An SCCE Podcast
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Compliance Conversations is a monthly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://www.trendmicro.com/en_gb/business/public-sector.html?utm_source=podcast_organic&utm_medium=social&utm_campaign=cm_corporate_aw_e_ukie_int_teaandtren ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Lee Frazier and his team of experts bring you the latest in Cybersecurity, IT, and HIPAA HITECH news along with segments each episode covering their views and advice on topics such as mobile devices, PC recommendations, compliance issues such as HIPAA HITECH and PCI, cybersafety, emerging technologies, IT for healthcare, and listener questions. One episode each month is followed up with a free live webinar where podcast listeners/viewers can get more in depth info on the topic and bring thei ...
…
continue reading
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices - including barristers chambers.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Innovation in compliance brings you interviews with industry leading experts who are changing the way practitioners approach compliance. Host Tom Fox, the Compliance Evangelist and Voice of Compliance is driving the conversation about compliance into the 2020s and beyond with his focus on innovations for the compliance practitioner and the compliance profession. If you want to learn how to bring business solutions to compliance problems to more fully operationalize compliance, this is the po ...
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
Welcome to the connector podcast, an ongoing conversation connecting FinTechs, banks and regulators worldwide. Join CEO and founder Koen Vanderhoydonk as you learn more about the latest available trends and solutions in the markets.
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading

1
14 - The Intersection of Business and Cybersecurity
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42What are the real costs of cybersecurity implementation? Spoiler alert: it’s far more complex than it appears on the surface. Cybersecurity is a people and process problem, not a technology problem. Most of implementation costs come in the form of time, effort and coordination throughout the organization. In this episode, we reach back to classroom…
…
continue reading

1
Eric Shoemaker on Establishing the Value of a Cybersecurity Compliance Program [Podcast]
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43By Adam TurteltaubHow much is your cybersecurity program worth? Traditionally the thinking has kind of been: if we don’t have a breach it’s expensive but valuable, and if we do have one it’s both expensive and worthless.Eric Shoemaker of Genius GRC advocates for a different way to value cybersecurity efforts. Instead of just looking at what it prev…
…
continue reading

1
Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the growing sophistication of financial cyberattacks, hi…
…
continue reading

1
The Accelerating Adversary: Inside the 2025 Threat Landscape
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the surge in automated reconnaissance, the evolving da…
…
continue reading

1
Socvel intel threat quiz, Pearson Breached, nintendo bricking stuff, and kevintel.com
1:24:40
1:24:40
Play later
Play later
Lists
Like
Liked
1:24:40socvel.com/quiz if you want to play along! Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec join the Discord: https://bit.ly/brakesecDiscord Music: Music provided by Chillhop Music: https://chillhop.ffm.to/creatorcred "Flex" by Jeremy Blake Courtesy of Youtube media libraryBy Bryan Brake
…
continue reading

1
Securing Mortgage Data in a 50-State Compliance Maze with Rohbair Jean
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01In this Episode Rohbair Jean sheds light on the unique challenges of securing a mortgage company operating across all 50 states, each with different regulatory requirements. He discusses how compliance often trails behind real-world threats, urging leaders not to treat frameworks like NIST or GLBA as finish lines but as baselines. His advice? Use c…
…
continue reading

1
2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
…
continue reading

1
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk …
…
continue reading
Healthcare still has a giant “Hack Me” sign taped to its back — and the latest reports from Mandiant and Verizon are here to confirm it. These cybercrime breakdowns reveal that attackers are smarter, sneakier, and spending more time poking around your network than ever before. Waiting to secure your systems until after a breach is like installing a…
…
continue reading

1
Wide World of Cyber: How state adversaries attack security vendors
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
…
continue reading

1
Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, fro…
…
continue reading

1
Leyla Erkan on the Top Compliance Priorities for US Healthcare Companies [Podcast]
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30By Adam TurteltaubRecently Protiviti released an intriguing report: Top Compliance Priorities for U.S. Healthcare Organizations in 2025. In this podcast their Global Healthcare Compliance Leader, Leyla Erkan, shares some of the key priorities they revealed: Managing technology. This includes wearable devices, AI, telehealth platforms and more. All …
…
continue reading

1
Conferences, Coding, and Compliance: What We Learned
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57From artificial intelligence in audit workflows to CMS’s renewed focus on fraud, waste, and abuse, this episode of Compliance Conversations covers the biggest themes that emerged from HEALTHCON and HCCA’s Compliance Institute. Tune in to hear real takeaways from the exhibit hall, speaker sessions, and side conversations—including why quality of car…
…
continue reading

1
CEO Feras Tappuni Talks AI, Cloud & SoC Strategy
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54Running a SoC today isn't about tech—it's about people, risk and scaling in a hyper-complex threat landscape. Learn how the pros do it.In this episode, SecurityHQ CEO reveals:• The real ROI of SoC operations• Why fully automated SoCs are a dangerous myth• How AI and quantum will shape tomorrow’s threats• Scaling from 1 to 500+ SoC staff worldwide• …
…
continue reading

1
Why Shorter Certificate Lifespans are a Hidden Security Opportunity with Kevin Naidoo of Quantum PKI
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Kevin Naidoo, Founder and Engineering Lead at Quantum PKI, to explore the challenges of managing shorter certificate lifespans and the importance of automation when it comes to certificate lifecycle management (CLM).…
…
continue reading

