Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
SC Media and Semperis are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
…
continue reading
SC Media and Semperis are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading

1
Red Canary: Detecting the 2025 Threats
14:45
14:45
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
14:45This podcast delves into the findings of Red Canary's 2025 Threat Detection Report, dissecting the major cybersecurity trends observed in 2024. We explore the surge in ransomware, increasingly sophisticated initial access techniques like "paste and run," the dramatic rise of identity attacks targeting cloud environments, persistent vulnerability ex…
…
continue reading

1
Why the Best Security Leaders Stay Curious
51:35
51:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
51:35In this episode of The New CISO, host Steve Moore sits down with Michael Mendelsohn, CISO at Majesco, to discuss his journey in cybersecurity—from his early days as a software developer to leading security for a major insurance software company. Michael shares insights into the evolving role of a CISO, the intersection of security and technology, a…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole challenges cybersecurity leaders to think beyond immediate threats and short-term fixes. Using the famous Mission Impossible phrase, "Your mission, if you choose to accept it," he urges CISOs to define their long-term vision—both for their careers and for the cybersecurity landscape. While businesses…
…
continue reading

1
CISOs & The Board: Lessons from Corporate Governance Expert Debra von Storch
44:20
44:20
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
44:20🎙️ Episode Summary How can CISOs break into the boardroom and become key players in corporate strategy? In this episode, Debra von Storch, former Ernst & Young (EY) senior partner turned accomplished board director, joins host David Malicoatto reveal what it takes for cybersecurity leaders to elevate their influence at the executive level. With dec…
…
continue reading

1
From Legal to Cyber: Building Bridges with CISO David Malicoat | The GC+CISO Connection Show
36:52
36:52
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
36:52In this episode of The GC+CISO Connection Show, host Shawn Tuma welcomes CISO extraordinaire and host of The Professional CISO Show, David Malicoat. Together, they dive into the critical collaboration between legal and cybersecurity professionals, exploring how these partnerships can drive business success and mitigate risk. David shares his journe…
…
continue reading

1
S7E13 - A Conversation with Tyler Bartley
30:01
30:01
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:01Tyler Bartley is a Cybersecurity Engineer at Critical Start. Join us as we discuss the benefits of taking a break to rediscover your passion, the risk o SMBs of unqualified personnel, and how music can help bring stress down.
…
continue reading

1
How to Best Maintain a Healthy Work-Work Balance in Cybersecurity
40:56
40:56
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
40:56All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Edward Contreras, senior evp and CISO, Frost Bank. In this episode: A gradual language shift Don’t reflexively rise and grind Lean into focus Gauging the unm…
…
continue reading

1
#224 - The Evolution of Data Loss Prevention (DLP)
30:34
30:34
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:34In this episode of CISO Tradecraft, host G. Mark Hardy dives into the evolution, challenges, and solutions of Data Loss Prevention (DLP). From early methods like 'dirty word lists' in the military to advanced AI and machine learning models of today, discover how DLP technologies have developed to safeguard sensitive information. Learn about differe…
…
continue reading

1
Column: Innovatie in de leveranciersketen is hard nodig
4:04
4:04
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
4:04Deze column is oorspronkelijk verschenen op de website van Security Innovation Stories: https://www.securityinnovationstories.com/innovatie-in-de-leveranciersketen-is-hard-nodig/
…
continue reading

1
Breach by the Dozen: Incident Response Lessons from the Field - Mike Miller - CSP #210
31:29
31:29
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
31:29In this episode of the CISO Stories Podcast, we’re joined by Mike Miller, a seasoned penetration tester and audit and compliance SME, to explore the real-world impact of incident response controls. From technical to managerial and physical safeguards, Mike shares eye-opening stories from the field—including how he once penetrated a network with not…
…
continue reading

1
Ep 149: Unlocking the Future: Passkeys and Passwordless Authentication with Anna Pobletts
40:58
40:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
40:58द्वारा John Verry
…
continue reading

1
Unpacking Data Security Risk: Navigating the Gaps and Misalignment
13:05
13:05
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
13:05Are you struggling to understand and manage your organization's data security risks? Based on the latest insights, we delve into the key challenges hindering effective data protection, including gaps in risk understanding, the critical misalignment between management and staff on security strategies, the limitations of existing security tools, and …
…
continue reading

1
Secrets Unsprawled: Navigating the Hidden Risks of Exposed Credentials
23:54
23:54
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
23:54Dive into the alarming world of secrets sprawl, exploring the growing number of exposed API keys, passwords, and other sensitive credentials across development environments, collaboration tools, and cloud platforms. Based on the latest data analysis from GitGuardian's "The State of Secrets Sprawl 2025" report, we uncover the primary risk categories…
…
continue reading

