Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
SC Media and Sophos are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
SC Media and Semperis are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading

1
S7E16 - A Conversation with Sean Goodwin
25:39
25:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
25:39As a Principal in the DenSecure team at Wolf & Company, P.C., Sean Goodwin leads and executes cybersecurity projects for clients across various industries, including healthcare, financial services, and retail. He has over a decade of experience in cybersecurity and information security and holds several credentials, such as GSE #271, CISSP, CISA, G…
…
continue reading
In CISO Perspectives, Kim Jones, a CISO with over four decades of real-world security and risk management experience, sits down with industry leaders throughout this series for candid conversations that share their experiences and perspectives about the cybersecurity industry and the many challenges it faces. Whether it be cybersecurity leadership,…
…
continue reading

1
#227 - The 30 Year CISO Evolution
28:34
28:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:34Ever wonder how the CISO role went from obscure techie to boardroom MVP? In this episode of CISO Tradecraft, G Mark Hardy takes you on a journey through the evolution of the Chief Information Security Officer — from Steve Katz's groundbreaking appointment at Citibank in 1995 to the high-stakes, high-impact role CISOs play today. Transcripts: https:…
…
continue reading

1
Never Trust, Always Verify: Exploring Zero Trust Architecture
22:43
22:43
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
22:43Delve into the principles and practical applications of Zero Trust Architecture (ZTA), a modern cybersecurity paradigm that moves away from traditional perimeter-based security by embracing the core tenet of "never trust, always verify". Learn about the key components, tenets, and benefits of ZTA, as well as strategies for implementation in today's…
…
continue reading

1
Soevereine cloud of vegan kipfilet?
22:39
22:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
22:39Eet je vegetarisch of vegan? Dan is een pak kipfilet in de supermarkt met het label "vegan" erop waarschijnlijk niet iets wat jij acceptabel zou vinden om te eten. De afgelopen tijd praat men binnen security over "digitale soevereiniteit" en "digitale autonomie". Maar wat is dat eigenlijk? En hoe zorg je dat je een echt soevereine dienst inkoopt en…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole explores the often-overlooked path of consulting within the cybersecurity field. While many professionals transition from security engineering to management and eventually to a CISO role, he emphasizes that consulting can be an invaluable step in that journey. Consulting sharpens essential skills lik…
…
continue reading

1
👀 Stop Rolling Your Eyes: AI Is Your CISO Leadership Opportunity 🙄
32:22
32:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
32:22🙄 Stop Rolling Your Eyes: AI Is Your CISO Leadership Opportunity The Professional CISO Show – Episode 57 Hosted by David Malicoat This episode is brought to you by Symmetry Systems, The Data+AI Security Company. (www.symmetry-systems.com) 🎧 Episode Summary: In this solo commentary episode, David Malicoat issues a direct challenge to security leader…
…
continue reading

1
This Security Control Is So Good We Don’t Even Have to Turn It On (LIVE in Clearwater, FL)
45:00
45:00
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:00All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Christina Shannon, CIO, KIK Consumer Products. Joining them is Jim Bowie, CISO, Tampa General Hospital. In this episode: A journey, not a destination The difference between pressure and stress Fighting com…
…
continue reading

1
Tony Gonzalez - Principal, Innervision Services
28:27
28:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:27This is an interview with Tony Gonzalez (Principal, Innervision Services LLC) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only community o…
…
continue reading

1
Why the Best Security Leaders Stay Curious
51:35
51:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
51:35In this episode of The New CISO, host Steve Moore sits down with Michael Mendelsohn, CISO at Majesco, to discuss his journey in cybersecurity—from his early days as a software developer to leading security for a major insurance software company. Michael shares insights into the evolving role of a CISO, the intersection of security and technology, a…
…
continue reading

1
From Legal to Cyber: Building Bridges with CISO David Malicoat | The GC+CISO Connection Show
36:52
36:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:52In this episode of The GC+CISO Connection Show, host Shawn Tuma welcomes CISO extraordinaire and host of The Professional CISO Show, David Malicoat. Together, they dive into the critical collaboration between legal and cybersecurity professionals, exploring how these partnerships can drive business success and mitigate risk. David shares his journe…
…
continue reading

1
Breach by the Dozen: Incident Response Lessons from the Field - Mike Miller - CSP #210
31:29
31:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
31:29In this episode of the CISO Stories Podcast, we’re joined by Mike Miller, a seasoned penetration tester and audit and compliance SME, to explore the real-world impact of incident response controls. From technical to managerial and physical safeguards, Mike shares eye-opening stories from the field—including how he once penetrated a network with not…
…
continue reading

