Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Sensitive Content Communications Podcasts
We are a community of supportive women from around the globe committed to making the world a better place. If you have been through hard times and you're tired of looking back, then you have finally found your swarm. We focus on kindness, self-care, stress management, mental health and making a difference in the lives of others. Join us each week as we come together for "Can You Feel The Flutter?" Fridays, where we share inspirational stories and show off the great things we are doing in our ...
…
continue reading

1
AI and Third-Party Security "Danger Zone": 2025 Annual Data Security and Compliance Risk Report
55:35
55:35
Play later
Play later
Lists
Like
Liked
55:35Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks' Data Security and Compliance Risk: 2025 Annual Survey Report, which introduces the industry's first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterpr…
…
continue reading

1
Rick Goud: Navigating Europe’s Data Sovereignty Challenges
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19Dr. Rick Goud brings a unique perspective to the data sovereignty conversation, combining medical informatics expertise with entrepreneurial technology innovation. As co-founder and Chief Innovation Officer of Zivver, a secure digital communications platform acquired by Kiteworks in 2025, Goud's journey began with an unexpected twist – missing out …
…
continue reading

1
Scott McCrady: MSPs and Identity-first Security
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Scott McCrady's path to becoming CEO of SolCyber started in the server rooms of the early 2000s. Back then, he was installing Nokia security appliances and building some of the first security operations centers for major corporations. McCrady spent years at companies like Symantec and FireEye, where he learned that keeping businesses safe requires …
…
continue reading

1
Chris Pogue: Digital Forensics in the Modern Threat Landscape
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both inte…
…
continue reading

1
Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks' Top 11 Data Breaches in 2024 Report. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method pr…
…
continue reading

1
Dominic Bowen: Geopolitical Risk Planning & Management
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24This insightful Kitecast episode features Dominic Bowen, Partner and Head of Strategic Advisory at 2Secure in Stockholm, Sweden. With over 20 years of experience supporting business leaders, boards, and executives, Dominic brings valuable perspective from his work across cybersecurity, generative AI, risk management, and crisis response. His backgr…
…
continue reading

1
Arun DeSouza: Becoming a Transformation CISO
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48Arun DeSouza, the Managing Director at Profortis Solutions, brings over two decades of experience as a CISO, having developed and implemented award-winning programs in identity lifecycle management and IoT security. His impressive career includes induction into the CISO Hall of Fame by the Global Cyber Startup Observatory and recognition as a top C…
…
continue reading

1
Chad Lorenc: Security as a Practice in the Cloud
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08With over two decades of experience in the cybersecurity domain, Chad Lorenc stands as a prominent voice in cloud security and enterprise security strategy. Currently serving as a security leader at Amazon Web Services (AWS), Chad has contributed significantly to advancing cloud architecture best practices and building robust security frameworks fo…
…
continue reading

1
Howard Holton: Weighing AI Cyber Hype and Risks
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11Unveiling AI, Data Security, and Innovation Howard Holton, the Chief Technology Officer of GigaOm, explores some of the most pressing topics in technology today. With over two decades of experience spanning roles as CTO, CISO, CIO, and consultant, Howard brings a wealth of knowledge to the conversation. His background includes leadership positions …
…
continue reading

1
Luigi Lenguito: Getting Proactive About Your Cybersecurity
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34Luigi Lenguito, a pioneering figure in predictive cybersecurity, brings an extraordinary background to his role as founder and CEO of BforeAI. Before revolutionizing cyber threat prevention in 2018, Lenguito's 18-year tenure at Dell and Quest Software encompassed 26 diverse executive positions. His unconventional journey from Formula Three racing c…
…
continue reading
The Kiteworks 2025 Forecast for Managing Private Content Exposure Risk Report offers a comprehensive analysis of emerging cybersecurity and compliance trends shaping the year ahead. The report identifies 12 pivotal trends affecting how organizations manage private content exposure risk, highlighting critical areas like data privacy regulations, sof…
…
continue reading

1
Jerod Brennen: From Music Educator to Cybersecurity Consultant and Mentor
53:24
53:24
Play later
Play later
Lists
Like
Liked
53:24Jerod Brennen, VP of Cybersecurity Services at SideChannel, brings a unique perspective to cybersecurity leadership. Originally pursuing a career in music education, Brennen's journey led him through various IT roles before landing in cybersecurity at a public utility. Today, he serves as a vCISO for multiple organizations while also creating educa…
…
continue reading

1
Evgeniy Kharam: Architecting Success With Soft Skills
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01Evgeniy Kharam is the founder of a cybersecurity consulting company and an industry veteran with extensive expertise in cybersecurity. He advises clients on navigating the complexities of the cybersecurity landscape and co-hosts two popular podcasts focused on cybersecurity architecture and business insights. Evgeniy is also a board advisor for the…
…
continue reading

