The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
…
continue reading
Infosecurity Europe Podcasts
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The podcast from those well-versed in all things cyber. Mandy Haeburn-Little, Cyber Woman of the Year 2021, in conjunction with the National Cyber Resilience Centre Group (NCRCG), brings listeners access to strategic conversations with industry leaders and figures in the UK’s cyber resilience landscape. With a changing roster of high-profile guests from across policing, government, academia and business, stay tuned for the latest in the UK’s cyber security landscape. The NCRCG is a non-profi ...
…
continue reading

1
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats of AI integrations. As Pascal Geenens, Director of Threat Intelligence at Radware, puts it, "It's AI, so everything is changing weekly. What I talked …
…
continue reading

1
Episode 41 - National Ambassador Focus - CGI
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14In episode 41, Mandy Haeburn-Little is joined by Justene Ewing, Vice President, Health, Care and Life Sciences for UK & Australia at CGI. It is a fascinating conversation that explores the role technology plays in healthcare and the associated risks as we adopt digital solutions to improve services and productivity. Justene outlines some of what we…
…
continue reading

1
Why Fraud Prevention Silos Are Holding Your Business Back
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
…
continue reading

1
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
…
continue reading

1
Episode 40 - Infosecurity Europe 2025 Review
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Episode 40 is a short podcast recorded when Mandy Haeburn-Little caught up with Richard Meeus, Director of Security Technology and Strategy EMEA at Akamai, and Paul Croker, UK & I Executive Committee Member at GTIA (Global Technology Industry Association. Both attended Infosec (Infosecurity Europe 2025) from 2nd - 4th June and were kind enough to j…
…
continue reading

1
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
…
continue reading

1
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
…
continue reading

1
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
Data Backups: The Digital Safety Deposit Box
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
…
continue reading

1
DDoS Demystified: Understanding the Threat
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
…
continue reading

1
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
…
continue reading
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
…
continue reading

1
From Peacetime to Wartime: Is Your Cloud Secure?
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
…
continue reading

1
How to Streamline IT Operations and Enhance Security with RMM and Automation
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
…
continue reading

1
Can You Stop an API Business Logic Attack?
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors. “When it comes to API…
…
continue reading

1
The Critical Role of MDM in Safeguarding Dedicated Devices
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between security and user experience in dedicated devices. They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterpr…
…
continue reading

1
Episode 39 - National Ambassador Focus - Microsoft
46:58
46:58
Play later
Play later
Lists
Like
Liked
46:58In episode 39, Mandy Haeburn-Little is joined by three members of the Microsoft team: Marc Carney, Director, Security Solutions Group; Gabriela Gradden, EMEA Security Sales Director; and Joseph Boland-Scott, Security Product Manager. The team began by reflecting on a transformative period for the cyber security landscape, with an increase in ransom…
…
continue reading

1
Meeting of the Minds: State of Cybersecurity in 2025 Part II
45:17
45:17
Play later
Play later
Lists
Like
Liked
45:17Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. The…
…
continue reading

1
Why Cyber Needs to Rebrand from a Boys Club
20:42
20:42
Play later
Play later
Lists
Like
Liked
20:42Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance of diversity and mentorship in fostering innovation and problem-solving within cybersecurity teams. Andrea advocates for a more inclusive approach to r…
…
continue reading

1
Reducing Risk with Effective Exposure Management in Enterprise Tech
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of Sevco Security. In this episode of The Security Strategist podcast, Richard Stiennon, Founder and Chief Analyst at IT-Harvest speaks with Guy about the evolution of vulnerability management into …
…
continue reading

1
Episode 38 - National Ambassador Focus - Logistics UK
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45In episode 38, Mandy Haeburn-Little is joined by two members of the Logistics UK team, the first company from the transport sector to join the National Cyber Resilience Centre Group as National Ambassadors; they are Nigel Smart, Director of IT & Development and Natalie Chapman, Head of Public Affairs. Nigel begins the conversation by highlighting t…
…
continue reading

1
Episode 37 - National Ambassador Focus - Akamai
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02In episode 37, Mandy Haeburn-Little is joined by two members of the team at Akamai, the newest member of our National Cyber Resilience Centre Group National Ambassadors. Mandy chats with Richard Meeus, Director of Security Technology and Strategy EMEA, and Matt Payne, Regional Director, EMEA Financial Services Industry and Public Sector at Akamai T…
…
continue reading

1
The Evolving Cyber Threat Space: A Geopolitical Perspective
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-shifting threat space and examining how international regulations and geopolitical tensions impact organisations' cybersecurity posture. The episode al…
…
continue reading

1
Diversity in Cybersecurity: A Key to Innovation
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emphasizes how neurodiverse individuals can bring unique problem-solving skills that drive innovation in cybersecurity. The discussion also covers the significance of diversity in teams, the need for resi…
…
continue reading

1
Is AI and Zero Trust the Future of Cyber Warfare?
20:28
20:28
Play later
Play later
Lists
Like
Liked
20:28The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defences. The critical role of AI and Zero Trust has been shaping the future of cyber defence for a while now. It’s become absolutely necessary to adopt a zero-trust security model to protect against today'…
…
continue reading

1
Meeting of the Minds: State Of Cybersecurity in 2025
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. In the first episode of Meeting of the Minds, three leading industry analysts – Christopher Steffen, VP of Research at EMA; Richard Stiennon, Founder and Chief Analyst at IT-Harvest; and Brad LaPorte, Morphisec CMO & Advisor at Lionfish Tech Ad…
…
continue reading

1
Episode 36 - National Ambassador Focus - Nationwide
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In episode 36, Mandy Haeburn-Little chats with two of the team at Nationwide Building Society, a valued member of our portfolio of National Cyber Resilience Centre Group National Ambassadors. Rachel Vigor, Business Services, Governance, Risk & Controls Director and Sharon Gould, Supplier Security Manager, Business Services GRC, join Mandy on this e…
…
continue reading

