on critical cybersecurity news as it happe ...
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading

1
Navigating the AI Compliance Maze: Building Trustworthy Systems in a Regulated World
18:20
18:20
Play later
Play later
Lists
Like
Liked
18:20Artificial intelligence is rapidly transforming industries, but its increasing power necessitates robust governance and compliance. This episode delves into the evolving global regulatory landscape, exploring key frameworks like the EU AI Act and the NIST AI Risk Management Framework that aim to ensure AI systems are safe, transparent, and accounta…
…
continue reading

1
Cybersecurity in Healthcare: What Every Compliance Officer Needs to Know
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05In this episode of Compliance Conversations, Anurag Lal, CEO of NetSfere and former U.S. broadband official, explains why healthcare remains the top target for cybercriminals—and what you can do about it. What You’ll Learn: The evolving tactics behind healthcare cyberattacks How to identify insecure communication practices within your org What true…
…
continue reading

1
How to Scale Cybersecurity Consultancy | Interview with Bevan Lane
44:15
44:15
Play later
Play later
Lists
Like
Liked
44:15In this episode of the Secure and Simple Podcast, host Dejan Kosutic speaks with Bevan Lane, CEO of InfoSec Advisory Group. Bevan shares his journey from starting as an independent contractor to building a successful cybersecurity consultancy with offices in South Africa and London, and clients across five continents. Learn about his approach to sc…
…
continue reading

1
End Compliance Theatre: How Automation Can Save Your Business
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
…
continue reading

1
14 - The Intersection of Business and Cybersecurity
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42What are the real costs of cybersecurity implementation? Spoiler alert: it’s far more complex than it appears on the surface. Cybersecurity is a people and process problem, not a technology problem. Most of implementation costs come in the form of time, effort and coordination throughout the organization. In this episode, we reach back to classroom…
…
continue reading

1
Eric Shoemaker on Establishing the Value of a Cybersecurity Compliance Program [Podcast]
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43By Adam TurteltaubHow much is your cybersecurity program worth? Traditionally the thinking has kind of been: if we don’t have a breach it’s expensive but valuable, and if we do have one it’s both expensive and worthless.Eric Shoemaker of Genius GRC advocates for a different way to value cybersecurity efforts. Instead of just looking at what it prev…
…
continue reading

1
Robert Stratton on Healthcare Enterprise Risk Management [Podcast]
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01By Adam TurteltaubRisk assessments are not new in healthcare, and in specific regulatory areas are required. But, that doesn’t mean things aren’t changing. More and more organizations are embracing enterprise risk assessments (ERM) as a way to assess the range of risks that they face, including legal and regulatory concerns.Getting the risk assessm…
…
continue reading

1
E051 - A Year of Socializing Security - But What is Security, Really?
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44It’s been one year of Socializing Security, and in this special anniversary episode, Brian and Milou reflect on what they've learned—and unlearned—about the evolving world of cybersecurity. From redefining what "security" even means, to unpacking the human element behind most breaches, they explore why security isn’t just a tech problem—it’s a team…
…
continue reading
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
…
continue reading

1
Episode 391: AGA Transmission Operations Committee with Mike Kern
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56In this episode of the Pipeliners Podcast, Mike Kern joins the show to discuss the work of the AGA Transmission Operations Committee and the value of participating in industry trade groups. The conversation explores key committee initiatives, including regulatory awareness, white paper development on in-situ material testing, and the importance of …
…
continue reading

1
Cyber Insurance 2025: Why Your Security Posture is Your Policy
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Your cybersecurity posture is no longer just about protection; it's the cornerstone of obtaining effective cyber insurance coverage and managing rising costs in 2025. With threats becoming more sophisticated and regulatory landscapes shifting, insurers are scrutinizing security measures more closely than ever, often making basic safeguards prerequi…
…
continue reading

