A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
The GDPR Guy - the podcast dedicated to all things privacy, hosted by Carl Gottlieb - the trusted privacy advisor to leading tech companies, helping them gain maximum advantage through the right privacy strategy. Each episode Carl will be providing information, insights and inspiration to help you on your privacy journey. You’ll find show notes and useful resources on the website, https://CarlGottlieb.com, as well as details for getting in touch with Carl directly.
…
continue reading

1
Privacy in the age of robotics: A discussion with Erin Relford
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Autonomous robots with embedded artificial intelligence are growing more common across industry sectors. So-called “embodied AI,” collects vast amounts of data through its sensors and changes how humans interact with technology. As embodied AI becomes more common and continues to drive innovation, it also creates new challenges for ethical uses of …
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
296: 5 Trends That Will Separate Data Winners from Losers in 2025 - Yellowbrick Data
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
…
continue reading

1
InfoSec Beat: The Golden Age of Managed Security Services Reinvention
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10Can the way Accenture delivers managed security services be reinvented? Accenture CISO Kris Burkhardt poses this question to guest Rex Thexton, chief technology officer of Accenture Security, who gives a definite yes. Rex shares several exciting opportunities possible in the next 12 to 18 months. Listen to learn more about the prospects of AI-power…
…
continue reading

1
Insecure Webcam Was All a Ransomware Group Needed
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simulta…
…
continue reading

1
295: How to Turn Your Backups Into Business Intelligence - Eon
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
…
continue reading

1
294: Why Cybersecurity Isn’t Just for Hackers Anymore - Aspen Institute
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48Yameen Huq, Director of Cybersecurity Programs at the Aspen Institute explores the often-overlooked non-technical skills needed in cybersecurity, the evolving cyber policy landscape in Washington D.C., and the critical importance of aligning cyber investments with real-world business outcomes. From AI-enhanced policy development to economic-driven …
…
continue reading

1
293: The Fear Every CISO Has But Rarely Admits - Loreta Today
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
…
continue reading
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
…
continue reading

1
292: Avoiding Cyber Disaster: Is Your Company DORA Compliant? - N2WS
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
…
continue reading

1
291: Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware - Commvault
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
…
continue reading

1
On privacy and technology with Dan Solove
47:08
47:08
Play later
Play later
Lists
Like
Liked
47:08Privacy law and technological advancements have a deep and intertwined history that go back to at least the 1890s with Samuel Warren and Louis Brandeis's article "The Right to Privacy," which was prompted by camera technology. George Washington University Law Professor Dan Solove has long studied and written about privacy law. He published several …
…
continue reading
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
…
continue reading

1
290: Your Old Tapes Might Be a Goldmine for Hackers – Here’s Why! - Insurgo
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss why traditional shredding and degaussing aren’t enough. Insurgo’s groundbreaking tech ensures data is t…
…
continue reading

1
289: The Enterprise Backup Industry’s Worst Nightmare? - S2|DATA
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08W. Curtis Preston, aka "Mr. Backup," reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
…
continue reading

1
Observations of an Ethical Hacking Researcher
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker land…
…
continue reading

1
288: From Data Chaos to Control: The Future of Cloud Backup - Backblaze
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the company public. We explore rising storage costs, AI-driven data explosion, ransomware defense strategies…
…
continue reading

1
Regulating online safety: A chat with Australia eSafety Commissioner Julie Inman-Grant
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24Australia made waves in 2024 after it passed an amendment to the Online Safety Act of 2021, which introduces a legal minimum age of 16 to create and use an account for certain social media platforms in Australia. It also requires platforms within scope to implement age-gating practices. As Australia’s first eSafety Commissioner, Julie Inman-Grant, …
…
continue reading

1
287: The Secret Weapon NFL Teams Use for Game-Changing Decisions! - OSNEXUS
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
…
continue reading
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware,…
…
continue reading

1
286: CEOs Beware: Ignoring Your Data Could Cost You Everything - The Data Group
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
…
continue reading

1
285: Hackers Are One Step Ahead – Can You Recover Your Backups? - DCIG
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
…
continue reading

1
US state AI legislation in 2025: A discussion with Connecticut State Sen. James Maroney
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22Though it came close in recent years, federal privacy legislation is not likely top of mind as a new administration takes the reigns in Washington, DC. The same likely goes for federal AI governance and safety legislation with a divided Congress and executive branch that promotes a deregulatory posture. That means state-level privacy and AI bills w…
…
continue reading
While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics. So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to indust…
…
continue reading

1
284: How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 - Memcyco
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
…
continue reading

1
InfoSec Beat: Careers in Information Security – Governance, Risk and Compliance
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28This episode of the InfoSec Beat podcast focused on careers in information security features a conversation between Accenture CISO Kris Burkhardt and Paul Kunas, who led our Governance, Risk, and Compliance (GRC) function for almost 10 years. Paul’s career journey involved security roles at Accenture and other companies and ultimately a return to A…
…
continue reading

1
283: How Data Lakes and Deep Learning Are Revolutionizing Cybersecurity in 2025 - DeepTempo
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflake in reducing data silos, and best practices for leveraging AI in threat detection. Powell emphasizes a…
…
continue reading
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware. We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detec…
…
continue reading

1
282: Shocking New Tactics Hackers Are Using to Steal Your Identity - Breez Security
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry and AI to enhance detection and response capabilities. The conversation explores persistent security chal…
…
continue reading

1
281: Your Phone Could Be the Perfect Target -- Here’s Why - Nuke from Orbit
22:27
22:27
Play later
Play later
Lists
Like
Liked
22:27James O'Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the origin story of his company, born from a personal incident of phone theft, and details how Nuke from Orbit …
…
continue reading

1
280: Protecting Backups and Future-Proofing Skills in Containers – IDC
26:17
26:17
Play later
Play later
Lists
Like
Liked
26:17Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences from traditional backups, and the expertise gap in managing Kubernetes-based systems. Johnny discusses…
…
continue reading
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at som…
…
continue reading

1
279: Connecting AI and DevOps to Solve Modern Workflow Challenges - Jozu
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He introduces KitOps.ml, an open-source project designed to simplify the management of AI/ML artifacts an…
…
continue reading

1
278: Critical Mobile Vulnerabilities and How to Prevent Them - Appknox
25:24
25:24
Play later
Play later
Lists
Like
Liked
25:24Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure coding practices, and fake apps. He emphasizes the importance of integrating security into the Softwar…
…
continue reading

1
Digital policy 2024: A year in review with Omer Tene
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57It's hard to believe we’ve reached the final weeks of 2024, a year filled with policy and legal developments across the map. From the continued emergence of AI governance, to location privacy enforcement, children’s online safety to novel forms of privacy litigation, no doubt this was a year that kept privacy and AI governance pros very busy. One s…
…
continue reading
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months. While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with sp…
…
continue reading

1
277: Why Business Continuity Plans Often Fail - Strata Identity
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights re…
…
continue reading

1
AI Is Exposing Your Most Vulnerable Attack Surface
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. And we all know what happens with this hijacked data. Per the World Economic Forum’s May 2024 whi…
…
continue reading

1
276: When Hackers Hit Your Backups, This One Thing May Save You - Myota
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Gabriel Gumbs, Chief Product Officer and President at Myota, unpacks the unsettling truths about immutability, the evolution of ransomware tactics, and why traditional backup systems are failing in the face of cyber threats. Discover a revolutionary approach to Polymorphic Immutability, designed to keep your data secure, recoverable, and cost-effec…
…
continue reading

1
275: From Open-Source to APIs: The Critical Decisions Behind SaaS Architecture - Fastbreak RFP
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Peter Bonney, CEO and Founder of Fastbreak RFP, shares his journey in building a scalable SaaS platform for automating RFP responses using AI. Peter dives into the challenges of balancing innovation with the rapid evolution of foundational AI models, the trade-offs between open-source tools and third-party APIs, and the critical architectural decis…
…
continue reading
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing …
…
continue reading

1
274: Preventing Breaches Through Smarter Detection Techniques - Vectra AI
25:49
25:49
Play later
Play later
Lists
Like
Liked
25:49David Brooks, Cyber Security Architect at Vectra AI discusses early adversary detection, the role of AI and machine learning in preventing breaches, and the importance of network traffic analysis. David shares insights into balancing technology and empathy in cybersecurity, the value of layered defense strategies, and advice for aspiring profession…
…
continue reading

1
What Cybersecurity Can Learn from Tom Brady
53:11
53:11
Play later
Play later
Lists
Like
Liked
53:11We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats. Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re goin…
…
continue reading

1
AI red teaming strategy and risk assessments: A conversation with Brenda Leong
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41AI governance is a rapidly evolving field that faces a wide array of risks, challenges and opportunities. For organizations looking to leverage AI systems such as large language models and generative AI, assessing risk prior to deployment is a must. One technique that’s been borrowed from the security space is red teaming. The practice is growing, …
…
continue reading

1
273: Critical Attack Vectors Every SMB Must Defend Against - Dropsuite
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33Mark Kirstein, Chief Product Officer at DropSuite discusses the evolving cyber threat landscape, particularly how SMBs are increasingly targeted by cybercriminals. He explains the rising importance of data protection and the critical role MSPs play in helping small businesses safeguard essential information. Mark shares insights on new attack vecto…
…
continue reading
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries res…
…
continue reading

1
272: Protecting the Next Generation of AI: Backup Challenges for Large Language Models - IDC
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Phil Goodwin, IDC’s Research VP, explore the challenges of backing up AI environments, focusing on large language models. Phil highlights the limitations of traditional backup methods for dynamic AI systems and the industry's push for genuine AI-driven data protection. We discuss the roles of companies like Dell, Commvault, Rubrik, and Cohesity in …
…
continue reading
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
…
continue reading

1
271: Guarding the Kingdom: Protecting Microsoft Entra ID and IAM Systems- Dropsuite
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers to as "the keys to the kingdom," underscoring its importance as a primary target for cyber threats. We e…
…
continue reading

1
InfoSec Beat: How to Balance Real-Time Intelligence with System Availability
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55Are organizations in control of updates to their environments? The July 2024 CrowdStrike disruptive update has many asking this question. Patches are essential to security, but this event and others before it have organizations asking how to strike a balance in protecting quickly with the need to be resilient? Join me and Jacky Fox, Accenture Secur…
…
continue reading