Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Infosecurity Europe Podcasts

show episodes
 
Artwork

1
Infosecurity Europe Podcast

Infosecurity Europe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
CyberVersed

National Cyber Resilience Centre Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast from those well-versed in all things cyber. Mandy Haeburn-Little, Cyber Woman of the Year 2021, in conjunction with the National Cyber Resilience Centre Group (NCRCG), brings listeners access to strategic conversations with industry leaders and figures in the UK’s cyber resilience landscape. With a changing roster of high-profile guests from across policing, government, academia and business, stay tuned for the latest in the UK’s cyber security landscape. The NCRCG is a non-profi ...
  continue reading
 
Loading …
show series
 
Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats of AI integrations. As Pascal Geenens, Director of Threat Intelligence at Radware, puts it, "It's AI, so everything is changing weekly. What I talked …
  continue reading
 
In episode 41, Mandy Haeburn-Little is joined by Justene Ewing, Vice President, Health, Care and Life Sciences for UK & Australia at CGI. It is a fascinating conversation that explores the role technology plays in healthcare and the associated risks as we adopt digital solutions to improve services and productivity. Justene outlines some of what we…
  continue reading
 
"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
  continue reading
 
"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
  continue reading
 
Episode 40 is a short podcast recorded when Mandy Haeburn-Little caught up with Richard Meeus, Director of Security Technology and Strategy EMEA at Akamai, and Paul Croker, UK & I Executive Committee Member at GTIA (Global Technology Industry Association. Both attended Infosec (Infosecurity Europe 2025) from 2nd - 4th June and were kind enough to j…
  continue reading
 
In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
  continue reading
 
Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
  continue reading
 
“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
  continue reading
 
Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
  continue reading
 
Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
  continue reading
 
Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
  continue reading
 
Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
  continue reading
 
"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
  continue reading
 
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
  continue reading
 
Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
  continue reading
 
Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
  continue reading
 
Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors. “When it comes to API…
  continue reading
 
In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between security and user experience in dedicated devices. They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterpr…
  continue reading
 
In episode 39, Mandy Haeburn-Little is joined by three members of the Microsoft team: Marc Carney, Director, Security Solutions Group; Gabriela Gradden, EMEA Security Sales Director; and Joseph Boland-Scott, Security Product Manager. The team began by reflecting on a transformative period for the cyber security landscape, with an increase in ransom…
  continue reading
 
Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. The…
  continue reading
 
Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance of diversity and mentorship in fostering innovation and problem-solving within cybersecurity teams. Andrea advocates for a more inclusive approach to r…
  continue reading
 
“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of Sevco Security. In this episode of The Security Strategist podcast, Richard Stiennon, Founder and Chief Analyst at IT-Harvest speaks with Guy about the evolution of vulnerability management into …
  continue reading
 
In episode 38, Mandy Haeburn-Little is joined by two members of the Logistics UK team, the first company from the transport sector to join the National Cyber Resilience Centre Group as National Ambassadors; they are Nigel Smart, Director of IT & Development and Natalie Chapman, Head of Public Affairs. Nigel begins the conversation by highlighting t…
  continue reading
 
In episode 37, Mandy Haeburn-Little is joined by two members of the team at Akamai, the newest member of our National Cyber Resilience Centre Group National Ambassadors. Mandy chats with Richard Meeus, Director of Security Technology and Strategy EMEA, and Matt Payne, Regional Director, EMEA Financial Services Industry and Public Sector at Akamai T…
  continue reading
 
In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-shifting threat space and examining how international regulations and geopolitical tensions impact organisations' cybersecurity posture. The episode al…
  continue reading
 
In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emphasizes how neurodiverse individuals can bring unique problem-solving skills that drive innovation in cybersecurity. The discussion also covers the significance of diversity in teams, the need for resi…
  continue reading
 
The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defences. The critical role of AI and Zero Trust has been shaping the future of cyber defence for a while now. It’s become absolutely necessary to adopt a zero-trust security model to protect against today'…
  continue reading
 
The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. In the first episode of Meeting of the Minds, three leading industry analysts – Christopher Steffen, VP of Research at EMA; Richard Stiennon, Founder and Chief Analyst at IT-Harvest; and Brad LaPorte, Morphisec CMO & Advisor at Lionfish Tech Ad…
  continue reading
 
In episode 36, Mandy Haeburn-Little chats with two of the team at Nationwide Building Society, a valued member of our portfolio of National Cyber Resilience Centre Group National Ambassadors. Rachel Vigor, Business Services, Governance, Risk & Controls Director and Sharon Gould, Supplier Security Manager, Business Services GRC, join Mandy on this e…
  continue reading
 
