Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
Cyber Risk Management Podcasts
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Podcasts, articles, and reference materials for Managed Service Providers. Brought to you by James Kernan and produced by Kernan Consulting.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Experiments in Risk Science
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
What the futr is a biweekly podcast that explores the intersection of AI, sales, and humanity. Hosted by Sandesh Patel and Chris Brandt, each episode features AI startup founders and tech leaders sharing real stories, their value proposition, and visions for the future—structured like a smart first-call sales meeting. It’s all about making AI make sense for businesses—and helping people stay informed, not left behind.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
"On Aon" offers conversations between Risk Capital and Human Capital experts and guests about the Risk and People issues impacting businesses around the world. Each episode provides unique insights to help industry experts make better decisions across Trade, Technology, Weather and Workforce.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
Description: Creating AI Trust is a very complex and hard problem. It is not clear what it is and how it can be operationalized. We will demystify what is Trustworthy AI, efficient adoption and leveraging it for reducing risks in AI programs. McKinsey reports indicates companies seeing the biggest bottom-line returns from AI—those that attribute at least 20 percent of EBIT or profitability to their use of AI—are more likely than others to follow Trustworthy AI best practices, including expla ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Helping clients embrace risk and achieve peak business performance for over 150 years.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Conversations with Thailand is a bi-monthly podcast series by Deloitte Thailand. Listeners can expect to hear insights from subject matter experts across the different business domains that will benefit both organisations and individuals navigate through complexities of today's VUCA world.
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
Preparing Organizations for Managing Crises
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
Objectivity matters. Today, more than ever. With no agenda, other than getting it right, Milliman’s Critical Point podcast takes a deep dive into subject matter that affects the health and well-being of people across the globe, from healthcare to retirement security, flood insurance to autonomous vehicles. Through a team of professionals ranging from actuaries to clinicians, technology specialists to economists, Critical Point examines the inherent challenges – and innovative solutions – tha ...
…
continue reading
Strategy. Execution. Results. Offering consulting, training & software solutions for companies building complex, highly regulated systems. Learn more @ www.321gang.com
…
continue reading
SaaS is seen as one of the best things that have ever happened in the world of software in terms of costs and ease of usage. But it’s not enough to embrace its advantages alone. There are two sides to a coin, and even SaaS has a lesser-known side that can harm businesses if left unattended. The dark side of SaaS involves shadow IT, security and compliance risks, and SaaS wastage. We’ve started this podcast series, “SaaS Whispers,” to focus on the inefficiencies and cost overruns posed by inc ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
1
AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00AI-Powered Compliance: Transforming Enterprise Security In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity. Why Enterpris…
…
continue reading
1
Tommy Bavel co-founder & CEO @Cyzea on manage risk cyber and metrics for meeting objectives, & AI
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01מתאר האיום משתנה בתדירות גבוהה ומתקפות הסייבר מתגלות כיותר מתקדמות מיכולות ההגנה, כניסת הבינה המלאכותית משנה שוב את מתאר האיום ומעלה את הרף בצורה אקספוננציאלית (מעריכית). נחשון פינקו מארח את טומי באבל מייסד-שותף ומנכ"ל סיזאה, אחד מאנשי הסייבר המוכרים והמוערכים בענף הסייבר בישראל ולא רק בשיחה על ניהול סיכונים בארגון ומה המקום של סייבר, איך יכולו הנה…
…
continue reading
1
Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Please enjoy this encore of Career Notes. Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you bui…
…
continue reading
1
AI in the GRC: What's real, what's risky and what's next. [Special Edition]
1:02:46
1:02:46
Play later
Play later
Lists
Like
Liked
1:02:46Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial int…
…
continue reading
1
Danielle Jablanski: Finding the path to success [Strategy]
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Please enjoy this encore of Career Notes. Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you bui…
…
continue reading
1
A new stealer hiding behind AI hype. [Research Saturday]
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as …
…
continue reading
1
Pass the intel, please. [Only Malware in the Building]
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the r…
