Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Controls Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Small bites on Transatlantic Security, NATO, the EU, Russia, and all things Europe. Hosted by Andrea Kendall-Taylor and Jim Townsend at the Center for a New American Security.
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
Take a peek inside the real-life stories of physical security professionals with the team from J & J Access & Security. These guys have a great chemistry, and it comes through hilariously on this podcast about the lives of locksmiths and security pros.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Helping you thrive in a world of out of control central banks and big governments. In this podcast I help you build and protect wealth through investing, real estate and an extreme dose of economics.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Moneycontrol Podcast is your daily source of business news, investment analysis and advice on stocks and the markets. Tune in to broaden your horizons with podcasts by journalists, experts and analysts giving you a head-start in the investment game.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Big Access Podcast is all about access control and what ProdataKey (PDK) can provide in this industry. With new innovation and principles, we believe that the best type of access control is one that gives peace of mind, protecting life and property. Listen in as we discuss various topics on this type of business and industry and how you could get started! Not only that, but how you could also become a partner with PDK! Our main goal is to be able to provide people with the best informati ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Which companies are on the cutting edge of artificial intelligence? What’s the next major breakthrough in healthcare? How do iconic brands reinvent themselves to appeal to the next generation? Most Innovative Companies is where tech, business, and innovation convene. Join hosts Yasmin Gagne and Josh Christensen as they bring you the latest innovations transforming business and society—and highlights the companies that are reshaping industries and culture.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
The hosts of NPR's All Things Considered help you make sense of a major news story and what it means for you, in 15 minutes. New episodes six days a week, Sunday through Friday. Support NPR and get your news sponsor-free with Consider This+. Learn more at plus.npr.org/considerthis
…
continue reading
Welcome to "Calm Your Caveman" – the podcast that gives you the tools for anxiety mastery. I'm Dr. Adriana Jarvis Twitchell, and my doctoral degree in anxiety management strategies qualifies me to guide you on this journey. I've walked the path from chronic anxiety to security, and I'm here to help you do the same. In this podcast, you'll find control through understanding how emotions are generated and learn effective anxiety mastery strategies for every circumstance. By tuning in, you’ll a ...
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
…
continue reading

1
84-Talking Cloud Podcast with Amy Chaney, SVP Technology, COO | Global Technology - Risk & Control | Strategy > Automation > Optimization at CITI
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18In this episode of Talking Cloud, my guest is Amy Chaney, a transformation artist with extensive experience in technology and risk control. We discuss the evolving landscape of cloud technology, the impact of AI on workforce dynamics, and the importance of identity management in cybersecurity. Amy shares insights on navigating organizational change…
…
continue reading

1
Episode 32: Continuous Monitoring of Security Controls
11:36
11:36
Play later
Play later
Lists
Like
Liked
11:36Continuous monitoring is the mechanism by which CISOs stay ahead of threats, vulnerabilities, and operational failures. In this episode, we unpack what it means to implement and sustain continuous monitoring programs at the enterprise level. You’ll learn how to define monitoring objectives, select appropriate technologies like SIEMs and dashboards,…
…
continue reading

1
Flooding is common in Texas Hill Country. This was different
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23Imagine standing in water shallow enough to just barely hit the soles of your feet. And then it rises so fast that in just about ten minutes, it's up to your neck. That's how fast the Guadalupe River in Texas rose last week, according to state officials. Twenty-six feet in less than an hour. That flooding left dozens dead, devastated homes and busi…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Treb Ryan, Sagi Rodin, Amir Ofek, Artyom Poghosyan, Ajay Amlani, Ajay Gupta - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
…
continue reading

1
Americanswers… did Trump’s funding cuts contribute to Texas floods deaths?
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27Justin, Anthony and Marianna answer your questions on the devastating flash floods in Texas, which have killed tens of people, including children at a summer camp, and where search and rescue operations are ongoing. There are now questions around why people were not evacuated sooner, the inadequate warning systems in place, and if Donald Trump and …
…
continue reading

