Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
…
continue reading
Career Pathways In Cybersecurity Podcasts
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
Emerging Tech Unpacked is a podcast that aims to demystify new and emerging technologies and feature incredible women in STEM (science, technology, engineering & mathematics) leadership. It aims to inform, engage, and inspire people to learn more about the latest innovations that will impact their professional and personal lives, and to hear inspiring stories from diverse experts and their career pathways. Hosted by Lucy Lin, a STEM communicator and educator, join us to hear how you can deve ...
…
continue reading
These podcasts bring you the full audio from World Economic Forum events, including the Annual Meeting in Davos.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Essential listening for anyone thinking about pursuing their CPA license, this is the official podcast for the CPA Exam brought to you by the AICPA. Contact us at [email protected].
…
continue reading
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
1
Season 2 Episode 17: From Campus to Career: Interview Tips That Work
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04Ready to turn your education into opportunity? Talent solutions experts share practical interview prep tips based on extensive industry experience and offer real-world answers to your most pressing interview questions. This episode is facilitated by Hunter Richardson (Accounting and Computer Science student at the Georgia Institute for Technology) …
…
continue reading
1
Muted to Unmuted: Finding Your Voice in Cybersecurity
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37If you’ve ever felt like the odd one out in tech, this conversation will feel like oxygen. Akira joins us to share how a shy kid, bullied for being different, found sanctuary in two unlikely rooms—the choir room and the computer lab—and turned that mix of voice and logic into a career leading application security. We map the path from opera trainin…
…
continue reading
In 2024, 72% of Chinese consumers expressed trust in AI and 90% considered autonomous driving beneficial, while only 32% of US consumers reported trust in AI and acceptance rates for autonomous driving remained lower in Germany, the US and Japan than in China. What factors are driving these regional differences and how might they shape the speed an…
…
continue reading
Welcome to the Cyber Journey Podcast. This is where real people in cybersecurity share how they actually got here, what they learned along the way, and what they wish someone had told them at the start. If you are trying to break into cyber, change directions in your career, or just figure out what is real in all the noise, you are in the right pla…
…
continue reading
1
Hearing Innovations Unpacked: Listening For the Future of Sound
1:07:47
1:07:47
Play later
Play later
Lists
Like
Liked
1:07:47Send us a text Curious how artificial intelligence and wearable tech are making hearing effortless? Join Emerging Tech Unpacked host Lucy Lin and guest Nicky Chong-White, Principal Engineer at the National Acoustic Laboratories (NAL), as they dive into the latest hearing innovations, AI hearing aids, live captioning apps, and game-changing wearable…
…
continue reading
1
Fear into Fluency: Building Real Cyber Literacy
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27Panic is not a security strategy. We sit down with Craig Taylor, co-founder of Cyberhoot and longtime virtual CISO, to unpack a people-first blueprint that replaces shame and fear with positive reinforcement, practical safeguards, and repeatable habits. Craig draws on his psychology background to explain why short, gamified exercises build muscle m…
…
continue reading
1
#89 – Is The Expanding Quantum Computing Workforce Your Next Career Move?