1
Navigating Cybersecurity: Insights from Jim Liddle
20:23
20:23
Play later
Play later
Lists
Like
Liked
20:23This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity of proactive security measures in an increasingly interconnected digital world. The discussion highlights essential themes such as data resilience, the seamless integration of security and recovery s…
…
continue reading
Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. APIs, the backbone of modern technology, are vital for enabling seamless communication between applications. However, as their usage grows, so do the risks associated with inadequate API management and …
…
continue reading

1
Episode 35 - National Ambassador Focus - HP
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40In episode 35, Mandy Haeburn-Little chats with David Scutt, Head of Software Sales EMEA at HP, the global technology leader, operating in 170 countries and shipping three devices every second! David begins the conversation by outlining the core focus areas of the business, which are Personal Computing & Printing, 3D Printing, Hybrid Work, and Gamin…
…
continue reading

1
The AI Shift: Transforming Roles and Securing IT Systems
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the importance of collaboration between IT and AI teams. He emphasizes that while AI may replace some jobs, it will primarily transform existing roles. The discussion also highlights the necessity of observabil…
…
continue reading
The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as organisations increasingly rely on the cloud, the attack surface for cyber threats has expanded significantly. Traditional security tools often struggle to keep up with the unique challenges of cloud env…
…
continue reading

1
Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve
17:59
17:59
Play later
Play later
Lists
Like
Liked
17:59Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geopolitical tensions, or unexpected global events like pandemics can ripple through even the most carefully planned supply chains. Companies that fail to anticipate and mitigate these risks can face costl…
…
continue reading

1
Episode 34 - In conversation with Nik Adams
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32CyberVersed episode 34 is the final podcast of 2024, and fittingly, Mandy Haeburn-Little caught up with Nik Adams, Assistant Commissioner, City of London Police and Chair of the NCRCG National Ambassador Steering Group. Their conversation highlights the progress made during 2024 and, more importantly, outlines the opportunities and goals for NCRCG …
…
continue reading

1
Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabilities can result in data breaches, financial losses, and reputational damage, making them a top concern for businesses of all sizes. Despite technological advances, many organisations struggle to keep up…
…
continue reading

1
The Cyber Game: Simulations, Ranges, and Digital Twins
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To stay ahead in emerging risks, organisations must adopt cutting-edge tools that enable proactive preparation and robust defence strategies against these risks. Cyber ranges and digital twins are revoluti…
…
continue reading

1
Why Tracking Your Digital Risk is a Big Deal
22:23
22:23
Play later
Play later
Lists
Like
Liked
22:23Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safeguarding sensitive data to mitigating external threats. Businesses must move beyond traditional cybersecurity approaches, embracing holistic digital risk strategies that protect their reputation, asse…
…
continue reading

1
The Psychology of Security: Empowering People to Protect
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effectiveness of security measures. By prioritising behavioural insights, organisations can anticipate potential threats and design systems that align with how people naturally act and interact. Discussing …
…
continue reading

1
Episode 33 - National Ambassador Focus - The Very Group
28:31
28:31
Play later
Play later
Lists
Like
Liked
28:31In CyberVersed episode 33 Mandy Haeburn-Little catches up with one of the founding ambassador companies, The Very Group. She is joined by Muktar Mahama, Head of Product and Digital Experience, in a truly insightful conversation about The Very Group's total commitment to customer experience and the continuous monitoring and refinement to ensure the …
…
continue reading

1
How do Hackers Collect Intelligence on their Victims?
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data mining to get ahead. From scouring social media profiles to exploiting publicly available data, attackers gather intelligence that helps them pinpoint vulnerabilities and personalise attacks. Every detai…
…
continue reading

1
Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and consumers alike. These advanced vehicles, packed with digital features and data-driven capabilities, also bring new cybersecurity challenges. With sophisticated connectivity features, onboard software, …
…
continue reading

1
Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and how does it fit alongside other advanced security solutions like XDR? Just as Security Operations Centers (SOCs) defend the enterprise network, they now must extend their defences to the cloud, ensuri…
…
continue reading

1
Courage & Resilience: Bringing FBI Grit to Cybersecurity
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions can mean the difference between safeguarding critical assets and exposing vulnerabilities. This requires a willingness to act decisively, even under uncertainty, and to take calculated risks for the …
…
continue reading

1
Episode 32 - National Ambassador Focus - Trustify
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01CyberVersed episode 32 focuses on Trustify, one of the newest National Cyber Resilience Centre Group's National Ambassadors. Mandy Haebrun-Little talks to John Madelin, Advisory Board Member at Trustify. John is a highly respected cyber professional with 30+ years of experience in the design, build and management of Cyber Security. It is evident du…
…
continue reading

1
Ransom-Repeat: How to Stop Funding Your Favorite Hackers!
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational damage. Semperis’s Ransomware Risk Report explores the reasons behind the high percentage of businesses making payments, which inadvertently encourages attackers to strike again. By giving in to dema…
…
continue reading
Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormous, often involving extensive data restoration, system reconfiguration, and potential business disruptions. The financial toll, reputational damage, and operational downtime can be devastating. AI can…
…
continue reading

1
The Innovation Paradox: Security and Productivity in a Regulatory World
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to growth. However, as businesses embrace digital transformation, they open themselves to new security vulnerabilities. These advancements can quickly become liabilities without proper protection, expos…
…
continue reading

1
Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information security, drawing on key findings from their latest report. The discussion emphasises the growing importance of compliance in the face of rising data breaches and supply chain vulnerabilities. They explore …
…
continue reading