…
continue reading
CISO Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
You are not years away from accomplishing your career goals, you are skills away. Learn the Tradecraft to Take Your Cybersecurity Skills to the Executive Level. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
Join Query CISO Neal Bridges as he explores the world of SecDataOps with different guests each episode. What is SecDataOps? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
Soulful CXO explores the intersection of technology, business, and humanity. Each episode features a thoughtful conversation with leaders who share real stories about navigating cybersecurity, leadership pressures, and personal growth. Hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert, the show invites listeners to reflect on how intention, purpose, and values shape the way we lead. Through candid insights and vulnerable moments, guests reveal the challenges they have face ...
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
In this New Year's episode of Life of a CISO, Dr. Eric Cole reflects on the challenges of 2025 and delivers a powerful reset framework for CISOs entering 2026. Drawing from real-world coaching, executive leadership principles, and personal experience, Dr. Cole challenges security leaders to stop thinking like technologists and start acting like tru…
…
continue reading
This series explores how emerging technologies—from Artificial Intelligence to biotechnology—are acting as "force multipliers" to transform the human brain itself into a contested battlefield. We examine NATO's strategic framework for "Cognitive Superiority," detailing how adversaries exploit the "OODA loop" to disrupt decision-making and how natio…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
Season finale: Leading security in a brave new world.
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
#265 - 12 CISO Templates (with Ross Young)
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05In this episode of CISO Tradecraft, hosts G Mark Hardy and Ross Young discuss the extensive redesign at CISO Tradecraft and introduce a series of free cybersecurity tools and templates available on their website. The tools, created with the help of AI, range from a Cybersecurity Budget Template and Gen AI Risk Assessment to a Personal Values Exerci…
…
continue reading
All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter G…
…
continue reading
1
Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16By John Verry
…
continue reading
1
S7E55 - Five Security Trends That Will Force Hard Conversations in 2026
33:23
33:23
Play later
Play later
Lists
Like
Liked
33:23In this special episode of The Virtual CISO Moment, Greg Schaffer shares five cybersecurity predictions for 2026 grounded in real-world patterns — not hype. From the tightening of SOC 2 audits and the rise of “vibe coding” risks, to a coming shakeout in the vCISO market, influencer-driven security shaming, and the growing dangers of contractor misc…
…
continue reading
1
Why CISOs Are Rethinking Managed Security: Check Point’s Open Garden Approach | Lenny Krol
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of The Professional CISO Show, David Malicoat is joined by Lenny Krol, Head of Services Sales at Check Point Software, recorded live at GPSEC DFW. Lenny breaks down how Check Point’s services organization supports customers across both Check Point and third-party technologies, why an open ecosystem matters, and how CISOs can realist…
…
continue reading
1
How Much Risk Would a CISO Risk if a CISO Could Risk Risk? (LIVE in Boca Raton)
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Brett Conlon, CISO, American Century Investments. Joining them are Ryan Barras, CISO, Mount Sinai Medical Center. In this episode: Nobody understands what we do Someone else should fix this Make the audience care Speaking CEO …
…
continue reading
1
The CISO's Playbook: From Security Leader to Business Partner
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29From the Department of 'No' to a Seat at the Table: Mastering the Art of CISO Leadership CISO Ian Schneller joins host Shawn Tuma to share how CISOs evolve into true business partners by aligning security with enterprise goals and collaborating closely with GCs and legal on AI governance, risk, and board communications. Hear practical guidance on m…
…
continue reading
1
Department of Know: CISO hiring warning, critical threat actor law, Microsoft Defender outage
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
…
continue reading
1
Agents at the Door: Vetting Non-Human Identities in External IAM - Rakesh Soni - CSP #219
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28This episode was about agentic IAM—what it is and the risks that come with letting non-human agents act for customers. We defined external IAM, then traced how the industry moved from basic login and MFA to consent, delegation, and now agent-to-agent interactions. Along the way we unpacked key risks for CISOs and practitioners to consider. Segment …
…
continue reading
1
Just Starting in Security? Here’s What You Need to Succeed
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47In this episode of The New CISO, host Steve Moore speaks with Iain Paterson, Chief Information Security Officer at Well Health Technologies, about his unconventional path into cybersecurity and the lessons learned from building programs across industries—from banking and healthcare to breach response and beyond. From skipping college to take an eig…
…
continue reading
1
NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15NYC mayoral inauguration bans Flipper Zero and Raspberry Pi devices Crypto must now share account details with UK tax officials Finland seizes suspected cable sabotage ship Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to impleme…
…
continue reading
1
Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Trust Wallet heist
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Hackers drain millions from Unleash Protocol DarkSpectre campaigns exposed Shai-Hulud attack led Trust Wallet heist Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us …