1
4689: Capgemini’s $3.3 bn deal with WNS, Cred leads in bill payment value, Yulu's quick commerce boom, Garena's ghar wapsi | MC Tech3
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11In today’s Tech3 from Moneycontrol, Capgemini makes one of the biggest AI-driven acquisitions of the year, buying WNS for $3.3 billion. Cred leads in credit card bill value, even outpacing PhonePe. Yulu scales EV rentals for gig workers in the quick commerce boom. Esports giant Garena returns with Free Fire Max India Cup. And BigBasket ropes in a n…
…
continue reading

1
How Privado.ai Helps DPOs Operationalize Privacy with Code Scanning with Masters of Privacy,
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Send us a text In this episode of the Privacy Tech Spotlight series by Masters of Privacy, Vaibhav Antil, Co-Founder & CEO of Privado.ai, explores the shift from trust-based compliance to evidence-based privacy programs. Vaibhav breaks down how tools like code scanning, built-in alerts, and server-side auditing help DPOs and legal teams gain real-t…
…
continue reading

1
Why Your Goals Might Be Fueling Your Anxiety
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02The secret to calming your anxiety isn’t about calming down, but about aiming smarter. In this episode, I take you behind the scenes of two real coaching sessions—one on social anxiety, one on test anxiety—to walk you through a powerful mindset shift that can dramatically reduce anxiety and increase your sense of control. You’ll learn how to spot t…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne’s leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI…
…
continue reading

1
Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne's leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI…
…
continue reading

1
4687: Can Nifty extend Friday’s rebound? US tariff update & India’s historic Edgbaston win | Market Minutes
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04In today’s Market Minutes, we break down Friday’s smart recovery in the markets and what could drive Nifty’s next move. IT stocks and ICICI Bank led the charge, but pressure lingered on capital market plays post SEBI’s action against Jane Street. We also spotlight key Q1 business updates from Dabur, Godrej Consumer, Nykaa, and more, along with Tata…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
…
continue reading

1
Episode 69: Vendor Risk Oversight and Auditing
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
…
continue reading

1
Episode 68: Vendor Contracts, SLAs, and Performance Metrics
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
…
continue reading

1
Episode 67: Security Procurement: RFPs, RFIs, and Vendor Selection
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
…
continue reading

1
Episode 66: ROI and Cost-Benefit Analysis for Security Investments
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 64: Financial Management Principles for Security Leaders
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
…
continue reading

1
Episode 63: Strategic Security Planning Frameworks (TOGAF, SABSA)
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
…
continue reading

1
Episode 62: Aligning Security with Organizational Objectives
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
…
continue reading

1
Episode 61: Autonomous Security Operations Centers and Future Trends
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
…
continue reading

1
Episode 60: Emerging Tech in Security: AI and Machine Learning
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
…
continue reading

1
Episode 59: Virtualization Security Overview
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
…
continue reading

1
Episode 58: Mobile Device Security Essentials
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
…
continue reading
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
…
continue reading

1
Episode 56: Encryption Principles and Practices
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26Encryption is a cornerstone of data protection, and in this episode, we break down its role in securing data both at rest and in transit. You’ll learn about the key encryption types—symmetric, asymmetric, and hashing—and how each serves a distinct purpose in confidentiality, integrity, and authentication strategies. We explore how encryption is app…
…
continue reading

1
Episode 55: Data Security and Privacy Basics
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Data is the crown jewel of most organizations—and protecting it is a central responsibility of the CISO. In this episode, we explore the foundational practices for securing sensitive and regulated data, including classification, labeling, access controls, encryption, and secure disposal. You’ll learn how to define data handling requirements by type…
…
continue reading
As organizations migrate more infrastructure and services to the cloud, CISOs must adapt their strategies to manage risk in cloud environments. This episode introduces the core principles of cloud security, including shared responsibility models, identity federation, encryption of data at rest and in transit, and secure API design. You'll learn abo…
…
continue reading

1
Episode 53: Network Security for Executives
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Network security remains a foundational element of cybersecurity architecture, even as perimeter boundaries blur in cloud-first and remote-enabled environments. In this episode, we provide a comprehensive overview of modern network security strategies, including segmentation, firewall deployment, IDS/IPS, secure tunneling, and zero trust network ac…
…
continue reading
Endpoints represent one of the largest attack surfaces in modern organizations, making endpoint protection a critical priority. In this episode, we cover the foundational components of endpoint security—including antivirus, EDR (Endpoint Detection and Response), application whitelisting, configuration hardening, and data loss prevention (DLP). You’…
…
continue reading

