Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading
This podcast is for Next Gen Leaders who know the power of storytelling is the best way to become more influential in their brand messages in order to create more influence, income, & time freedom. This podcast is about sharing the real, raw, stories and mindsets of some of the top brand influencers on a journey behind the curtains to hear about the stories they share and why they share them.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
…
continue reading
Deloitte global podcast feed
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
The Tech Leaders Podcast brings you candid conversations with established technology leaders, at some of the world's most incredible organisations. From the challenges of sustainable growth, through to continuous innovation and everything in-between. These are the behind-the-scenes stories and personal anecdotes of inspirational leaders at the forefront of the digital revolution.
…
continue reading
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Brief conversations with entrepreneurs, innovators, and company founders
…
continue reading

1
Ep 52 The Story Behind the Greatest Dog in the World
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13This is the story behind the greatest dog in the world—and the man he helped shape. Host Travis opens his heart in this raw, deeply personal episode, paying tribute to Max, his beloved white lab who recently passed. Finding healing and purpose through Max’s unwavering love, Travis pulls back the curtain on the journey that defined his brand, inspir…
…
continue reading
In this episode of The Backstory on Marketing and AI, we uncover how AI is reshaping influencer marketing. Our guest from The Rave reveals how smart tools are identifying influencers hidden within your customer base, enabling personalized, scalable outreach using real-time data and automation. Learn how AI-powered platforms reduce wasted spend on u…
…
continue reading

1
AI Summit Special: The Return of Matt Armstrong-Barnes, Group AI Practice Director at Servita
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27Join us this week on The Tech Leaders Podcast, where Gareth Davies sits down with Matt Armstrong-Barnes, Group AI Practice Director at Servita, and former AI CTO at Hewlett-Packard Enterprises. Matt talks about his new role at Servita, the lessons he learned at HPE, and how effective AI Asset Management can help you keep control of your data. On th…
…
continue reading

1
CCT 253: Practice CISSP Questions - Conduct logging and monitoring activities (Domain 7.2)
25:09
25:09
Play later
Play later
Lists
Like
Liked
25:09Send us a text Security professionals face a constant battle to keep up with evolving threats, and our latest CISSP Question Thursday podcast delivers critical insights into one of the most fundamental cybersecurity capabilities: effective logging and monitoring. The episode begins with a warning about a sophisticated attack campaign targeting recr…
…
continue reading

1
Standardizing Security: A Deep Dive into DoD CUI Rules
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27Send us a text In this episode of CMMC News, we break down DoD Instruction 5200.48—the Department of Defense’s rulebook for handling Controlled Unclassified Information (CUI). Hosts take you through what CUI really means, why the DoD created a standardized approach, and what it takes to handle, mark, and share sensitive information properly. Learn …
…
continue reading

1
CMMC 2.0: What Is a C3PAO and What Does It Cost?
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Send us a text If you're a Department of Defense (DoD) contractor, navigating the world of CMMC 2.0 is essential—and it starts with understanding the role of a C3PAO. In this episode, we break down what a Certified Third-Party Assessor Organization (C3PAO) is, why it matters, and what to expect during a third-party CMMC assessment. You’ll learn: Wh…
…
continue reading

1
CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2)
44:45
44:45
Play later
Play later
Lists
Like
Liked
44:45Send us a text Dive deep into the critical world of security logging and monitoring as we explore Domain 7.2 of the CISSP certification. This episode unpacks the strategic considerations behind effective logging practices that balance comprehensive visibility with practical resource management. We begin with a thought-provoking look at Anthropic's …
…
continue reading

1
Unsecurity Episode 239: Meet the Mentor - CISSP w/ John Kennedy
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35We're back! It's time for a "Meet The Mentor" session with our newest CISSP Program Instructor, John Kennedy. From joining the Air Force to being an ISSM and a cybersecurity mentor, John transports us from his challenges in tech to now leading live sessions, the pressure of building slide decks, and why giving back is essential to him and the secur…
…
continue reading

1
#88, Tech for good and the future of migrant safety: Tom O'Sullivan, Founder and CEO @ Animus Bytes
1:03:31
1:03:31
Play later
Play later
Lists
Like
Liked
1:03:31If you’re looking for a truly authentic insight into entrepreneurship, look no further than this week’s episode. Gareth is joined by Tom O’Sullivan, ex-army veteran and founder of software development company Animus Bytes, and the pair candidly discuss Tom’s journey from battlefield to business meeting. Tom’s leadership journey began in Helmand Pro…
…
continue reading
In this episode, Boobesh Ramadurai, Head of Marketing Analytics at LatentView, shares how companies are unlocking powerful ROI using AI in their marketing stack. We discuss why AI-enabled market research is faster and more insightful than traditional methods and how creative teams are leveraging generative AI to accelerate campaign timelines. Boobe…
…
continue reading