…
continue reading
1
European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist
20:01
20:01
Play later
Play later
Lists
Like
Liked
20:01🎙️ European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1036: Today's episode will discuss the latest news: Microsoft Azure Back Up After Global Meltdown and Service…
…
continue reading
1
323 - Thoughts on Azure networking topologies
38:56
38:56
Play later
Play later
Lists
Like
Liked
38:56In this episode, we take a look at Azure networking topologies from the ground up. What options do we have for building enterprise-scale architectures, and when should we choose one over another? We discuss our own experiences, and also the stuff we seemingly do not know enough about. (00:00) - Intro and catching up. (03:59) - Show content starts. …
…
continue reading
1
Holiday Spending, Consumer Confidence, and Why Cash Still Matters
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37In this episode of The Cash News Podcast, Brad Moody and Shaun Ferrari unpack the data behind holiday spending, consumer confidence, and payment behavior as we close out the year. From Black Friday and Cyber Monday trends to inflation, unemployment, and credit usage, the conversation explores why spending is rising even as confidence falls. They al…
…
continue reading
1
The 2026 Cyber Horizon: Agentic AI, Identity, and the Shift to Preemptive Defense
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45As the cybersecurity landscape transitions from reactive detection to automated preemption, this series explores how the rise of "Agentic AI" and autonomous threats are forcing organizations to radically modernize their security stacks. We dive deep into the essential governance strategies for the year ahead, including the adoption of the new NIST …
…
continue reading
1
Episode 168: Institutionalizing Good Cybersecurity Ideas
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56In Episode 168 of Cybersecurity Where You Are, Tony Sager sits down with Tony Rutkowski, one of the CIS Critical Security Controls® (CIS Controls®) Ambassadors of the Center for Internet Security® (CIS®). Together, they discuss what Tony Rutkowski has learned in his efforts to institutionalize good cybersecurity ideas like the CIS Controls. Here ar…
…
continue reading
1
Silver Fox targets Indian users, Mustang Panda deploys ToneShell, will prompt injection ever be 'solved'?
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25Silver Fox targets Indian users Mustang Panda deploys ToneShell Will prompt injection ever be 'solved'? Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in…
…
continue reading
1
The Human Side of Cybersecurity: 2025 in Review - Ep 182
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51In part two of the 'Best of 2025' series of Reimagining Cyber, hosted by Rob Aragao, the focus is on the human elements influencing cybersecurity. The episode explores the challenges of burnout in the cybersecurity workforce as explained by Dr. Andrew Reeves, a cyber psychology expert. Betsy Cooper of the Aspen Policy Academy emphasizes the importa…
…
continue reading
1
Secure by Design: Integrating AI into Operational Technology
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05Join us as we explore the comprehensive guidance released by international cybersecurity agencies, including CISA and the NSA, regarding the integration of Artificial Intelligence into critical infrastructure environments. We will break down the four key principles for owners and operators, which range from understanding unique AI risks—such as mod…
…
continue reading
1
Condé Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft Hits 2,596 Wallets, and Korean Air Falls to Oracle EBS Campaign
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04🎙️ Conde Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft 2,596 Wallets, Korean Air Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1035: Today's episode will discuss the latest news: Former Coinbase Support Agent Arrested for Helping Hackers Hacker …
…
continue reading
1
Penetration Testing & Threat Intelligence: Enhancing Cybersecurity | Interview with Sasa Jusic
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
…
continue reading
In this episode, host Emily Wearmouth welcomes back Steve Riley, VP and Field CTO at Netskope, to demystify CSMA: Cybersecurity Mesh Architecture. They dive into what CSMA is, how it's being evangelized by analysts, and its vital role in moving beyond a simple zero trust model to achieve continuous adaptive trust. Steve explains the industry fricti…
…
continue reading
1
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Coupang recovers laptop allegedly thrown into river Trust Wallet reports 2k+ wallets drained Sax discloses 2024 data breach Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. …
…
continue reading
1
The Department of Know: year in review and predictions
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47Link to episode page To end off a tumultuous year, our final Department of Know episode of 2025 features a chat between host Rich Stroffolino and producer Steve Prentice. Join them as they chat about the biggest stories of 2025, the trends we are seeing, and what we can expect in the new year. Thanks to our show sponsor, ThreatLocker Want real Zero…
…
continue reading
1
Building Resilience: Bridging DORA Requirements with ISO 27001 Controls
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08Join us as we explore the critical alignment between the EU’s Digital Operational Resilience Act (DORA) and the ISO 27001:2022 standard, demonstrating how financial entities can leverage existing ISMS frameworks for regulatory compliance. We break down the detailed mapping of governance, third-party risk management, and incident reporting, turning …
…
continue reading
1
Iranian Hacker Claims It Hacked Phone of Israeli PM's Chief of Staff, Hacker Claims to Leak Wired Database with 2.3 Million Records, LastPass 2022 Breach Led to Consequences, Pro-Russian Claim Cyberattack ...
