Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
How can business help solve society’s biggest challenges? Welcome to Take on Tomorrow, the award-winning podcast from PwC that examines the biggest problems facing society and the role business can—and should—play in solving them. Hosts Femi Oke and Lizzie O’Leary talk to industry innovators, tech trailblazers and visionary leaders from around the globe about timely topics: from the climate transition to AI and data; and from the future of food to how we build, move and power the world.
…
continue reading
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
A series of informal conversations with thought leaders, researchers, practitioners, and writers on a wide range of topics in technology, science, and of course big data, data science, artificial intelligence, and related applications. Anchored by Ben Lorica (@BigData), the Data Exchange also features a roundup of the most important stories from the worlds of data, machine learning and AI. Detailed show notes for each episode can be found on https://thedataexchange.media/ The Data Exchange p ...
…
continue reading
Chakras and Shotguns is a wellness podcast hosted by Mik and Jenn, a married couple who ditched their corporate jobs to become healers. Jenn's a former corporate lawyer, now yoga instructor, Tarot card reader and medium. Mik's a former brand marketer, now a Reiki Master, Shaman, life coach and prepper. And yes, we know Chakras and Shotguns sounds like an odd combo, but it's all about balance and the duality of life! "Chakras" symbolizes your spiritual journey towards enlightenment, while "sh ...
…
continue reading

1
Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40In Episode 185 of The Citrix Session, Andy Whiteside, Bill Sutton, and Todd Smith explore how Citrix NetScaler is evolving into a true Swiss Army knife for security—delivering protection not just for Citrix workloads, but for all applications. The conversation dives into the looming challenge of quantum computing and the “harvest now, decrypt later…
…
continue reading

1
Designing for Breakage: What Cybersecurity Leaders Must Plan For
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34As quantum computing accelerates toward real-world impact, organizations must stop viewing post-quantum cryptography as a one-time technical upgrade. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Yolanda Reid, former Associate Partner at IBM Consulting and U.S. Department of Defense leader, to exp…
…
continue reading

1
The Fenic Approach to Production-Ready Data Processing
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45Kostas Paralis, co-founder of Typedef , discusses Fenic, an open-source data frame framework designed specifically for AI applications that treats inference as a first-class operation within the query engine. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify · Overcast · Pocket Casts · Antenna…
…
continue reading

1
AI Adoption vs. Security Reality — Insights from GPSEC STL
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) Episode Summary: AI isn’t just hype anymore — it’s transforming the way enterprises operate. At GPSEC St. Louis, David Malicoat sits down with Felix Simmons, Principal Security Architect at GuidePoint Security, to cut through the noise around AI adoption, risk, an…
…
continue reading

1
Episode 330 Deep Dive: Marco Pereira | The Day Encryption Breaks: Are We Ready for the Quantum Threat?
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantu…
…
continue reading

1
When AI Eats the Bottom Rung of the Career Ladder
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57Ben Lorica and Evangelos Simoudis discuss three critical trends shaping the AI industry: the “Great Hollowing Out” where AI automation is eliminating entry-level positions and disrupting talent pipelines, the financial implications of rapid AI hardware depreciation versus traditional accounting practices, and OpenAI’s shift to router-based model se…
…
continue reading

1
From NotebookLM to Audio Companions: Why Google’s AI Team Went Startup
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Raiza Martin, co-founder of Huxe and former leader of Google’s NotebookLM team, discusses leaving Google at the height of NotebookLM’s success to build an audio-first personal AI companion. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify · Overcast · Pocket Casts · AntennaPod · Podcast Addic…
…
continue reading

1
From NIST Standards to Action: A Year of PQC Migration
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift? In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back so…
…
continue reading

1
Why 91% of Cyberattacks Start with Email and How to Protect Yourself with Stefan Cink
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Stefan Cink, Director of Business and Professional Services at NoSpamProxy, to break down the real vulnerabilities in email security and strategies to protect yourself.By GMO GlobalSign Limited
…
continue reading

1
EP82: Lessons from CISO XC DFW: Leadership, Risk & Real-World Security
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04Summary: Recorded live at CISO XC DFW, this episode of The Professional CISO Show features three powerful conversations from leaders shaping the future of cybersecurity. First, Sonya Wickel shares her 24-year career journey from IT generalist to CISO & CIO, offering insights on fourth-party risk, the value of empathy in leadership, and the importan…
…
continue reading