1
John Christly: Demystifying CMMC to Protect the DIB
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of cybersecurity compliance for Department of Defense (Do…
…
continue reading

1
Kayne McGladrey: Compliance as a Critical Business Enabler
39:40
39:40
Play later
Play later
Lists
Like
Liked
39:40Kayne McGladrey, the Field CISO at hyperproof, is a renowned cybersecurity expert with an extensive background in enhancing security landscapes across various industries. His career is marked by significant contributions in developing robust security frameworks, managing complex risk scenarios, and driving comprehensive compliance initiatives. With…
…
continue reading

1
Jacqui Kernot: When AI, Security, and Compliance Collide
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46Jacqui Kernot, the Security Director at Accenture for Australia and New Zealand, boasts over two decades of extensive experience in cybersecurity, spanning multiple industries. Recognized for her authoritative voice on diversity and inclusion alongside cybersecurity risk management, Jacqui is a well-regarded speaker who frequently addresses these p…
…
continue reading

1
Kiteworks 2024 Survey Report: Expert Panel on Data Privacy and Security
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06The Kiteworks Sensitive Content Communications Privacy and Compliance Report is an annual survey designed to delve into the pressing issues of data privacy, compliance, and cybersecurity. This comprehensive report gathers insights from IT, cybersecurity, risk, and compliance leaders around the globe, with the latest survey capturing responses from …
…
continue reading

1
Betania Allo: Using Cyber Policy to Mitigate Risk
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56Betania Allo is a distinguished expert in cybersecurity law and public policy and frequently presents at international forums and events. She boasts an impressive academic background with advanced degrees from Harvard University and Syracuse University. Currently, she is pursuing a doctorate in engineering with a focus on analytics at George Washin…
…
continue reading

1
Edna Conway: Collaboration in Cybersecurity Policy and Practice
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Edna Conway, an innovative executive and thought leader with over 30 years of experience leading cybersecurity, risk management, and value chain transformation at Fortune 10 technology companies, highlights how collaboration in cybersecurity is critical for the development of and adherence to policy and practice in this Kitecast episode. Edna is cu…
…
continue reading

1
Debra Farber: Shifting Privacy Left With Privacy by Design
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31Debra Farber, a globally recognized privacy, security, and ethical tech advisor with nearly two decades of experience, discusses data privacy, privacy by design, and the growing field of privacy engineering in this Kitecast episode. As the host of the Shifting Privacy Left podcast, Farber is dedicated to building a community of privacy engineers an…
…
continue reading

1
Lisa Plaggemier: Empowering Digital Safety for All
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33In the latest Kitecast episode, Lisa Plaggemier, the Executive Director of the National Cybersecurity Alliance, discusses what it takes to empower digital safety for all peoples and organizations. With an extensive background in marketing, operations, and cybersecurity, including a decade at Ford Motor Company and senior roles at CDK Global and Inf…
…
continue reading

1
Alan Shimel: Separating AI Hype From Reality in Cybersecurity
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Alan Shimel, a prominent figure in the cybersecurity industry, is the CEO and founder of Techstrong Group, a global platform that powers tech innovation and transformation across various media, research, and consulting brands. With over 25 years of experience in security, Shimel has been at the forefront of the industry, witnessing its evolution an…
…
continue reading

1
Huxley Barbee: Cyber Asset Inventory Risk Management
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35runZero provides comprehensive visibility into an organization’s cyber assets and attack surface to empower risk and exposure management. By combining external scanning, internal asset discovery, cloud inventory, and API integrations, runZero maps all devices, software, vulnerabilities, owners, and other security attributes. This integrated view ac…
…
continue reading

1
Patrick Garrity: Safeguarding Vulnerabilities
37:35
37:35
Play later
Play later
Lists
Like
Liked
37:35Patrick Garrity has over 15 years of experience spanning various marketing, sales, and product roles for high-growth cybersecurity companies. For this Kitecast episode, he delves into detail on his expertise in vulnerability management. To start the podcast episode, Garrity discusses the rapid evolution of vulnerability management over the past few…
…
continue reading

1
Dan Lorhmann: Cybersecurity and Incident Response in the Face of GenAI
39:32
39:32
Play later
Play later
Lists
Like
Liked
39:32As an author, podcaster, and field CISO focused on the public sector, Dan Lohrmann brings a wealth of experience spanning over two decades. This Kitecast episode includes a discussion of Lohrmann’s recent book, Cyber Mayday and the Day After, that he co-authored with cybersecurity expert Shamane Tan. The book shares ransomware stories and insights …
…
continue reading

1
Alexandre Blanc: Assessing Cyber Risks in the Cloud and AI Era
48:28
48:28
Play later
Play later
Lists
Like
Liked
48:28In this Kitecast episode, Alexandre Blanc, a Cybersecurity Advisor and Consultant, brings his extensive 15-year background in cybersecurity and risk management into focus. With a significant online presence established since 2018, Blanc has become a prominent LinkedIn influencer for over 70,000 followers by offering critical insights aimed at bolst…
…
continue reading

1
Jason Rebholz: Evolution of Ransomware and Other Cyber Topics
50:08
50:08
Play later
Play later
Lists
Like
Liked
50:08This Kitecast episode features Jason Rebholz who has an extensive background in cybersecurity. He is currently the CISO at Corvus Insurance, which he joined in 2021. He also serves as an advisor for NetDiligence and MOXFIVE. Previously, Jason served as the VP of Strategic Partnerships for ICEBRG, which was acquired by Gigamon, VP of Professional Se…
…
continue reading

1
Chris Rose: Getting CMMC Ready: A C3PAO’s Perspective
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14This Kitecast episode features an interview with Chris Rose, a Partner at Ariento, a leading cybersecurity, IT, and compliance service provider. He has extensive experience in cybersecurity, having previously served as an instructor at UCLA where he taught cybersecurity and privacy courses. Chris holds an MBA and a master’s in computer science from…
…
continue reading

1
Katie Arrington: Cybersecurity in an Era of National Adversaries
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Katie Arrington, former Chief Information Security Officer (CISO) for the U.S. Department of Defense and member of the US House of Representatives, discusses her experience as CISO, noting that the position was newly created in 2019 to address urgent cybersecurity threats. In the role, she aimed to establish consistent standards for cybersecurity a…
…
continue reading
Today I am talking about the importance of making self-care a priority. I am sharing one of my favorite time management strategies called the ABC Method created by Alan Lakein. It's an easy method that will help you assign urgency and manage tasks on your to do list.. Resources: ABC Method by Alan Lakein: https://www.timedoctor.com/blog/abc-method-…
…
continue reading

1
10 warning signs that may indicate a need to seek professional mental health help
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57WARNING: Topics frequently discussed on this platform include, but are not limited to topics such as: suicide, self-harm, depression, and sexual assault. Discretion is strongly advised. Be aware we frequently promote simple acts of kindness on the show and sometimes helping others comes at a risk. Never share any personal, financial, or identifying…
…
continue reading
On episode today, we are going to focus on four styles of communication. They include: aggressive, passive, passive aggressive and assertive. Can you guess which one is considered the healthiest? Please see the attached "Speaker/Listener card which will help you get your point across using "I feel statements." It may not be easy, but over time, thi…
…
continue reading

1
You don't have to be lonely anymore. Seven types of loneliness (part two)
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Today we are recapping the seven types of loneliness according to Psychology Today and then discussing possible solutions to these loneliness types. Join us each Friday as we support each other's mental health and promote simple acts of kindness. You never know how a simple act of kindness can change someone's life. Link to the Psychology Today art…
…
continue reading

1
If you are lonely, you won't want to miss this episode.
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47Today we are talking about the 7 loneliness types according to Psychology Today and why it's so important to know your style. Let's face it, people need people and long-term isolation is just not good for your mental health. It can lead to sleeplessness, problems at work, problems in relationships and so forth. Take the first step towards identifyi…
…
continue reading

1
Jean Bernier: Quantum AI: The Future of Cybersecurity
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34CEO and Entrepreneur Jean Phillip Bernier, the CEO of AnniQ and Spin Quantum Tech, shares his enthusiasm for AI and Quantum Computing technology advances. Bernier tracks the progress of Quantum Computing, especially IBM’s rapid development from a 5-qubit machine in 2017 to a prediction of a 100,000-qubit machine by 2033. The staggering quantum proc…
…
continue reading
On this episode, I will explain how a quote I heard over 20 years ago, not only stuck with me, but actually became my personal guide to happiness. My hope is that it will help you too! The quote was written by Joseph Addison and reads... "Three grand essentials to happiness in this life are something to do, something to love, and something to hope …
…
continue reading

1
Billy Spears: Reciprocal and Cross-functional Cybersecurity Learning and Engagement
40:40
40:40
Play later
Play later
Lists
Like
Liked
40:40Billy Spears, Teradata’s CISO since 2021, stresses reciprocal learning and community in cybersecurity in a Kitecast episode. He believes each interaction offers learning potential and guides his volunteering decisions based on potential mutual benefits. Spears discusses the evolution of cybersecurity standards since his time at the Department of Ho…
…
continue reading

1
Eddie Doyle: Cybersecurity Evolutions: From the Network to Blockchains
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07Eddie Doyle, a renowned Security Strategist and Speaker at Check Point Software, has a fascinating career journey in the fast-paced field of cybersecurity. Doyle first understood the importance of cybersecurity in 2007 when he joined Check Point Software. Back then, it was a transformative phase; IT departments were just beginning to comprehend the…
…
continue reading