1
Decoding CMMC: Navigating Levels 1, 2, and 3
16:19
16:19
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
16:19This podcast breaks down the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) framework. We delve into the fundamental differences between Level 1's basic safeguarding requirements, Level 2's alignment with NIST SP 800-171 Rev 2, and Level 3's enhanced security based on NIST SP 800-172 and government ass…
…
continue reading

1
Smart City Under Siege: Navigating Privacy and Cyber Threats
28:26
28:26
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
28:26This podcast delves into the growing privacy vulnerabilities and cybersecurity risks inherent in the deeply interconnected systems of modern smart cities. We explore the challenges of data protection, the expanding attack surface created by IoT devices, and the governance and regulatory gaps that can leave urban environments vulnerable to exploitat…
…
continue reading

1
Lithuania's 2025 Security Under Threat
15:41
15:41
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
15:41This podcast delves into the findings of Lithuania's "National Threat Assessment 2025," dissecting the primary external state actors posing the most significant risks to its national security. We examine the multifaceted threats emanating from an increasingly aggressive Russia, Belarus with its growing dependence, and an increasingly hostile China,…
…
continue reading

1
Converged Infrastructure: Bridging the Cyber-Physical Security Gap
17:49
17:49
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
17:49In an era where cyber and physical threats increasingly intersect, critical infrastructure faces unprecedented risks. This podcast delves into the crucial need for security convergence, exploring how organizations can break down security silos between IT, physical security, and operational technology (OT) to achieve a holistic and resilient defense…
…
continue reading

1
Check Point Edge Wars: 2024's Battle for Network Perimeters
33:40
33:40
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:40In this episode, we delve into the alarming rise of edge device exploitation in 2024 from the Check Point Threat Intel report, where cybercriminals and nation-states alike targeted routers, firewalls, and VPN appliances to gain initial access, establish ORBs for covert operations, and leverage a surge in zero-day vulnerabilities. We explore the tac…
…
continue reading

1
Autonomy Under Attack: Decoding CAV Cybersecurity
15:25
15:25
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
15:25Navigate the complex landscape of Connected Autonomous Vehicle (CAV) cybersecurity. We delve into the critical vulnerabilities in intra- and inter-vehicle communication, explore potential attack motivations ranging from operational disruption to data theft and physical control, and discuss the significance of standards like ISO/SAE 21434 in buildin…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives into the power of asking the right questions and the importance of letting data—not emotions—drive decisions. He emphasizes the need to focus on solving root causes rather than just treating symptoms, using cybersecurity as an analogy for how we approach problems in life and leadership. By shif…
…
continue reading

1
Cyber Incident Response Maturity: Assessing Your Readiness
21:31
21:31
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
21:31This podcast delves into the crucial aspects of cyber security incident response maturity. We explore how organizations can assess and improve their capabilities using tools like the detailed assessment based on 15 steps. We discuss key concepts such as criticality assessments, threat analysis, and the importance of people, process, technology, and…
…
continue reading

1
Navigating NIST CSF 2.0: Your Guide to Cybersecurity Resilience
18:24
18:24
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
18:24Join us as we explore the NIST Cybersecurity Framework (CSF) 2.0, the essential guide for organizations looking to manage and reduce cybersecurity risks. We delve into the six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover, examining the key changes and updates from previous versions. Whether you're new to the CSF or lookin…
…
continue reading

1
The CISO's New Secret Weapon: Business Acumen w/ Alain Espinosa
44:35
44:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
44:35🔐 How do CISOs transition from cybersecurity leaders to business executives and board members? In this episode of The Professional CISO Show, I sit down with Alain Espinosa to explore his journey from IT operations to board readiness and leadership. We cover building business acumen, navigating the boardroom, professional development strategies, an…
…
continue reading

1
AI-Powered Cybersecurity: Simplifying Policies and Automating Tasks with CISO Marketplace
13:08
13:08
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
13:08Discover how CISO Marketplace's latest innovations, GeneratePolicy.com and CyberAgent.Exchange, are transforming cybersecurity for startups and SMBs. Learn how AI-driven policy generation simplifies compliance and documentation, and how AI-powered agents automate critical security roles, enhancing efficiency and reducing costs. We delve into the ke…
…
continue reading

1
Our CISO Might Be Virtual, But the Lack of Respect Is Genuine
34:16
34:16
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
34:16All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Mike Wilkes, former CISO, Major League Soccer. In this episode: Are we misusing vCISOs? Cybersecurity is out to sea Planning for your ex…
…
continue reading

1
Breach by the Dozen: Incident Response Lessons from the Field - Mike Miller - CSP #210
31:29
31:29
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
31:29In this episode of the CISO Stories Podcast, we’re joined by Mike Miller, a seasoned penetration tester and audit and compliance SME, to explore the real-world impact of incident response controls. From technical to managerial and physical safeguards, Mike shares eye-opening stories from the field—including how he once penetrated a network with not…
…
continue reading