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Do you think Quantum Computing jobs are just for PhD's and physics geniuses? Not anymore. Your current SaaS, business, or marketing skills are desperately needed to build this new industry. Izhar Medalsy tells us how to jump careers, and why the new quantum computing industry is already exciting.By Extra Something Media
…
continue reading
1
Season 2 Episode 16: CPA Pathways: Your Questions, Our Answers
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16Want to know more about the evolving landscape of CPA licensure? Tune in to learn about the current pathways to licensure, how states are rolling out the newest option, and what mobility means for your career. Whether you're just starting out or preparing for your next move, our guest speaker offers practical advice, transition tips, and resources …
…
continue reading
1
Building Cyber-Ready Partnerships for Small and Medium Businesses
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44In this episode of Pathways-2-Partnership (P2P), we speak with Mariano Mattei, VP of Cyber Initiatives for Eccalon and Project Spectrum, the DoD OSBP-endorsed cybersecurity platform supporting companies entering or operating within the defense industrial base. Mariano breaks down the evolving cyber landscape, the rising expectations around complian…
…
continue reading
1
#88 – Why We Need Quantum Sensing to Support GPS
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00Someone threatened a world leadser's flight by jamming her plane's GPS system. In Episode 88 of DIY Cyber Guy, David Schropfer and Q-CTRL's Aravind Ratnam reveal how quantum sensing could make global navigation jam-proof and redefine aviation safety using a the earth's natural magnetic field.By Extra Something Media
…
continue reading
1
Calm Under Fire: The Psychology of Thriving in Cybersecurity
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37Ever wonder why your brain feels sharp at 2 p.m. triaging alerts but foggy by 7 p.m. at home? We sit down with psychologist and behavioral scientist Dr. Sara Rabinovich to unpack the hidden cost of constant vigilance—and the small, evidence-based resets that bring your nervous system back online. Sara works with high-stress sectors like cybersecuri…
…
continue reading
1
Season 2 Episode 15: Q&A with a CPA: Sim-ple Steps to TBS Success
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19Learn how to master simple steps to TBS success. Listen to this episode in the "Q&A with a CPA" series for helpful guidance on task-based simulations on the CPA Exam. This episode is hosted by Liz Burkhalter (Director CPA Pipeline, AICPA) who is joined by guest, Lori Kelly (Senior Manager Examinations, AICPA). Bonus resource: Be sure to check out a…
…
continue reading
1
The ‘so what’ behind the Rapid Innovation Accelerator – Miami (RIA-M)
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44In this episode, Solomon Stavis, Director of the Rapid Innovation Accelerator - Miami (RIA-M), joins us to discuss how the RIA-M is helping emerging and non-traditional businesses and universities successfully navigate and access the federal contracting space. This podcast unpacks the 'so what' behind the RIA-M’s impact, from helping companies subm…
…
continue reading
1
Season 2 Episode 14: Q&A with a CPA: Rule the REG
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56Getting ready to test for the Regulation (REG) section of the CPA exam? Tune in to this episode, hosted by Liz Burkhalter (Director CPA Pipeline, AICPA) with guest Irina Moyseyenko (Senior Manager Examinations, AICPA), to understand what to expect. For additional resources: STUDENTS Register for free AICPA student affiliate membership here. Check o…
…
continue reading
1
#87: How to Use AI to Create a Competitive Advantage Without Losing Control
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22AI can fuel your edge—or leak your data. In this episode, RealVNC CPO/CTO Neil Gad joins David to unpack zero-trust, workspace segmentation, and why 94% of orgs saw identity/access incidents last year. Learn concrete steps to harness AI without losing control.By Extra Something Media
…
continue reading
1
Annual Meetings of the Global Future Councils and Cybersecurity: Opening Plenary
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Amid major geoeconomic and geopolitical shifts, compounded by rapid technological advancements, the need for agile, collaborative and cross-disciplinary thinking has never been more urgent. What steps are required to foster constructive, iterative dialogue in an era of rapid change and uncertainty? Speakers: Robert M. Lee, Chief Executive Officer a…
…
continue reading
1
The Groundbreaker: Lessons from the Many Layers of Cyber
48:08
48:08
Play later
Play later
Lists
Like
Liked
48:08Careers aren’t linear, and the most resilient defenders are forged in the messy middle. We sit down with Andreae Pohlman—Air Force veteran, former Microsoft incident responder, and enterprise security advisor—to trace a path from identity trenches to global ransomware recovery and back to the architecture that holds it all together. Andreae opens t…
…
continue reading
1
Welcome to the A+ Certification Audio Course
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00By Dr. Jason Edwards
…
continue reading
While global debt is forecast to increase to 100% of global GDP by the end of the decade, the economy is facing numerous headwinds, from fragmentation, environmental shocks, demographic pressures and technological disruptions. Speakers: Vera Songwe, Chairperson and Founder, Liquidity and Sustainability Facility Stacey Vanek Smith, Senior Story Edit…
…
continue reading
1
Season 2 Episode 13: Q&A with a CPA: Going FARther
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00Want to go FARther in your CPA Exam journey? Learn all about the Financial Accounting and Reporting (FAR) section of the CPA Exam. Covering the basics and some tips to consider, join Liz Burkhalter (Director CPA Pipeline, AICPA) as she interviews Randi Lockart (Senior Manager Examinations, AICPA) to get the information you need to know. For additio…
…
continue reading
1
#86: Are You Drowning In Account Sprawl, And Don't Know It?
