The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Cyber Risk Management Podcasts
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Podcasts, articles, and reference materials for Managed Service Providers. Brought to you by James Kernan and produced by Kernan Consulting.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Experiments in Risk Science
…
continue reading
The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
"On Aon" offers conversations between Risk Capital and Human Capital experts and guests about the Risk and People issues impacting businesses around the world. Each episode provides unique insights to help industry experts make better decisions across Trade, Technology, Weather and Workforce.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Bringing together the best technology and innovation for insurance and risk management together from around the world. Podcast hosted by Matthew Grant.
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Helping clients embrace risk and achieve peak business performance for over 150 years.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Conversations with Thailand is a bi-monthly podcast series by Deloitte Thailand. Listeners can expect to hear insights from subject matter experts across the different business domains that will benefit both organisations and individuals navigate through complexities of today's VUCA world.
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Enter the Boardroom lifts the veil on the secretive world of boards, giving you the information you need to get more board roles and become better board members. Join Nurole CEO Oliver Cummings as he sits down with the extraordinary people shaping today's and tomorrow's boardrooms.
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Preparing Organizations for Managing Crises
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Barry Kirby explores aspects of Human Factors, from practitioners in the field, through Processes and Tools that are useful (or not) and other Information and News that may be beneficial. For HF people to keep in touch and non-HF people to hear what we do.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Strategy. Execution. Results. Offering consulting, training & software solutions for companies building complex, highly regulated systems. Learn more @ www.321gang.com
…
continue reading
We are refining and redefining the sales game. A place where sales professionals can come to learn from other sales professionals and thought leaders who have mastered their craft. Real sales professionals. Real stories. Real results. Are you ready to feel the power?
…
continue reading
SaaS is seen as one of the best things that have ever happened in the world of software in terms of costs and ease of usage. But it’s not enough to embrace its advantages alone. There are two sides to a coin, and even SaaS has a lesser-known side that can harm businesses if left unattended. The dark side of SaaS involves shadow IT, security and compliance risks, and SaaS wastage. We’ve started this podcast series, “SaaS Whispers,” to focus on the inefficiencies and cost overruns posed by inc ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
Defense in Depth promises clear talk on cybersecurity�s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community�s insights to lead our discussion.
…
continue reading
Our goal for this series is to bring to listeners the latest insights on trending topics, delivered by specialists from Guy Carpenter and other organizations on the forefront of thought leadership.
…
continue reading
1
Exploring Cyber Risk Management: An Interview with Kevin Schmidt
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Overview: In this episode of the SMB Community Podcast, James Kernan interviews Kevin Schmidt from Coalition. They discuss the importance of cybersecurity and cyber risk management, focusing on Coalition's comprehensive approach that integrates cyber insurance with cybersecurity solutions. Kevin highlights the unique aspects of Coalition’s services…
…
continue reading
1
NCSAM Week 5 - The Evolution of Cyber Threats and Risk Reduction
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05NCSAM Week 5 - The Evolution of Cyber Threats and Risk ReductionBy Public Risk Management Association (PRIMA)
…
continue reading
1
Cyber Insurance Risk Management with Zane Goldthorp
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02In the third installment of this Shoptalk series, host David Carothers and guest Zane Goldthorp of ProWriters shift the focus to proactive risk management for cyber insurance. They make the case that even in a soft market, a responsible business owner's focus should be on security, not just on meeting minimum carrier requirements. The conversation …
…
continue reading
1
Dutch espionage arrest, DOD risk management framework, Oyster malvertising
8:00
8:00
Play later
Play later
Lists
Like
Liked
8:00Dutch teenagers arrested for attempted espionage for Russia DoD announces replacement for risk management framework Fake Microsoft Teams installers deliver Oyster malware Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing.…
…
continue reading
1
Week in Review: AI powered cyberattacks, Chinese time hacked, the 72 hour workweek
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests David Cross, CISO, Atlassian, and davidcrosstravels.com, and Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everyth…
