A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Cyber Essentials Podcasts
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
…
continue reading
Welcome to The Pink Room Podcast. A space for values-led professionals and business owners who want to lead with heart, act with clarity, and make a meaningful impact without losing themselves along the way. Hosted by Bryony Roberts, founder of Pragmatic Consultancy, this podcast lifts the curtain on the real work behind purpose-driven growth. Part mentor, part truth-teller, part coach in your corner, Bryony shares stories, insights, and behind-the-scenes lessons from years spent helping peo ...
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
The latest AI and cybersecurity conversations to help you achieve digital greatness to grow your organizations, empower your teams, and protect your data, all delivered from your host Sagar Pandya.
…
continue reading
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
…
continue reading
Unlock the secrets to financial success with the Boomers, Bucks, and Bling Podcast! Hosted by Carl Spiteri, a veteran Mortgage Loan Originator with over 30 years of experience, this podcast is your ultimate guide to mastering the financial intricacies of buying, selling, and lending in today's dynamic market. Whether you're a home buyer, lender, or seller, Carl's expert insights and practical advice will empower you to make informed decisions that lead to lasting financial stability. Each ep ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Welcome to **Mind the Breach**, the podcast series designed to protect your UK small business from the costly threat of payment fraud. I'm Sarah, and in this essential series, **The Phantom Invoice: Protecting Your UK Small Business from Payment Scams**, we're diving deep into the number one cyber threat facing businesses like yours across the UK. Are you a small business owner, director, or sole trader worried about cunning scams that could wipe out your hard-earned profits? Then this show ...
…
continue reading

1
Cyber Essentials: Prevention Over Cure with Chani and Clive
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Send us a text In this episode of The Pink Room, Bryony Roberts from Pragmatic Consultancy is joined by Chani and Clive Simms of MetaDefence Labs, experts in GDPR, Cyber Essentials, and vulnerability management. Together, they discuss the growing cybersecurity threats facing businesses, the importance of preventative measures, and why board-level e…
…
continue reading

1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
…
continue reading

1
From Equity to Income: How Boomers Can Make Retirement Work | Boomers, Bucks & Bling Ep. 17
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37In this episode of Boomers, Bucks, & Bling, Carl sits down with Southern California financial advisor Jon to talk about the biggest challenges Baby Boomers face in retirement. From rising housing costs to new tax rules, this episode is packed with practical strategies to help you protect your retirement income, keep your family close, and make the …
…
continue reading

1
E48 - The Vendor Dating Game: How to Find Your Perfect Match
48:18
48:18
Play later
Play later
Lists
Like
Liked
48:18Finding the Perfect Vendor: Navigating IT Vendor Relationships Welcome to Off The Wire, the podcast that helps you curb your cybersecurity risk and tackle technology challenges. In this episode, Tanner and Anthony, seasoned IT executives, discuss the ins and outs of selecting the right vendors for your business. They explore the qualities to look f…
…
continue reading
I have an incredible announcement to share! 👀 Before that though, let me share some of my history with you. Back in 2016, I started a side-business called TEKFused LLC focused on web design/hosting. Fast forward to 2022, I launched GRC Academy, and since then I’ve released 3 CMMC courses, released 50+ podcast episodes, and partnered with some amazi…
…
continue reading
The notes go here. I really can't go and look for them right now. This week in InfoSec is a sticky pickle Rant of the Week will have you guessing at who it could possibly be, again… Billy Big Balls is why british men need to take their passport to the bathroom these days Industry News is the latest and greatest security news stories from around the…
…
continue reading

1
Can You REALLY Trust AI? The Cybersecurity Risks Explained
24:12
24:12
Play later
Play later
Lists
Like
Liked
24:12Artificial Intelligence is transforming the world—but can it also put you at risk? In this episode of the Learn Online Security Podcast, Richard Bankert (Social Engineering Expert & CEO) and Chris Howells (Director of IT & Head Trainer) break down the hidden dangers of AI in cybersecurity. From data scraping and deepfakes to AI-powered scams and em…
…
continue reading

1
Why Your Processes Don’t Work (And What to Do About It)
37:28
37:28
Play later
Play later
Lists
Like
Liked
37:28Send us a text Processes are the backbone of any business but too many companies either drown in paperwork or rely on unwritten habits that only a few people understand. In this episode, we discuss what are business processes, when they should be written down, and when they need to be lived and breathed as part of your company’s culture. I’ll share…
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
continue reading