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
…
continue reading
1
Securing America’s Lifelines: Building Resilience in Critical Supply Chain
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23By MoveAmerica
…
continue reading
1
Energy Transition: Amping Up or Powering Down?
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43In 2025, the global energy landscape is being redefined by geopolitical unpredictability, shifting market dynamics and uncertainty around climate ambitions. Assumptions about the speed, scale and direction of the energy transition are being tested as nations recalibrate priorities on energy security, affordability and industrial competitiveness. Sp…
…
continue reading
1
#85 – What Happens When A Fortune 5 Company Fails Cybersecurity 101
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Even Fortune 5 firms fail at Cybersecurity 101. Paul Tracey discusses how small businesses and even home users can block the same attacks.By Extra Something Media
…
continue reading
1
#84 - Is Your Data Secure When You Use AI?
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52Is Your Data Secure When You Use AI? Navy intel veteran, engineer, and attorney Cordell Robinson reveals how AI handles your data, what to share, and practical steps to protect privacy, comply with standards, and avoid mistakes.By Extra Something Media
…
continue reading
1
Season 2 Episode 12: Q&A with a CPA: Trust But Verify: Cracking the AUD Code
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Do you have questions about the Auditing and Attestation (AUD) section of the CPA Exam? Learn about the content areas it covers, structure of the exam, and a few tips to consider as you prepare for exam day. This episode is hosted by Liz Burkhalter (Director CPA Pipeline, AICPA) who is joined by guest, Jennifer Bukowski (Senior Manager Examinations…
…
continue reading
An uncertain geopolitical era has emerged, marked by shifting alliances, volatile economic policies and weakening multilateral cooperation. This moment calls for stakeholders to identify steps to strengthen global security and stability. What paths exist for continued security cooperation and how are organizations adapting to operate more effective…
…
continue reading
From tariffs to territory, political and economic tensions between countries are deepening as the geopolitical landscape enters a new era of uncertainty. What are the pre-eminent political shifts and under-recognized trends for stakeholders to look out for and how might they shape economies? Speakers: Graham Allison, Douglas Dillon Professor of Gov…
…
continue reading
1
The Mentor’s Map: Empowering Pathways to Cyber
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Chris Lemon's cybersecurity journey defies conventional paths. As Director of Security Engineering at Secure Yeti and an educator at City Colleges of Chicago, she's building bridges between education and employment while championing diversity in tech. What makes Chris's perspective so valuable is her unique background. Before entering cybersecurity…
…
continue reading
1
Entering the Federal Supply Chain: Top 5 Essentials for Dual-Use Manufacturers (
23:56
23:56
Play later
Play later
Lists
Like
Liked
23:56By MoveAmerica
…
continue reading
Global public debt stands at around 94% of GDP, constraining governments' ability to fund critical growth-promoting investment in infrastructure, education and technology. How can innovative financing, alongside global trade and investment strategies, mobilize resources to meet development goals? This is the full audio from a session at the AMNC25 …
…
continue reading
1
Season 2 Episode 11: Q&A with a CPA: Exploring the CPA Exam Disciplines
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Are you curious to learn more about the three Discipline sections on the CPA Exam? In this episode, learn about the focus of each discipline, resources available to you, and planning your path to CPA success. This episode is facilitated by Hunter Richardson (Accounting and Computer Science student at the Georgia Institute for Technology) who is joi…
…
continue reading
1
#83 - Zero Cost Pathway to American Cybersecurity
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Frustrated by cybersecurity losses? Guest Larry Clinton, President of the Internet Security Alliance (ISA) proposes a zero-cost solution. By eliminating redundant regulations and creating a tuition-for-service program, we can enhance our defenses and train 10,000 new cyber pros annually.By Extra Something Media
…
continue reading