1
Decoding Digital Finance: Navigating Cyber Threats with Innovative Solutions
16:23
16:23
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
16:23Explore the critical cybersecurity challenges facing the financial services industry today, from the increased risk of data breaches and sophisticated cyber attacks to emerging threats like quantum computing and client-side vulnerabilities. Drawing insights from the cutting-edge solutions featured in the CYBERTECH100, we delve into innovative techn…
…
continue reading

1
HIPAA Security Hub: Protecting Your Digital Health Information
13:36
13:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
13:36Navigating the complex world of healthcare cybersecurity. Join us as we delve into the HIPAA Security Rule, its purpose in safeguarding electronic Protected Health Information (ePHI), and the latest updates addressing evolving threats like AI and quantum computing. We'll break down compliance requirements, explore the impact of the HIPAA Omnibus Ru…
…
continue reading

1
SOC Insights: Navigating the Cyber Security Operations Center
25:10
25:10
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
25:10Join us for SOC Insights, the podcast dedicated to demystifying the world of the Security Operations Center. We delve into the core functions of a SOC including collection, detection, triage, investigation, and incident response. Explore essential SOC tools like SIEMs, Threat Intelligence Platforms, and Incident Management Systems. Understand the c…
…
continue reading

1
Digital Forensics Evolved: Navigating New Tech Threats
25:35
25:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
25:35Explore the dynamic landscape of digital forensics in the face of rapidly evolving technologies. We delve into the impact of trends like IoT, 5G networks, AI-driven attacks, advanced file systems (APFS, NTFS), cloud integration, and sophisticated anti-forensic techniques across Mac OS, network infrastructures, and Windows platforms. Join us as we u…
…
continue reading

1
AI Unlocked: The Prompt Hacking Threat Landscape
21:53
21:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
21:53Delve into the critical security vulnerabilities of Artificial Intelligence, exploring the dangerous world of prompt injection, leaking, and jailbreaking as highlighted in SANS' Critical AI Security Controls and real-world adversarial misuse of generative AI like Gemini by government-backed actors. Understand how malicious actors attempt to bypass …
…
continue reading

1
AI in Cyber and Strategy: Threats, Defenses, and Geopolitical Shifts
27:09
27:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:09This podcast explores the multifaceted impact of artificial intelligence on the landscape of cybersecurity and military strategy. We delve into how AI is being leveraged for advanced cyber defense, including identifying vulnerabilities and accelerating incident response. while also examining the emerging cyberattack capabilities that AI can enable.…
…
continue reading

1
S7E15 - A Conversation with Chris Camacho
27:37
27:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:37Chris Camacho is the Co-Founder and COO of Abstract Security. Abstract Security collects and routes data from cloud sources (such as AWS CloudTrail, Azure Activity Logs and GCP Audit Logs), removes unwanted noise, performs optimization, threat enrichment and normalizes data to OCSF schema in real-time before routing it to any SIEM or data lake of y…
…
continue reading

1
#226 - Vulnerability Management (with Chris Hughes)
45:53
45:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:53In this episode of CISO Tradecraft, we host Chris Hughes, CEO of Aquia, cybersecurity consultant, and author. Chris shares insights on the evolving landscape of cybersecurity, discussing software supply chain threats, vulnerability management, relationships between security and development, and the future impacts of AI. Tune in to gain expert advic…
…
continue reading

1
Navigating the AI Frontier: Risk Management for GPAI and Foundation Models
16:02
16:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
16:02Join us as we delve into the critical realm of risk management for General-Purpose AI (GPAI) and foundation models. Drawing insights from the UC Berkeley Center for Long-Term Cybersecurity's profile, we explore the unique risks associated with these increasingly multi-purpose AI systems, from their large-scale impact and potential for misuse to the…
…
continue reading

1
SOC 2 for SaaS: Building Trust and Compliance
22:06
22:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
22:06Navigate the world of SOC 2 compliance specifically for SaaS companies. We break down the Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy) explain the difference between Type I and Type II audits, and offer best practices for achieving and maintaining your SOC 2 certification to build customer tru…
…
continue reading

1
The Cybernetic Teammate: AI's Revolution in Teamwork
21:01
21:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
21:01Explore how artificial intelligence is transforming the core of organizational collaboration. We delve into the groundbreaking research from "The Cybernetic Teammate" study, revealing how AI-powered tools are impacting team performance, breaking down expertise silos, and even influencing social engagement in the workplace. Discover how individual A…
…
continue reading

1
Global Threats Unveiled: Decoding the 2025 Intelligence Assessment
27:56
27:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:56This podcast dives deep into the 2025 Annual Threat Assessment by the U.S. Intelligence Community, analyzing the most serious threats to U.S. national security posed by major state actors like China and Russia, non-state transnational criminals and terrorists such as ISIS, and the growing trend of adversarial cooperation. We explore the nuanced int…
…
continue reading