…
continue reading
Overview: In this episode of the SMB Community Podcast, hosts Amy and James discuss the evolving landscape of IT distribution and whether it is becoming obsolete. They reminisce about the days when IT professionals relied heavily on specific distributors and how the market shift has changed their role. They also touch on the U.S. Senate passing the…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading
1
Inside the Adversary Mindset: Building Smarter Protection in a Connected World
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threat…
…
continue reading
1
Innovation & AI: Reimagining Insurance Risk with Ashish Srivastava
20:14
20:14
Play later
Play later
Lists
Like
Liked
20:14We're coming to you LIVE from ITC 2025! In this new, limited series of Risk Management: Brick by Brick, host Jason Reichl sits down with Ashish Srivastava, Head of North America, Insurance & Risk Management for Blackstone Real Estate, to explore the massive gap between what insurance customers need and what the market actually delivers. With experi…
…
continue reading
1
EP 153 No Tech Just Cyber - Why Defensive Security Isn’t Enough Anymore with Terry Cutler International Award-Winning Cybersecurity Expert
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14Send us a text 🎧 Episode Summary — “Why Defensive Security Isn’t Enough Anymore” In this episode, cybersecurity author, keynote speaker and ethical hacker Terry Cutler joins The Security Circle to unpack the harsh realities of today’s cyber threat landscape. Terry discusses the shift organisations are experiencing as budgets tighten while attacks a…
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
Cyber attacks don’t just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply. We sat down with Kristen (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adver…
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading
1
Faster, Smarter, Scalable: The Future of M365 Management
59:10
59:10
Play later
Play later
Lists
Like
Liked
59:10Today’s conversation is all about what comes next for Microsoft 365 — because after Ignite, it’s clear that we’re entering a brand-new era. AI agents, identity-first security, native Sysmon, tenant baselines — Microsoft is rebuilding the entire stack around speed, intelligence, and scale. And when you talk about managing M365 at scale, there’s one …
…
continue reading
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing brea…
…
continue reading
1
Law Practice Shares Insights for Federal Workers
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18There are many law practices in the DMV that proudly champion the workplace rights of federal employees, supervisors, and senior executives across agencies nationwide—helping preserve what is often their most valuable asset: their government career. Shehan Legal joins the Security Clearance Careers Podcast to talk about the current state of affiars…
…
continue reading
1
How realistic is A House of Dynamite? [T-Minus Deep Space]
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.). Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your co…
…
continue reading
1
From Sewers To Subsea: Rethinking Data Centers And Defense
53:30
53:30
Play later
Play later
Lists
Like
Liked
53:30Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
…
continue reading
1
Satya Gupta: Rising to your contribution. [CTO] [Career Notes]
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
…
continue reading
1
Satya Gupta: Rising to your contribution. [CTO]
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
…
continue reading
1
DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation." The podcast tech host panel included Dave Bittner, host of CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging dis…
…
continue reading
1
Two RMMs walk into a phish… [Research Saturday]
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
…
continue reading
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
…
continue reading
1
Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
…
continue reading
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
…
continue reading
1
J. Assaf Turner Founder & CEO @Maya Security on CxO & regulators' cyber dilemmas not limited to ICS
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39עֲקַבְיָא בֶּן מַהֲלַלְאֵל אוֹמֵר, הִסְתַּכֵּל בִּשְׁלֹשָׁה דְּבָרִים וְאֵין אַתָּה בָּא לִידֵי עֲבֵרָה. דַּע מֵאַיִן בָּאתָ וּלְאָן אַתָּה הוֹלֵךְ וְלִפְנֵי מִי אַתָּה עָתִיד לִתֵּן דִּין וְחֶשְׁבּוֹן.“ (משנה, מסכת אבות – פרק ג, משנה א) ללא הידיעה אין אפשרות לנהל סיכונים, עצם הידיעה נותנת את האפשרות לקבל החלטות מושכלות החל מהעובד הזוטר ועד ההנהלה …
…
continue reading
1
Opportunities in a Changing Market — What Risk Buyers Need to Know
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31On Aon — Episode 96 Opportunities in a Changing Market — What Risk Buyers Need to Know November 20, 2025 420 words … about a minute read What’s new: In the latest episode of On Aon, Global Chief Broking Officer Cynthia Beveridge and Global Chief Claims Officer Mona Barnes discuss emerging trends in the commercial risk market as it heads towards the…
…
continue reading
1
The oversized file that stalled the internet.
