show episodes
 
Artwork

1
Good Morning, HR

Mike Coffey, SPHR, SHRM-SCP

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
HR entrepreneur Mike Coffey, SPHR, SHRM-SCP engages business thought leaders about the strategic, psychological, legal, and practical implications of bringing people together to create value for shareholders, customers, and the community. As an HR consultant, mentor to first-stage businesses through EO’s Accelerator program, and owner of Imperative—Bulletproof Background Screening, Mike is passionate about helping other professionals improve how they recruit, select, and manage their people. ...
  continue reading
 
The EY India Insights podcast features conversations with experts on a wide range of topical subjects like ESG, technology, and economic and policy changes that are shaping the thought process of the C-Suite, and are likely to be the cornerstone of a transformative business.
  continue reading
 
Equinology Institute is well known leader in offering online equine massage therapy certifications at ease. Become a certified equine massage therapist by taking the course at Equinology Institute. To know more details on equine massage therapy certifications click at: https://www.equinologyinstitute.com Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Garlic Marketing Show

Video Marketing Expert Ian Garlic discusses whats working RIGHT now with top marketers, their stories of failure and success. Ian also works live to create video marketing strategies.

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
In a world full of business “Gurus” and “marketing experts” one man seeks the latest marketing techniques that are actually working, plus finds the real stories of triumph and failure from those REALLY doing it. Guests like #1 Marketer Neil Patel, Tucker Max, Ryan Deiss from Digital Marketer, Michael Port and many, many more… Ian Garlic has hands on helped hundreds of businesses with marketing strategy and execution. As CEO of authenticWEB, Ian launched hundreds of websites, produced even mo ...
  continue reading
 
Loading …
show series
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
In episode 198, Coffey talks with Kelly Baringer about 2025 trends in employee health benefits and strategies for reducing healthcare costs. They discuss value-based care and directed networks that steer patients to providers with better outcomes; consumer-driven healthcare plans with transparent pricing and no balance billing; the rising costs of …
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
In episode 197, Coffey talks with Adam Dougherty about angry ex-employees and new ways to get sued. They discuss managing post-termination communications from angry ex-employees; responding to threats of litigation; the importance of good people practices when faced with litigation threats; new causes of discrimination claims following last year’s …
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
In this episode of the Indirect Tax insights Podcast, Bipin Sapra,Partner - Leader, Indirect Tax Economic Policy, EY India, is joined by Jayashree Parthasarathy, Partner, Indirect Tax, EY India. Together, they unravel the complexities of taxation on gift cards and vouchers under the GST regime. Discover key insights on: The evolution of tax treatme…
  continue reading
 
In this episode of EY.ai Unplugged, Rohit Pandharkar, Partner, Technology Consulting, EY India, explores the global and Indian advancements in Large Language Models (LLMs). Dive into the journey of AI progressing from text generation to agentic AI, revolutionizing industries through autonomous decision-making. Gain insights into India’s growing AI …
  continue reading
 
In this episode, Abhishek Sen, Partner at People Consulting, EY India, delves into the transformative power of Generative AI in HR. Discover how GenAI is revolutionizing recruitment, performance management, and employee experience, while also addressing the importance of responsible AI practices. Explore EY’s innovative approach to creating a smart…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
In episode 196, Coffey talks with Sam Kabert about achieving "soul-life balance" as an alternative approach to traditional work-life balance. They discuss the concept of soul-life balance focusing on inner well-being rather than compartmentalizing work and personal life; the 90-second rule for processing emotions based on neuroscience research; the…
  continue reading
 
In this episode of the EY.ai Unplugged series, Prashant Garg, Technology Consulting Partner, EY India delves into how generative AI is shaping the future of finance from a CFO’s perspective. Explore how GenAI is transforming routine finance tasks into strategic opportunities, enabling faster and more insightful decision-making, and driving innovati…
  continue reading
 
AI isn’t here to replace you! it’s here to make you better. But only if you know how to use it the right way. Meet Adi Klevit, CEO and Founder of Business Success Consulting Group, where she helps businesses document, optimize, and implement processes for long-term growth. She’s here to break down how AI can improve your systems, streamline trainin…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
  continue reading
 
In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid …
  continue reading
 
In episode 195, Coffey talks with Diane Allen about achieving flow state at work to maximize productivity, creativity, and fulfillment. They discuss the definition of flow as an optimal state of mind where people perform and feel their best; the neurological and physiological aspects of flow including the release of performance-enhancing hormones; …
  continue reading
 
This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
  continue reading
 
Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
  continue reading
 
In episode 194, Coffey talks with Lucy Adams about transforming people practices to meet modern business needs. They discuss how traditional HR processes focus on conformity rather than flexibility; the tendency to design policies around the lowest common denominator rather than individual needs; regulation burdens in the UK versus the US; opportun…
  continue reading
 
Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
Welcome to BIS Certification: What Indian Businesses Must Know, where we decode the evolving regulatory landscape of BIS certification and its impact on manufacturers and importers in India. In this episode, Jayashree Parthasarathy, Indirect Tax Partner at EY India, is joined by Agneshwar Sen, Indirect Tax Partner at EY India, to discuss why BIS ce…
  continue reading
 
Jotform isn’t just about forms anymore. AI is changing everything. In this episode of the Garlic Marketing Show, Aytekin Tank, Founder & CEO of Jotform, shares how his team is replacing traditional forms with AI agents, their game-changing experiment with Google AI, and how they’re using customer stories to shape their products. If you want to know…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
In episode 193, Coffey talks with Terri Swain about recent HR news items including return-to-office mandates, “illegal DEI”, and whether it is Alt+Ctrl+Delete or Ctrl+Alt+Delete. They discuss SHRM's report showing significantly higher workplace incivility in companies with return-to-office mandates; challenges with remote work including leadership …
  continue reading
 
Private jets aren’t just for luxury. They’re a powerful business tool for networking, deal-making, and elite masterminds. On this episode of the Garlic Marketing Show, Lea Woodford, CEO of SmartFem Media Group, reveals how she leverages private jets to land high-profile clients, host exclusive events, and create unforgettable experiences that build…
  continue reading
 
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play