1
CCT 251: Practice CISSP Questions - Security Control Testing, Vulnerability Assessments and Network Scanning (Domain 6.2)
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Send us a text The boundaries between digital vulnerabilities and physical warfare are dissolving before our eyes. Ukrainian forces have dramatically shifted military paradigms by marrying cybersecurity breaches with commercial drone attacks against strategic Russian targets like Tupolev aircraft manufacturers. This evolution demands security profe…
…
continue reading
In this episode of The Backstory on Marketing and AI, host Guy Powell interviews Rocketium CEO Satej Sirur to explore the evolving intersection of AI and marketing. Discover how Rocketium is helping brands automate ad creative generation at scale while maintaining brand compliance, improving speed to market, and reducing creative friction. Satej ex…
…
continue reading

1
Defending AI: White-Collar Crime In The Digital Age, with Dr. Simone Kaempfer
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32As cybercrime, identity theft, and financial fraud rise, regulators are ramping up their responses—and companies and their compliance teams need to adapt to that change. Dr. Simone Kaempfer, partner at law firm Freshfields and head of the firm’s White Collar Defense Practice Group for Continental Europe, is an expert at navigating complex commercia…
…
continue reading

1
CCT 250: Vulnerability Assessments and Network Scanning and the CISSP (D6.2.1)
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54Send us a text Vulnerability assessments serve as the frontline defense against cybersecurity threats, yet many professionals struggle to understand the terminology and methodologies that make them effective. In this comprehensive episode, we demystify the critical components of vulnerability management that every security practitioner should maste…
…
continue reading

1
51 - The Story Behind Building Communities W/ Scott "Red Suit" Orison
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Meet Red Suit Realtor—a driven entrepreneur, luxury agent, and creator known for turning high-end dreams into stunning realities. This episode dives into his brand journey, from the power of authentic marketing to his signature red suit that’s become a symbol of his dynamic approach. Pulling back the curtain on his challenges, breakthroughs, and wh…
…
continue reading

1
CCT 249: Practice CISSP Questions - De-provisioning and Role Definitions (Domain 5.5.2-3)
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10Send us a text Ransomware attacks are surging at an alarming rate - a Scottish non-profit recently reported a 100% increase year-over-year, with fraud cases expected to exceed $33 million. Even more concerning, businesses report feeling less resilient against these threats than in previous years. As cybersecurity professionals, we have a responsibi…
…
continue reading

1
PRMA Insurance Thought Leaders Insight Series- Kareen Boyadjian, VP of UW at Tokio Marine HCC – Cyber & Professional Lines Group
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
…
continue reading
In this episode of The Backstory on Marketing and AI, Peter Swimm of Toilville dives deep into the real-world implications of AI and marketing. With over a decade of experience in conversational AI, Peter breaks down the practical and philosophical challenges businesses face in today’s AI-saturated landscape. From building chatbot systems for enter…
…
continue reading

1
CT 248: Implementing Authentication Systems (SAML, OpenID, ODIC, Kerberos, RADIUS/TACACS+) - Domain 5.6
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21Send us a text Navigating the complex landscape of authentication frameworks is essential for any cybersecurity professional, especially those preparing for the CISSP exam. This deep-dive episode unravels the intricate world of authentication systems that protect our digital identities across multiple platforms and services. We begin by examining O…
…
continue reading

1
CCT 247: Mastering Access Controls - From Biometrics to Administrative Policies (CISSP Domain 4)
18:34
18:34
Play later
Play later
Lists
Like
Liked
18:34Send us a text A shocking incident in Spain recently left 60% of the country's power grid dark in less than five seconds. Was it a cyber attack? The jury's still out, but this real-world event perfectly illustrates why understanding access controls and security mechanisms is critical for today's cybersecurity professionals. Sean Gerber, despite bat…
…
continue reading
This episode of The Backstory on Marketing and AI features John Gargiulo, co-founder of Airpost.ai, as he discusses the future of AI-driven advertising and the role of creativity in the age of automation. From user-generated content to instant video ad creation, John shares how Airpost is reshaping DTC growth through technology. Discover how AI can…
…
continue reading

1
CCT Vendor 03: From Bomb Loader to Hacker - A Journey in Cybersecurity with Clint Steven (Phycyx.com)
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28Send us a text What happens when a former Air Force weapons loader transforms into a cybersecurity expert? Clint Stevens from Physics joins us to share his remarkable journey through military intelligence, special operations support, and cyber warfare before founding his own security consultancy. This conversation peels back the layers of cybersecu…
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore how AI is being embedded in every step of the creative process—from ideation and transcription to video post-production. Our guest is the Executive Video Director of Ammunition, an award-winning Atlanta-based advertising agency. With tools like Midjourney, ChatGPT, and Runway, Ammunit…
…
continue reading

