Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cio Chat Podcasts

show episodes
 
The Insightful Investor is a weekly podcast hosted by Alex Shahidi, Co-CIO of one of the nation’s leading RIAs. In a conversational, “fireside chat” format, Alex interacts with some of the world’s premier investors and business icons to share market insights rarely found elsewhere. While many investors echo common sentiments, our “insights” include concepts that we believe are counterintuitive, widely misunderstood, or underappreciated. With over two decades of experience managing billions o ...
  continue reading
 
Artwork

1
CIONews

CIONews

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the podcast channel of CIONews, we produce the latest updates in the world of technology and business from CIO perspective. Our show features in-depth discussions with top CIOs, technology leaders, and industry experts who share their insights and experiences on a wide range of topics. We also cover the latest news, and developments in the tech industry. CIONews helps to stay informed and inspired whether you're a seasoned CIO or just starting out in your career, it has something ...
  continue reading
 
"Digital Strategy Unlocked" is a show that helps CIOs and other business leaders take a step back, take a breath, and consider the broader perspective, to rethink how digital can transform businesses. In every episode, we provide cutting-edge insights from global Digital leaders to help increase IT product adoption and accelerate business outcomes.
  continue reading
 
Artwork

1
The Data Files

Practicus Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Data Files explores the rapidly evolving world of data, information and people. A light-hearted limited series hosted by Barry Panayi (Chief Data Officer at John Lewis Partnership) and Tony Cassin-Scott (ex-CIO & CDO, now Advisor). They chat with some of the minds responsible for the past, present and future of the development of the data space and explore what’s worked, what’s not worked, and what the future might hold – both for organisations and for the data profession itself.Find out ...
  continue reading
 
Artwork

1
NTP Podcast

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the NTP Podcast. Each episode highlights the incredible work of talented tech professionals in Australia. We chat with people who are at the top of their game to learn all about their craft—why they’re passionate about their work and what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and see where it may be headed.
  continue reading
 
The future of manufacturing is digital. We explore the technologies that are transforming fabrication, from advanced 3D printing to AI-assisted design, and get to know the leaders who are bringing them to the factory floor. The Digital Factory is hosted by Jon Bruner and presented by Formlabs.
  continue reading
 
Artwork

1
Clause & Effect

SimpliContract

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Guru Venkatesan & Matthias Toppert - co-founders of SimpliContract as they make biweekly dives into the ever-evolving world of business contracts and their impact. Listen in as they chat with industry experts with decades of experience in law, sales, procurement, and finance and bring you plausible solutions backed by real life experiences in contracts.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
In this episode, Chetna explains how new automation strategies are evolving not only productivity, but the role of the CIO. Chetna emphasizes the importance of data quality and security when scaling a fast-growing company, as well as transparency and partnership in vendor relationships. About the Guest: Chetna is an award winning CIO, board member,…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Howard is co‑founder of Tennenbaum Capital Partners, where he helped build one of the early success stories in private credit before leading its integration into BlackRock. In this episode, he shares how private credit grew from a niche strategy into a cornerstone of modern portfolios, the lessons learned through that evolution, and what innovation…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
From a childhood without electricity to co-founding a listed betting company, Oliver Shanahan’s story is a masterclass in technical grit and commercial pivots. As the Group Head of Cybersecurity and Infrastructure at BetMakers Technology Group, Oliver traces his path from wiring up early ISPs and mining ERPs to building TopBetta from a two-person L…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
Gabe is Co-President at General Atlantic, a global growth equity firm managing approximately $114 billion in assets as of June 2025. He discusses growth equity investing and how GA partners with visionary entrepreneurs to build category-leading companies. The conversation explores technology, market evolution, and collaboration strategies that driv…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
In this episode of Tech Execs, James MacDonald heads to Melbourne to sit down with Matt Vitale, former co-founder of Australia’s largest equity crowdfunding platform and now Executive Director at New Dialogue. Matt traces his winding path from nightlife promoter and sugarcane juice tinkerer to financial services lawyer, then startup pioneer, where …
  continue reading
 
In this episode, we meet Simon Lindner, software engineer at Nextcloud, the developer and main maintainer of Nextcloud All-in-One (AIO). Back in 2021, Simon joined the Nextcloud team as a working student. Already a seasoned Nextcloud contributor and home user, he had a vision to make self-hosting Nextcloud more accessible to users by simplifying de…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Alex is founder and CEO of Percapita and a longtime senior executive at Goldman Sachs, UBS, and Morgan Stanley. He shares four decades of insights—from his “Leadership Pyramid” philosophy and the value of a team-centered culture to expanding inclusive banking. Listeners will learn strategies for building resilient organizations and leading with pur…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
This episode features Chidi Alams, CIO of Just Born — the company behind candy classics like Peeps, Mike and Ike, and Hot Tamales. Chidi shares how his team is using AI, automation, and smarter data systems to modernize operations, strengthen supply chain resilience, and double the business impact of technology. It’s a conversation about what it re…
  continue reading
 
Victoria Aspden, Executive General Manager - Digital & Transformation at Ampcontrol has had an unconventional career journey. Initially choosing technology for its earning potential, she managed to work her way through the field when recruiters valued her relationship-building skills over pure technical credentials. This pattern of people taking ch…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
On the first episode of NTP’s Tech Exec podcast series, James MacDonald sits down with Andrew Cresp to talk about his journey through financial services technology leadership, from early days in the insurance industry, moving through major roles in banking, before landing as CIO at NGM Group. Having grown up in country South Australia, Andrew revea…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play