…
continue reading
CISO Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
You are not years away from accomplishing your career goals, you are skills away. Learn the Tradecraft to Take Your Cybersecurity Skills to the Executive Level. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
4
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
Join Query CISO Neal Bridges as he explores the world of SecDataOps with different guests each episode. What is SecDataOps? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Soulful CXO explores the intersection of technology, business, and humanity. Each episode features a thoughtful conversation with leaders who share real stories about navigating cybersecurity, leadership pressures, and personal growth. Hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert, the show invites listeners to reflect on how intention, purpose, and values shape the way we lead. Through candid insights and vulnerable moments, guests reveal the challenges they have face ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
Is the cyber talent ecosystem broken? [CISO Perspectives]
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36Please enjoy this encore of CISO Perspectives We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episod…
…
continue reading
1
S8E2 - When Ransomware Gets Real: Zach Lewis on Surviving a LockBit Attack
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35What happens when a routine IT problem turns into a full-blown ransomware crisis? In this episode of The Virtual CISO Moment, Greg Schaffer sits down with Zach Lewis, CIO, CISO, and author of Locked Up, to explore the reality of leading through a LockBit ransomware attack—without the benefit of hindsight. Zach takes listeners inside the moment thin…
…
continue reading
1
Navigating the 2026 Intelligence Supercycle: Data, Law, and the New Global Marketplace
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55This episode explores the transition into the "Intelligence Supercycle," where organizations are deploying security AI and automation to identify data breaches 80 days faster and mitigate nearly $1.9 million in potential losses per incident. We delve into the shifting global regulatory landscape, highlighting how aggressive enforcement in the U.S.,…
…
continue reading
1
Holiday Bonus: Cyber Safety at Home — Legal + Security Lessons from Real Life
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43In this special Christmas mini-episode, host Shawn Tuma is joined by his son, Ryan, for a candid conversation about cyber safety at home: screen-time limits, risky chats in games, not believing everything online, and why he doesn’t have his own YouTube channel—practical lessons that mirror how GCs and CISOs collaborate to govern risk at work. See h…
…
continue reading
1
Managing Risk Has Been a Priority Ever Since You Asked About It (LIVE in NYC)
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Matthew Southworth, CSO, Priceline. Joining them is sponsored guest, Saket Modi, CEO, Safe Security. This episode was recorded live at FAIRCON25 in NYC. In this episode: AI won't stay broken Identity before intelligence People…
…
continue reading
By N2K Networks
…
continue reading
1
Keys Without People — John Heasman on Cleaning Up Non-Human Access - John Heasman - CSP #220
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Title: Keys Without People" — John Heasman on Cleaning Up Non-Human Access Summary: John breaks today's non-human identity mess into three buckets: core tools your business runs on, old/one-off integrations that linger, and engineer tokens left behind. His playbook is simple: decide what's truly critical, assign a clear owner, keep access minimal, …
…
continue reading
1
#267 - Busy is the New Stupid (with Ross Young)
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10You’re working longer hours than ever… yet somehow getting less done. Sound familiar? In this episode of CISO Tradecraft, we break down why busy has become the enemy of effectiveness and why “Busy is the New Stupid.” This isn’t about working harder or faster. It’s about understanding how your time gets attacked, how distractions persist, and how ev…
…
continue reading
1
Safety Third: Why Security Shouldn't Be Your Top Priority
1:06:54
1:06:54
Play later
Play later
Lists
Like
Liked
1:06:54In this episode of The New CISO, host Steve Moore speaks with Alex Rice, Founder, CTO, and CISO at HackerOne, about challenging one of cybersecurity's most deeply held beliefs—that security should be the top priority. Drawing from his journey building security programs at Facebook and founding HackerOne, Alex introduces the "safety third" philosoph…
…
continue reading
1
Why Intellectual Property Is the New Cybersecurity Battleground
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44In this episode of Life of a CISO, Dr. Eric Cole explains why intellectual property is becoming the most important cybersecurity priority for organizations as artificial intelligence accelerates innovation and imitation. As AI makes products, services, and content easier to replicate, traditional approaches to data security are no longer enough. Dr…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode: Consequence, not…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16By John Verry
…
continue reading
1
Why CISOs Are Rethinking Managed Security: Check Point’s Open Garden Approach | Lenny Krol