1
AI Risks & Regulations: Navigating the New Landscape
32:03
32:03
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:03This podcast delves into the complex world of Artificial Intelligence, exploring the cybersecurity risks associated with its adoption and the evolving regulatory landscape, particularly focusing on the EU AI Act. We break down the key aspects of the AI Act, including definitions of AI systems and general-purpose AI models risk classifications and t…
…
continue reading

1
#223 - A CISO Primer on Agentic AI
25:43
25:43
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
25:43In this episode of CISO Tradecraft, G. Mark Hardy dives deep into the world of Agentic AI and its impact on cybersecurity. The discussion covers the definition and characteristics of Agentic AI, as well as expert insights on its feasibility. Learn about its primary functions—perception, cognition, and action—and explore practical cybersecurity appl…
…
continue reading

1
Cyber Frontier: Navigating Threats and AI in the Digital Age
26:48
26:48
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
26:48This podcast explores the evolving cybersecurity landscape, drawing insights from the Microsoft Digital Defense Report 2024 and the ENISA Threat Landscape. We delve into the tactics of nation-state actors and cybercriminals, the growing impact of AI on both attacks and defenses, and strategies for building resilience in an increasingly complex digi…
…
continue reading
Explore the cutting-edge intersection of artificial intelligence and red team operations in cybersecurity. We delve into how AI is revolutionizing traditional cyber offense and defense methodologies, enhancing adaptability, fostering innovation, and pushing the boundaries of cyber operations in an era of rapidly evolving digital threats, as highlig…
…
continue reading

1
S7E12 - A Conversation with Dylan Evans
34:32
34:32
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
34:32Dylan Evans is the Workstream Owner at Simple Salt. They stop internet crime and demystify security for businesses with a lot to lose by explaining exactly how internet crime practically threatens business health and goals, and the easiest and most effective things you can do about it. Join us for a fascinating discussion as we dive into how we as …
…
continue reading

1
S7E11 - A Conversation with Ryan Burch
30:02
30:02
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:02With over 23 years of experience in the IT industry, Ryan Burch is a seasoned and versatile leader with a proven track record of planning, executing, and delivering complex and innovative IT solutions that align with organizational goals. He is passionate about empowering teams, streamlining operations, and ensuring high standards of quality, secur…
…
continue reading

1
Arctic Wolf 2025: Navigating the Cyber Threat Landscape
19:48
19:48
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
19:48Based on the Arctic Wolf 2025 Threat Report, this podcast explores the key cybersecurity threats that organizations will face in the coming year. We delve into the prevalence of ransomware and data extortion, the ongoing challenges of business email compromise, and the persistent risks posed by intrusions. Gain insights into attacker tactics, vulne…
…
continue reading
Are You Thinking Like a True CISO? Or Just Reacting to Cybersecurity? In this episode of Life of a CISO, Dr. Eric Cole challenges cybersecurity leaders to rethink their approach, shifting from a reactive, firefighting mindset to a long-term, strategic vision. He highlights how most CISOs operate in a short-term, tactical manner—responding to incide…
…
continue reading

1
2024 Cyber Underworld: Recorded Future Unpacking Malicious Infrastructure
22:30
22:30
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
22:30This episode dives into the key findings of Recorded Future's 2024 Malicious Infrastructure Report, revealing the dominant malware families like LummaC2 and AsyncRAT, the continued reign of Cobalt Strike, and the evolving tactics of threat actors, including the abuse of legitimate internet services and relay networks. We'll explore the top threats,…
…
continue reading

1
Leadership, Collaboration, and Cybersecurity: Insights from Bryce Carter, CISO of Arlington, TX
33:16
33:16
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:16In this episode of "The GC+CISO Connection Show," host Shawn Tuma sits down with Bryce Carter, CISO for the City of Arlington, Texas, to explore the intersection of leadership, cybersecurity, and collaboration between legal and cyber teams. Bryce shares his unique career journey from pre-med to cybersecurity, his experiences as a startup founder, a…
…
continue reading

1
ThreatDown's 2025 Malware State: Autonomous AI and the Rise of Dark Horse Ransomware
20:38
20:38
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
20:38Delve into the key findings of ThreatDown's 2025 State of Malware report, exploring the anticipated impact of agentic AI on cybercrime and the evolving ransomware landscape, including the emergence of smaller, more agile "dark horse" groups. We'll discuss how cybercriminals are leveraging AI to scale attacks and the shift towards Living Off The Lan…
…
continue reading

1
Greynoise Legacy Exploits & Zero-Days: Mass Internet Attacks in 2024
24:08
24:08
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
24:08Dive into the key findings of the Greynoise 2025 Mass Internet Exploitation Report. We dissect how attackers are reviving old vulnerabilities, the impact of home router exploits, and the speed at which new vulnerabilities are weaponized. Discover actionable defense strategies for staying ahead of mass internet exploitation. breached.company/mass-in…
…
continue reading