1
CCT 246: CISSP Training - Secure Communication Protocols (Domain 4.1.3)
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Send us a text Cybersecurity professionals need a solid understanding of secure communication protocols, not just for exam success but for real-world implementation. This episode unpacks the essential protocols covered in CISSP Domain 4.1.3, providing clear explanations of how each works and when to use them. We begin with a timely discussion of th…
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore how AI transforms startups from idea to execution. David Hirschfeld, founder of Tekyz, shares his Launch First methodology—a system for using AI to find product-market fit before development even begins. David explains how AI-powered workflows reduce failure risk, speed up iteration c…
…
continue reading

1
CCT 245: Practice CISSP Questions - Hashing - Ensuring Message Authenticity with the CISSP (D3.6)
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25Send us a text Security regulations are changing dramatically in response to major breaches, and the implications for cybersecurity professionals are profound. Sean Gerber kicks off this episode with a career announcement, sharing his transition to independent consulting after 13 years with his previous employer—a move that highlights the evolving …
…
continue reading

1
RCR 161: AI and Financial Security: The New Frontier - Vendor Focus (NextPeak.net)
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18The digital landscape for financial institutions has forever changed with the rapid advancement of artificial intelligence and machine learning technologies. What started as simple robotic process automation has evolved into sophisticated AI systems capable of transforming everything from fraud detection to customer service - but at what security c…
…
continue reading

1
CCT 244: Cybersecurity Foundations - Message Integrity and Authentication (CISSP Domain 3.6)
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17Send us a text Ever wondered how your sensitive messages stay secure in an increasingly dangerous digital landscape? The answer lies in message integrity controls, digital signatures, and certificate validation – the core components of modern cybersecurity we tackle in this episode. We begin with a timely breakdown of Microsoft's recent security br…
…
continue reading

1
Episode #113, Agentic AI Special: "The Rise of AI Agents" - Joseph Connor, Founder of CarefulAI and Prof. at UCL
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Join us this week on The Tech Leaders Podcast, as Gareth sits down with Joseph Connor, Chairman of Agentic AI specialist, CarefulAI and Professor at UCL and formerly Director of AI innovation at NHS England. Joseph talks about his allegiance to the NHS, his love of Stoicism, and his experiences building AI agents for businesses. On this episode Jos…
…
continue reading
In this episode of The Backstory on Marketing and AI, we sit down with Andreas Duess, co-founder of 6 Seeds Consulting, to explore how artificial intelligence is revolutionizing the world of consumer research. From reducing the failure rate of CPG product launches to building synthetic personas based on behavioral data, Duess offers a fascinating l…
…
continue reading

1
CCT 243: Practice CISSP Questions - Information and Asset Handling Requirements (Domain 2.2)
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50Send us a text What happens when a security professional falls victim to malicious AI? The consequences can be devastating, as demonstrated by our analysis of a recent high-profile breach where a Disney security engineer downloaded AI-generated artwork containing hidden malware. This sophisticated attack led to the theft of 1.1 terabytes of sensiti…
…
continue reading

1
Who Owns Transaction Monitoring? Data-Driven Compliance and Culture in Action with Vincent Walden
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33Risk doesn't end with due diligence, it intensifies when money starts moving. But who really owns the responsibility for transaction monitoring, and how can organizations collaborate across silos to stay ahead of fraud? In this episode Hanjo Siebert sits down with Vincent Walden, CEO of Kona AI, to explore how companies can modernize their complian…
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore how AI search tools like ChatGPT and Perplexity are revolutionizing how customers discover and engage with brands. From optimizing for conversational language to updating your website’s technical structure, marketers must adapt quickly. You'll hear expert insights on: · How AI search …
…
continue reading

1
Chris Pogue: Digital Forensics in the Modern Threat Landscape
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both inte…
…
continue reading
In this episode of The Backstory on Marketing and AI, we dive into how AI enabled market research is reshaping small business marketing, especially in the trades. Our guest from Far Beyond Marketing shares how her proprietary "4 Cs" framework—Clear Copy, Consistent Branding, Customer Demographics, and Channel Management—helps business owners build …
…
continue reading

1
Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Send us a text 🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values. Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defi…
…
continue reading

1
CCT 242: CISSP and Information and Asset Handling Requirements (Domain 2.2)
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41Send us a text Four million people affected by a single data breach. Let that sink in. This sobering reality frames today's deep dive into Domain 2 of the CISSP exam: Asset Security. As cybersecurity professionals, understanding how to establish proper information and asset handling requirements isn't just academic—it's essential for preventing exa…
…
continue reading