1
Dr. Rebecca Wynn: Cybersecurity Mentoring Promotes Risk Management
44:29
44:29
Play later
Play later
Lists
Like
Liked
44:29Dr. Rebecca Wynn is the Global Chief Security Strategist and CISO at Click Solutions Group and Podcast Host for Soulful CXO and Threat Watch. In this Kitecast episode, Dr. Wynn discusses professional motivation, the importance of mentorship, and her unique approach to cybersecurity based on her diverse experience, including time in the U.S. militar…
…
continue reading
Join us as we explore how past events shape how we view the world and behave today. I also share details on joining our community of supportive friends. It's an episode packed with a little punch of sincerity and reality. You won't want to miss it! Warning, on the "I am Miss Resilience Podcast", we speak about sensitive content which some viewers m…
…
continue reading
Warning, on this podcast, we speak about sensitive content which some viewers may find offensive. Topics may include but are not limited to sexual assault, self-harm, suicide, loneliness, anxiety, depression, etc. Listener discretion is advised. Episode details: Over 20 years ago, I had the chance to meet Robin Williams, and BOY was that the surpri…
…
continue reading

1
How to have a difficult conversation with your child. 10 steps from a licensed school counselor.
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11Warning: the following podcast contains content relating to sexual assault, suicidal ideation and self-harm. Viewer discretion is advised. Do you want to have a difficult conversation with your child but you don't know where to start? Perhaps I can help. I have worked with children for almost two decades as a teacher and school counselor. I have ha…
…
continue reading

1
I was sexually assaulted. How an act of kindness saved my life.
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49Warning, on this podcast, we speak about sensitive content which some viewers may find offensive. Topics may include but are not limited to sexual assault, self-harm, suicide, loneliness, anxiety, depression, etc. Listener discretion is advised. Episode Details: As Gemma Troy quoted, "Your words can plant gardens or burn whole forests down." Listen…
…
continue reading
Warning, on this podcast, we speak about sensitive content which some viewers may find offensive. Topics may include but are not limited to sexual assault, self-harm, suicide, loneliness, anxiety, depression, etc. Listener discretion is advised. I thought I was the only person on the planet who was dealing with a very dark secret, but little did I …
…
continue reading

1
Albert E. Whale: Against-the-Grain Cybersecurity for Managing Cyber Risk
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12Albert E. Whale is a serial entrepreneur with over 30 years of experience in cybersecurity and risk management. He is the Founder and CEO of IT Security Solutions, which helps businesses secure their environments using ITS Safe™, an appliance that delivers real-time continuous protection of networks, printers, servers, clouds, modems and routers, a…
…
continue reading
Mark Lynd is a former CEO, CIO, CTO, and CISO and currently serves as the Head of Digital Business at Netsync that employs a consultative and collaborative approach to help organizations architect innovative technology solutions that meet business needs. He is an author, frequent speaker on topics related to AI, IoT, and cybersecurity, is ranked in…
…
continue reading

1
Richard Stiennon: The Good, Bad, and Ugly About AI Cybersecurity
44:47
44:47
Play later
Play later
Lists
Like
Liked
44:47Richard Stiennon, a cybersecurity pioneer, author, and industry executive, spoke about the hottest trending topic of our day in this Kitecast episode: artificial intelligence (AI). He currently serves as the Chief Research Analyst at IT-Harvest, a research organization he founded in 2017, which provides access to data on more than 3,318 cybersecuri…
…
continue reading

1
Michael Redman: Mapping Out Your CMMC Roadmap: Insights & Tips
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49In this Kitecast episode, Michael Redman, who is a Knowledge & Learning Management Instructor at Schellman and is a subject-matter expert in various cybersecurity and compliance standards, spoke at length about Cybersecurity Maturity Model Certification (CMMC), the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), a…
…
continue reading

1
Chet Hayes: Data Privacy and Governance in the Public Sector
40:59
40:59
Play later
Play later
Lists
Like
Liked
40:59Vertosoft's CTO Chet Hayes is a technologist at heart and has kept his finger on the pulse of the public sector for much of his career. Early on in his career, he cut his teeth in technical software architecture roles in organizations such as Sun Microsystems, Hughes Information Technology, and BEA Systems. Based in Virginia, much of his customer-f…
…
continue reading

1
Taiye Lambo: Managing Risk Using Cybersecurity Frameworks
57:10
57:10
Play later
Play later
Lists
Like
Liked
57:10Serial Entrepreneur and Cybersecurity and Risk Management Pioneer Taiye Lambo has worn a lot of different hats over the course of his career. He has led cybersecurity at the Federal Reserve Bank of Atlanta, the City of Atlanta, and Harland Clarke, among others. He founded or co-founded organizations such as eFortresses (a Gartner Cool Vendor), Clou…
…
continue reading