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of The Professional CISO Show, David Malicoat is joined by Lenny Krol, Head of Services Sales at Check Point Software, recorded live at GPSEC DFW. Lenny breaks down how Check Point’s services organization supports customers across both Check Point and third-party technologies, why an open ecosystem matters, and how CISOs can realist…
…
continue reading
Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook user…
…
continue reading
Leaders may shy away from thinking about insider threats because it means assuming the worst about colleagues and friends. But technology executives do need to confront this problem because insider attacks are prevalent—a recent study claims that in 2024, 83% of organizations experienced at least one—and on the rise. Moreover, AI and deepfakes vast…
…
continue reading
1
The Evolving Threat Landscape – Offensive Security in Action
21:15
21:15
Play later
Play later
Lists
Like
Liked
21:15Defences are only as strong as what you test. Are you ready? Join Rui Shantilal, Group VP Cyber Trust, and guest Bruno Morisson, Global Head of Offensive Security at Devoteam Cyber Trust, as they explore why offensive security has become essential for modern cyber resilience. In this episode, discover how ethical hacking, penetration testing, and r…
…
continue reading
1
University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline
16:40
16:40
Play later
Play later
Lists
Like
Liked
16:40🎙️ University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1042: Today's episode will discuss the latest news: Russia's APT28 Targeting Energy Research Defense Collabo…
…
continue reading
1
Resolving a Conflict Between IT and Cybersecurity | Interview with Jared Leuschen
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, discusses the ongoing conflict between IT operations and cybersecurity governance with Jared Leuschen, CEO and Founder of Blue Tree. They delve into the human component behind security and compliance issues, misalignment and communication gaps within organization…
…
continue reading
On the latest Security Visionaries podcast, host Emily Wearmouth invites Steve Riley back to demystify another key acronym in the AI world: MCP, or model context protocol. They break down what MCP actually is, how it functions, and why it is critical to understanding AI interactions. From there, they pivot into a discussion about the critical secur…
…
continue reading
1
Episode 102: Episode 102 - Part 3 - Security knowledge alone is not enough
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37Richard continues his discussion about the non-security skills you require to be successful in a cyber role.
…
continue reading
1
Instagram denies breach, Sweden detains spying suspect, n8n attack steals OAuth tokens
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Instagram denies breach post-data leak Sweden detains consultant suspected of spying n8n supply chain attack steals OAuth tokens Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. …
…
continue reading
1
Department of Know: Brightspeed investigates breach, Prompt injection woes
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Johna Till Johnson, CEO and Founder, Nemertes (check out the Nemertes substack) and Jason Shockey, CISO, Cenlar FSB. Jason will be speaking at MBA Servicing Solution26 in Texas in late February. Details here. Thanks to our show sponsor, ThreatLocker Want r…
…
continue reading
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mob…
…
continue reading
1
The 2026 Cyber Arms Race: AI, Risk, and Resilience
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58This episode explores how leaders worldwide are adapting to evolving cyber risks, drawing on survey responses from over 800 executives across more than 90 countries. We discuss the acceleration of the cyber arms race, examining how artificial intelligence is simultaneously strengthening defense systems while enabling faster and more sophisticated a…
…
continue reading
1
Keys Without People — John Heasman on Cleaning Up Non-Human Access - John Heasman - CSP #220
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Title: Keys Without People" — John Heasman on Cleaning Up Non-Human Access Summary: John breaks today's non-human identity mess into three buckets: core tools your business runs on, old/one-off integrations that linger, and engineer tokens left behind. His playbook is simple: decide what's truly critical, assign a clear owner, keep access minimal, …
…
continue reading
1
Bridging the Cloud Security Gap with Trend Micro
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integration overhead. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Jason Shockey, CS…
…
continue reading
1
Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43🎙️ Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1041: Today's episode will discuss the latest news: Exploit for VMware Zero-Day Flaws Likely Built a Year Before Publi…
…
continue reading
1
BreachForums database leaked, Instagram breach worries, UK government exempts self
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16BreachForums hacking forum database leaked exposing 324,000 accounts Instagram breach exposes user data, creates password reset panic UK government exempts self from flagship cyber law Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to …
…
continue reading
1
Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was i…
…
continue reading
1
Walking on EggStremes. [Research Saturday]
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
…
continue reading
The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Resear…
…
continue reading
1
Hamid Kashfi on the situation in Iran; Did cyber cause Venezuela blackouts?