1
#07 - Zo leg je het datafundament voor AI - Met Sam van Kesteren, Group Data Manager bij Royal Terberg Group
59:45
59:45
Play later
Play later
Lists
Like
Liked
59:45Terberg ontwikkelt en produceert speciale transportvoertuigen en systemen voor haventerminals, logistiek en afvalinzameling. Dat doet dit familiebedrijf wereldwijd en al meer dan 155 jaar. Als Group Data Manager is Sam van Kesteren de spil in het beheren en optimaliseren van alle data binnen Royal Terberg Group. Aan de keukentafel hebben Roel en Sa…
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore the collision of AI and SEO with HelloSEO’s founder. With over a decade of experience, she shares how AI-enabled market research is transforming how marketers approach digital visibility—and what still can’t be replaced by machines. Discover: · Why human expertise still matters in SEO…
…
continue reading

1
CCT 241: Practice CISSP Questions - Transborder Data Flows and the CISSP (Domain 1.5)
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05Send us a text The cybersecurity talent gap is widening at an alarming rate. According to the 2023 ISC² Global Workforce Study, we're facing a shortfall of 5.5 million cybersecurity professionals by 2024, with the workforce needing to grow 12.6% annually just to keep pace with demand. Yet growth is stalling at only 8.7%, creating both challenges an…
…
continue reading

1
Unsecurity Episode 238: Air Gapping w/ Sean Behan
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11This week on Unsecurity, Senior Offensive Security Engineer Sean Behan sits with Brad and Megan to dissect Air Gapping. Starting with the development of the Air Gap method, they discuss its evolution and the pros and cons of each type. Tune in for an engaging discussion on understanding systems operations, strengths, and weaknesses of air gapped ne…
…
continue reading

1
CCT Vendor 02: AI in Cybersecurity: Protecting Financial Institutions - NextPeak.net
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05Send us a text The rapid evolution of artificial intelligence and machine learning has created a pivotal moment for financial institutions. As these organizations race to implement AI solutions, they face both transformative opportunities and significant cybersecurity challenges that demand immediate attention. Sean Gerber draws from over 20 years …
…
continue reading
In this episode of The Backstory on Marketing and AI, we talk with a senior leader at Freepik, an AI-powered creative platform used by millions of professionals. Discover how the evolution of generative tools is reshaping the design and marketing world. From the rise of video AI in 2025 to the ethical questions around copyright and content quality,…
…
continue reading
In this episode of The Backstory on Marketing and AI, we uncover how Marla Schilling at Zayo is using AI to dramatically enhance marketing performance. Learn how her team increased blog traffic by 160% and improved social media engagement by 90% by integrating AI into their content and social workflows. Discover how AI-enabled Market Research power…
…
continue reading

1
RCR 160: Physical Meets Digital: Security's Evolving Frontier - Vendor Focus (Haystack.com)
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
…
continue reading

1
CCT 240: Cybersecurity Documentation: Policies, Standards, and Procedures (CISSP Domain 1.7)
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36Send us a text Ever wonder why organizations with robust cybersecurity teams still fall victim to devastating attacks? The answer often lies not in fancy technology but in something far more fundamental: documentation. In this eye-opening episode, Shon Gerber takes listeners into the critical world of cybersecurity documentation hierarchy, revealin…
…
continue reading
From the electrifying rhythms of Broadway’s STOMP to energizing arenas with the Cleveland Cavaliers, Elec Simon's journey is a testament to passion and perseverance. Hailing from Steubenville, Ohio, Elec transformed early challenges into a dynamic career as a percussion entertainer, motivational speaker, and event MC. In this episode, we delve into…
…
continue reading
In this episode of The Backstory on Marketing and AI, we spotlight an AI-native advertising platform that’s reshaping how marketers approach media buying and personalization. Learn how NextRoll powers over 150 billion buyer predictions daily and helps marketers optimize spend across web, social, CTV, and more. Discover how AI-enabled market researc…
…
continue reading

1
CCT 239: Practice CISSP Questions - Assess the Effectiveness of Software Security (D8.3)
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20Send us a text Cybersecurity isn't just for enterprises—small and medium businesses face increasingly sophisticated threats with fewer resources to combat them. In this information-packed episode, Shon Gerber explores why cybersecurity matters critically for SMBs while delivering practical CISSP exam questions focused on Domain 8.3. Shon begins by …
…
continue reading
In this episode of The Backstory on Marketing and AI, we explore how artificial intelligence is transforming the publishing industry. Our guest is the CEO of Ulysses Press, who reveals how his company uses AI to forecast demand, optimize marketing, and stay competitive in a changing digital landscape. You’ll learn: How TikTok and influencer-driven …
…
continue reading