Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Education Podcasts
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
…
continue reading
.
…
continue reading
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
Cyber Octet Pvt. Ltd. is an IT Solution, Security, Training and Services Company providing best solution to its clients for any development solution to Securing data. We have end to end expertise and have served several Government, Institutions, and Private Sectors. https://cyberoctet.com/
…
continue reading
talking about what to do in certain situations Cover art photo provided by John Schnobrich on Unsplash: https://unsplash.com/@johnschno
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
The audio version of videos from my popular YouTube channel (JonGoodCyber).
…
continue reading
Bullying is bad, so we discuss about cyber-bullying which is also bad. Cover art photo provided by rawpixel on Unsplash: https://unsplash.com/@rawpixel
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Lisa Forte interviews interesting people from Infosec and beyond
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
Where Georgia Cyber Academy (GCA) shares hootworthy stories of their Champions rising up, aiming high, and soaring. GCA is an online, tuition-free, public charter school serving students in grades K-12 throughout the state of Georgia. We provide a learning environment where students are empowered to reach their full academic potential through active participation in live interactive classes and an engaging curriculum that supports individualized and differentiated student learning paths.
…
continue reading
Welcome to Orpheus Talks, your go-to source for all things cyber threat intelligence and cybersecurity. Join the Orpheus team and other industry experts as they delve into the latest trends and threats in the digital world, and provide actionable insights on how to protect yourself and your organisation.https://orpheus-cyber.com/https://twitter.com/orpheuscyberhttps://www.linkedin.com/company/orpheuscyber/
…
continue reading
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
…
continue reading
SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
…
continue reading
"Control-Alt-Alumni" is your gateway to the world of cybersecurity education and careers. Join us as we sit down with students, educators, and industry leaders to discuss the ins and outs of cyber education, the skills companies are looking for, and how to land your dream job in the field. Whether you're a student, teacher, or professional, this podcast offers actionable insights, inspiring stories, and expert advice to help you navigate the ever-evolving cybersecurity landscape.
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Listen to cybersecurity and technology topics from industry experts. Don't worry; we'll keep it fun and light.
…
continue reading
Discussions with SEI researchers about cyber-related topics of interest
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
Verdicts and Voices is a monthly podcast hosted by Alison Crawford in which we unpack key legal stories and celebrate the 150th anniversary of the Supreme Court of Canada. This special series delves into legal news, landmark cases and features expert guests who provide unique insights into Canada’s justice system.
…
continue reading
Join Michael Merlin, Founder of Merlin Wealth Management at Rockefeller Global Family Office and various colleagues and experts as they take the complex and make it simple. In each episode Michael and friends discuss the key tenants of financial longevity: maximizing your wealth span and securing your financial future, spending money guilt-free while still growing your assets and enjoying your bigger future with confidence. Don't let financial complexity hold you back from living your best l ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
…
continue reading
This show is about doing business globally. We provide expert insights for Canadian companies looking to enter new markets and stay competitive. Whether your business has international presence, is considering the beginning of an international expansion or, if you’re in the middle of revising your expansion plan, then this show is for you.
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
Ars Boni deals with Digitalisation, Media, Social Crisis (in particular the Covid-19 Crisis) and the Law, in different legal fields and in different countries. Ars Boni is a podcast launched by the Department of Innovation and Digitalisation in Law, University of Vienna. Prof. Dr. Nikolaus Forgó serves as its host.
…
continue reading
A podcast about all things cyber security, news, views and clues; from yesteryear, today and even the future. Stories and interviews about cyber security, breaches, malware, hacking, social engineering, best practice, lessons learnt, and anything else related. Theme music: Please Listen Carefully, courtesy of Jahzarr http://freemusicarchive.org/music/Jahzzar/Tumbling_Dishes_Like_Old-Mans_Wishes/Please_Listen_Carefully Music licensed under https://creativecommons.org/licenses/by-sa/4.0/ Cover ...
…
continue reading
This is a podcast with you in mind. It was created to equip you with the critical real-life skills and wisdom that you weren't taught in school. This show will give you the tools to not just get by in adulthood, but to ultimately thrive. I'll be interviewing people from all walks of life, including CEO's, veterans, therapists, and a host of other characters that will bring the life lessons and wisdom that they have learned on their life's journey so far, right to this podcast.
…
continue reading
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
…
continue reading

1
New Generation Cyber Training: Bhavikas Journey as an Educator
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11“Age or education doesn’t matter in cybersecurity. What matters is initiative.” — Bhavika Ketani In this episode, we interview Bhavika Ketani, a cybersecurity lecturer at Curtin University, discussing the importance of education in the cybersecurity field. They explore Bhavika's journey into teaching, the challenges faced in cybersecurity education…
…
continue reading