1
E47 - Embracing AI in the Cooperative Sector: Insights and Strategies
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14Embracing AI in the Cooperative Sector: Insights and Strategies Join Tanner Greer, Chief Technology Officer at Blue Ridge Energy, and Anthony Kent from Four County EMC as they share their perspectives on integrating artificial intelligence in the cooperative industry. With a combined 35 years of IT experience, they discuss practical approaches, use…
…
continue reading

1
⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
…
continue reading

1
🚨 Gone Vishing: The Recent Surge of Vishing Attacks
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
…
continue reading

1
How Attackers Are Bypassing Your Security With AUTHORITY
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46You’re not alone in underestimating how easily authority can be faked! In this episode of the Learn Online Security Podcast, Richard Bankert and Chris Howells expose the hidden world of authority-based social engineering attacks — a psychological tactic hackers use to bypass security by posing as trusted figures. 🔍 What You’ll Learn: 📌What social e…
…
continue reading

1
Medicare Made Simple — What You Really Need to Know Before 65 | Boomers Bucks and Bling Episode 16
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Welcome to Boomers Bucks and Bling, where retirement planning gets a modern (and sometimes thrilling) twist! In this episode, host Carl Spiteri sits down with Medicare expert Keith Burkowski to take the confusion out of one of the most important decisions retirees will face: signing up for Medicare. Whether you’re approaching 65 or helping a loved …
…
continue reading
Top 5 Cybersecurity Policies Vital for IT Departments | Off The Wire Podcast Join Tanner and Anthony, seasoned IT executives with over 35 years of experience, as they debate the top five critical cybersecurity policies that every IT department should implement. From incident response plans to password policies, they break down the most vital measur…
…
continue reading

1
Milestones: More Than Just Markers in Time
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53Send us a text In this reflective episode of The Pink Room, Bryony Roberts compares milestones to birthdays, defined as fixed dates that can’t be moved, and moments that invite us to take stock of where we’ve been. Bryony discusses the importance of recognising both personal and professional growth, not just in terms of achievements, but in the exp…
…
continue reading

1
Back to School with Greg & Keri: Real Talk + Real Digital Marketing Tips
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32It’s officially back-to-school season—and not just for the kids! In this episode of the Code of Entry Podcast, Greg and Keri chat about the highs and lows of the first day back, the tech their kids are using (TI-84s still exist?!), and how schools are navigating digital evolution. But that’s not all… We dive deep into: 💻 When to revamp your website…
…
continue reading
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
…
continue reading
Send us a text In this Pink Room session, Bryony Roberts from Pragmatic Consultancy reflects on turning 50 and the ripple effects it had on her business routines. After a period of family celebrations, school holidays, and life’s inevitable interruptions, Bryony opens up about the challenge and importance of staying consistent in a small business. …
…
continue reading

1
Strictly Cyber EP 4 - Cyber Security Process and Policy
59:59
59:59
Play later
Play later
Lists
Like
Liked
59:59In this episode, James and I talk about something that doesn't get enough attention: the everyday habits that make or break your cyber security. Strong cyber security is not just about buying the right tech. It is about putting the right processes and policies in place to help your team make good decisions and avoid costly mistakes. In this episode…
…
continue reading

1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
…
continue reading

1
5 Years of Code of Entry: Retrospective, Real Talk & Lessons Learned
48:35
48:35
Play later
Play later
Lists
Like
Liked
48:35In this milestone episode, Greg and Keri raise a toast to five years of Code of Entry! 🥂 From launching a business during COVID to building a powerhouse team and embracing SEO, websites, and special projects, this candid conversation highlights what worked, what flopped, and what’s next. Whether you're an entrepreneur, digital marketing nerd, or ju…
…
continue reading

1
Boomers Bucks and Bling Ep. 15 | Why You Need a Living Trust Before Retirement
23:34
23:34
Play later
Play later
Lists
Like
Liked
23:34Boomers Bucks and Bling Ep. 15 | Why You Need a Living Trust Before Retirement Welcome back to Boomers Bucks and Bling—where retirement planning meets real talk, real strategy, and a little bit of sparkle ✨. In this episode, host Carl Spiteri sits down with estate planning attorney Danielle Barger, founding partner at Barger & Batiste Law. Together…
…
continue reading

1
E45 - Unlocking the Power of Low-Code Development with Adam W.
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Unlocking the Power of Low-Code Development with Adam W. In this episode of Off the Wire, hosts Tanner and Anthony are joined by Adam W., a Senior Workflow Engineer at Shift Four, to dive deep into the world of low-code and no-code development. Adam shares his journey from help desk technician to low-code expert, discusses the various levels of cod…
…
continue reading

1
AI Standards and Cybersecurity Education for Kids with Sam Bourgeois
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09In this episode, host Jethro Jones discusses the crucial topic of AI and cybersecurity with Sam Bourgeois, an experienced IT director with a background in private industry and education. The conversation covers the importance of AI standards, the ethical implications of AI use, and the need for cybersecurity awareness among young people. Sam introd…
…
continue reading
Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-f…
…
continue reading

1
Are you studying scams like athletes study game film?
24:53
24:53
Play later
Play later
Lists
Like
Liked
24:53Just like athletes review game film to win, you need to recognize the plays scammers run against you. In this perspective-changing episode of the Learn Online Security Podcast, we compare cybersecurity threats to professional sports strategy. 🎙️ Hosted by Tamara Michèle with experts Richard Bankert and Chris Howells, we uncover how most people are …
…
continue reading
Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and …
…
continue reading

1
Aligned by Design: CISO x Legal in Practice - Episode 92
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expe…
…
continue reading
8th July 2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan. https://x.com/todayininfosec/status/1942695691270193211 10th J…
…
continue reading

1
Dramatic changes in UK Supply Chain Security
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52This episode dives deep into UK Supply Chain Cyber Security, a critical and often overlooked area in today's digital world. So, what exactly is it? It's about securing the entire network of external partners, suppliers, and third-party services that your business relies on. Imagine your company as only as strong as its weakest link. In the UK, this…
…
continue reading

1
Every job can be a sustainability job, but you need a champion to keep you on the path...
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Send us a text In this episode of The Pink Room, host Bryony Roberts welcomes Kruti, Pragmatic Consultancy’s Sustainability Consultant, to share her journey from Mumbai to the UK and from architecture to impact. Kruti reflects on how her childhood, growing up in a multi-generational household where nothing went to waste, gave her an early appreciat…
…
continue reading
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
…
continue reading

1
E44 - Building Cyber Resilience Through Microsegmentation & Zero Trust
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Deep Dive into Microsegmentation for Cybersecurity Welcome to Off The Wire, the podcast that helps you curb your cybersecurity risk and tackle technology challenges. In this episode, hosts Tanner and Anthony discuss the concept of microsegmentation, its implementation, and its importance in improving network security. With decades of IT experience,…
…
continue reading

1
Belief Before Action: Belief Isn’t the Reward - It’s the Launch Pad
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28Send us a text We often think belief comes after we succeed, after we’ve proved ourselves, hit the milestone, or won the approval. But what if that’s backwards? In this empowering episode of The Pink Room, Bryony Roberts flips the script on how we see confidence and belief. She shares why believing in yourself is not something you earn at the finis…
…
continue reading
27th June 2007: Live Free or Die Hard was released. Cop John McClane partners with hacker Matt Farrell to stop cyberterrorists trying to take down the US's infrastructure. Traceroute (1337!) is used to find the ringleader's location, then McClane kills him by shooting HIS OWN shoulder. https://x.com/todayininfosec/status/1938731279937057144 1st Jul…
…
continue reading

1
Dumpster Disasters: How Medical Records End Up on the Streets
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03When private medical records are dumped in an alley, who really pays the price? In this episode of the Learn Online Security Podcast, Tamara Michèle and Chris Howells unpack a disturbing privacy breach involving discarded psychiatric files and the fallout that followed. They explore the real-life consequences of identity theft, how sensitive data c…
…
continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading

1
Strictly Cyber EP 3 - Cyber Security Technology to Keep Your Data Protected
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16In this episode of Strictly Cyber, James and I are talking all about the tech that keeps your business safe behind the scenes. We break down the key tools — like firewalls, antivirus, encryption and cloud backups — and explain how they actually work to protect your data. No jargon, no fluff, just real talk about what you need and why it matters. If…
…
continue reading
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
…
continue reading

1
Episode 69: Vendor Risk Oversight and Auditing
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
…
continue reading

1
Episode 68: Vendor Contracts, SLAs, and Performance Metrics
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
…
continue reading

1
Episode 67: Security Procurement: RFPs, RFIs, and Vendor Selection
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
…
continue reading

1
Episode 66: ROI and Cost-Benefit Analysis for Security Investments
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 64: Financial Management Principles for Security Leaders
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
…
continue reading

1
Episode 63: Strategic Security Planning Frameworks (TOGAF, SABSA)
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
…
continue reading

1
Episode 62: Aligning Security with Organizational Objectives
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
…
continue reading

1
Episode 61: Autonomous Security Operations Centers and Future Trends
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
…
continue reading