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
…
continue reading
1
EP 152 90,000 Heartbeats, One Security Chief: Wembley Stadium- Behind the Scenes, with Steve McGrath
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53Send us a text In this powerful and engaging episode, YoYo sits down with Steve McGrath, the Head of Security at Wembley Stadium, to explore what it really takes to protect one of the world’s most iconic venues. With a background in counter terrorism policing and years of operational leadership, Steve shares an inside look into managing security fo…
…
continue reading
Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass enc…
…
continue reading
5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs. https://x.com/todayininfosec/status/1986164925039841770 24th Oc…
…
continue reading
1
Real Talk on AI from the Field- Part II | Brian O'Shea | EP: 05
52:27
52:27
Play later
Play later
Lists
Like
Liked
52:27Welcome to What the futr Podcast - where we dive into what’s next in AI, tech, sales, and the messy, brilliant human hustle behind it all. In Part 2 of this What the futr Podcast episode, Sandesh continues his conversation with GTM leader Brian O’Shea, this time focusing on “execution”. They unpack where AI is really landing first (agents), why saf…
…
continue reading
Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host Kim Jones sits down with Richard Bird from Singular AI to discuss this e…
…
continue reading
1
The Ulimate Partner – Building an MSP Growth Engine with Microsoft
1:02:14
1:02:14
Play later
Play later
Lists
Like
Liked
1:02:14Today we’re talking about what it really takes to partner with a giant. Every MSP wants to grow alongside hyperscalers like Microsoft — but few truly know how to align, scale, and turn partnership into profit. Our guest today has lived that journey from the inside out. Vince Menzione, Founder of The Ultimate Partner and former Microsoft channel lea…
…
continue reading
The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A large-scale brand impersonation campaign delivers…
…
continue reading
1
Right of Boom: What Happens When Cybersecurity Prevention Fails
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59If your organization treats cybersecurity as something IT "handles," you're already behind. The regulators know it. The plaintiffs' attorneys know it. And when the breach happens, your board will discover it the expensive way. WHY YOU SHOULD LISTEN Krishan Thakker, a seasoned executive legal advisor, delivers the uncomfortable truths that consultan…
…
continue reading
1
Federal Worker? How to Keep Calm and Carry On
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25The "Fork in the Road" email was sent to federal employees on January 28, 2025. This email, from the Office of Personnel Management (OPM), introduced a deferred resignation program, offering employees a choice between continuing their current employment or resigning with full pay and benefits until September 30, 2025. Almost a year after the federa…
…
continue reading
1
Inside The Global Push For Offensive Cyber And Smarter Defense
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
…
continue reading
1
Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a …
…
continue reading
1
Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a …
…
continue reading
1
When clicks turn criminal. [Research Saturday]
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The …
…
continue reading
Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical fl…
…
continue reading
Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture f…
…
continue reading
1
How Pragmatic Controls Build Trust Between GRC, Security, and Engineering ft Mukund Sarma, Deputy CISO @ Chime
56:45
56:45
Play later
Play later
Lists
Like
Liked
56:45In this episode of Security & GRC Decoded, host Raj Krishnamurthy sits down with Mukund Sarma, Deputy CISO and Head of Product Security at Chime, to explore what happens when governance, risk, and compliance teams work with engineering instead of against it. Mukund shares real-world lessons from a decade in security, explaining how to balance shift…
…
continue reading
Overview: In this episode of the SMB Community Podcast, hosts Amy and James discuss the importance of timely year-end planning for IT professionals, suggesting October as the ideal start time for preparation. They cover effective strategies for developing annual goals, emphasizing the need for a personalized approach and tactical objectives. The ho…
…
continue reading