1
CCT 283: Practice CISSP Questions - Security Controls for Developers (Domain 8.3)
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Send us a text Dive into the critical world of software development security with Sean Gerber as he tackles Domain 8.3 in this knowledge-packed CISSP Question Thursday episode. We examine fifteen challenging questions that address the security controls essential for protecting code throughout the development lifecycle. Discover why static applicati…
…
continue reading

1
Stay Ahead of DoD's Shift from RMF to CSRMC
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
…
continue reading

1
How I’d Learn Cybersecurity in 2025 (If I Were Starting Over)
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34If I were starting my cybersecurity career from scratch in 2025, this is exactly what I’d do. No fluff, no unnecessary certs, and no wasted time. Too many professionals are burning out chasing certs or bootcamps without real clarity. In this episode, I share my complete 6-step cybersecurity roadmap, the one I’d follow if I had to start all over aga…
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
S2 E4: Industrial Security Alongside a Warzone
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
…
continue reading

1
“One day, she just had enough”: Karin Wells on the women behind landmark cases in Canadian law
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Verdicts & Voices is a legal current affairs podcast presented by the Canadian Bar Association. With her retinue of expert guests, host Alison Crawford keeps listeners up to date on news, views, and stories about the law and the justice system in Canada. In this episode, writer and documentarian Karin Wells discusses her new book, Women Who Woke up…
…
continue reading
A quiet data breach at Stellantis could be more than it seems. In this episode of Darnley’s Cyber Café, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry. What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to fin…
…
continue reading

1
New GRC course Upcoming Cloud AWS Book New GRC Community
1:44:53
1:44:53
Play later
Play later
Lists
Like
Liked
1:44:53SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading
Join Michael Merlin and guests Adrienne Heart, Head of Philanthropy, Rockefeller Global Family Office and Mallory Findley, Head of Family Values & Dynamics, Rockefeller Capital Management, as they discuss helping clients find the “why” in their charitable giving. This material was prepared by Rockefeller Capital Management. The views expressed of t…
…
continue reading
Send us a text Ready to master the critical domain of Identity and Access Management for your CISSP exam? This comprehensive rapid review demystifies Domain 5, which accounts for 13% of all exam questions—knowledge you absolutely cannot skip. Dive deep into the fundamentals as we explore controlling physical and logical access to assets—from inform…
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
…
continue reading

1
Infrastructure, Cloud, and Supply Chain Security
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
…
continue reading
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
…
continue reading

1
Identity, Authentication, and Access Control
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
…
continue reading
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
…
continue reading

1
Security Foundations & Risk in the Modern Enterprise
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
…
continue reading

1
IVR Systems & Impact of AI: The Ciphered Reality Podcast welcomes Steven from Newbridge Solutions
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
…
continue reading

1
CCT 281: Practice CISSP Questions - Deep Dive - Identity and Access Provisioning Lifecycle (Domain 5.5)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape is evolving rapidly with AI development creat…
…
continue reading

1
Ransomware Protection & Latest Cybersecurity News: The Ciphered Reality Podcast
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
…
continue reading

1
University Security & Latest Cybersecurity News: The Ciphered Reality Podcast
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
…
continue reading

1
Student & Parent Cyberawareness | Copyright Phishing Lures - The Ciphered Reality Podcast
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
…
continue reading
Wie funktioniert eigentlich der Staat? Wie kann ich mitbestimmen? Und wer ist überhaupt die mächtigste Person im Staat? Rund um diese und noch viel mehr Fragen dreht sich die Podcast-Folge am 10. September, in der Alina und Hannah mit Dr. in Franziska Bereuter über all diese Themen sprechen. ⚖️
…
continue reading

1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
…
continue reading

1
CMMC Level Determination: How to Know What Your Contract Requires
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20One of the most common questions Defense Industrial Base (DIB) contractors face is: “What CMMC Level do I need in order to respond to this solicitation?” The answer depends entirely on the contract language and the type of information your organization will handle. Let’s break it down into plain terms. Step 1: Look for DFARS 252.204-7012 or NIST SP…
…
continue reading
When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams. In this episode of Darnley’s Cyber Café, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday fin…
…
continue reading

1
eBPF, Fishy Book Covers, and Open Source Security with Liz Rice
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08🚨 The kernel-level security revolution you can't ignore — a must-listen with Liz Rice Eden Naftali and Amitai sit down with Liz Rice, Chief Open Source Officer at Isovalent (Cisco), and a global expert in eBPF, containers, and Kubernetes security. 🎙️ In this episode: How eBPF is reshaping cloud security from the ground up Practical strategies to ta…
…
continue reading

1
CCT 280: Mastering Identity Lifecycle Management (Domain 5.5)
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The effective management of digital identities throughout their lifecycle…
…
continue reading

1
AI the job market and future of GRC and cybersecurity
1:22:37
1:22:37
Play later
Play later
Lists
Like
Liked
1:22:37https://youtube.com/live/jweGSLb_zgU SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.t…
…
continue reading

1
Transitioned from GRC to Cloud Security Guy
1:23:49
1:23:49
Play later
Play later
Lists
Like
Liked
1:23:49https://youtube.com/live/Slam57hVRYs I have been in GRC for years and I have just transitioned into Cloud. Day 0: How did I do it Preparation of GRC vs Cloud Open topics 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourse…
…
continue reading

1
CCT 279: Practice CISSP Questions - Security Models (Domain 3.2)
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the complex world of security models as we unpack Domain 3.2 of…
…
continue reading
Image of Timeline The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program is moving from planning to execution. With the Final CMMC Acquisition Rule now published, contractors across the Defense Industrial Base (DIB) must prepare for phased implementation beginning November 10, 2025. Understanding the timeline is criti…
…
continue reading
https://youtube.com/live/VuiCYeVHr2s Lets check out the biggest GRC news as of AUG 2025! We will also take questions. 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop…
…
continue reading

1
Enclave VS Enterprise - CMMC Level 1 SPRS Reporting in PIEE
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37CMMC LEVEL 1 SELF-ASSESSMENT QUICK ENTRY GUIDE VERSION 4.0 The Defense Industrial Base (DIB), compliance with the Cybersecurity Maturity Model Certification (CMMC) is no longer optional, it’s a prerequisite for doing business with the Department of Defense (DoD). While CMMC Level 1 is the foundational tier, it still requires contractors to demonstr…
…
continue reading

1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
…
continue reading

1
S2 E3: Maritime Cybersecurity Threats & Critical Infrastructure
17:44
17:44
Play later
Play later
Lists
Like
Liked
17:44In this episode of Simply ICS Cyber, co-hosts Don C. Weber and Tom VanNorman are joined by maritime and energy cybersecurity expert Marco (Marc) Ayala — vOT-CISO, Senior Principal Advisor for Energy, Oil, and Gas at the Cyber Infrastructure Protection Innovation Center (CIPIC), President of InfraGard Houston Members Alliance, and National Sector Ch…
…
continue reading

1
CMMC Subcontractor Verification for Prime Contractors
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10For prime contractors in the Defense Industrial Base (DIB), meeting Cybersecurity Maturity Model Certification (CMMC) requirements is no longer optional, it’s a contractual obligation. But compliance doesn’t stop with your own systems. As a prime, you’re also responsible for ensuring that your subcontractors meet the appropriate CMMC level before t…
…
continue reading

1
Ars Boni 589 Update Handysicherstellung (MMag. Michael Hofstätter)
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Wir sprechen erneut (vgl. Ars Boni #532) mit MMag. Michael Hofstätter. Er ist Rechtsanwalt in Innsbruck und hat einen Mandanten vertreten, der anlässlich einer postalischen Lieferung von 85g Cannabis von von der polizeilichen Sicherstellung seines Handys betroffen war. Nach einer Vorabentscheidung das EuGH, C-548/21, hat das LVwG Tirol der Maßnahme…
…
continue reading

1
OT on the Frontlines: Threat Intelligence You Can’t Ignore - Dawn Cappelli - CSP #216
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine’s infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos’ OT-CERT program offers free resources to help organizations defe…
…
continue reading

1
033 - Black Mirror - Is the UK's Surveillance State Coming to America?
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance…
…
continue reading

1
CCT 278: Security Models Demystified - CISSP Domain 3.2
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security models can be one of the most challenging concepts for CISSP can…
…
continue reading

1
CMMC for MSPs and MSSPs Turning Compliance Into a Service Offering
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
Building an Effective Incident Response Plan for CMMC Compliance
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
The Future of Supply Chain Security Under CMMC
5:59
5:59
Play later
Play later
Lists
Like
Liked
5:59Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
How Automation and AI Are Changing the Future of Compliance
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
How to Build a System Security Plan (SSP) Without Losing Your Mind
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
CMMC 2.0 Made Simple: What Small Businesses Need to Know
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
The State of CMMC Rulemaking - What’s Next After 48 CFR
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11The Cybersecurity Maturity Model Certification (CMMC) has been years in the making, evolving from draft concepts to the rulemaking stage. With the publication of the interim rule in 48 CFR (which formally embeds CMMC 2.0 into the Defense Federal Acquisition Regulation Supplement, or DFARS), many in the Defense Industrial Base (DIB) are asking the s…
…
continue reading