…
continue reading
In this first episode of a special 12-part Power Producer Shop Talk series titled "Becoming the Protégé," host David Carothers introduces the contestants and coaches for The Protégé Season 3. Kicking off the series is Sam Louwrens (Can't shut up Sam on X), whose application video generated significant buzz. David sets the stage, explaining his moti…
…
continue reading
1
Jingle Thief exploit, Lazarus targets jobseekers, the 72 hour workweek
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Jingle Thief hackers steal millions in gift cards by exploiting cloud infrastructure Lazarus hackers targeted European defense companies Deep Tech work culture pushes for 72 hour workweeks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. T…
…
continue reading
1
CISO IT – Dmitri Alperovitch’s Vision for Cyber Defense, E07
22:31
22:31
Play later
Play later
Lists
Like
Liked
22:31In this episode, host Jason Kikta talks with Dmitri Alperovitch – CrowdStrike co-founder and chairman of the Automox board – about how speed and precision define modern cyber defense. Alperovitch explores how the OODA loop (Observe–Orient–Decide–Act), a concept rooted in military strategy, can help IT and security teams detect, respond, and adapt t…
…
continue reading
1
From Good to World-Class: Aligning Cybersecurity with Business Success
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10In this episode of Life of a CISO, Dr. Eric Cole breaks down what truly separates good CISOs from world-class ones — the ability to align cybersecurity strategy with the core business mission. He explains that understanding what business your organization is really in is the foundation of effective security leadership. Using real-world examples, Dr…
…
continue reading
1
Sales Follow Up Sequences: What Works Best in Cyber?
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26All links and images can be found on CISO Series. Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on this weekâ��s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining them is Alex Guilday, BISO, Royal Caribbean Group. In this episode: Timing the approach When persis…
…
continue reading
1
TP-Link urges updates, MuddyWater espionage campaign, flaw hits Adobe Commerce
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26TP-Link urges updates for Omada gateways MuddyWater targets organizations in espionage campaign "SessionReaper" flaw exploited in Adobe Commerce Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint prote…
…
continue reading
20 years after their paths first crossed, three Canadian security professionals regroup to discuss a new risk management strategy book based on hard won field experience. Patrick Hayes was a security strategist before organizations knew this was success differentiator. For decades he has been guiding organizations large and small, public, private a…
…
continue reading
1
Ep. 58 – From Forms to Data Precision: Telemetry’s Role in Cyber Underwriting – with Alex Jomaa
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21Telemetry is changing the underwriting game, enabling a shift from clunky forms to real-time, verifiable risk data. In this episode, host Anthony Hess sits down with Alex Jomaa, Chief Underwriting Officer at Onda, to explore how real-time data is transforming cyber underwriting, and why it’s time the industry stopped relying on outdated processes t…
…
continue reading
1
From Confusion to Clarity with Ashley Napier
55:43
55:43
Play later
Play later
Lists
Like
Liked
55:43In this episode of the Power Producers Podcast, host David Carothers and co-host Kyle Houck welcome back Ashley Napier of Solomon Strategic Advisors, a key supporter of Producers in Paradise. Ashley, who transitioned from an agency COO to a leadership consultant, shares her insights into the common struggles facing insurance organizations today. Th…
…
continue reading
1
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s …
…
continue reading
1
145. Thomas Thune Andersen: Impacting culture, managing IPOs and embracing the climate revolution - Boardroom Lessons from the former/Chair of Ørsted and Lloyd’s Register Group
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13Tune in to the conversation to hear about: The three moments that have had the biggest impact on how Thomas chairs today (01:48) International cultural differences every board member needs to know about (04:15) Practical steps to bridge cultural gaps with younger generations (6:22) The benefits of reverse mentoring versus surveys (12:15) How to de-…
…
continue reading
1
Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
…
continue reading
1
AI in Action: Transforming Crisis Preparedness, Training, and Exercises
46:27
46:27
Play later
Play later
Lists
Like
Liked
46:27In this episode of The PreparedEx Podcast, host Rob Burton sits down with Austin Cruz, Associate Director of Crisis Management and Strategic Innovation at Witt O’Brien’s and newly elected leader of the Business Continuity Institute’s AI Special Interest Group. Together, they explore how artificial intelligence is reshaping the world of crisis manag…
…
continue reading
1
S3 | E26: Building a Cyber Risk Playbook for the Post-CAT World
