Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
Adopting Zero Trust Podcasts
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
CXOCIETY (read "society") is the platform for senior business, technology, finance and operations executives to discuss, share and discover the latest in technology, process and people innovation."CXOInsights" by CXOCIETY is the repository of shared insights and experiences by the best, brightest and most experienced professionals globally. Subscribe to "CXOInsights" by CXOCIETY to keep abreast in the latest in all things innovation.
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is their sponsored guest, Ash Hunt, vp, strategy, EMEA, Cyera. In this episode: The access creep chal…
…
continue reading

1
How Can Security Vendors Better Stand Out?
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33All links and images can be found on CISO Series. Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Taule, CISO, Luminis Health. In this episo…
…
continue reading

1
PodChats for FutureCISO: Zero Trust and Cybersecurity Mesh: A dual shield for cloud security
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05The ASEAN region’s enterprises are no longer choosing between legacy systems and cloud-native architectures; they are converging them. This is where Zero Trust Network Access (ZTNA) and Cybersecurity Mesh Architecture (CSMA) cease to be competing paradigms and become symbiotic enablers. For ASEAN CISOs and CIOs, this duality is not theoretical—it’s…
…
continue reading

1
A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has g…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Kara Sprague, CEO, HackerOne. In this episode: Shadow AI as a control problem Rethinkin…
…
continue reading

1
PodChats for FutureCISO: Resilience in Action: Critical Infrastructure Defence in 2026
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52In 2024, there were 440,000 detected cyber threats to critical infrastructure, and the U.S. Critical Infrastructure experienced a surge in attacks, including the Volt Typhoon and Chinese Telecom Network Infiltration. For 2025, projections indicate 30% of critical infrastructure organizations will experience a security breach, and major attacks on t…
…
continue reading

1
PodChats for FutureCISO: AI alters identity management strategies
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52In 2025 identity has become the new (security) perimeter, making identity security attacks a primary threat vector for organisations throughout the region. Threat actors are targeting user credentials and privileged access pathways, moving beyond traditional network-based assaults to exploit identities as the weakest link. This is forcing CISOs to …
…
continue reading

1
The Pattern of Early Adoption of Security Tools
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is CISO Series reporter and CISO herself, Hadas Cassorla. In this episode: …
…
continue reading

1
PodChats for FutureIoT: Strategic resilience through intelligent automation
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38For Chief Operating Officers, CFOs, and heads of warehousing, logistics, and retail across Asia, 2026 will be defined by one overarching theme: strategic resilience through intelligent automation. The region's blistering e-commerce growth, coupled with persistent geopolitical and supply chain volatilities (as highlighted by analysts like BCG regard…
…
continue reading

1
PodChats for FutureCISO: AI, Automation, and the Next Generation of Threats
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39In 2025, AI and automation are reshaping Asia’s cybersecurity landscape, empowering both defenders and adversaries. CISOs face intelligent, self-evolving threats—from AI-generated deepfakes to autonomous malware—exploiting the region’s rapid digitalisation and IT/OT convergence. While AI-driven SOAR and predictive analytics enhance response, over-r…
…
continue reading

1
PodChats for FutureCFO: Finance Efficiency: Is Agentic AI the Answer?
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23While traditional automation and GenAI are making inroads in 2025, Southeast Asian CFOs face persistent efficiency challenges demanding more sophisticated solutions. Agentic AI emerges as a promising, albeit complex, answer by enabling autonomous execution of intricate finance workflows. Its potential lies not just in incremental efficiency gains, …
…
continue reading

1
PodChats for FutureCISO: Restoring trust in a world of deception
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:392025 has seen deepfake technology become alarmingly accessible and sophisticated, fuelling a surge in high-impact incidents that erode confidence in institutions, media, and digital interactions. The proliferation of AI-powered deepfakes represents an existential threat to digital trust across Southeast Asia and Hong Kong. Singapore's leadership in…
…
continue reading

1
Understanding Microsoft Zero Trust DNS with Aditi Patange
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to c…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest Mokhtar Bacha, founder and CEO, Formal. In this episode: Access management faces transformat…
…
continue reading

1
How to Deal with Last Minute Compliance Requirements
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and John Overbaugh, CISO, Alpine Investors. Joining us is our sponsored guest, Pukar Hamal, fo…
…
continue reading

1
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
…
continue reading

1
Do You Have a Functional Policy or Did You Just Write One?
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Justin Berman, formerly vp of platform engineering and CISO at Thirty Ma…
…
continue reading

1
PodChats for FutureCIO: How agentic AI redefines enterprise decision-making
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12Across APJ boardrooms, the initial excitement around generative AI has hardened into a pressing demand: “Show me the real impact.” Experiments are done, budgets are spent. Now, the C-suite wants tangible results from their AI investments. The answer emerging isn't just smarter automation; it's a leap towards autonomy. Welcome to the era of Agentic …
…
continue reading

1
PodChats for FutureCOO: Ensuring DC sustainability and regulatory alignment in 2026
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37Data centre COOs in Southeast Asia face a dual challenge in 2026: managing rapid AI-driven growth while ensuring sustainability and regulatory compliance. Key challenges include strained local grids unable to meet intense power demands from densified AI workloads, increasing public opposition due to environmental concerns, and complex, uneven regio…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: Legacy infrastructure…
…
continue reading

1
PodChats for FutureCIO: Accelerating agentic AI adoption in 2026
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10In 2026, Southeast Asia and Hong Kong stand at a pivotal moment in the integration of agentic AI, a technology that empowers machines to make autonomous decisions. While organisations can harness agentic AI to streamline operations and enhance customer experiences, they also face significant challenges, including ethical concerns and workforce disp…
…
continue reading

1
Podchats for FutureCIO: Agentic Transformation: The Next Boardroom Evolution
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02This 2026, agentic transformation is set to revolutionize Asia's boardrooms, shifting the focus from traditional digital automation to autonomous AI agents capable of decision-making and task execution with minimal human input. This transition promises unparalleled agility and efficiency, empowering organizations to enhance productivity while allev…
…
continue reading

1
PodChats for FutureCFO: Succeeding as a finance professional in the AI era
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31The global finance function is undergoing profound transformation, driven by technology (AI, automation, blockchain), evolving regulations (ESG, cryptocurrency, data privacy), and heightened demands for strategic insight. In this dynamic landscape, professional certifications and continuous education are no longer merely advantageous; they are fund…
…
continue reading

1
PodChats for FutureCFO: Asia as the Nexus of Global Commerce
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21In 2026, Asia's digital transformation is not just a trend—it's a thrilling opportunity for CFOs ready to lead their organizations into the future! As the region rises as a global commerce powerhouse, with Singapore paving the way, CFOs face the challenge of navigating geopolitical uncertainties while harnessing groundbreaking innovations like AI-p…
…
continue reading

1
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
…
continue reading

1
PodChats for FutureCIO: The Critical Need for a Unified AI Vision
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58A unified AI vision serves as the North Star for enterprise-wide AI adoption, ensuring all departments work toward common strategic objectives. Without this alignment, organizations risk fragmented investments, duplicated efforts, and missed opportunities for transformation. A cohesive vision enables CIOs to prioritize initiatives that deliver meas…
…
continue reading

1
Cybersecurity Has a Prioritization Problem
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Terry O'Daniel, former CISO at Amplitude. In this episode: Beyond prioritization: aligning risk with real…
…
continue reading

1
PodChats for FutureCIO: Strategies for LCNC audit workflow builders in 2026
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33Gartner predicts that by 2026, developers outside formal IT departments will account for at least 80% of the user base for low-code development tools. While citizen developers boost agility, decentralised creation brings new risks in the form of shadow IT, fragmented systems, data silo sprawl and data exposure, and compliance gaps. But with proper …
…
continue reading

1
PodChats for FutureCOO: Driving next-gen automation with Agentic AI
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40Imagine, it is 2026, a semiconductor plant in Penang, Malaysia is running at peak efficiency—not because of more workers, but because of agentic AI. Autonomous digital agents, each with goals, context, and decision rights, now orchestrate production lines, dynamically rerouting workflows when a machine falters or a shipment delays. These aren’t rul…
…
continue reading

1
PodChats for FutureCIO: Agentic process automation and how to get started (for a CIO)
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43Artificial intelligence may be the topic that is on the thoughts of leadership in 2024, Agentic AI is quickly becoming the new watercooler discussions among users of the technology looking to answer the question – how do I marry automation and AI so that it benefits “my way of work”? Agentic AI represents the next frontier in enterprise automation …
…
continue reading

1
How Can AI Provide Useful Guidance from Fragmented Security Data?
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is their sponsored guest, Matt Eberhart, CEO, Query. In this episode: Quality over quantity in AI decision-makin…
…
continue reading

1
PodChats for FutureCISO: Developing a Resilient Cybersecurity Roadmap
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33In 2025, Asia’s cybersecurity landscape is shaped by rapid digitalisation, AI adoption, and evolving regulatory frameworks. Regional authorities, such as Singapore’s MAS and South Korea’s National AI Committee, are intensifying enforcement and introducing robust regulations for data privacy, AI governance, and cyber risk management. Businesses face…
…
continue reading

1
Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
…
continue reading

1
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jason Thomas, senior director, technology security, governance, and risk, Cystic Fibrosis Foundation. In th…
…
continue reading

1
What Are the Cybersecurity Trends We Need To Follow?
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital. In this episode: …
…
continue reading

1
PodChats for FutureCIO: AI-hybrid cloud: Asia’s next innovation engine
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35FutureCIO discussions with CIOs and business leaders in Asia reveal key trends such as strategies revolving around increased AI integration, hybrid cloud adoption for flexibility and compliance, and the growth of edge computing for real-time data processing. Organizations are also prioritizing sustainability and security, with a focus on green clou…
…
continue reading

1
Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian. In this episode: The experience prerequisi…
…
continue reading

1
PodChats for FutureCIO: Managing Low-Code/No-Code risks
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In Asia, the rapid adoption of low-code/no-code (LCNC) platforms are transforming digital innovation by enabling faster application development amid developer shortages and rising competition. However, this acceleration introduces significant security risks, including inadequate access controls, unmanaged integrations, and shadow IT, which can bypa…
…
continue reading

1
PodChats for FutureCIO: The business imperative of embracing hybrid cloud by design
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23In 2025, the business landscape in Malaysia, Singapore, and much of ASEAN is being reshaped by the rapid evolution of technology, particularly in the areas of artificial intelligence (AI), automation, and advanced analytics. Drawing on valuable lessons learned, organizations are increasingly adopting a hybrid cloud by design approach. This strategy…
…
continue reading

1
PodChats for FutureCIO: Data integration as an enabler of successful AI adoption
14:22
14:22
Play later
Play later
Lists
Like
Liked
14:22Three years on since the introduction of ChatGPT and the continuing commoditization of artificial intelligence, Asia’s CIOs and CAIOs continue to face intensified AI pressures. Yet 79% of firms globally report inadequate GPU capacity for AI workloads – signalling critical infrastructure strain. Beyond hardware, fragmented data ecosystems threaten r…
…
continue reading

1
What's the Most Efficient Way to Rate Third Party Vendors?
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27All posts and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Steve Knight, former CISO, Hyundai Capital America. In this episode: Streamlining vendor evaluations Moving …
…
continue reading

1
PodChats for FutureCIO: Optimise cloud for value delivery
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30In 2025, Asia Pacific CIOs must optimise cloud value delivery amid a $250 billion market surge driven by AI and regulatory demands. With nearly 90% of enterprises adopting multi-cloud strategies, balancing hybrid cloud innovation and stringent data privacy laws is critical. Addressing these challenges requires strategic focus on security, complianc…
…
continue reading

1
PodChats for FutureCISO: Navigating the AI imperative
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38In 2025/2026, CISOs in Asia face the dual challenge of leveraging AI for innovation while safeguarding against its unique vulnerabilities. As generative AI reshapes the landscape, strategies must evolve to address risks like prompt injection and data poisoning. By prioritizing transparency, compliance, and a security-first culture, CISOs can naviga…
…
continue reading

1
PodChats for FutureCOO: Balancing scalability-resilience: The shared services conundrum
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22Asia is witnessing a shift from transactional execution to strategic business enablement, driven by digitisation, AI, and a focus on enterprise value creation. For organisations considering expanding backoffice and midoffice operations into shared services, the decision between prioritising scalability or resilience is now more critical than ever. …
…
continue reading

1
Don't Ask "Can" We Secure It, But "How" Can We Secure It
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology. In this episode Embracing gro…
…
continue reading

1
PodChats for FutureCFO: Strategic moves CFOs are making amid Southeast Asia volatility
17:08
17:08
Play later
Play later
Lists
Like
Liked
17:08In 2025, finance leaders in Singapore and Southeast Asia face a complex landscape shaped by rapid digital transformation, evolving regulatory demands, and heightened emphasis on sustainability. The rise of fintech innovations such as embedded finance, AI-driven personalization, and stablecoins is redefining financial services, while the pressure to…
…
continue reading

1
PodChats for FutureCFO: Building Finance Functions in Unfamiliar Jurisdictions
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11For CFOs overseeing finance operations across Asia Pacific, the Middle East, and Europe, building compliant, scalable finance functions in unfamiliar jurisdictions is a high-stakes challenge. Asset acquisitions, market entries, and decentralized operations demand more than technical expertise—they require navigating fragmented regulations, cultural…
…
continue reading

1
PodChats for FutureCISO: AI-powered Ransomware: Time to rethink data resilience
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28In 2025, Chief Information Security Officers (CISOs) and CIOs across Asia are grappling with an increasingly sophisticated ransomware threat landscape. The 2025 Veeam Ransomware Trends report reveals a concerning shift towards smaller, opportunistic groups that exploit vulnerabilities in larger enterprises, making rapid detection and response essen…
…
continue reading

1
PodChats for FutureCISO: Unlocking cyber resilience essentials for Asia's CISOs and CIOs
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06Asia's CISOs and CIOs face a uniquely complex cyber landscape in 2025. The convergence of AI-driven attacks and deepfakes intensifies disinformation and social engineering threats, demanding adaptive strategies. Simultaneously, securing sprawling IoT ecosystems against supply chain vulnerabilities call for more adaptive, scalable and resilient solu…
…
continue reading

1
Has the Shared Security Model for SaaS Shifted?
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Jesse Webb, CISO and svp information systems, Avalon Healthcare Solutions. In th…
…
continue reading