1
Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. This series is introduced by Tom Fox and hosted by Roxeanne Petraeus. Ethena sponsors this s…
…
continue reading
Main Theme & Key Takeaways This episode centers on resilience-how IT professionals juggle demanding projects, unexpected technical hurdles, and personal upheaval, all while staying ahead of industry changes. Marv’s firsthand stories and practical advice make this episode a masterclass in adaptability, resourcefulness, and the importance of communit…
…
continue reading
Welcome to Tea & Trend - Pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Each episode brings you real stories, real challenges, and real solutions, straight from your peers working across the UK’s public services. Whether you're navigating stretched resources, rising cyber threats or co…
…
continue reading

1
Tea & Trend - Episode 1 with Stuart MacLellan, Chief Technology Officer @ South London and Maudsley NHS Foundation Trust
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39In this episode of Tea & Trend, Jonathan Lee and Stuart MacLellan dive into the critical topic of cyber resilience in today's digital landscape. Together, they explore challenges around legacy systems, the human factor in cyber risk, and the cultural shifts required to make resilience a core part of operations. They also touch on regulatory pressur…
…
continue reading

1
Building Cyber Warriors: The Evolving Cyber Professional
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confidentiality, and complying with relevant laws and regul…
…
continue reading

1
Responsible AI Isn't Optional: New Strategies for Risk Management Success with Rohan Sen
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Responsible AI implementation requires a balanced approach between innovation and risk management in today's rapidly evolving business landscape. In this episode of Risk Management Brick by Brick, The Power of AI in Risk - Episode 7, host Jason Reichl sits down with Rohan Sen, Principal in Data Risk and Privacy Practice at PwC, to explore the criti…
…
continue reading
In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cyber…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
Building a Career in Cybersecurity with Yuri Diogenes
36:29
36:29
Play later
Play later
Lists
Like
Liked
36:29How do you make a career in cybersecurity? Richard talks to Yuri Diogenes about his work in cybersecurity, including his book on building a career in cybersecurity. Yuri talks about the inquisitive mindset that works well in cybersecurity - wanting to understand why things happen and get to the root cause. The conversation also explores the value o…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
From Netflix to Startup CEO: Travis McPeak Is Redesigning Security for Developers
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50What if security wasn’t something developers had to think about at all? That’s the vision Travis McPeak—former Netflix and Databricks security leader—is building at Resourcely. In this episode, he breaks down why most security tools fail, how trust between security and engineering got broken, and what it really takes to fix cloud misconfigurations …
…
continue reading

1
How Russian Disinformation Networks Are Poisoning AI Chatbots | SecureTalk with NewsGuard Experts
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28Episode Summary: In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbo…
…
continue reading

1
The Iceberg Impact: Unpacking the Hidden Costs of Cyber Attacks
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational loss to the complete failure of a business. Go be…
…
continue reading

1
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Innovation comes in many areas, and compliance professionals must be ready for and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. Today, we begin a 3-part podcast series sponsored by Diligent with Clint Palermo, Kristy Grant-Har…
…
continue reading

1
Ransomware Attack Timeline: A Walkthrough of the Disruption
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Send us a text Step inside the chaos of a real ransomware attack. In this episode of CyberSound, Vancord's experts break down the timeline of a ransomware incident—from initial compromise to full recovery. Discover how threat actors move, what response steps matter most, and what it really takes to manage the disruption. This isn’t theory—this is a…
…
continue reading

1
Stuxnet to Colonial Pipeline What Have We Learned & What’s on the Horizon?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Dino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. From his early fascination with hacking culture to leading OT security for one of the world’s largest engineering firms, Mike shares personal insights and lessons learne…
…
continue reading
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading

1
The MAESTRO Framework: Layering Up Against MAS Security Threats
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP Agentic Security Initiative's MAESTRO (Multi-Agent…
…
continue reading

1
"Co-Op" Under Siege: Cyberattack Hits UK Retail Giant
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31- UK retail giant Co-Op Hit By A Major Cyber-Attack. - Paradies Pays the Price: $6.9M Settlement Over 2020 Data Breach. - Zambia Gets Serious on Data Privacy: Inside the Rollout of the Data Protection Act. - Ransomware Hits the Aisles: Ahold Delhaize USA Confirms Data Breach. - BFSI Security Summit 2025 to Address Rising Cybersecurity Threats in Af…
…
continue reading

1
Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Send us a text 🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values. Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defi…
…
continue reading

1
Chris Pogue: Digital Forensics in the Modern Threat Landscape
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both inte…
…
continue reading

1
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
42:21
42:21
Play later
Play later
Lists
Like
Liked
42:21Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro ne…
…
continue reading

1
Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episo…
…
continue reading

1
Beyond the Prompt: Navigating the Threats to AI Agents
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surfac…
…
continue reading

1
M&A Without Mayhem: Cyber Lessons from CISO Frank DePaola
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In this Episode Frank shares how building a playbook for consistent M&A integration became critical—not just for operations, but for cybersecurity and regulatory alignment. He details his framework built on the Three Cs: Cybersecurity (identity, MFA, EDR, cloud visibility), Compliance (mapping tools across frameworks like ISO, NIST, and CMMC), and …
…
continue reading

1
Why Public Biotechs Back Better Cybersecurity with Anthony Morano
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12In this episode… Anthony Morano shares how he leveraged a background in finance and self-taught programming to become a hands-on IT and cybersecurity leader in biotech. Starting with annuity calculations in Excel and VB, Anthony moved from labor unions to life sciences, eventually earning leadership roles at some of the most regulated organizations…
…
continue reading