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Cybersecurity is evolving faster than many community banks and credit unions can keep pace with. With the retirement of the FFIEC Cybersecurity Assessment Tool (CAT) on August 31, 2025, financial institutions are left wondering how best to measure, track, and manage cyber risk without a regulator-endorsed standard. In this episode of the Banking on…
…
continue reading
1
AWS outage, NSA hacking accusations, High risk WhatsApp automation
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19DNS failure leads to AWS outage China accuses NSA of hacking national time center Chrome store flooded with high-risk WhatsApp automation Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection p…
…
continue reading
1
What’s Driving Global Benefits Strategy Today
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54October 21, 2025 435 words…about a minute read What’s new: In the latest episode of On Aon, Vice President of Global Benefits Kathryn Davis and Global Business Development Director of Global Benefits Celine Ng tong examine the findings from two important Aon reports: the 2025 Global Benefit Trends Study and the 2026 Global Medical Trend Rate Report…
…
continue reading
To “resign under unfavorable circumstances” generally means that an employee chose to resign from a job before being formally terminated or while facing serious workplace issues that reflect negatively on them. It often indicates the resignation was not entirely voluntary or amicable, but instead prompted by: Pending termination (e.g., the employer…
…
continue reading
1
Europol dismantles SIM farm, Envoy Air compromised, Everest claims Collins hack
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Europol dismantles 49 million fake account SIM farm Envoy Air confirms Oracle E-Business Suite compromise Cybercrime group Everest claims Collins Aerospace hack Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLocker deli…
…
continue reading
1
What are we still missing in catastrophe modelling? (377)
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11What are we still missing in catastrophe modelling and how can we close the gap? As part of InsTech’s The Future of Catastrophe Risk: Where Science Meets Reality event, this expert panel explored the limitations of current catastrophe models and how the insurance industry can evolve its approach to risk. Hosted by Ludovico Nicotina (Inigo), with in…
…
continue reading
1
Week in Review: Velociraptor pushes LockBit, Hartman loses nomination, Sotheby’s cyberattack
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Tom Hollingsworth, networking technology advisor, The Futurum Group, as well as on BlueSky, and Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, Vanta What’s your 2 AM security worry? Is it “Do I have the …
…
continue reading
1
Sotheby’s suffers cyberattack, Cisco “Zero Disco’ attacks, Microsoft revokes ransomware certificates
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Sotheby’s suffers cyberattack Hackers exploit Cisco SNMP flaw in “Zero Disco’ attacks Microsoft revokes more than 200 certificates to disrupt ransomware campaign Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out…
…
continue reading
1
Rethinking Risk: Data-Driven Decisions for Modern CISOs ft Tony Martin-Vegue
1:00:29
1:00:29
Play later
Play later
Lists
Like
Liked
1:00:29In this episode, Raj Krishnamurthy speaks with Tony Martin-Vegue, seasoned risk practitioner, speaker, and co-chair of the FAIR Institute San Francisco chapter. Tony shares decades of lessons learned from leading cyber risk management at Netflix, Gap, and other major enterprises—showing how to move from qualitative heat maps to quantitative insight…
…
continue reading
1
From Race Cars to Risk: Dual CISO-CTO Leadership with Ben Wilcox
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43In this high-speed episode of Life of a CISO, Dr. Eric Cole welcomes Ben Wilcox, a rare dual-role executive serving as both CISO and CTO at ProArch — and a race car driver to boot. Ben shares his 30-year journey from building websites in the early internet days to leading enterprise security and technology strategy today. Dr. Cole and Ben dive into…
…
continue reading
Overview: In this episode of the SMB Community Podcast, hosts James and Amy discuss weekend highlights and then dive into crucial advice for improving monthly cash flow for Managed Service Providers (MSPs). They emphasize the importance of collecting payments upfront, managing monthly subscription income, and understanding monthly burn rates. They …
…
continue reading
All links and images can be found on CISO Series. Check out this post by Evgeniy Kharam for the discussion that is the basis of our conversation on this weekâ��s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Ryan Dunn, Leader of Product and Supply Chain Technolo…
…
continue reading
1
Executive IT – Expert CFO Advice on Bridging IT and Business Strategy, E01
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43CFOs Ziad Fanous (Automox) and David Mehok (formerly CFO of Q2) join host Evan Kiely to break down how IT transformation drives real business value—not just cost savings. They share candid lessons from decades in finance leadership on: Aligning IT investments with company-wide goals Avoiding the pitfalls of tool consolidation and vendor lock-in Tra…
…
continue reading
1
MANGO discloses data breach, Jewelbug infiltrates Russian IT network, nation-state behind F5 attack?