1
Episode 329 Deep Dive: John Hultquist | An Overview of Australia’s Threat Landscape
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia’s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors—particularly from China—and financially motivated…
…
continue reading

1
Hardware Is the Hidden Risk: Ferhat Yaman on PQC, Side-Channel Attacks, and AI Privacy
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22As post-quantum cryptography moves from theory to hardware, organizations can no longer afford to ignore the physical layer of security. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Ferhat Yaman, security researcher at AMD’s Product Security Office, to explore how electromagnetic side-channel attack…
…
continue reading

1
The AI-Native Notebook That Thinks Like a Spreadsheet
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26The discussion with CEO Akshay Agrawal covers how Marimo’s AI integration provides runtime context to LLMs for superior code generation, its adoption across industries from cybersecurity to DevOps, and the technical innovations that make notebooks viable for production environments. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.s…
…
continue reading

1
From Data Governance to AI Security: Kristi Cook on Building Resilient Teams
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46Sponsors AIM Security (www.aim.security) Guidepoint Security (www.guidepointsecurity.com) Kristi Cook, Head of Cybersecurity at Peabody Energy, joins David Malicoat live from GPSEC St. Louis — with AIM Security as our midday sponsor — to discuss how she’s leading her team through AI adoption, data governance, and talent development. From leveraging…
…
continue reading
The way we power society is transforming, and it’s not happening in a silo. As energy demand and geopolitical tensions both rise, and the shift toward new ways to fuel and power our lives picks up speed, how should businesses rethink the opportunities and challenges ahead? Where can they find new value? And what could the world look like with more …
…
continue reading

1
Episode 328 Deep Dive: Rob Clyde & Jamie Norton | Quantum Computing – How Can Cyber Professionals Prepare?
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a recent ISACA global survey revealing that 95% of organizations lack …
…
continue reading

1
Introducing a special series of Take on Tomorrow
2:04
2:04
Play later
Play later
Lists
Like
Liked
2:04This special series of Take on Tomorrow, PwC’s award-winning podcast, unpacks how the global economy will change over the decade ahead and what that means for business and society. We’ll explore how business will navigate—and shape—the challenges and opportunities ahead, including emerging technology, climate impacts, and new ways of collaborating …
…
continue reading

1
How Agentic AI is Transforming Wall Street
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Josh Pantony, CEO of Boosted AI, discusses Alfa, an agentic AI platform that creates persistent AI workers for finance professionals, moving beyond traditional prompt-response AI to proactive, autonomous systems. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify · Overcast · Pocket Casts · Ant…
…
continue reading

1
Episode 327 Deep Dive: David Wiseman | Do You Really Know Who You're Speaking To?
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents—including compromised government messaging apps and political deep fakes—that highlight vulnerabilitie…
…
continue reading

1
Expanding Citrix DaaS with Amazon WorkSpaces Core Managed Instances
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06In Episode 184 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to explore the newly enhanced integration between Citrix DaaS and Amazon WorkSpaces Core Managed Instances. The team dives into what's new in this “version 2” release, how it enables flexible, cost-effective VDI deployment, and why it’s a…
…
continue reading

1
CISO XC Live: Conversations on Innovation and Threats
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Sponsored by HivePro (www.hivepro.com) and CISO XC (www.cisoxc.com). EP80 – CISO XC DFW | Hive Pro Special: AI, Identity & The Future of Cyber Roles Live from CISO XC DFW, The Professional CISO Show dives into the intersection of innovation, leadership, and cyber resilience. Host David Malicoat sits down with: Ted Sanders, BISO and cybersecurity ed…
…
continue reading

1
Episode 326 Deep Dive: James Blake | Assessing Your Organisation’s Cyber Resilience
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a si…
…
continue reading

1
Why IT Needs Deep Visibility for Application Rollouts
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In Episode 183 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to break down how IT leaders can make smarter decisions when rolling out Windows 365. They explore the growing importance of deep visibility, flexible deployment models, and persona-based strategies to support modern hybrid environments. …
…
continue reading