1
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
…
continue reading

1
Insider Threats and the Monitoring Tightrope: Balancing Security and Trust in Hybrid Work
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10Hybrid and remote work arrangements, accelerated by recent events, have significantly increased the challenge of detecting and mitigating insider threats from trusted individuals like employees and contractors who have authorized access to organizational resources. Employee monitoring technologies, such as User Activity Monitoring (UAM) and User Be…
…
continue reading
Getting ready for a CMMC Level 2 certification doesn’t have to drain your budget. In this episode, we break down a practical, cost-effective path to prepare for your C3PAO assessment without compromising quality. We discuss how to leverage CyberGap, a free self-assessment tool by Armada Cyber Defense, and how to streamline remediation using CyberCo…
…
continue reading

1
Beyond the Deal: Unseen Cyber Risks in M&A
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49Mergers and acquisitions are complex processes often driven by financial, operational, and positioning goals. However, critical cybersecurity risks, stemming from overlooked areas like integrating divergent security cultures, unknown user practices, and complex data separation, frequently go undiscussed during negotiations. This neglected perspecti…
…
continue reading

1
DragonForce Ransomware: MSPs Under Attack! (EP 831)
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57This episode dives deep into the recent DragonForce ransomware attack that targeted an MSP using the SimpleHelp RMM tool, compromising both the provider and its clients. Uncle Marv is joined by Dave Sobel, host of MSP Radio and The Business of Tech podcast, to analyze what went wrong and how MSPs can avoid similar fates. The conversation covers the…
…
continue reading

1
What You Missed at CEIC West 2025: CMMC Culture, AI Labeling, and Subcontractor Risks
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51Submit any questions you would like answered on the podcast! Missed CEIC West 2025 in Las Vegas? We’ve got your insider recap. In this episode of the CMMC Compliance Guide, Austin and Brooke break down the most critical insights defense contractors need to know—from Katie Arrington’s keynote to real-world flowdown risks, mock assessment walkthrough…
…
continue reading

1
(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar
1:21:40
1:21:40
Play later
Play later
Lists
Like
Liked
1:21:40(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your …
…
continue reading

1
Ep40: The AI Layoff Apocalypse Has Already Started — And You’re Next
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33The Imminent AI Job Crisis: Are You Prepared? This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Cherry Kent Cherry Kent | LinkedIn Incident Response Resources Incident Response | KirkpatrickPrice Find a Forensics Response Provider 24x7 Cyber I…
…
continue reading

1
Tabletop Tactics: Rehearsing for Cyber Threats
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01A tabletop exercise is a discussion-based simulation designed to help teams determine how to respond to a crisis. These exercises provide a safe environment to test and refine an organization's incident response plan and identify weaknesses in processes. By engaging key personnel in simulated scenarios, tabletop exercises allow for practicing decis…
…
continue reading

1
EP2 - Securing Britain’s Public Sector: Navigating cyber resilience, Compliance and Government legislation
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08In this episode of Tea & Trend, Jonathan Lee sits down with Jill Broom, Head of Cyber Resilience at techUK, for a deep dive into the state of public sector cybersecurity and the evolving challenges shaping the UK's digital defence. Together, they explore Jill’s unique path into cyber strategy and her role at techUK, as well as the critical intersec…
…
continue reading

1
The Impact of AI on Digital Identity with Kristie Pfosi
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03In this episode, Kristie Pfosi, CISO at Marelli, discusses the evolving landscape of digital identity and cybersecurity, highlighting the significant role of AI in data analytics and risk identification. She talks about the current hesitations in fully adopting AI/ML capabilities, citing concerns over data transparency and control. Kristie also exp…
…
continue reading

1
Mitigating Evolving Cyber Threats: The Power of Preparedness and Continuous Management
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44Evolving cyber threats are a significant business risk that boards and executives must oversee, moving beyond simply protecting systems to building resilience. This episode explores how a focus on preparedness, including robust incident response plans and regular testing, combined with continuous management like ongoing monitoring and adapting stra…
…
continue reading

