Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
Cyber Essentials Podcasts
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to The Pink Room Podcast. A space for values-led professionals and business owners who want to lead with heart, act with clarity, and make a meaningful impact without losing themselves along the way. Hosted by Bryony Roberts, founder of Pragmatic Consultancy, this podcast lifts the curtain on the real work behind purpose-driven growth. Part mentor, part truth-teller, part coach in your corner, Bryony shares stories, insights, and behind-the-scenes lessons from years spent helping peo ...
…
continue reading
…
continue reading
Join Host Mark L. Madrid as he shares his insights on business excellence, leadership, differentiation, and adaptive strategies that resonate deeply. His energetic, dynamic leadership and innovative approaches have helped countless businesses navigate challenges, experience breakthroughs, and seize opportunities.
…
continue reading
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
…
continue reading
Wealth is not about money in the bank. Wealth includes good health, an abundance of friends, wealth can be an amazing relationship. Wealth is a state of gratitude. Kundalini Yoga- This is the oldest yoga and dates back to India over 5000 years You CAN protect yourself with yoga, prevent illness, and increase your prosperity. Wine - I am a Francophile I love all things French, especially the wines Therefore, I am biased when discussing wines and for many reasons. But listen to the podcast. It ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Welcome to Future in Focus podcast from LRQA. Risk doesn’t sleep – and neither do we. In each episode, we explore how organisations can turn business risk into opportunity, using connected risk management solutions to gain a competitive edge. From certification and cyber to sustainability and supply chains, we connect the dots across today’s complex and evolving landscape. With data-driven insight, sector expertise and a partnership approach, we help you navigate risk with clarity, stay one ...
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
Pam Grice, counselor/crocheter turned crochet business coach, from Crochetpreneur® and Made with a Twist™ hosts the Crochet Business Chat podcast to help you turn yarn into money. Whether you're a maker, designer, or blogger, your handmade business will benefit from these bite-sized tidbits and actionable strategies for taking your business from passion to profits. Each week, Pam and other yarn industry experts will answer your questions about creating, selling, designing, marketing, time ma ...
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Formerly the Joy Joya Jewelry Marketing Podcast, Marketing With Laryssa is a podcast for purpose-driven, product-based brand owners who want to build real connections with their customers. Hosted by Laryssa Wirstiuk, founder of Joy Joya and marketing strategist since 2018, the show zooms out beyond tactics to explore the bigger picture of email, SMS, and digital storytelling. With a mix of practical tips, inspiring ideas, and behind-the-scenes insights, Laryssa shares how to grow your brand ...
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
…
continue reading
Welcome to The Coverage Forge, where complex commercial insurance gets hammered into simple, actionable insights. Hosted by Jessica Weaver, CIC | CEO & Founder of Iron Valley Insurance Group in Sheridan, Wyoming, this podcast cuts through industry jargon to deliver straight-talking advice for business owners, risk managers, and entrepreneurs. Each episode, we forge real solutions to real business challenges—from navigating workers' comp and liability coverage to understanding cyber insurance ...
…
continue reading
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
In a world where businesses and individuals leave billions of dollars unclaimed, hidden in plain sight, The Claim Hunters takes you behind the scenes with the experts who recover what others overlook. From uncovering unclaimed property to investigating complex fraud schemes, we’ll dive into real stories of high-stakes financial recoveries, the tools used by industry-leading professionals, and the strategies that help businesses and individuals recover lost assets. Whether it’s insurance clai ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Welcome to **Mind the Breach**, the podcast series designed to protect your UK small business from the costly threat of payment fraud. I'm Sarah, and in this essential series, **The Phantom Invoice: Protecting Your UK Small Business from Payment Scams**, we're diving deep into the number one cyber threat facing businesses like yours across the UK. Are you a small business owner, director, or sole trader worried about cunning scams that could wipe out your hard-earned profits? Then this show ...