1
The Quantum Advantage Is Real—But Where's the Infrastructure?
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53Jennifer Prendki explains that while universal quantum computers are a decade away, specialized quantum accelerators are already tackling AI problems in finance and pharma. She argues the biggest hurdle isn’t the hardware but the profound software and infrastructure gap, as fundamental principles like the “no-cloning theorem” break traditional MLOp…
…
continue reading

1
From DFIR Godfather to AI Risk Advocate: Rob T. Lee on Cybersecurity’s Crossroads | RSA 2025
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05In this special RSA Conference edition of The Professional CISO Show, host David Malicoat sits down with Rob T. Lee—Chief of Research at SANS Institute and a foundational figure in cybersecurity. With nearly three decades of experience spanning the Air Force, Mandiant, and SANS, Rob shares his insights on the evolving challenges of the CISO role, t…
…
continue reading

1
Episode 325 Deep Dive: Federico Torreti | Organisations Getting Choice and Flexibility for AI Experimentation
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41In this episode, we sit down with Federico Torreti, Senior Director of Product for AI & ML at Oracle, as he discusses the company’s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-a…
…
continue reading

1
XenServer 8.4: A New Era of Virtualization for All Workloads
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35In Episode 182 of The Citrix Session, host Bill Sutton and Citrix’s Todd Smith dive into the expanded capabilities of XenServer 8.4, Citrix’s enterprise-grade hypervisor. No longer just for Citrix workloads, XenServer is now fully supported for all workloads under both Citrix Platform Licensing and UHMC—making it a strong contender for organization…
…
continue reading

1
Episode 324 Deep Dive: Kate Healy | Successfully Engaging and Selling to a CISO
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationsh…
…
continue reading

1
From Human-Readable to Machine-Usable: The New API Stack
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Sagar Batchu, CEO of Speakeasy, joins the podcast to discuss the critical shift in API development as AI agents become primary consumers. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify · Overcast · Pocket Casts · AntennaPod · Podcast Addict · Amazon · RSS. Detailed show notes - with links t…
…
continue reading

1
The biggest risk to PQC migration is you (and other humans)
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20As quantum computing inches closer to real-world impact, organizations can no longer afford to treat post-quantum cryptography as a future concern. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Professor Bill Buchanan, OBE, FRSE, to examine what it takes to transition into the post-quantum era. They …
…
continue reading

1
Event Series EP 78: AI, Data, and Talent: CISO Lessons from GPSEC STL
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) In this episode of The Professional CISO Show, David Malicoat hosts a special two-part discussion live from GPSEC STL in St. Louis. First up is Marc Ashworth, CISO of First Bank and host of The Cyber Executive Podcast, who discusses leadership development, AI, mentor…
…
continue reading

1
Episode 323 Deep Dive: Jadee Hanson | Is Compliance A Minimum Standard Or A Strategic Enabler In Cybersecurity Governance?
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business su…
…
continue reading

1
What’s New and What’s Next at Citrix: LTSR, UHMC, Secure Browsers & More
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17In Episode 181 of The Citrix Session, hosts Bill Sutton and Todd Smith dive into the key takeaways from the blog “What’s New and Next with Citrix: Q&A from our May 2025 Webinar.” From release cadence updates and licensing clarity to enhanced integration with Windows 365 and Nutanix, this episode is packed with forward-looking insights for Citrix ad…
…
continue reading

1
🎙 Episode 77 – CISO XC DFW 4: Securing the Real World
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14🔹 Live from CISO XC DFW (www.cisoxc.com) | Sponsored by Valence Security (www.valencesecurity.com) In this field-recorded episode of The Professional CISO Show, host David Malicoat returns to CISO XC DFW for another round of dynamic, on-the-ground conversations with three influential cybersecurity leaders — each offering a unique and grounded persp…
…
continue reading

1
Fix Your Data Pipeline or Drown: David Young on Cost, Complexity & AI in Security
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) In this episode of The Professional CISO Show, recorded live at GuidePoint Security’s GPSEC STL event, host David Malicoat sits down with David Young, Chief Revenue Officer at ObservoAI. Together, they unpack the explosive growth of security data, the hidden costs…
…
continue reading

1
Episode 322 Deep Dive: Courtney Guss | Resilience in Real Time: Women, Leadership and the Frontlines of Cyber Crisis
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impac…
…
continue reading