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16🎙️ Iran Hackers Claim Israeli PM Staff Phone Hack, Wired Database 2.3M Records Leaked, LastPass 2022 Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1034: Today's episode will discuss the latest news: Pro-Russian Hackers Claim Cyberattack on French Postal Servi…
…
continue reading
1
Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Rainbow Six Siege suffers breach, gamers go shopping Diesel generators and aircraft engines in high demand to power AI LastPass 2022 breach reverberates through crypto world Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implem…
…
continue reading
1
Resilience Redesigned: Architecting the Agentic and Post-Quantum Future
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04As 2026 approaches, cybersecurity leaders face a "strategic redesign" that prioritizes resilience and recovery over mere prevention to handle the $20 trillion cybercrime economy. This episode explores the critical convergence of autonomous Agentic AI, the urgent mandate for Post-Quantum Cryptography (PQC), and the cementing of Zero Trust as a non-n…
…
continue reading
1
The Ingredient List: Surviving the Supply Chain Crisis of 2025
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33In 2025, software supply chain attacks have surged by 34%, with threat actors like Salt Typhoon exploiting a "lack of visibility" to target critical infrastructure and manufacturing sectors. This episode explores the permanent "SolarWinds Effect" on executive liability and how CISA’s updated 2025 SBOM mandates are forcing organizations to cryptogra…
…
continue reading
1
Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning
3:19:04
3:19:04
Play later
Play later
Lists
Like
Liked
3:19:04(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. Plus, a bizarre polygraph scandal at CISA, Chinese APT research d…
…
continue reading
1
Green Rush, Red Alert: Cannabis Cybersecurity & Compliance
37:38
37:38
Play later
Play later
Lists
Like
Liked
37:38In this episode, we dissect the escalating cyber threats targeting the cannabis industry in 2025, from the massive STIIIZY data breach to the rise of AI-driven ransomware groups like Everest and Qilin. We explore critical regulatory shifts, including the strategic partnership between Metrc and BioTrack and the strict new data privacy mandates under…
…
continue reading
1
Fortinet VPN exploit, Google gmail change, Aflac breach update
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
…
continue reading
1
How AI, Cloud Outages, and Data Protection Will Define Cybersecurity in 2026
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to ex…
…
continue reading
1
Silent Nights & Cyber Frights: The 12 Threats of Christmas 2025
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56This episode uncovers the "12 Threats of Christmas" defining the 2025 holiday season, where AI-driven social engineering and deepfakes have turned festive shopping into a high-stakes battlefield. We explore the surge in retail ransomware and "smishing" attacks, while auditing the hidden privacy risks of popular smart toys that may be spying on your…
…
continue reading
1
Scams target MENA region, pen testers accused of blackmail, DDoS protection faces fresh challenges
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
…
continue reading
1
322 - Getting started with Azure Trusted Signing
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36In this episode, we dive deeper into Azure Trusted Signing, and how it can help with signing your binaries. Why should you care? What are the tools today and in the future, and how to get this done right? (00:00) - Intro and catching up. (03:01) - Show content starts. Show links - Signtool - Introduction to code signing - Trusted Signing - Give us …
…
continue reading
1
22.7 Million Impacted in Aflac Data Breach, Shinhan Card Data Breach, Nova Scotia Power Incident Report Confirms Cyberattack, FCC Bans Foreign Made Drones and Key Communication Equipment
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31🎙️ Aflac 2.2M Breach, Shinhan Card Data Breach, Nova Scotia Power Cyberattack, FCC Bans Foreign Drones 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1033: Today's episode will discuss the latest news: Critical MongoDB Vulnerability Threatens Database Security Threat…
…
continue reading
1
Dominating the Digital Space: The Fight for National Resilience
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47This episode unpacks a bold new strategy from the Vanderbilt University Institute of National Security, arguing that the U.S. must undertake a "whole-of-society" mobilization akin to World War II to counter persistent cyber aggression. We discuss the proposed shift to "Integrated Resilience," which focuses defense efforts on the five most critical …
…
continue reading
1
Episode 167: Volunteers as a Critical Cybersecurity Resource
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In Episode 167 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Kelley Misata, Ph.D., Chief Trailblazer and Founder at Sightline Security. Together, they discuss how volunteers constitute a critical cybersecurity resource for the Center for Internet Security® (CIS®). Along the way, they explore the nature of volunteerism, …
…
continue reading
1
ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
…
continue reading
1
Unlocking the 1999 Joint PSYOP Task Force Manual
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13This episode dives into the declassified Chairman of the Joint Chiefs of Staff Manual 3500.08, which serves as the master training guide for establishing and operating a Joint Psychological Operations Task Force (JPOTF) headquarters. We explore how military planners were taught to integrate psychological operations with special forces, civil affair…
…
continue reading
1
Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29🎙️ Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1032: Today's episode will discuss the latest news: La Poste France DDoS Disruption Days Before Christmas Spotify Disables…
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
Spotify music library scraped, DDoS disrupts French postal services, Fake delivery sites hit holiday shoppers
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
…
continue reading
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading