Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
The Awareness Angle makes cybersecurity simple. Hosted by Anthony and Luke, we break down security awareness stories, from phishing scams to data breaches, and share practical tips to keep colleagues and employees safe online. We focus on tackling human risk, building a security culture, and making security easy to understand. Whether you’re new to security awareness or want fresh ideas, join us for relatable advice, real-world examples, and strategies to protect your data and stay ahead of ...
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
The Bid Picture with Bidemi Ologunde

CHIP STORY Media & Rainmaker Podcasts

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
The New CISO

Steve Moore

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Constellations is your connection to the innovators, business leaders, entrepreneurs and policy makers who are making—and remaking—today’s satellite and space networks. Whether you’re in the industry or just have a desire to learn, this podcast is for you. For more information and to subscribe to the biweekly newsletter go to www.ConstellationsMag.com
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork
 
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Packet Protector

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Welcome to Lighting it Up, where host Jennifer Cox brings you into insightful conversations with powerful, innovative, and inspiring people from the tech world and beyond. This podcast highlights the journeys, challenges, and successes of those who are shaping the future—covering everything from navigating neurodiversity to leading with impact. Each episode features candid discussions, practical advice, and fresh perspectives on thriving in today’s fast-evolving landscape. Whether you’re a s ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
  continue reading
 
Artwork

51
Cybility Savvy

Michala Liavaag

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Welcome to the What’s Next! Podcast. I’ve met so many brilliant people as I traveled the globe and have had some fascinating conversations that I’ve wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
  continue reading
 
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We’ll help you find it without having to abandon the technology that makes life easy, convenient and connected. Join the movement today at techwellness.com
  continue reading
 
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
  continue reading
 
Artwork

1
CvCISO Podcast

SecurityStudio

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Artwork

1
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
Artwork

1
Meraki Unboxed

Cisco Meraki

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Welcome to Charter Engage: Know IT, the new podcast series from Charter (www.charter.ca), an award-winning technology solutions integrator established in 1997 in Victoria, BC, Canada. Our mission is to align people, process, and technologies to build better organizations, enhance communication, boost operational performance, and modernize businesses. Leveraging a design thinking methodology and a human-centered approach, our team of experts drives successful business transformation for clien ...
  continue reading
 
Loading …
show series
 
In this episode, host Joseph Tromba is joined by Stephen Brown, Director of Cyber and Physical Security at SERC, to explore the role of cybersecurity in protecting the electric grid. As threats in the digital world evolve, safeguarding systems and data become increasingly critical; not only for personal security, but also for maintaining the reliab…
  continue reading
 
Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report. May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup rapidly gained ground, while established groups like Qilin deployed advanced loaders like NETXLOADER and SmokeLoa…
  continue reading
 
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
  continue reading
 
Bias is everywhere—on the surface and deep under it. But what if you could spot it… before it affects your life? In this episode of ask socialprofiler, we explore how our AI-powered platform uncovers people’s real interests, values, and even subtle biases—just from public social media data. No guesswork. No invasions. Just digital facts. 🔍 Whether …
  continue reading
 
Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
  continue reading
 
James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
  continue reading
 
CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently harvests browser-stored passwords, cookies, credit card details, Wi-Fi credentials, and session tokens from…
  continue reading
 
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
  continue reading
 
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
  continue reading
 
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
  continue reading
 
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
  continue reading
 
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
  continue reading
 
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
  continue reading
 
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
  continue reading
 
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
  continue reading
 
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
  continue reading
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
  continue reading
 
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
  continue reading
 
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
  continue reading
 
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
  continue reading
 
Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
  continue reading
 
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
  continue reading
 
Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
  continue reading
 
Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
  continue reading
 
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
  continue reading
 
Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
  continue reading
 
This week, The Awareness Angle dives into NHS breaches, dodgy shortcut files, and why fake CAPTCHAs are the new phishing frontier. 🧑‍⚕️ NHS Professionals Breached – Attackers spent 13 months undetected inside the UK’s largest NHS staffing agency. We break down how they got in, why Active Directory matters, and what took so long to tell anyone. 🖥️ S…
  continue reading
 
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
  continue reading
 
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
  continue reading
 
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
  continue reading
 
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
  continue reading
 
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
  continue reading
 
System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
  continue reading
 
Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
  continue reading
 
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
  continue reading
 
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
  continue reading
 
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
  continue reading
 
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
  continue reading
 
Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers and key risk indicators (KRIs). A risk register is a living document that catalogs identified risks, their likelihood, potential impact, status, ownership, and mitigation plans. It enables organizati…
  continue reading
 
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both qualitative methods (like high/medium/low ratings and heat maps) and quantitative techniques (like Single Loss Expectancy, Annualized Loss Expectancy, and Annualized Rate of Occurrence). We explain how the…
  continue reading
 
Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of assessments and how they’re conducted. We start by comparing ad hoc, recurring, one-time, and continuous assessments, each of which serves different operational or compliance needs. We explain how to scope…
  continue reading
 
Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In this episode, we explain how to identify risks, evaluate their likelihood and impact, and decide whether to accept, avoid, mitigate, or transfer them. We cover key concepts like threat, vulnerability, a…
  continue reading
 
Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In this episode, we examine the key roles involved in managing data and systems securely, including data owners, custodians, stewards, processors, and controllers. Data owners are responsible for setting c…
  continue reading
 
Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episode, we explore governance structures such as boards, steering committees, and cross-functional security councils, each playing a role in shaping strategy, prioritizing risks, and allocating resources.…
  continue reading
 
Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essential. In this episode, we explore how organizations maintain governance effectiveness by regularly reviewing policies, tracking their implementation, and auditing their relevance. We cover methods like poli…
  continue reading
 
Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In this episode, we explore regulatory requirements (like GDPR, HIPAA, and PCI-DSS), industry standards, and legal obligations that influence security architecture, policies, and practices. We also cover how…
  continue reading
 
Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding to specific threats or performing security tasks. In this episode, we explain the difference between general procedures (e.g., user onboarding or access review) and incident-specific playbooks (e.g., m…
  continue reading
 
Standards and controls turn high-level policy into actionable, enforceable security, and in this episode, we explore how physical controls and documented standards create consistent, measurable protection. We discuss the value of security standards like password complexity requirements, encryption levels, and access review intervals that ensure sys…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play