Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
…
continue reading
Prof G Markets breaks down the news that’s moving the capital markets, helping you build financial literacy and security. Tune in every Monday and Thursday for no mercy, no malice insight from Scott Galloway and Ed Elson on high flying stocks, booming sectors, and master of the universe CEOs. Like it or not, we live in a capitalist society. The key to navigating it? Talk about money. Part of the Vox Media Podcast Network.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Catch up with summaries from an average of 50 new geopolitical events daily. Subscribe to better understand geopolitical risks.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Independent holistic security consultancy
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. Join Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute, and CEO of NCX Group with over 24 years of expertise, for weekly, no-nonsense insights tailored to CEOs, CFOs, and business leaders. From data breaches to actionable cybersecurity and data privacy strategies, we deliver practical steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk into oppor ...
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
From the team analysing the intersection of finance and security, tune into compelling conversations on the real-world impact of global illicit finance. This podcast explores the financial dimensions of today’s leading transnational security challenges. Host Tom Keatinge and the team from the Centre for Finance and Security at RUSI bring you unique insights on the challenges posed by illicit finance and practical analysis of the policy responses. They interview top thinkers and influential v ...
…
continue reading
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Empower your audience with expert insights from top-tier risk and resilience speakers. PSpeakers represents global thought leaders who help businesses and teams prepare for disruption, adapt under pressure, and recover stronger. Whether addressing economic uncertainty, operational risk, or organizational resilience, our speakers share real-world strategies drawn from experience in crisis leadership, global security, finance, and psychology. From boardrooms to international conferences, these ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
Hosted by Jay Sapsford, The Call delivers timely and incisive analysis to help businesses navigate risks and opportunities.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
At this moment of inflection in technology, co-hosts Elad Gil and Sarah Guo talk to the world's leading AI engineers, researchers and founders about the biggest questions: How far away is AGI? What markets are at risk for disruption? How will commerce, culture, and society change? What’s happening in state-of-the-art in research? “No Priors” is your guide to the AI revolution. Email feedback to [email protected]. Sarah Guo is a startup investor and the founder of Conviction, an investment f ...
…
continue reading

1
S17 E01 (VIDEO) Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
…
continue reading

1
EP 121 The Pretender: A Cops Descent into the Criminal Underworld. How One Under Cover Police Officer Risked Everything
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53Send us a text Podcast Talking Points – Neil Woods Episode A raw look inside the life of an undercover cop: Neil Woods recounts his years infiltrating dangerous drug gangs across the UK, living double lives and navigating high-stakes deception. The emotional and psychological toll of undercover work: Neil opens up about the trauma, fear, and moral …
…
continue reading

1
Policies & Procedures for SAP Access Risk Management
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this episode we engage in insightful conversation on why Policies and Procedures are more than just compliance checkboxes - they’re business enablers. Whether you’re starting from scratch or updating existing Policies and Procedures…
…
continue reading

1
Fortinet Exploits, Windows INET Folder, and AI Code Risks: Cyber Security Today for April 14
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through i…
…
continue reading

1
Episode 414: Another RPR Variation, More Cowbell, Accounting For Social Security And Portfolio Reviews As Of April 11, 2025
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32In this episode we answer emails from Jeremy, Brad, and James. We discuss a more aggressive risk-parity portfolio similar to the Weird Portfolio, the problems with data analysis and recency bias and considerations in accounting for Social Security or pensions in retirement portfolio planning. And THEN we our go through our weekly portfolio reviews …
…
continue reading

1
Balancing AI Opportunities vs. Risks to Drive Better Business Outcomes - Matt Muller, Summer Fowler - BSW #390
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
…
continue reading

1
Balancing AI Opportunities vs. Risks to Drive Better Business Outcomes - Summer Fowler, Matt Muller - BSW #390
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
…
continue reading

1
Balancing Risk, Resilience and AI in Security - Ep 144
26:25
26:25
Play later
Play later
Lists
Like
Liked
26:25In this episode of Reimagining Cyber, host Tyler Moffitt welcomes Tim Armandpour from PagerDuty to explore how organizations can assess and manage their cyber risk in an era of rapid technological change. They discuss the importance of continuous risk evaluation, building a culture of resilience, and the impact of AI on security practices. Tim shar…
…
continue reading
Retirement is not without its challenges... What are the key financial risks and how can you safeguard your future? In this episode, hosts April Schoen and John Curry unravel the top five financial risks in retirement, and share insights on how to effectively manage and reduce them for a secure future. You’ll discover: The surprising impact longevi…
…
continue reading