…
continue reading
1
CCT 294: Config Management Essentials - CISSP Domain 7
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Send us a text A single Windows shortcut can open the door to espionage—and that’s exactly where we begin. We break down a fresh LNK exploit campaign to show how hidden command execution and DLL sideloading slip past busy teams, then pivot into the core defense most organizations underuse: disciplined configuration management. From baselines and ve…
…
continue reading
1
A CISO's Field Guide to Securing AI Agents
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
…
continue reading
1
CCT 302: Security Audits and the CISSP Exam
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv If audits feel like paperwork purgatory, this conversation will change yo…
…
continue reading
1
360 - Why Your Email Marketing Feels Flat (And How to Spark More Desire)
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13If your ecommerce brand is obsessing over checkout tweaks, button colors, pop-ups, and discounts—but your email marketing still feels flat—there's a deeper issue at play. And it's not friction. It's desire. 🎧 In this episode, I break down a powerful idea inspired by Wes Kao: the difference between decreasing friction and increasing desire—and why m…
…
continue reading
1
Top 12 CMMC Level 2 Requirements Explained: Gap Assessments, Scope, SSP, and POA&M
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31Submit any questions you would like answered on the podcast! In this episode of the CMMC Compliance Guide Podcast, Stacey and Austin from Justice IT Consulting walk through the top 12 essentials every contractor needs to achieve CMMC Level 2 compliance especially small and mid-sized defense manufacturers. You’ll learn how to start compliance the ri…
…
continue reading
1
Black Friday Without the Discount: No-Sale Marketing Ideas for Crochet Business Owners to Boost Revenue
49:00
49:00
Play later
Play later
Lists
Like
Liked
49:00It's that time of year again—your inbox is overflowing with Black Friday sales, every major brand is slashing prices, and you may feel pressured to do the same. But instead of stressing over discounts your margins can't support, let's rethink the season. In this episode, I'll share why you don't need to jump on the discount treadmill. Then, I'll gi…
…
continue reading
1
Gratitude, Giving & Becoming a World-Class CISO
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40In this special Thanksgiving episode of Life of a CISO, Dr. Eric Cole delivers one of his most personal and powerful messages yet. Before diving into the technical skills of executive briefings and CISO strategy, he shifts focus to something far more foundational: gratitude, giving, and appreciation—the mindset pillars that shape world-class cybers…
…
continue reading
1
CCT 301: CISSP Questions Deep Dive - Zero Trust
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Zero trust isn’t a checkbox or a buzzword; it’s a mindset shift that chan…
…
continue reading
1
CyberComply CMMC GRC Partner Rates and Discounts
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
Why Walking Away Can Be the Fastest Way to Fix What’s Stuck
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59Send us a text In this episode of The Pink Room, Bryony Roberts unpacks the power of “thinking time” the skill of stepping away from a problem long enough to see it clearly again. Bryony shares a sharp story from her corporate days: a developer spent hours stuck on a bug, only to solve it in seconds after a short walk, because the real issue was ti…
…
continue reading
1
CCT 300: Failing Securely, Simply, Separation of Duties, KISS and Zero Trust (CISSP)
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security programs fail when they try to do everything at once. We walk th…
…
continue reading
1
CISO Priorities for 2026: Health, Leadership & Risk Mastery
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32In this episode of Life of a CISO, Dr. Eric Cole explains the top priorities every CISO must focus on as we move into 2026. He begins by highlighting the importance of personal health and why nutrition, hydration, and daily habits directly impact your ability to lead and make smart decisions in cybersecurity. After facing his own health challenges …
…
continue reading
1
CCT 299: Practice CISSP Questions - Data Security Controls
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19Send us a text Words can trigger audits, budget panic, or calm execution, and few words carry more weight than “leak” and “breach.” We unpack the real differences, the legal and regulatory implications of each, and how precise language shapes incident response. From there, we get hands-on with CISSP-ready concepts—data states, DLP, CASB, DRM, minim…
…
continue reading
1
How Make Money as a Crochet Designer: Uncover the Best Monetization Strategy for YOU
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09If you're a crochet designer who loves the creative side of things but feels overwhelmed trying to figure out how to actually make money with your designs, take a breath—you're in the right place. Today, we're going to simplify the entire landscape of monetizing your crochet design business so you can uncover your perfect starting point. Good news:…
…
continue reading
1
Small Business is Big Business with Mark L Madrid - Episode 11: Authentic Connections & Entrepreneurial Grit with Anthony Mendoza
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Anthony Mendoza is the CEO of Las Vegas-based LaunchPad Business Development and he joins host Mark L Madrid to share how he grew from selling fire pits out of a van to partnering with major brands. His journey highlights resilience, trusting the process, and building genuine relationships that drive business success.…
…
continue reading
5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs. https://x.com/todayininfosec/status/1986164925039841770 24th Oc…
…
continue reading
1
Building Cyber-Ready Partnerships for Small and Medium Businesses
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44In this episode of Pathways-2-Partnership (P2P), we speak with Mariano Mattei, VP of Cyber Initiatives for Eccalon and Project Spectrum, the DoD OSBP-endorsed cybersecurity platform supporting companies entering or operating within the defense industrial base. Mariano breaks down the evolving cyber landscape, the rising expectations around complian…
…
continue reading
1
CCT 298: Determining Data Controls - CISSP
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A graphing calculator running ChatGPT might make headlines, but our real …
…
continue reading
1
359 - Should Your Ecommerce Brand Use Klaviyo for Email Marketing? (What's Hype vs. What Matters)
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38If Shopify is the body of your ecommerce business, Klaviyo's the heartbeat — connecting data, customers, and sales. But does every brand actually need it? Or is Klaviyo just the industry's favorite buzzword? 🎧 In this episode, I'm breaking down what Klaviyo really is (in human language), why so many ecommerce brands swear by it, when it makes sense…
…
continue reading
1
Small Business is Big Business with Mark L. Madrid - Episode 10: Interview with His Excellency Dr. Mohamed Al Kuwaiti Head of Cyber Security for the UAE Governement
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10From the GITEX Global Conference in October 2025 in Dubai, host Mark L. Madrid and co-host Sam Khan welcomed His Excellency Dr. Mohamed Al Kuwaiti, head of UAE cybersecurity, to discuss the nation's vision for digital resilience. He emphasized that cybersecurity is now a trust currency.By Mark L. Madrid
…
continue reading
• This month — and this time of year — represent philanthropy for me. • I find myself drawn to artists, because so many of them are struggling. • We often equate the phrase "struggling artist" with finances or fame, but sometimes the struggle runs much deeper. • For Tokunbo Agosu — known as TOKS — the struggle has been shaped by tragedy and loss. •…
…
continue reading
1
Blogging Tips for Crochet Sellers: Your Essential Guide to Growing Traffic, Building Fans, and Selling More Products
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48Are you a crochet product maker, watching designers effortlessly build traffic, visibility, and revenue with their blogs—and wondering, "Could that work for me?" Good news: you're not just a dreamer, you're a maker with untapped potential. Blogging can be a viable income stream for crochet sellers—and these tips will put you on the path to success!…
…
continue reading
1
Cyber at the Top: Defining Strength─Building a Resilient Incident Response Capability
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
…
continue reading
1
Relationships Over Firewalls with Attila Torok
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20In this episode of Life of a CISO, Dr. Eric Cole sits down with Attila Torok, CISO at GoTo (formerly LogMeIn), to unpack what it really takes to move from security engineer to strategic leader. Attila shares his journey, the advice that shaped his career, and why "relationships matter more than engineering skills." From mastering executive communic…
…
continue reading
1
CCT 297: Practice CISSP Questions - Investigation Types (Domain 1.6)
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single compromised API key can undo months of hard work. We open with a…
…
continue reading
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This …
…
continue reading
1
AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00AI-Powered Compliance: Transforming Enterprise Security In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity. Why Enterpris…
…
continue reading
1
S3 | E28: Data-Driven Growth: Empowering Frontline Teams with Actionable Insights
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33Community banks have always excelled at building relationships. But in a market driven by data, relationships alone aren’t enough. The next wave of growth in banking depends on turning customer insights into action. This means empowering marketing, sales, and frontline teams to collaborate smarter and deliver more personalized experiences. In this …
…
continue reading
1
CMMC for MSPs and MSSPs Turning Compliance Into a Service Offering
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
CCT 296: Compliance and Contractual Requirements (Domain 1.4)
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A tiny payload hidden in a legitimate-looking NuGet package can sit insid…
…
continue reading
1
The quality mindset: Connecting risk, culture and performance to create opportunity
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08In this episode, host Xavier Francis is joined by Bill Barnes, Auditor Manager at LRQA, and Dariusz Antonczyk, Training and Improvement Services Manager at LRQA, to explore how quality thinking has evolved from a management system into a powerful organisational mindset. Together, they trace the journey of quality from the origins of ISO 9001 to tod…
…
continue reading
1
358 - The Essential Guide to Email Domain Verification for Ecommerce Brands
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Episode #358 - The Essential Guide to Domain Verification for Ecommerce Brands Ever throw a party and forget to tell the bouncer who's on the list? Suddenly your best friends are stuck outside while total randos waltz right in. That's basically what happens when you skip domain verification - and your emails are the ones getting bounced. 🎧 In this …
…
continue reading
1
Empower Your Clients’ CMMC Readiness Journey
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
Cyber AB Town Hall Breakdown: Legal Lessons, Ecosystem Growth, and CMMC Phase 2 Progress
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Submit any questions you would like answered on the podcast! In this episode of the CMMC Compliance Guide Podcast, Brooke and Stacey from Justice IT Consulting unpack the biggest updates from the Cyber AB’s October 2025 Town Hall and what they mean for defense contractors preparing for CMMC certification. You’ll learn: Why the government shutdown i…
…
continue reading
In this urgent and eye-opening episode of Life of a CISO, Dr. Eric Cole dives into one of the most consequential moments in U.S. cybersecurity history: the expiration of the Information Sharing Act of 2015, which quietly lapsed the same day the government shut down. Dr. Cole explains how this coincidence has effectively cut off the flow of critical…
…
continue reading
1
How I Revived My Dormant Crochet Blog in 30 Days: 5 Proven Steps to Increase Traffic and Revenue
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Just last month, I transformed my crochet blog from a sleepy corner of the internet into a thriving resource that drew over 60,000 page views and nearly $2,000 in ad revenue—in just 30 days. Curious how I did it? Let me walk you through the five steps that brought my blog, Made with a Twist, back to life—and how you can use them to increase your cr…
…
continue reading
1
CCT 295: Practice CISSP Questions - Deep Dive (Domain 7)
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57Send us a text Ransomware doesn’t wait for your change window, and neither do we. This episode takes you inside the decisions that matter when privileged accounts start hopping across systems, Exchange servers attract fresh exploits, and the clock is running on recovery. We open with the newest CISA guidance on Microsoft Exchange and translate it i…
…
continue reading
1
The Rock Lobster Trade: Changing Climates and the Future of Fisheries
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25In areas off the coast of Victoria in Southern Australia, ocean conditions are changing. Warmer currents, unpredictable storms, and shifting water chemistry present a new reality for the communities who depend on the sea. In this episode of NorthStandard's 'Alongside' podcast, hosted by Danielle Jalowiecka, we dive into how these changes are impact…
…
continue reading
1
CyberComply GRC Case Study: For MSPs and MSSPs
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
CyberComply GRC Case Study: For Independent Consultants
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
CyberComply GRC Case Study: For Small Business
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
CyberComply GRC Case Study: Primes with Subcontractors
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
IF YOUR BIG DREAM IS TAKING FOREVER TO REALIZE
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45Chris Hill created a concept of eco-luxury vacations that include philanthropic volunteering. The vision began in 2002, during a trip to South Africa, where he helped build a home for a local family. Hands Up Holidays That experience was more fulfilling than his successful finance career in London, inspiring him to pursue a new path. He launched Ha…
…
continue reading
1
Championing Sustainable and Human-Friendly Security
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
…
continue reading
1
CMMC Level 1 Certification Explained Self-Assessment Guide (Step-by-Step Walkthrough)
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
357 - Your Last-Minute BFCM Email Checklist (Before You Hit Send)
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35BFCM is basically tomorrow in marketing time - that's how it feels, right? The clock's ticking, inboxes are about to explode, and you might be thinking, "Am I even ready for this?" Before panic sets in, take a breath. This episode is your quick hit of clarity before the chaos: a last-minute checklist to steady the nerves and drive more revenue. 🎧 I…
…
continue reading
1
Highlights from CS5 East 2025: Operation Midnight Hammer, CMMC Updates, and AI Insights
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32Submit any questions you would like answered on the podcast! Get the inside scoop from CS5 East 2025, the largest cybersecurity and compliance event for the Defense Industrial Base. In this episode, Brooke and Stacey from Justice IT Consulting breaks down the biggest CMMC updates, Operation Midnight Hammer, and how AI is reshaping compliance. Learn…
…
continue reading