1
Ryan Redman and Brett Sommers on AI and Cybercrime [Podcast]
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32By Adam TurteltaubAs if ransomware and phishing attacks weren’t enough to keep us up at night, now AI is enabling a whole new range of cyber threats.Ryan Redman, Product Manager, Marketing and Brett Sommers, Director of GRC Products at Onspring warn that the nature of attacks is evolving. Vishing, in which criminals use technology to imitate the vo…
…
continue reading

1
May 2025: AI Unicorns, Mega VC Funds, and Regulation Shakeups in DACH
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18Startups in the DACH region are heating up — from AI unicorns to VC mega-funds. In this monthly startup news roundup, we unpack the most important trends in Germany, Austria, and Switzerland’s tech ecosystem. Learn how Parloa became Germany’s second unicorn of the year, how Quantum Systems secured €160M to dominate aerial AI, and how the EIB’s €70B…
…
continue reading

1
Look the Part: Video Appearance Tips for IT Pros (EP 830)
1:00:27
1:00:27
Play later
Play later
Lists
Like
Liked
1:00:27Uncle Marv welcomes back Lisa Shorr, a leading authority on personal branding and client experience for IT businesses, for a lively and insightful discussion on video meeting etiquette. After breaking down the latest cybersecurity threats, the conversation shifts to the “new normal” of remote and hybrid work, where your camera is your connection to…
…
continue reading

1
Why Pax8 Beyond is a Must-Attend for MSPs (EP 829)
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58Watch the video here: https://www.youtube.com/watch?v=VSQ4kIIBbRQ === Join Uncle Marv and Rob Rae as they preview Pax8 Beyond 2025, the can’t-miss conference for managed service providers. Rob shares the inside story of how this event has grown into a global phenomenon, with plans for expansion into Europe and Southeast Asia. Listeners get a sneak …
…
continue reading

1
Trust No Link! - Ep. 26 - CyberSafe News and Views
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55Episode 26 - Trust No Link: Modern Email Threats Exposed! In this eye-opening episode, we break down the most common types of email security threats—phishing, spear phishing, spoofing, and more. 🕵️♂️ Learn how to spot red flags in suspicious emails 📬, what to do immediately 🚨 if you receive one, and how to protect yourself and your organization fr…
…
continue reading

1
Cybersecurity Posture: Methodologies, Mindsets, and Maturity
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42This episode delves into the essential methodologies and services organizations use to assess their cybersecurity posture. We explore techniques like Enterprise Risk Assessments, Threat Analysis, Vulnerability Management and Assessment, and Penetration Testing. Learn how understanding attacker tactics and human behavior through methods like Social …
…
continue reading

1
Shadow AI and Smart Risk: Navigating Enterprise Innovation with Lianne Appelt of Salesforce
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16We’re coming to you LIVE from Riskworld 2025! In this episode of Brick by Brick, Jason Reichl sits down with Lianne Appelt, Enterprise Risk Management lead at Salesforce, to explore the hidden world of 'Shadow AI' - the unauthorized AI tools employees use that put companies at risk. Lianne shares her journey from traditional tech companies like Ora…
…
continue reading

1
How Do You Safeguard AI When Development Outpaces Security? With Ante Gojsalić - SplxAI
46:11
46:11
Play later
Play later
Lists
Like
Liked
46:11Can we secure generative AI before it outpaces our ability to defend it? Welcome back to Razorwire, where we have our finger on the pulse of cybersecurity’s most urgent dilemmas and future threats. I’m your host, Jim and in this episode, I sit down with Ante Gojsalić, CTO and co-founder of SplxAI, to unpick the tangled challenges of securing the ne…
…
continue reading
Uncle Marv welcomes Syncro’s CEO Michael George and Chief Product Officer Dee Zepf for an in-depth conversation about the all-new XMM platform. Listeners get an insider’s look at how Syncro is addressing the biggest pain points for MSPs—integrating Microsoft 365 management, automating security baselines, and streamlining workflows within a single p…
…
continue reading
How do you talk to security? While at NDC Melbourne, Richard chatted with Sarah Young about her approaches to helping folks work with the security team. Often seen as an impediment to business, Sarah talks about what motivates security teams, how to use language to help them understand that you are taking security seriously, and how to get more thi…
…
continue reading

1
Obliterating the Box with Nancy Henriquez (EP 827)
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Uncle Marv sits down with Nancy Henriquez, CEO of Sibyl Consulting Group and a force for change in the MSP community. Nancy shares her journey from launching a break-fix shop at 22, building and selling her own MSP, working with SuperOps, and finally founding Sibyl Consulting. She explains the origin of her company’s name, rooted in Greek mythology…
…
continue reading

1
Ep39: AI in the Workplace: Adapt or Be Replaced
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55Adapt or Replace: How AI is Changing Entry-Level Job Markets AI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more ef…
…
continue reading

1
Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert
53:36
53:36
Play later
Play later
Lists
Like
Liked
53:36Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we ne…
…
continue reading

1
Anna Romberg on Compliance Amidst a Global Consensus Breakdown [Podcast]
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10By Adam TurteltaubThese are fractious times, and it’s often difficult to figure out what to do, what comes next and keep people with divergent views working together.Despite these challenges, Anna Romberg, Executive Vice President, Sustainability, Legal and Compliance for Getinge, doesn’t believe that things are hopeless. In an article she co-autho…
…
continue reading

1
Securing the AI Frontier: Unmasking LLM and RAG Vulnerabilities
15:17
15:17
Play later
Play later
Lists
Like
Liked
15:17Large language models present new security challenges, especially when they leverage external data sources through Retrieval Augmented Generation (RAG) architectures . This podcast explores the unique attack techniques that exploit these systems, including indirect prompt injection and RAG poisoning. We delve into how offensive testing methods like…
…
continue reading

1
Negotiate Like the FBI: Sales Psychology for Startup Founders
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42What happens when an FBI-trained negotiation coach brings elite sales psychology into the startup world? You get a masterclass in influence, integrity, and investor persuasion. Today’s episode of Startuprad.io features Matthias Bullmahn, a crisis negotiation expert, former Accenture executive, and storytelling coach — here to show founders how to n…
…
continue reading
In this episode of Socializing Security, the hosts discuss their experiences at the RSA Conference with guest Bharat Jogi, a seasoned attendee. They explore the evolution of the conference, the importance of networking, and share valuable tips for first-time attendees. The conversation also touches on the role of AI in cybersecurity and the signifi…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
Episode 390: AGA Construction Operations Committee
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31On this episode of the Pipeliners Podcast, host Russel Treat is joined by Todd Lakatos and Mary Molina during the 2025 AGA Operations Conference in Aurora, Colorado. Visit PipelinePodcastNetwork.com for a full episode transcript, as well as detailed show notes with relevant links and insider term definitions.…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
Cyber Resilience in Finance: Planning, Responding, and Recovering
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54The financial sector is a frequent target for cyberattacks, facing a staggering rise in cases and significant costs from data breaches. Preparing for these threats requires understanding ransomware-as-a-service (RaaS), phishing, and other malicious activities, as well as implementing robust cybersecurity programs and incident response plans. This e…
…
continue reading

1
The Threat Horizon: DIA 2025 Global Security
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17The 2025 Worldwide Threat Assessment by the Defense Intelligence Agency describes a rapidly changing global security environment where national security threats are expanding, fueled by advanced technology. It identifies key regional security flashpoints, including threats to the U.S. Homeland and Southern Border, China's assertiveness in the Indo-…
…
continue reading

1
The Great Digital Crackdown of 2025: Inside the Global Fight Against Cybercrime
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:562025 saw unprecedented international law enforcement efforts shatter major cybercrime networks like the LummaC2 infostealer, the Cracked and Nulled forums, the 8Base ransomware gang, and the Zservers bulletproof hosting service. These coordinated operations, involving over 20 nations and resulting in thousands of server seizures, disrupted criminal…
…
continue reading