1
Episode 51: Best Practices for Access Control
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54Once you've selected the right access control model, the challenge shifts to enforcing it consistently across systems, users, and environments. In this episode, we walk through best practices for implementing, maintaining, and auditing access control systems in complex enterprises. You'll learn how to enforce least privilege, manage role creep, and…
…
continue reading

1
Episode 50: Access Control Models Overview
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Access control is foundational to every security program, and this episode introduces the core models used to govern who can access what, when, and under what conditions. We examine the primary access control models—Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (…
…
continue reading

1
Episode 49: Advanced Threat Hunting Concepts
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20Building on the previous episode, we now explore more advanced threat hunting concepts that CISOs must understand to support elite detection capabilities. You'll learn how mature organizations move beyond one-off hunts to establish sustained, repeatable hunting programs with custom detection logic, automation pipelines, and continuous telemetry tun…
…
continue reading

1
Episode 48: Threat Hunting Basics for Executives
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23Threat hunting goes beyond traditional alert-driven detection by proactively searching for indicators of compromise within the environment. In this episode, we explore what threat hunting is, why it's becoming a critical capability, and how CISOs support and guide hunting programs. You’ll learn about the use of hypotheses, the importance of telemet…
…
continue reading

1
Episode 47: Threat Intelligence for Executives
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07By Dr Jason Edwards
…
continue reading

1
Episode 46: Vulnerability Management Essentials
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52Vulnerability management is the process of identifying, evaluating, and remediating weaknesses in systems, applications, and configurations before they can be exploited. In this episode, we break down the key stages of an effective vulnerability management program, from scanning and prioritization to patching and verification. You’ll learn how to c…
…
continue reading

1
Episode 45: Leveraging SIEM Solutions Strategically
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Security Information and Event Management (SIEM) platforms are powerful tools for correlation, alerting, and visibility—but they can also become operational burdens if poorly managed. In this episode, we explore how CISOs select, configure, and govern SIEM solutions to drive meaningful insights without overwhelming analysts. You'll learn what data …
…
continue reading

1
Episode 44: Security Operations Center (SOC) Basics
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40The Security Operations Center, or SOC, is the front line of defense against cyber threats. In this episode, we explain how SOCs operate, what core functions they perform, and how they fit into an enterprise security architecture. You’ll learn about SOC tiers, key analyst roles, common tools such as SIEMs, SOAR platforms, and EDR systems, and how S…
…
continue reading

1
Episode 43: Disaster Recovery Strategy Essentials
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Disaster recovery (DR) is the technical counterpart to business continuity—and this episode explores how CISOs ensure the restoration of systems, services, and data after catastrophic disruptions. You’ll learn about the core elements of DR planning, including backup strategies, failover procedures, DR site selection, data replication models, and sy…
…
continue reading

1
Episode 42: Business Continuity Planning Fundamentals
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28Business continuity planning (BCP) ensures that critical operations can continue even in the face of major disruptions—and CISOs play a central role in shaping those plans. In this episode, we break down the key components of a business continuity strategy, including business impact analysis (BIA), recovery objectives (RTOs and RPOs), critical syst…
…
continue reading

1
Episode 41: Digital Forensics Essentials for Executives
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Digital forensics is no longer just a technical specialty—it’s an executive concern that intersects with legal risk, regulatory obligations, and organizational reputation. In this episode, we introduce the fundamentals of digital forensics from a CCISO lens. You’ll learn what forensics is, when it should be triggered, and how it integrates with inc…
…
continue reading

1
Episode 40: Advanced Incident Response Techniques
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Once the basics of incident management are in place, advanced techniques are needed to handle complex, multi-phase, or high-stakes threats. This episode dives deeper into advanced incident response strategies, such as threat containment across hybrid environments, cross-border coordination for global enterprises, and legal evidence handling during …
…
continue reading
Every security leader must be prepared to lead during a crisis—and that begins with mastering the fundamentals of incident management. In this episode, we walk through the full lifecycle of incident handling, from detection and triage to containment, eradication, and recovery. You’ll learn how to build incident response plans, define escalation pat…
…
continue reading