A decade after the Paris Agreement, policies and politics have evolved but the associated risks from climate change, pollution and biodiversity loss remain. Although the narrative is shifting towards energy security, national and regional actors are still looking towards innovative solutions to climate challenges. How are government and business co…
…
continue reading
1
#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Craig Taylor.By Extra Something Media
…
continue reading
1
Negative Four to Secure: Starting Your Cybersecurity Journey
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25In this episode of Pathways-2-Partnership from MoveAmerica, we chat with Chris Barber, Chief Nerd and founder, of the award-winning IT services firm Cheaper Than a Geek®. With more than 20 years of experience helping small businesses navigate the digital landscape, Chris shares practical guidance on how organizations can take their first steps towa…
…
continue reading
A new wave of start-ups is emerging, built around powerful AI agents capable of autonomous decision-making, dynamic collaboration and end-to-end task execution. These agents aren't just supporting workflows – they're becoming the digital workforce that runs entire business functions. How are business models evolving when AI agents take the lead in …
…
continue reading
1
Season 2 Episode 10: Q&A with a CPA: A Day in the Life of a Cybersecurity Entrepreneur
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Discover what a typical day looks like in your dream career – insights, experiences and expert advice await! Are you ready to dive into the exciting world of cybersecurity? Hear an expert share his personal journey into the world of accounting, including his fascinating work as an entrepreneur in the area of cybersecurity and compliance. This episo…
…
continue reading
Agentic AI is disrupting entry-level jobs and evolving job markets are changing traditional career paths, leaving young people uncertain about the future. How do we turn AI-driven disruption into career opportunities for young people? Speakers: Zhang Dandan, Professor, Deputy Dean, National School of Development, Peking University Rahul Attuluri, C…
…
continue reading
1
The Grid Guardian: Strength through The Circle
47:23
47:23
Play later
Play later
Lists
Like
Liked
47:23What if protecting yourself online wasn't mysterious or intimidating, but as normal as locking your front door? Dd Budiharto, founder of CyberPoint Advisory LLC and self-proclaimed "cybersecurity equivalent of a Swiss army knife," is on a mission to make that reality. Dd's remarkable journey spans continents and careers – from arriving in America w…
…
continue reading
1
Hacking Yeast With A Microbiologist: How Microbes Are Powering the Future of Food
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30Send us a text Think yeast is just for bread and beer? Think again! Discover how this tiny microorganism is driving the future of biofuels, cleaning up oil spills, transforming sustainable food, and creating eco-friendly materials. On Emerging Tech Unpacked, host Lucy Lin dives deep into the incredible world of “yeast hacking” with trailblazing mic…
…
continue reading
1
Mitigating FOCI: How to Protect Your Business and IP
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55What do you do when your business already has FOCI exposure? In this episode of Pathways-2-Partnership, Dr. Christophe McCray walks us through real-world examples of how foreign influence has compromised U.S. innovation—and what companies can do about it. From red flags and risk factors to voting trusts and mitigation strategies, this episode provi…
…
continue reading
1
Episode 138: Scripting and Remote Access — .bat, RDP, SSH, Risks
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
…
continue reading
1
Episode 137: Handling Confidential Materials
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
…
continue reading
1
Episode 136: Communication and Customer Service Skills
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
…
continue reading
1
Episode 135: Data Privacy and Licensing — DRM, Chain of Custody
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
…
continue reading
1
Episode 134: Environmental Controls — Ventilation, Disposal, MSDS
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
…
continue reading
1
Episode 133: Safety Procedures — ESD, Handling, Fire Safety
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
…
continue reading
1
Episode 132: Backup and Recovery Methods — GFS, 3-2-1, Testing
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
…
continue reading
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
…
continue reading