Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork

1
Dare to Leap

Kathy Goughenour

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Dare to Leap, a conversation and community supporting women to create the freedom, flexibility and financial security they desire and deserve. Hosted by Kathy Goughenour, CEO & Founder of Virtual Expert(R) Training. Each week you’ll hear from thought leaders who are offering innovative solutions for the remote workforce, gather best practices from organizations recognized as best in class at leading virtual teams and engage in conversations with all stakeholders when it comes to t ...
  continue reading
 
Artwork
 
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
  continue reading
 
Loading …
show series
 
Ever felt like the pandemic was one massive, global disaster recovery test? You're not alone. In this episode of Cyber After Hours—Securing Remote Workforces: Lessons from the Pandemic—Paul and Evan are joined by their guest, John Vigeant, Chief Executive Officer (CEO) of Login VSI, to dive into how the world of cybersecurity (and office life itsel…
  continue reading
 
Ever wonder why cybercrime feels like it has better customer service than your cable provider? You're not alone! In this episode of Cyber After Hours—The Rise of Cybercrime as a Service and How to Combat It—Paul and Evan are joined by their guest, Rob Davis, SVP and Head of Digital Identity Services at Citizens, share an eye-opening (and occasional…
  continue reading
 
Ever wonder if those dusty legacy systems you’ve been ignoring are one breach away from disaster? In Episode 29 of Cyber After Hours—titled “How to Secure Legacy Systems in a Modern World?”—co-hosts Evan Morgan and Paul Marco dig into the tough questions around outdated tech. They talk about everything from finding the right work-life balance (and …
  continue reading
 
Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really ta…
  continue reading
 
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst int…
  continue reading
 
AI’s a Game-Changer—But Are You Ready for the Catch? AI is showing up faster than your policies can catch up—already embedded in your CRM, your help desk, and maybe even your compliance workflows. It’s powerful. It’s profitable. But it’s also risky as hell if you’re not paying attention. In this episode of Bite Size Security, Mike Fitzpatrick break…
  continue reading
 
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 e…
  continue reading
 
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
  continue reading
 
🎙️ Episode Title: The Silent Threat to Your Bottom Line Podcast: Bite Size Security with Mike Fitzpatrick Episode Summary: In this episode, Mike Fitzpatrick, CEO of NCX Group, pulls back the curtain on one of the most underestimated risks to your business: the assumption that cybersecurity is “just an IT problem.” Mike shares real-world insights fr…
  continue reading
 
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated t…
  continue reading
 
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dy…
  continue reading
 
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving…
  continue reading
 
In this episode of Bite Size Security, Mike Fitzpatrick—CEO of NCX Group and 25-year cyber risk veteran—dives into one of the most common and costly misconceptions in business today: the belief that compliance equals security. We explore: Why simply passing audits or meeting regulatory checklists leaves your business vulnerable Real-world stories o…
  continue reading
 
Welcome Back to Bite Size Security I hope you are all Healthy and well as we End 2020. It’s been a Difficult year for everyone. Especially for Small businesses everywhere in this changing world of growing risks, and now forced into a remote workforce and having to adjust on the fly. In this episode I layout the plan and focus for this podcast going…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and …
  continue reading
 
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly,…
  continue reading
 
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding t…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demysti…
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’l…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
Ever wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs)…
  continue reading
 
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar musta…
  continue reading
 
AI: The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generati…
  continue reading
 
Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s …
  continue reading
 
Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing br…
  continue reading
 
Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfe…
  continue reading
 
Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family dra…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play