1
100 Days of Trump: The Ask-Me-Anything Edition
49:53
49:53
Play later
Play later
Lists
Like
Liked
49:53To mark the first 100 days of the second Trump White House, we have a special ask-me-anything episode. Amid a firehose of news, which policies will endure, and which are purely rhetorical? How does Foreign Policy find the signal in the noise? FP Live’s executive producer, Dana Sherne, turns the tables on host Ravi Agrawal as he assesses the implica…
…
continue reading

1
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
From Compliance to SBOMs: Josh Bressers’ Take on Security
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47In this episode, Raj Krishnamurthy sits down with Josh Bressers, VP of Security at Anchore and longtime leader in the open source security space. With decades of experience, Josh brings a candid and compelling perspective on everything from the chaos of early cybersecurity days to the nuanced challenges of SBOMs and compliance in today’s world. Jos…
…
continue reading

1
Mission-Critical Partnerships in Protest Preparedness and Schools
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Security benefits can come from unexpected sources, especially in community-centric organizations like schools and colleges. Melinda Heikkinen from Saint Louis University (SLU) explains how the college’s history of open dialogue and philosophy of meeting peace with peace helped it weather a wave of mass protests on campus. Then, Jason Stoddard with…
…
continue reading
🎙️ Episode Title: The Silent Threat to Your Bottom Line Podcast: Bite Size Security with Mike Fitzpatrick Episode Summary: In this episode, Mike Fitzpatrick, CEO of NCX Group, pulls back the curtain on one of the most underestimated risks to your business: the assumption that cybersecurity is “just an IT problem.” Mike shares real-world insights fr…
…
continue reading

1
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
…
continue reading

1
S17 E02 (VIDEO) Is Your Job Safe From AI?
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
…
continue reading

1
Episode 419: Transitioning To Retirement Portfolios, Fiddling With Limited 401k Funds And Applying The Socratic Method To Personal Finance
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11In this episode we answer emails from Chris, Will and Neelix. We discuss the basics of transitioning from accumulation to decumulation, choosing funds for accumulation from a limited selection, more transitioning questions from an alien, my lawyerly approach to personal finance and why the public personal finance landscape is often not very helpful…
…
continue reading

1
O3 and the Next Leap in Reasoning with OpenAI’s Eric Mitchell and Brandon McKinzie
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13This week on No Priors, Elad and Sarah sit down with Eric Mitchell and Brandon McKinzie, two of the minds behind OpenAI’s O3 model. They discuss what makes O3 unique, including its focus on reasoning, the role of reinforcement learning, and how tool use enables more powerful interactions. The conversation explores the unification of model capabilit…
…
continue reading

1
How Much Should Salespeople Know About Their Product?
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet. In this episode: Aligning incentives T…
…
continue reading

1
Alert in Kashmir over potential terrorist attacks
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36Join us for the May 1, 2025 edition of the Geopolitical Report Daily Podcast. On Wednesday, we mapped 70 events, including an alert in India over possible terrorist attacks in Kashmir.By Geopolitical Report
…
continue reading

1
Book Leading Risk and Resilience Speakers Who Inspire Strength and Strategic Thinking in Uncertain Times
1:15
1:15
Play later
Play later
Lists
Like
Liked
1:15Empower your audience with expert insights from top-tier risk and resilience speakers. PSpeakers represents global thought leaders who help businesses and teams prepare for disruption, adapt under pressure, and recover stronger. Whether addressing economic uncertainty, operational risk, or organizational resilience, our speakers share real-world st…
…
continue reading
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
…
continue reading

1
What to Buy When the Tech Sector is On Sale — ft. Mark Mahaney
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22Scott and Ed discuss Huawei’s new challenge to Nvidia, Apple shifting U.S. iPhone production from China to India, and Spotify’s Q1 earnings report. Then Mark Mahaney, senior managing director and head of internet research at Evercore, returns to the show to share his top internet stock picks. He explains why he believes Google is the cheapest of bi…
…
continue reading