2:13:55
2:13:55
Play later
Play later
Lists
Like
Liked
2:13:55(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how i…
…
continue reading
1
The AI-Powered Ecosystem for Continuous Cybersecurity Policy Management
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32Addressing the "cold start" challenge, platforms like GeneratePolicy.com utilize AI to instantly draft customized, framework-aligned security policies while reducing reliance on expensive consultants. To ensure these documents are actually implemented, tools such as SecureCheck convert dense legal text into actionable IT checklists and audit questi…
…
continue reading
1
Microsoft enforces admin MFA, Cisco patches ISE, Illinois breaches self
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Microsoft to enforce MFA for Microsoft 365 admin center sign-ins Cisco patches ISE security vulnerability after PoC release Illinois state agency breaches itself Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt…
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
1
Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan
17:51
17:51
Play later
Play later
Lists
Like
Liked
17:51🎙️ Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1040: Today's episode will discuss the latest news: Australia's Scams Framework Criticized Over Major Exclusio…
…
continue reading
1
Power to the People: Reclaiming Privacy Rights in the Age of AI
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33This episode explores how the United States drifted away from the robust, substantive privacy protections envisioned in the early 1970s, replacing them with ineffective "notice and choice" frameworks that favor government surveillance and corporate profit. As we face a new technological crossroads with artificial intelligence, the discussion reveal…
…
continue reading
1
ESA confirms new data heist, Ni8mare lets hackers hijack n8n servers, Taiwan blames 'cyber army' for intrusion attempts
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03ESA confirms new data heist Ni8mare lets hackers hijack n8n servers Taiwan blames 'cyber army' for intrusion attempts Huge thanks to our sponsor, Hoxhunt Traditional security training fails because it treats employees like the problem. Hoxhunt treats them like the solution. AI-powered simulations mirror actual attacks hitting your inbox. Instant co…
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
1
324 - Governing AI with the Security Dashboard for AI
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27In this episode, we take a look at the brand new Microsoft Security Dashboard for AI. We initially spotted this during Microsoft Ignite 2025, and have been eagerly waiting for it to become available. And here it is! We talk about the what, how, and why of this new capability. (00:00) - Intro and catching up. (02:40) - Show content starts. Show link…
…
continue reading
1
Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42🎙️ Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1039: Today's episode will discuss the latest news: Critical Dolby Vulnerability Patched in Android Devices …
…
continue reading
1
Securing the AI Economy: From the 2025 Holiday Breach Window to 2026’s Autonomous Threats
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22This episode analyzes the 2025 threat landscape, where U.S. data breach costs reached record highs of $10.22 million and cybercriminals utilized the "holiday breach window" to stage sophisticated attacks for the new year. We explore the transition into 2026—projected by experts to be the "Year of the Defender"—where organizations must combat "Agent…
…
continue reading
1
Episode 169: 2026 Cybersecurity Predictions from CIS — Pt 1
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54In Episode 169 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager begin their discussion of 2026 cybersecurity predictions from seven experts at the Center for Internet Security® (CIS®), as shared on the CIS website. Here are some highlights from our episode: 01:05. The impact and promise of artificial intelligence on cyber defense 05:37.…
…
continue reading
1
Quantum Is Coming, Are You Ready? - Ep 183
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02Quantum computing is coming—but what does that actually mean for cybersecurity leaders today? In this episode, Rob Aragao is joined by Morgan Adamski to break down key insights from PwC’s 2026 Global Digital Trust Insights Report and explore why quantum risk belongs on every CISO’s strategic roadmap. From geopolitical uncertainty to the shift from …
…
continue reading
1
UK cyber reset, no MFA is a problem, US cyberattacks on display
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19The UK hits reset on cybersecurity No MFA, Know Problems US may have coordinated cyberattacks with Maduro's arrest Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from…
…
continue reading
1
The AI Rubicon: Navigating the Intelligence Supercycle and the 2026 Threat Landscape
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02The year 2026 marks the entry into the "Intelligence Supercycle," a pivotal era where autonomous AI agents transition from mere tools to independent actors capable of executing complex attacks and defensive workflows at machine speed. Security leaders face a dual pressure: responding to the immediate rise of "portfolio extortion" ransomware and "Sh…
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading
1
S8E1 - Offensive Security in the Age of AI with Corey LeBleu
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45In the Season 8 premiere of The Virtual CISO Moment, host Greg Schaffer sits down with Corey LeBleu, Founder and CEO of Relix Security, to explore how offensive security and penetration testing are evolving in a world shaped by cloud platforms, AI, and “vibe coding.” With more than two decades of hands-on experience in application and network penet…
…
continue reading
1
Cybersecurity resolutions you’ll actually stick to in 2026
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14Happy New Year! 🎉✨ We’re kicking off 2026 with cybersecurity resolutions you’ll actually stick to — no cold plunges, no green juice cleanse, just a handful of tiny ten-minute wins that make a big difference to your privacy and security. We’ve turned the best advice from last season’s guests into a simple, practical checklist. On this episode, you’l…
…
continue reading