1
Why Voice Security Is Your Next Big Problem
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37In this episode, Yishay Carmiel and Roy Zanbel of Apollo Defend discuss the rapidly evolving landscape of voice AI and its emerging security threats. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify · Overcast · Pocket Casts · AntennaPod · Podcast Addict · Amazon · RSS. Detailed show notes - …
…
continue reading

1
Too Small to Hack? Busting the Myth Putting Your Business at Risk with Sarah Armstrong-Smith
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Sarah Armstrong-Smith, Best Selling Author and Co-Host of the Cyber Sisters podcast, to dismantle the dangerous myth that SMEs are "too small to hack," how cloud-based tools can bolster resilience, and how the right mix of AI…
…
continue reading

1
KBI.Media Update | KBKast Partners with Vanta as First Exclusive Sponsor
1:02
1:02
Play later
Play later
Lists
Like
Liked
1:02KBI.Media is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and Vanta, the leading trust management platform. In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to: Inv…
…
continue reading

1
🎙 Episode 75 — GPSEC STL: Community, AI & Quantum Readiness
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Sponsors: AIM Security (www.aim.security) Guidepoint Security (www.guidepointsecurity.com) In this special on-location episode, David Malicoat returns to The Professional CISO Show from the heart of the St. Louis cybersecurity scene—GPSEC STL—presented by GuidePoint Security and AIM Security. He’s joined by two standout guests: 🔹 Andrew Wilder, CIS…
…
continue reading

1
Episode 321 Deep Dive: Graeme Neilson | How the Security Industry Ignores the Halting Problem
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, ar…
…
continue reading

1
Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boar…
…
continue reading
Shreya Shankar is a PhD student at UC Berkeley in the EECS department. This episode explores how Large Language Models (LLMs) are revolutionizing the processing of unstructured enterprise data like text documents and PDFs. It introduces DocETL, a framework using a MapReduce approach with LLMs for semantic extraction, thematic analysis, and summariz…
…
continue reading

1
From JFrog EveryOps Day '25 Sydney – KB On The Go | Sunny Rao, Craig Wilson, and Tal Zarfati
1:20:48
1:20:48
Play later
Play later
Lists
Like
Liked
1:20:48In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and th…
…
continue reading

1
✈️ EP74: Inside GPSEC STL: AI, Red Team Ops & Human-Centered Security
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) In this live GPSEC St. Louis episode of The Professional CISO Show, host David Malicoat dives deep into cybersecurity leadership with two powerhouse guests: Victor Wieczorek, SVP of Offensive Security at GuidePoint Security, and Wayne Fajerski, Deputy CISO of Edward …
…
continue reading

1
Citrix + Nutanix: The Easy Button for VDI Management
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01Managing virtual desktops doesn’t have to be hard. In Episode 180 of The Citrix Session, Bill Sutton is joined by Citrix’s Todd Smith and Geremy Meyers—and special guest Phil Sellers from XenTegra—to break down the latest innovations from the Citrix + Nutanix partnership. What’s New & Why It Matters: One Integration Point: Citrix now supports Prism…
…
continue reading

1
Episode 319 Deep Dive: Paul O'Rourke | The New Function Of A CRO And What This Actually Means
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22In this episode, we sit down with Paul O’Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-…
…
continue reading
Douwe Kiela, Founder and CEO of Contextual AI, discusses why RAG isn’t obsolete despite massive context windows, explaining how RAG 2.0 represents a fundamental shift to treating retrieval-augmented generation as an end-to-end trainable system. Subscribe to the Gradient Flow Newsletter 📩 https://gradientflow.substack.com/ Subscribe: Apple · Spotify…
…
continue reading

1
The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10Most cybersecurity roadmaps don’t plan for 20-year-old firmware, but that’s the reality of operational technology (OT). In this episode, Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric, offers a behind-the-scenes look at what it takes to secure industrial systems, …
…
continue reading

1
🔒 EP 73 — CISO XC DFW Part 3: From Threat Exposure to Business Enablement (ft. Matt Walker & Allen Rountree)
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Sponsors: HivePro (www.hivepro.com) CISO XC: (www.cisoxc.com) In this on-site episode from CISO XC DFW, David Malicoat sits down with Matt Walker (Goosehead Insurance) and Allen Rountree (IBM Public Cloud) for candid conversations on today’s biggest challenges and opportunities in cybersecurity leadership. 💡 Topics Covered Applying Zero Trust princ…
…
continue reading