Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Adopting Zero Trust Podcasts

show episodes
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Artwork

1
CXOInsights by CXOCIETY

CXOCIETY | FutureCIO FutureCFO FutureIoT

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
CXOCIETY (read "society") is the platform for senior business, technology, finance and operations executives to discuss, share and discover the latest in technology, process and people innovation."CXOInsights" by CXOCIETY is the repository of shared insights and experiences by the best, brightest and most experienced professionals globally. Subscribe to "CXOInsights" by CXOCIETY to keep abreast in the latest in all things innovation.
  continue reading
 
Loading …
show series
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is their sponsored guest, Ash Hunt, vp, strategy, EMEA, Cyera. In this episode: The access creep chal…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Taule, CISO, Luminis Health. In this episo…
  continue reading
 
The ASEAN region’s enterprises are no longer choosing between legacy systems and cloud-native architectures; they are converging them. This is where Zero Trust Network Access (ZTNA) and Cybersecurity Mesh Architecture (CSMA) cease to be competing paradigms and become symbiotic enablers. For ASEAN CISOs and CIOs, this duality is not theoretical—it’s…
  continue reading
 
"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has g…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Kara Sprague, CEO, HackerOne. In this episode: Shadow AI as a control problem Rethinkin…
  continue reading
 
In 2024, there were 440,000 detected cyber threats to critical infrastructure, and the U.S. Critical Infrastructure experienced a surge in attacks, including the Volt Typhoon and Chinese Telecom Network Infiltration. For 2025, projections indicate 30% of critical infrastructure organizations will experience a security breach, and major attacks on t…
  continue reading
 
In 2025 identity has become the new (security) perimeter, making identity security attacks a primary threat vector for organisations throughout the region. Threat actors are targeting user credentials and privileged access pathways, moving beyond traditional network-based assaults to exploit identities as the weakest link. This is forcing CISOs to …
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is CISO Series reporter and CISO herself, Hadas Cassorla. In this episode: …
  continue reading
 
For Chief Operating Officers, CFOs, and heads of warehousing, logistics, and retail across Asia, 2026 will be defined by one overarching theme: strategic resilience through intelligent automation. The region's blistering e-commerce growth, coupled with persistent geopolitical and supply chain volatilities (as highlighted by analysts like BCG regard…
  continue reading
 
In 2025, AI and automation are reshaping Asia’s cybersecurity landscape, empowering both defenders and adversaries. CISOs face intelligent, self-evolving threats—from AI-generated deepfakes to autonomous malware—exploiting the region’s rapid digitalisation and IT/OT convergence. While AI-driven SOAR and predictive analytics enhance response, over-r…
  continue reading
 
While traditional automation and GenAI are making inroads in 2025, Southeast Asian CFOs face persistent efficiency challenges demanding more sophisticated solutions. Agentic AI emerges as a promising, albeit complex, answer by enabling autonomous execution of intricate finance workflows. Its potential lies not just in incremental efficiency gains, …
  continue reading
 
2025 has seen deepfake technology become alarmingly accessible and sophisticated, fuelling a surge in high-impact incidents that erode confidence in institutions, media, and digital interactions. The proliferation of AI-powered deepfakes represents an existential threat to digital trust across Southeast Asia and Hong Kong. Singapore's leadership in…
  continue reading
 
In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to c…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest Mokhtar Bacha, founder and CEO, Formal. In this episode: Access management faces transformat…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and John Overbaugh, CISO, Alpine Investors. Joining us is our sponsored guest, Pukar Hamal, fo…
  continue reading
 
In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Justin Berman, formerly vp of platform engineering and CISO at Thirty Ma…
  continue reading
 
Across APJ boardrooms, the initial excitement around generative AI has hardened into a pressing demand: “Show me the real impact.” Experiments are done, budgets are spent. Now, the C-suite wants tangible results from their AI investments. The answer emerging isn't just smarter automation; it's a leap towards autonomy. Welcome to the era of Agentic …
  continue reading
 
Data centre COOs in Southeast Asia face a dual challenge in 2026: managing rapid AI-driven growth while ensuring sustainability and regulatory compliance. Key challenges include strained local grids unable to meet intense power demands from densified AI workloads, increasing public opposition due to environmental concerns, and complex, uneven regio…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: Legacy infrastructure…
  continue reading
 
In 2026, Southeast Asia and Hong Kong stand at a pivotal moment in the integration of agentic AI, a technology that empowers machines to make autonomous decisions. While organisations can harness agentic AI to streamline operations and enhance customer experiences, they also face significant challenges, including ethical concerns and workforce disp…
  continue reading
 
This 2026, agentic transformation is set to revolutionize Asia's boardrooms, shifting the focus from traditional digital automation to autonomous AI agents capable of decision-making and task execution with minimal human input. This transition promises unparalleled agility and efficiency, empowering organizations to enhance productivity while allev…
  continue reading
 
The global finance function is undergoing profound transformation, driven by technology (AI, automation, blockchain), evolving regulations (ESG, cryptocurrency, data privacy), and heightened demands for strategic insight. In this dynamic landscape, professional certifications and continuous education are no longer merely advantageous; they are fund…
  continue reading
 
In 2026, Asia's digital transformation is not just a trend—it's a thrilling opportunity for CFOs ready to lead their organizations into the future! As the region rises as a global commerce powerhouse, with Singapore paving the way, CFOs face the challenge of navigating geopolitical uncertainties while harnessing groundbreaking innovations like AI-p…
  continue reading
 
In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
  continue reading
 
A unified AI vision serves as the North Star for enterprise-wide AI adoption, ensuring all departments work toward common strategic objectives. Without this alignment, organizations risk fragmented investments, duplicated efforts, and missed opportunities for transformation. A cohesive vision enables CIOs to prioritize initiatives that deliver meas…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Terry O'Daniel, former CISO at Amplitude. In this episode: Beyond prioritization: aligning risk with real…
  continue reading
 
Gartner predicts that by 2026, developers outside formal IT departments will account for at least 80% of the user base for low-code development tools. While citizen developers boost agility, decentralised creation brings new risks in the form of shadow IT, fragmented systems, data silo sprawl and data exposure, and compliance gaps. But with proper …
  continue reading
 
Imagine, it is 2026, a semiconductor plant in Penang, Malaysia is running at peak efficiency—not because of more workers, but because of agentic AI. Autonomous digital agents, each with goals, context, and decision rights, now orchestrate production lines, dynamically rerouting workflows when a machine falters or a shipment delays. These aren’t rul…
  continue reading
 
Artificial intelligence may be the topic that is on the thoughts of leadership in 2024, Agentic AI is quickly becoming the new watercooler discussions among users of the technology looking to answer the question – how do I marry automation and AI so that it benefits “my way of work”? Agentic AI represents the next frontier in enterprise automation …
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is their sponsored guest, Matt Eberhart, CEO, Query. In this episode: Quality over quantity in AI decision-makin…
  continue reading
 
In 2025, Asia’s cybersecurity landscape is shaped by rapid digitalisation, AI adoption, and evolving regulatory frameworks. Regional authorities, such as Singapore’s MAS and South Korea’s National AI Committee, are intensifying enforcement and introducing robust regulations for data privacy, AI governance, and cyber risk management. Businesses face…
  continue reading
 
In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jason Thomas, senior director, technology security, governance, and risk, Cystic Fibrosis Foundation. In th…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital. In this episode: …
  continue reading
 
FutureCIO discussions with CIOs and business leaders in Asia reveal key trends such as strategies revolving around increased AI integration, hybrid cloud adoption for flexibility and compliance, and the growth of edge computing for real-time data processing. Organizations are also prioritizing sustainability and security, with a focus on green clou…
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian. In this episode: The experience prerequisi…
  continue reading
 
In Asia, the rapid adoption of low-code/no-code (LCNC) platforms are transforming digital innovation by enabling faster application development amid developer shortages and rising competition. However, this acceleration introduces significant security risks, including inadequate access controls, unmanaged integrations, and shadow IT, which can bypa…
  continue reading
 
In 2025, the business landscape in Malaysia, Singapore, and much of ASEAN is being reshaped by the rapid evolution of technology, particularly in the areas of artificial intelligence (AI), automation, and advanced analytics. Drawing on valuable lessons learned, organizations are increasingly adopting a hybrid cloud by design approach. This strategy…
  continue reading
 
Three years on since the introduction of ChatGPT and the continuing commoditization of artificial intelligence, Asia’s CIOs and CAIOs continue to face intensified AI pressures. Yet 79% of firms globally report inadequate GPU capacity for AI workloads – signalling critical infrastructure strain. Beyond hardware, fragmented data ecosystems threaten r…
  continue reading
 
All posts and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Steve Knight, former CISO, Hyundai Capital America. In this episode: Streamlining vendor evaluations Moving …
  continue reading
 
In 2025, Asia Pacific CIOs must optimise cloud value delivery amid a $250 billion market surge driven by AI and regulatory demands. With nearly 90% of enterprises adopting multi-cloud strategies, balancing hybrid cloud innovation and stringent data privacy laws is critical. Addressing these challenges requires strategic focus on security, complianc…
  continue reading
 
In 2025/2026, CISOs in Asia face the dual challenge of leveraging AI for innovation while safeguarding against its unique vulnerabilities. As generative AI reshapes the landscape, strategies must evolve to address risks like prompt injection and data poisoning. By prioritizing transparency, compliance, and a security-first culture, CISOs can naviga…
  continue reading
 
Asia is witnessing a shift from transactional execution to strategic business enablement, driven by digitisation, AI, and a focus on enterprise value creation. For organisations considering expanding backoffice and midoffice operations into shared services, the decision between prioritising scalability or resilience is now more critical than ever. …
  continue reading
 
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology. In this episode Embracing gro…
  continue reading
 
In 2025, finance leaders in Singapore and Southeast Asia face a complex landscape shaped by rapid digital transformation, evolving regulatory demands, and heightened emphasis on sustainability. The rise of fintech innovations such as embedded finance, AI-driven personalization, and stablecoins is redefining financial services, while the pressure to…
  continue reading
 
For CFOs overseeing finance operations across Asia Pacific, the Middle East, and Europe, building compliant, scalable finance functions in unfamiliar jurisdictions is a high-stakes challenge. Asset acquisitions, market entries, and decentralized operations demand more than technical expertise—they require navigating fragmented regulations, cultural…
  continue reading
 
In 2025, Chief Information Security Officers (CISOs) and CIOs across Asia are grappling with an increasingly sophisticated ransomware threat landscape. The 2025 Veeam Ransomware Trends report reveals a concerning shift towards smaller, opportunistic groups that exploit vulnerabilities in larger enterprises, making rapid detection and response essen…
  continue reading
 
Asia's CISOs and CIOs face a uniquely complex cyber landscape in 2025. The convergence of AI-driven attacks and deepfakes intensifies disinformation and social engineering threats, demanding adaptive strategies. Simultaneously, securing sprawling IoT ecosystems against supply chain vulnerabilities call for more adaptive, scalable and resilient solu…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Jesse Webb, CISO and svp information systems, Avalon Healthcare Solutions. In th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play