Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Compliance And Data Protection Podcasts
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
…
continue reading
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Today's Wills & Probate Podcast will speak to some of the industry's most influential people and those at the forefront of innovation. Listeners will have the opportunity to pick up key business insights, gain valuable knowledge and ask questions to guests.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
TempGenius has established itself as a trusted name in wireless temperature monitoring, offering advanced solutions designed to meet the needs of diverse industries. Their systems are ideal for healthcare facilities, laboratories, food services, and industrial environments where temperature control is critical for compliance, safety, and efficiency. The wireless monitoring technology from TempGenius provides real-time data tracking, automated alerts, and detailed reporting, ensuring that bus ...
…
continue reading

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
Seasoned professionals chatting about current accounting, audit, tax, and operational issues germane to tax-exempt entities including nonprofits, associations, employee benefit plans, labor unions, and other business enterprises.
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading

1
The 1347 PODCAST -HEALTHCARE FRAUD DETECTION, CORPORATE COMPLIANCE AND ORGANIZATIONAL INTEGRITY
The 1347
The podcast focuses on healthcare fraud detection, corporate compliance, organizational integrity, and research security best practices.
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
…
continue reading
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
Podcast by Marketplace Risk
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
…
continue reading
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
…
continue reading
Welcome, fellow Mid-Marketers, to the podcast that throws a wrench in the B2B machine! We’re not your average industry insiders, whispering secrets from ivory towers. We’re in the trenches with you, navigating the unique challenges and opportunities of the mid-market. We get it, because we live it, and we LOVE IT! Forget the tired, one-size-fits-all B2B advice. Here, we disrupt the status quo, sharing relatable stories from the real world, where hustle meets heart, and expert analysis cuts t ...
…
continue reading
Claudia A. Merandi is the founder of the national "Don't Punish Pain Rally Organization." Claudia, mom to both Francesca and Ava, is the former owner of Merandi Court Reporting. She's a retired court reporter and self-published author, from East Providence, Rhode Island. As a person living with severe Crohn's Disease since a child, she witnessed first-hand the challenges a person with pain encounters when trying to obtain adequate pain management.Claudia, in 2017, created the Don't Punish Pa ...
…
continue reading

1
Endpoint Security and Data Protection: Uncovering the Hidden Compliance Risks in Printer Security with Jim LaRoe
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
…
continue reading

1
Why You Shouldn’t Wait on Your Security Risk Analysis | Medcurity Podcast 112
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04The Security Risk Analysis isn’t just another compliance task. It’s the foundation of your HIPAA program and the proof that you’re protecting patient data. In this episode, hear why now—not January—is the time to get it done. Recent OCR fines show that organizations of every size are still being penalized for missing or outdated SRAs. Waiting costs…
…
continue reading

1
Marketplace Taxation Compliance — An Overview
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46In this episode of Bulletproof Your Marketplace, Jeremy dives into the critical topic of marketplace taxation with Nick Furtwengler, senior tax manager at Miller Cooper. Nick brings over 14 years of experience in state and local tax law and has worked extensively with digital marketplaces.Listeners will gain insights into why tax compliance is esse…
…
continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading

1
Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
49:22
49:22
Play later
Play later
Lists
Like
Liked
49:22In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats. From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies,…
…
continue reading

1
Composing a legacy; mixing a jazz career with estate planning
21:36
21:36
Play later
Play later
Lists
Like
Liked
21:36The latest episode of the Today's Wills and Probate Podcast, takes a musical tur as host David Opie welcomes John Heavens, CEO of Your Legacy Solutions - and a professional jazz musician. John shares with David his background and how the worlds came to collide; and how he manages to balance his two professions. By day, he leads a tech-driven estate…
…
continue reading

1
Episode 360: Fraudsters Have a Way to Pass Payee Positive Pay for Stolen Checks – How it Works and What to do About it
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Fraudsters have evolved again – this time with check fraud because they have found a way to bypass payee positive pay. So now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendo…
…
continue reading

1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
continue reading

1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
continue reading

1
What Actually Works in Cybersecurity (And What Doesn't)
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06Are you making career moves in cybersecurity or is cybersecurity making moves around you? Welcome to Razorwire. In this episode, I sit down with Marius Poskus - CISO, consultant, podcaster and all-round cyber expert - to how to succeed in cybersecurity. We discuss career paths, why security culture fails in most organisations and the risks of rushi…
…
continue reading

1
Innovation vs. guardrails: The great AI regulation debate
31:45
31:45
Play later
Play later
Lists
Like
Liked
31:45Reed Smith’s Jason Garcia, Gerard Donovan, and Tyler Thompson are joined by Databricks’ Suchismita Pahi and Christina Farhat for a spirited discussion exploring one of the most urgent debates of our era: Should AI be regulated now, or are we moving too fast? Settle in and listen to a dynamic conversation that delves into the complex relationship be…
…
continue reading