This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity of proactive security measures in an increasingly interconnected digital world. The discussion highlights essential themes such as data resilience, the seamless integration of security and recovery s…
  continue reading
 
Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. APIs, the backbone of modern technology, are vital for enabling seamless communication between applications. However, as their usage grows, so do the risks associated with inadequate API management and …
  continue reading
 
In episode 35, Mandy Haeburn-Little chats with David Scutt, Head of Software Sales EMEA at HP, the global technology leader, operating in 170 countries and shipping three devices every second! David begins the conversation by outlining the core focus areas of the business, which are Personal Computing & Printing, 3D Printing, Hybrid Work, and Gamin…
  continue reading
 
In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the importance of collaboration between IT and AI teams. He emphasizes that while AI may replace some jobs, it will primarily transform existing roles. The discussion also highlights the necessity of observabil…
  continue reading
 
The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as organisations increasingly rely on the cloud, the attack surface for cyber threats has expanded significantly. Traditional security tools often struggle to keep up with the unique challenges of cloud env…
  continue reading
 
Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geopolitical tensions, or unexpected global events like pandemics can ripple through even the most carefully planned supply chains. Companies that fail to anticipate and mitigate these risks can face costl…
  continue reading
 
CyberVersed episode 34 is the final podcast of 2024, and fittingly, Mandy Haeburn-Little caught up with Nik Adams, Assistant Commissioner, City of London Police and Chair of the NCRCG National Ambassador Steering Group. Their conversation highlights the progress made during 2024 and, more importantly, outlines the opportunities and goals for NCRCG …
  continue reading
 
Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabilities can result in data breaches, financial losses, and reputational damage, making them a top concern for businesses of all sizes. Despite technological advances, many organisations struggle to keep up…
  continue reading
 
Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To stay ahead in emerging risks, organisations must adopt cutting-edge tools that enable proactive preparation and robust defence strategies against these risks. Cyber ranges and digital twins are revoluti…
  continue reading
 
Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safeguarding sensitive data to mitigating external threats. Businesses must move beyond traditional cybersecurity approaches, embracing holistic digital risk strategies that protect their reputation, asse…
  continue reading
 
Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effectiveness of security measures. By prioritising behavioural insights, organisations can anticipate potential threats and design systems that align with how people naturally act and interact. Discussing …
  continue reading
 
In CyberVersed episode 33 Mandy Haeburn-Little catches up with one of the founding ambassador companies, The Very Group. She is joined by Muktar Mahama, Head of Product and Digital Experience, in a truly insightful conversation about The Very Group's total commitment to customer experience and the continuous monitoring and refinement to ensure the …
  continue reading
 
Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data mining to get ahead. From scouring social media profiles to exploiting publicly available data, attackers gather intelligence that helps them pinpoint vulnerabilities and personalise attacks. Every detai…
  continue reading
 
As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and consumers alike. These advanced vehicles, packed with digital features and data-driven capabilities, also bring new cybersecurity challenges. With sophisticated connectivity features, onboard software, …
  continue reading
 
With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and how does it fit alongside other advanced security solutions like XDR? Just as Security Operations Centers (SOCs) defend the enterprise network, they now must extend their defences to the cloud, ensuri…
  continue reading
 
When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions can mean the difference between safeguarding critical assets and exposing vulnerabilities. This requires a willingness to act decisively, even under uncertainty, and to take calculated risks for the …
  continue reading
 
CyberVersed episode 32 focuses on Trustify, one of the newest National Cyber Resilience Centre Group's National Ambassadors. Mandy Haebrun-Little talks to John Madelin, Advisory Board Member at Trustify. John is a highly respected cyber professional with 30+ years of experience in the design, build and management of Cyber Security. It is evident du…
  continue reading
 
Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational damage. Semperis’s Ransomware Risk Report explores the reasons behind the high percentage of businesses making payments, which inadvertently encourages attackers to strike again. By giving in to dema…
  continue reading
 
Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormous, often involving extensive data restoration, system reconfiguration, and potential business disruptions. The financial toll, reputational damage, and operational downtime can be devastating. AI can…
  continue reading
 
Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to growth. However, as businesses embrace digital transformation, they open themselves to new security vulnerabilities. These advancements can quickly become liabilities without proper protection, expos…
  continue reading
 
In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information security, drawing on key findings from their latest report. The discussion emphasises the growing importance of compliance in the face of rising data breaches and supply chain vulnerabilities. They explore …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play