1
Caught in the Trap: Honeypot Cyber Attack Insights
23:36
23:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
23:36This podcast dives into the shocking findings of a live honeypot experiment that recorded over 570,000 cyber attacks in just seven days. We explore the attack trends, including brute-force attempts, stolen credentials, automated bots, and known vulnerabilities, offering valuable insights for SOC analysts, security researchers, and anyone curious ab…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole challenges the common misconception that cybersecurity is an anchor holding organizations back. Instead, he reframes cybersecurity as a stabilizing force—much like how an anchor steadies a boat during rough waters. Just as a well-placed anchor ensures balance and security, effective cybersecurity emp…
…
continue reading

1
Germany AI Trends 2025: Navigating the Global Race
17:01
17:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
17:01Delve into the critical artificial intelligence trends shaping 2025, as highlighted in the statworx AI Trends Report. This podcast explores the rapid advancements in AI, the ongoing global competition for AI supremacy, the impact of European regulations like the AI Act, and the potential bursting of the AI investment bubble, offering insights for b…
…
continue reading

1
The CISO’s Dilemma: Influence, Impact, and Leaving the Seat with Russell Okoth
45:37
45:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:37This episode is brought to you by Symmetry Systems (www.symmetry-systems.com) Innovate with Confidence. The Data+AI Security Company Discover, classify, and safeguard data at scale with our leading Data Security Posture Management Platform. Detect and respond to data focused concerns before they impact your business. 🎙️ Description: In this powerfu…
…
continue reading

1
S7E14 - A Conversation with John J Masserini
30:58
30:58
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:58John Masserini is the founder and managing partner of SentiCon Security, the voice behind the award-winning blog Chronicles of a CISO, and a founding member of BSides South Florida. He also is the creator of the popular and very useful NIST Cyber Security Framework Maturity Toolkit, available on GitHub. He brings his years of experience as a CISO a…
…
continue reading

1
Global AI Crossroads (India & Africa): Innovation, Regulation, and Trust
21:57
21:57
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
21:57Explore the dynamic world of artificial intelligence through a global lens, examining key trends identified in India and Africa. We delve into the balance between AI innovation and regulatory frameworks. Discover how AI is being applied for public sector transformation in India, addressing accessibility and leveraging multilingual capabilities. We …
…
continue reading

1
The Security Incident Has Been Upgraded From “Ouch” to “Boiiiing” (LIVE in Orlando, FL)
42:01
42:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:01All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Trina Ford, CISO, iHeartMedia. Joining us is our sponsored guest Rob Allen, chief product officer, ThreatLocker. This episode was recorded in front of a live audience at Zero Trust World in Orlando, Florid…
…
continue reading
In this episode of CSO Tradecraft, host G. Mark Hardy introduces 'The Full Irish,' a cybersecurity framework based on the '12 Steps to Cybersecurity' guidance from Ireland's National Cybersecurity Center. The episode covers comprehensive steps from governance and risk management to incident response and resilience, making it a valuable resource for…
…
continue reading

1
INCD Cybercrime Unpacked: 2024's Evolution and 2025 Predictions
27:08
27:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:08Delve into the key cybercrime trends observed in 2024 by Israel National Crime Directorate (INCD), from the pervasive use of infostealers and the rise of encryption-less ransomware to the emerging threats involving AI and decentralized technologies. We analyze how cybercriminals are adapting their tactics, the impact of law enforcement actions, and…
…
continue reading

1
Europe Under Threat: Inside the Evolving World of Organised Crime
28:11
28:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:11This podcast delves into the findings of the European Union Serious and Organised Crime Threat Assessment (EU-SOCTA) 2025, exploring the changing DNA of serious and organised crime in Europe as it becomes increasingly nurtured online and accelerated by AI and other new technologies. We examine the destabilising impact of these criminal activities o…
…
continue reading

1
Red Canary: Detecting the 2025 Threats
14:45
14:45
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
14:45This podcast delves into the findings of Red Canary's 2025 Threat Detection Report, dissecting the major cybersecurity trends observed in 2024. We explore the surge in ransomware, increasingly sophisticated initial access techniques like "paste and run," the dramatic rise of identity attacks targeting cloud environments, persistent vulnerability ex…
…
continue reading

1
Unpacking Data Security Risk: Navigating the Gaps and Misalignment
13:05
13:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
13:05Are you struggling to understand and manage your organization's data security risks? Based on the latest insights, we delve into the key challenges hindering effective data protection, including gaps in risk understanding, the critical misalignment between management and staff on security strategies, the limitations of existing security tools, and …
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole challenges cybersecurity leaders to think beyond immediate threats and short-term fixes. Using the famous Mission Impossible phrase, "Your mission, if you choose to accept it," he urges CISOs to define their long-term vision—both for their careers and for the cybersecurity landscape. While businesses…
…
continue reading