1
teissTalk: DORA - A new law for a new dawn
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/…
…
continue reading
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
…
continue reading

1
ISC West Exclusive: AI and the Monitoring Center with Actuate CEO Ken Francis
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Live from the show floor at ISC West 2025, Security Business Editor-in-Chief Paul Rothman meets with Actuate CEO Ken Francis to discuss the impact of AI on monitoring centers and their employees, technology integrations, and Actuate’s mission. Actuate, an AI surveillance software company founded in 2018, aims to transform security guard operations …
…
continue reading
Join us for the April 30, 2025 edition of the Geopolitical Report Daily Podcast. On Tuesday, we mapped 53 events, including multiple incidents involving Boko Haram in Nigeria.By Geopolitical Report
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Cybersecurity Incidents: Musk's Staffers, Canadian Power Utility Attack, and Massive Password Leak
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
…
continue reading

1
Embracing Change in Corporate Security: Strategies for Modernization with Ryan Schonfeld of HiveWatch
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52On this episode of the Ontic Connected Intelligence Podcast, Ryan Schoenfeld explores his transition from law enforcement to founding Hivewatch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from public…
…
continue reading

1
Unlock the Hidden Benefits of Life Insurance Today
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31Life insurance might not be the most exciting topic, but what if it was the secret ingredient to securing your financial future and living your best life? In this episode, John Curry and April Schoen dive deep into the transformative power of whole life insurance and reveal how it can be an essential financial tool for building and safeguarding wea…
…
continue reading

1
Deepfake Dilemma: Why Facial Recognition is Failing - Ep 147
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12In this eye-opening episode of Reimagining Cyber, host Tyler Moffitt is joined by Tom Tovar, co-creator of cybersecurity company Apto, to unpack one of the fastest-growing threats in mobile security—deepfakes and biometric bypass attacks. Tom explains why facial recognition, once considered a reliable security measure, was never designed to withsta…
…
continue reading

1
AI, Risk, and Reality: The CISO’s Guide to What’s Coming Next
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Sponsor: Netskope (www.netskope.com) EP62 | Building Real Cybersecurity Communities + AI Clarity with Dr. Anand Singh (Live from CISO XC ATX) Sponsored by Netskope What happens when a CISO-led community takes root in a new city — and how do you cut through the noise around AI in cybersecurity? In this special episode recorded live from the inaugura…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading
David Kim (DK) is a trusted advisor as an AI, GRC, cybersecurity, and PCI DSS consultant and currently sits on Technical Advisory Boards, Governance Boards. He has centered his entire career around IT topics such as telecommunications, data networking, VoIP, unified communications, network management, information systems security, regulatory compli…
…
continue reading
The views and opinions of the speaker do not represent the views and opinions of the FDIC. From ISACA Middle Tennessee Conference March 2025. Linda Finck was hired by the FDIC in December 1989 and currently serves as a Senior IT Examiner in the FDIC Dallas Region. She has: - 30+ years experience in the financial services industry (working for a nat…
…
continue reading
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
…
continue reading

1
The Realist POV on Trump’s First 100 Days
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48April 29 marks the 100th day of U.S. President Donald Trump’s second term. What do foreign policy experts make of his administration’s performance so far, as it continues to wage a trade war, reshape long-standing diplomatic relationships with allies and alliances, and advance a new world order? FP columnist Emma Ashford sits down with Ravi Agrawal…
…
continue reading

1
Putin announces a three-day ceasefire in May
21:59
21:59
Play later
Play later
Lists
Like
Liked
21:59Join us for the April 29, 2025 edition of the Geopolitical Report Daily Podcast. On Monday, we mapped 60 events, including Russian President Vladimir Putin announcing a three-day ceasefire in May.By Geopolitical Report
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
S34 Ep1: Threat Horizon 2027: Grasping for Control
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
…
continue reading

1
Artifacts of Deception (Deceptive Minds - issue #2)
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifac…
…
continue reading

1
Deceptive Minds (the audio experience): Issue #1
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17 Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do abo…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading