Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

VCISO Podcasts

show episodes
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
CvCISO Podcast

SecurityStudio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
  continue reading
 
Artwork
 
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork

1
Audience 1st

Dani Woolf

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
  continue reading
 
Loading …
show series
 
Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around how vCISOs are no longer just about frameworks and firewalls, but about protecting business outcomes, navigating executive risk, and helping clients make strategic decisions. This week, we’re taking it a step…
  continue reading
 
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~ In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025. Whether you’re building a security program, managin…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Alexander Jaber, CEO of Compliant Business Solutions GmbH, a consulting company from Germany. They discuss ISO 27001 as a service, an innovative approach that combines consulting, policy writing, software, and certification into a cohesive package. Alexander shares insi…
  continue reading
 
Send us a text The cybersecurity landscape is rapidly evolving, and AI stands at the forefront of this transformation. In this thought-provoking episode, Shon Gerber explores the projected $450 billion impact AI will have by 2028 and what this means for security professionals today. With only 2% of companies having fully deployed AI solutions and 3…
  continue reading
 
Scaling Security & Resilience in Regulated Industries with John Christly | DailyCyber 269 ~ Watch Now ~ In this episode of the DailyCyber Podcast, I’m joined by John Christly, Vice President of Commercial Services at OneZero Solutions, and a seasoned cybersecurity executive with 30+ years in the field. John has served as a CISO, CIO, and consultant…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
Greg Schaffer welcomes Butch Rutt, Campus Security Supervisor at Littleton Public Schools, for a powerful conversation on leadership, service, and school safety. Drawing from his background in the U.S. Army and over two decades in law enforcement, Butch shares how his experiences inform a people-first approach to security. From crisis response to b…
  continue reading
 
Send us a text Looking to strengthen your organization's defenses against unauthorized access? This episode dives deep into CISSP Domain 5.1, exploring the critical components of physical and logical access controls that protect your most valuable assets. We begin with a startling discussion about China's "Maciantool" - sophisticated software secre…
  continue reading
 
Send us a text Security vulnerabilities lurk in the most unexpected places – even in your home internet modem. Today we kick off with breaking news about a security flaw discovered in Cox modems that could potentially allow unauthorized access to run malicious commands on connected devices. While Cox reports fixing the issue within 24 hours, this r…
  continue reading
 
ABOUT THIS EPISODE: The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 3 featuring Christine Chasse RN, JD, MSN, NE-C, CIPPUS, AIGP. Christine recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of her insights. Christine is an Attorney with a focus on Regulatory and Compliance, and Da…
  continue reading
 
Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
  continue reading
 
Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
  continue reading
 
Nick Eicken is the founder of CyberAuthority and a seasoned Virtual Chief Information Security Officer (vCISO) with deep roots in both military and civilian cybersecurity leadership. A U.S. Army veteran who built top-secret communication networks as a signal officer, Nick transitioned to the private sector where he’s guided organizations across non…
  continue reading
 
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
  continue reading
 
Ted Harrington (Founder of IoT Village, Executive Partner for Independent Security Evaluators, Author, Speaker, and Podcaster) examines the ongoing challenges and progress in IoT security, emphasizing how community initiatives, the hacker mindset, and business-oriented communication can drive real change in the industry. Ted and Phil Wylie discuss …
  continue reading
 
Send us a text The medieval castle with its moat, high walls, and sentries provides the perfect metaphor for modern cybersecurity. Just as each defensive element served a specific purpose in protecting the castle, today's information security requires multiple layers working in concert to safeguard digital assets. Shon Gerber opens this episode wit…
  continue reading
 
Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~ In today’s DailyCyber Podcast, I’m joined by Paul Caron, Head of Cyber Security, Americas at S-RM. Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Res…
  continue reading
 
Send us a text Microsoft recently released 137 security patches, with 14 critical vulnerabilities that could allow attackers to seize control of Windows systems with minimal user interaction. Among these, the Windows authentication negotiation flaw rated at 9.8 severity poses a significant threat to all current Windows versions. For security profes…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Show Notes: https://securityweekly.com/bsw-403…
  continue reading
 
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
  continue reading
 
Send us a text Ready to conquer CISSP Domain 1? This rapid review episode delivers essential knowledge on security and risk management fundamentals that form the cornerstone of information security practice. We begin with a timely discussion on preventing ransomware through exfiltration controls, noting the alarming shift where 90% of ransomware at…
  continue reading
 
From the Middle Tennessee ISACA Conference, Cool Springs, Tennessee, March 2025. Stacy Mill is a seasoned cybersecurity and IT executive with a track record of leading complex technology initiatives in both the public and private sectors. She has served as CTO for the State of Kansas, VP of IT and CISO at Nashville Electric Service, and global CISO…
  continue reading
 
Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~ In today’s DailyCyber Podcast, I’m joined by Andy Maus, Head of Business Development, Cyber Recovery Services at DriveSavers Data Recovery. We dive into the realities of ransomware recovery—from corrupted files to deleted backups—and what actually works when everything goes…
  continue reading
 
In this episode of Breakfast Bytes, host Felicia King delves into the controversial world of IT assessments, often considered a deceptive sales tool rather than a vital business instrument. Drawing from years of experience, Felicia shares her insights into the improper paradigms surrounding assessments, highlighting how they frequently mislead busi…
  continue reading
 
In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Con…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
Amy Chaney, SVP Technology, COO for Citi, shares a seasoned perspective on driving technological transformation and robust security in large financial institutions. The episode explores practical guidance for aligning business cases with emerging technologies like AI, highlights the importance of agile security policies, and emphasizes the critical…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Brian Honan, the CEO of BH Consulting, to discuss the evolving landscape of cybersecurity and its governance, particularly in the EU. Brian shares insights on the role of European cybersecurity bodies like ENISA and the importance of cybersecurity in business operations…
  continue reading
 
In this episode of the Virtual CISO Podcast, host John Verry and guest Chris Schaeffer discuss the HITRUST framework, its evolution, and its significance in the cybersecurity landscape. They delve into the Common Security Framework (CSF), the different assessment models (E1, I1, R2), and how HITRUST compares to other frameworks like SOC 2 and ISO 2…
  continue reading
 
Send us a text Effective data classification isn't just about regulatory compliance—it's the foundation of your entire security program. Whether you're preparing for the CISSP exam or leading security initiatives at your organization, understanding how to identify, categorize, and protect sensitive information is critical to your success. This epis…
  continue reading
 
ABOUT THIS EPISODE:The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 2 featuring Albert Kittoe, Project Manager, Scrum Master. Albert recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of his insights.The burning desire to protect his family drove Albert to sit for the AIGP exam.Plea…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Ethical dilemmas lurk around every corner in cybersecurity, ready to challenge even the most technically competent professionals. Sean Gerber tackles these moral minefields head-on in this thought-provoking episode focused on CISSP Domain 1.1, presenting fifteen real-world ethical …
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode, Greg Schaffer interviews James Pham, CEO and co-founder of Opsin, who shares his unique journey from chemistry medalist in high school to tech entrepreneur. James discusses how his academic and professional path took him from studying in Korea and working in Singapore to pursuing his entrepreneurial dream in the U.S., eventually ea…
  continue reading
 
Send us a text Ethical leadership lies at the heart of effective cybersecurity practice. In this episode, we dive deep into Domain 1.1 of the CISSP certification, exploring professional ethics and their critical importance for security professionals. The episode opens with a sobering look at the current landscape of cyber warfare, examining how Isr…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play