1
A Compliance Roadmap for ADS/ADMT - Part 2: Understanding Opt-In and Opt-Out Requirements
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert, with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this second episode, Tom Fox and Alyssa DeSimone review the opt-in and opt-out requirements …
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading

1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
continue reading

1
A Compliance Roadmap for ADS/ADMT - Part 1: Introduction & Jurisdiction
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this first episode, we break down the essentials of ADS/ADMT, focusing on who is covered, the…
…
continue reading

1
#741: Modernizing Edge Infrastructure: Booking.com's Journey with AWS CloudFront and Lambda@Edge
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45In this episode of the AWS Podcast, host Jillian Forde discusses the migration journey of Booking.com to AWS with Ali and Sarah. They explore the challenges faced by Booking.com , the benefits of using CloudFront and Lambda at Edge, and the importance of observability and cost optimization. The conversation also delves into chaos engineering practi…
…
continue reading

1
Empowering Disability Inclusion Through Technology and Teamwork with John Winfrey
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14Guest Introduction John Winfrey serves as Director of IT at Ardmore Enterprises, a nonprofit organization in Lanham, Maryland, that empowers individuals with intellectual and developmental disabilities. Ardmore provides residential housing, community services, and employment programs that promote independence and inclusion. John brings over 30 year…
…
continue reading

1
Using Empathy to Strengthen Cyber Resilience in Healthcare with Dr Sergio Sanchez
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15Guest Introduction Sergio Sanchez serves as Chief Information Officer at Coleman Health Services, a nonprofit behavioral health organization based in Ohio that supports more than 30,000 clients annually across multiple counties. With a background as a general surgeon in Mexico before moving into IT leadership, Sergio brings a rare dual perspective …
…
continue reading

1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading

1
CIPA Lawsuits: Everything Privacy Leaders Should Know
1:04:23
1:04:23
Play later
Play later
Lists
Like
Liked
1:04:23Send us a text More than 5,000 CIPA lawsuits have been filed — and privacy teams are racing to prevent the next wave. In this webinar, Matthew Pearson, one of the leading CIPA legal experts, explains how this 1967 wiretapping law is being used against modern websites and apps. You’ll learn: 🔍 How CIPA lawsuits start and what makes them credible ⚙️ …
…
continue reading

1
No-Regrets Migration: Why PKI Should Be Your First Move
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
…
continue reading

1
Managing Risk — Insurance Policies and Program Design
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51In this episode of Bulletproof Your Marketplace, Jeremy Gottschalk dives into one of the most critical yet often misunderstood aspects of scaling digital platforms: insurance program and policy design.Joined by Garrett Johnston, Senior Vice President at Marsh with more than 25 years of experience in the commercial insurance industry, They explore h…
…
continue reading

1
Episode 359: Vendor Is Not Registered in Their State? Here’s What To Do Next
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34If one of your vendor validations is checking with the State of your vendor but find that the vendor is not registered with the State of their address….now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments,…
…
continue reading

1
From Firefighting to Strategizing IT Security with Giles Thornton
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
…
continue reading

1
Flow State for Startup Founders: Deep Work That Actually Ships
51:12
51:12
Play later
Play later
Lists
Like
Liked
51:12Steven Puri, co-founder/CEO of Sukha, shares the flow state for startup founders playbook: body doubling, the coffee-shop effect, chronotype time-blocking, demo-first standups, and outcome-based leadership. You’ll learn how to beat the 22-minute context switching tax, design deep-work rituals for remote teams, and build a best-idea-wins culture tha…
…
continue reading

1
2026 Look Ahead: Where HIPAA Compliance Is Actually Headed | Medcurity Podcast 111
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Enforcement is active, policy is tightening, and threats continue to evolve. This episode looks ahead to what 2026 will bring for healthcare compliance—how recent OCR settlements, proposed HIPAA Security Rule updates, and CMS’s 2026 payment rule all point to one clear expectation. Hear what strong compliance looks like going forward, from mapping e…
…
continue reading

1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading

1
AI Governance Essentials: Navigating Security and Compliance in Enterprise AI with Walter Haydock
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05AI Governance in an Era of Rapid Change In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and …
…
continue reading

1
Wireless Temperature Monitoring Solutions by TempGenius Ensure Safety Accuracy and Compliance Across Industries
1:37
1:37
Play later
Play later
Lists
Like
Liked
1:37TempGenius has established itself as a trusted name in wireless temperature monitoring, offering advanced solutions designed to meet the needs of diverse industries. Their systems are ideal for healthcare facilities, laboratories, food services, and industrial environments where temperature control is critical for compliance, safety, and efficiency…
…
continue reading

1
Webinar Audio - Strategies for AI Governance: Staying Ahead in an Evolving Technologies and New Regulatory Landscape
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27By Priya Keshav
…
continue reading

1
Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19By Justin Beals
…
continue reading

1
Encore | Investing Wisely in 2025: Avoiding Scams and Achieving Your Financial Goals
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52By FINRA
…
continue reading
By CDW Canada
…
continue reading

1
#740: AWS News: EC2 Instance Attestation, S3 Conditional Deletes, and more!
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Simon and Jillian keep you up to date with over 70 new releases and capabilities!By Amazon Web Services
…
continue reading

1
Field Notes: Coffee, Gliders & Trademark Scams
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
…
continue reading

1
Why Process, Data, and Adoption Drive Growth at Lift Solutions with Lawrence Bilker
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Guest Introduction Lawrence (Larry) Bilker serves as Chief Information Officer at Lift Solutions, a fast-growing company that provides complete industrial lifting services across the United States. Founded in 2021, Lift Solutions performs OSHA-mandated inspections, aftermarket services, and parts supply for overhead cranes and lifting equipment. As…
…
continue reading

1
German Startup News Sept 2025: Deep Tech, VC Surge, Fintech & Big Fundings
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47In this September 2025 wrap-up, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the signals that actually matter for B2B operators: where capital is flowing, how deep tech is commercializing, and what shifting regulatory winds mean for product, go-to-market, and hiring. Expect fast, factual coverage of German startups, Swiss and Austrian…
…
continue reading

1
An Educator's Guide to DNS Threats with Josh Kuo
57:12
57:12
Play later
Play later
Lists
Like
Liked
57:12Is your company's most critical blind spot hiding in plain sight? While most security teams focus on firewalls and web traffic, attackers are increasingly using the internet's phonebook—the Domain Name System (DNS)—as a secret backdoor for malware delivery, data theft, and command and control. In this episode of The Defenders Log, host David Redeko…
…
continue reading

1
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean Martin
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
…
continue reading

1
How to protect yourself from the rise of undervaluing estates claims
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53The probate industry is under increasing pressure to demonstrate practitioners have acted in the best interest of the estate, particularly as beneficiaries become more financially dependent on inheritances. The Probate Registry has done much to ease the pain of delays and now private enterprise is playing its part in helping law firms and probate p…
…
continue reading

1
Episode 358: 3 Ways AI In Your Existing Automation Software Can Help The Vendor Team That You May Not Have Thought About
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43Many automation software platforms including email to invoicing have artificial intelligence embedded in them. You may not think that email or invoicing software can help fight fraud in the vendor process, but yes they can and here’s how... Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication te…
…
continue reading

1
teissTalk: From service desk to security risk - stopping social engineering at the source
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
…
continue reading

1
From IT to Total Compliance Tracking with Adam Goslin
21:08
21:08
Play later
Play later
Lists
Like
Liked
21:08Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
…
continue reading

1
German Startup News Sept 2025: $2.3B AI Unicorn, N26 Crisis & Climate Tech
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32Berlin’s AI unicorn skyrocketed from $350M to $2.3B in valuation in just months. Meanwhile, fintech giant N26 faces its most severe governance crisis yet, as its co-founder CEO steps down after regulatory pressure. And Europe’s climate tech sector is booming with mega-funding rounds, including a record €825M hydrogen allocation. This is your Septem…
…
continue reading

1
Why Compliance Alone Isn’t Security: Lessons from Vetcor’s CSO Andrew Wilder
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27Guest Introduction Andrew Wilder serves as Chief Security Officer at Vetcor, a veterinary consolidator that owns and operates nearly 1,000 veterinary hospitals across North America. Backed by private equity, Vetcor relieves veterinary practices of back-office responsibilities such as IT, HR, and finance, enabling veterinarians to focus on patient c…
…
continue reading

1
Special Guest Episode: NWRPCA CEO Bruce Gray | Medcurity Podcast 110
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34Bruce Gray joins the Medcurity Podcast to share insights from more than 20 years leading the Northwest Regional Primary Care Association (NWRPCA). He’s joined by Joe Gellatly, CEO of Medcurity, for a conversation on the unique challenges and strengths of rural healthcare and community health centers, the future of care delivery, and how a team-base…
…
continue reading

1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading

1
The Hidden Costs of Security Stack Consolidation (That Vendors Don't Mention)
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15Is your security stack making you safer or just adding to the chaos? Welcome to Razorwire, the podcast where we unravel the mess, myths and market realities behind today’s cybersecurity challenges. I’m your host Jim and in this episode, I’m joined by our favourite regulars Oliver Rochford and Richard Cassidy to tackle a topic that irritates every C…
…
continue reading

1
#739: Applying Multi-region Strategies on AWS
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Amazon Application Recovery Controller (ARC) Region Switch - https://docs.aws.amazon.com/r53recovery/latest/dg/region-switch.htmlBy Amazon Web Services
…
continue reading

1
National Cybersecurity Awareness Month: Protecting Your Financial Data
15:18
15:18
Play later
Play later
Lists
Like
Liked
15:18In this special National Cybersecurity Awareness Month episode, Calibre’s Director of IT, Brian Isenstein, sits down with Tom DeMayo, Calibre’s virtual CISO and Partner at PKF O’Connor Davies, to discuss the growing threats to financial data. From ransomware and business email compromise to the role human behavior plays in breaches, they share real…
…
continue reading