1
All Cybersecurity Problems Are Easy to Fix… With Unlimited Time and Budget
39:09
39:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
39:09All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Adam Holland, former CISO, the Wendy’s Company, now CISO of Ascension Healthcare. In this episode: The long road to influence The effort…
…
continue reading

1
OT/ICS Cybersecurity: Defending Against Evolving Threats
22:13
22:13
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
22:13A deep dive into the latest trends, threat actors, and defense strategies in Operational Technology and Industrial Control Systems cybersecurity. We discuss how geopolitical tensions, ransomware, and hacktivist activities are shaping the threat landscape, and provide actionable insights to improve your organization's security posture. Learn about i…
…
continue reading

1
#222 - 40 Years of Career Advice in 40 Minutes
40:11
40:11
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
40:11In this episode of CISO Tradecraft, G. Mark Hardy shares 15 crucial characteristics to help you succeed in your cybersecurity career and become an effective CISO. From knowing yourself and developing leadership skills to enhancing communications and staying current with trends, Hardy distills decades of wisdom into practical advice. Learn how to na…
…
continue reading

1
Zou ik slagen voor CEH zonder training?
48:05
48:05
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
48:05Ik deed het al eens met CISM, maar zou ik ook slagen voor Certified Ethical Hacker zonder training? In deze aflevering gaan we het hebben over het (denk ik) meest omstreden certificaat in de security-wereld. Zou ik, die totaal geen pentester is, slagen voor CEH? En wat zegt dat over dit certificaat? Luister de aflevering nu of kijk op YouTube: http…
…
continue reading

1
Enterprising Adversaries: Staying Ahead of Evolving Cyber Threats
31:13
31:13
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
31:13Explore the evolving landscape of cyber threats with insights from the CrowdStrike 2025 Global Threat Report. We delve into the tactics, techniques, and procedures of modern adversaries, from social engineering and AI-driven attacks to cloud exploitation and vulnerability exploits. Learn how to proactively defend your organization against these eve…
…
continue reading

1
S7E10 - A Conversation with Bob Davis
28:16
28:16
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
28:16Bob Davis joins us on a special episode to celebrate three years and 184 conversations on The Virtual CISO Moment. Bob is the Partner / Chief Information Security Officer of Franklin CISO Partners, LLC. Franklin CISO Partners provides virtual, fractional, and interim Chief Information Security Officer services to small and medium-sized clients in h…
…
continue reading

1
CERT-EU Unveiling the 2024 Cyber Threat Landscape: Key Trends and Targeted Sectors
28:34
28:34
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
28:34This episode dissects the cyber threat landscape of 2024, drawing insights from a comprehensive analysis of malicious activities targeting Union entities and their vicinity. We explore the major trends, including the rise of cyber espionage and prepositioning the exploitation of zero-day vulnerabilities, and the techniques employed by threat actors…
…
continue reading

1
Black Basta: Inside the Ransomware Gang
19:36
19:36
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
19:36Explore the inner workings of the Black Basta ransomware group through leaked chat logs and technical analysis. Discover their tactics, techniques, and procedures (TTPs), from initial access and lateral movement to data exfiltration and encryption. Learn how the group exploited vulnerabilities, managed internal conflicts, and targeted critical infr…
…
continue reading
In this episode of The New CISO, host Steve Moore sits down with Yannick Herrebaut, Cyber Resilience Manager at the Port of Antwerp-Bruges, to explore his unconventional journey from intern to security leader. Yannick shares how his early passion for technology, sparked by gaming and building his own PCs, laid the foundation for his career in cyber…
…
continue reading

1
Navigating Vietnam's Data Law: Key Compliance for Businesses
19:13
19:13
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
19:13This podcast episode explores Vietnam's new Law on Data, effective July 1, 2025, and its implications for businesses. We'll break down the law's key aspects, including scope of application, digital data definitions, data ownership rights, regulations on cross-border data transfers (especially for "important" and "core" data), and the requirements f…
…
continue reading

1
S7E9 - SMB SME Series - Cary Johnson and Security Awareness Third Party Audits
22:01
22:01
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
22:01In the first installment of the SMB SME Series, phishing awareness training SME Cary Johnson discusses the need for third-party audits of security awareness programs. As he noted in a recent LinkedIn post https://www.linkedin.com/posts/activity-7293297179073392644-dJ6P/ "Cybersecurity awareness programs will never truly be effective if we continue …
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives into one of the most pressing topics in cybersecurity today—Artificial Intelligence (AI) and its impact on the role of a Chief Information Security Officer (CISO). He emphasizes that the key to being an effective CISO is thinking ahead, looking beyond the daily firefighting that many security l…
…
continue reading