1
Secrets Unsprawled: Navigating the Hidden Risks of Exposed Credentials
23:54
23:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
23:54Dive into the alarming world of secrets sprawl, exploring the growing number of exposed API keys, passwords, and other sensitive credentials across development environments, collaboration tools, and cloud platforms. Based on the latest data analysis from GitGuardian's "The State of Secrets Sprawl 2025" report, we uncover the primary risk categories…
…
continue reading

1
Decoding CMMC: Navigating Levels 1, 2, and 3
16:19
16:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
16:19This podcast breaks down the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) framework. We delve into the fundamental differences between Level 1's basic safeguarding requirements, Level 2's alignment with NIST SP 800-171 Rev 2, and Level 3's enhanced security based on NIST SP 800-172 and government ass…
…
continue reading

1
CISOs & The Board: Lessons from Corporate Governance Expert Debra von Storch
44:20
44:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:20🎙️ Episode Summary How can CISOs break into the boardroom and become key players in corporate strategy? In this episode, Debra von Storch, former Ernst & Young (EY) senior partner turned accomplished board director, joins host David Malicoatto reveal what it takes for cybersecurity leaders to elevate their influence at the executive level. With dec…
…
continue reading

1
S7E13 - A Conversation with Tyler Bartley
30:01
30:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:01Tyler Bartley is a Cybersecurity Engineer at Critical Start. Join us as we discuss the benefits of taking a break to rediscover your passion, the risk o SMBs of unqualified personnel, and how music can help bring stress down.
…
continue reading

1
Smart City Under Siege: Navigating Privacy and Cyber Threats
28:26
28:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:26This podcast delves into the growing privacy vulnerabilities and cybersecurity risks inherent in the deeply interconnected systems of modern smart cities. We explore the challenges of data protection, the expanding attack surface created by IoT devices, and the governance and regulatory gaps that can leave urban environments vulnerable to exploitat…
…
continue reading

1
How to Best Maintain a Healthy Work-Work Balance in Cybersecurity
40:56
40:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:56All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Edward Contreras, senior evp and CISO, Frost Bank. In this episode: A gradual language shift Don’t reflexively rise and grind Lean into focus Gauging the unm…
…
continue reading

1
#224 - The Evolution of Data Loss Prevention (DLP)
30:34
30:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:34In this episode of CISO Tradecraft, host G. Mark Hardy dives into the evolution, challenges, and solutions of Data Loss Prevention (DLP). From early methods like 'dirty word lists' in the military to advanced AI and machine learning models of today, discover how DLP technologies have developed to safeguard sensitive information. Learn about differe…
…
continue reading

1
Lithuania's 2025 Security Under Threat
15:41
15:41
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
15:41This podcast delves into the findings of Lithuania's "National Threat Assessment 2025," dissecting the primary external state actors posing the most significant risks to its national security. We examine the multifaceted threats emanating from an increasingly aggressive Russia, Belarus with its growing dependence, and an increasingly hostile China,…
…
continue reading

1
Converged Infrastructure: Bridging the Cyber-Physical Security Gap
17:49
17:49
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
17:49In an era where cyber and physical threats increasingly intersect, critical infrastructure faces unprecedented risks. This podcast delves into the crucial need for security convergence, exploring how organizations can break down security silos between IT, physical security, and operational technology (OT) to achieve a holistic and resilient defense…
…
continue reading

1
Check Point Edge Wars: 2024's Battle for Network Perimeters
33:40
33:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:40In this episode, we delve into the alarming rise of edge device exploitation in 2024 from the Check Point Threat Intel report, where cybercriminals and nation-states alike targeted routers, firewalls, and VPN appliances to gain initial access, establish ORBs for covert operations, and leverage a surge in zero-day vulnerabilities. We explore the tac…
…
continue reading

1
Autonomy Under Attack: Decoding CAV Cybersecurity
15:25
15:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
15:25Navigate the complex landscape of Connected Autonomous Vehicle (CAV) cybersecurity. We delve into the critical vulnerabilities in intra- and inter-vehicle communication, explore potential attack motivations ranging from operational disruption to data theft and physical control, and discuss the significance of standards like ISO/SAE 21434 in buildin…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives into the power of asking the right questions and the importance of letting data—not emotions—drive decisions. He emphasizes the need to focus on solving root causes rather than just treating symptoms, using cybersecurity as an analogy for how we approach problems in life and leadership. By shif…
…
continue reading

1
Cyber Incident Response Maturity: Assessing Your Readiness
21:31
21:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
21:31This podcast delves into the crucial aspects of cyber security incident response maturity. We explore how organizations can assess and improve their capabilities using tools like the detailed assessment based on 15 steps. We discuss key concepts such as criticality assessments, threat analysis, and the importance of people, process, technology, and…
…
continue reading