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
…
continue reading
1
AI Governance in Education: Building Responsible Innovation with Keith Stouder of ACT
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13In this new, limited series of Risk Management: Brick by Brick, host Jason Reichl sits down with Keith Stouder, Vice President of Privacy and AI Governance at ACT for Episode 2 of ‘Documentation & Organization,’ for a fascinating conversation about building AI governance frameworks that enable innovation while managing risk responsibly. With nearly…
…
continue reading
1
Becoming the AI-First Agency with Kevin Surace
54:03
54:03
Play later
Play later
Lists
Like
Liked
54:03In this episode of the Power Producers Podcast, host David Carothers and co-host Kyle Houck are joined by Kevin Surace, an inventor, keynote speaker, and the "father of the virtual assistant." They take a high-energy deep dive into the present-day impact of Artificial Intelligence (AI) on the insurance industry. Kevin explains that the AI revolutio…
…
continue reading
1
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
…
continue reading
1
From Reaction to Resilience: Evolving Incident Management with Michael Civitano
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02In this episode, Manish speaks with Michael Civitano, Senior Security Manager of Intelligence and GSOC at ServiceNow, about transforming incident management from reactive firefighting to proactive resilience. They unpack how modern GSOCs can streamline incident detection and response through simplified processes, empowered teams, and the strategic …
…
continue reading
1
144. Professor Alison Taylor: Should boards speak up or shut up?
46:44
46:44
Play later
Play later
Lists
Like
Liked
46:44Professor Alison Taylor is a Clinical Associate Professor at NYU Stern School of Business and author of Higher Ground: How Business Can Do the Right Thing in a Turbulent World (Harvard Business Review Press, 2024). Tune in to hear her thoughts on: Why it’s so hard for businesses to be “good” (01:37) Should boards speak up or shut up on divisive iss…
…
continue reading
1
Patch [FIX] Tuesday – October 2025 [Game Engine Gremlins, Windows Hello Attacks, and Exchange Exploits], E24
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month’s most critical vulnerabilities — and why this batch of CVEs might just be the spookiest yet. The duo dives deep into: A Unity Engine remote code execution flaw that impacts games, VR apps, and even training tools The Windows …
…
continue reading
1
S3 | E25: Responsible Innovation: How Fintechs & Banks Can Align for the Future
27:52
27:52
Play later
Play later
Lists
Like
Liked
27:52What happens when innovation outpaces regulation - and when community banks must adapt to a world moving faster than ever before? In this episode of Banking on Data, Host Ed Vincent sits down with Phil Goldfeder, CEO of the American Fintech Council (AFC), to explore how fintechs and financial institutions can innovate responsibly - with clarity, co…
…
continue reading
1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
NCSAM Week 4 - Negotiating the Cyber Landscape - Traversing Threats and Implementing Strategies
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55NCSAM Week 4 - Negotiating the Cyber Landscape - Traversing Threats and Implementing StrategiesBy Public Risk Management Association (PRIMA)
…
continue reading
1
Mirroring Corporate Compliance Impact in Public Environments
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30Mirroring Corporate Compliance Impact in Public EnvironmentsBy Public Risk Management Association (PRIMA)
…
continue reading
1
Velociraptor pushes LockBit, Spain dismantles crime group, SonicWall SSL VPN breach
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
…
continue reading
1
FSO's Managing Insider Risk and Security Cleared Personnel
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06Created by professionals with over 50 years of expertise, Tru-Vetting revolutionizes security management. Their solutions enhance efficiency, turning complex security processes into simple operations. Tru-Vetting is your FSO companion, empowering your organization to focus on growth while keeping your business aligned with the latest policies and p…
…
continue reading
1
Julian Schoemig, CEO: Diesta: Why insurance still struggles to move money (376)
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15In this episode, Robin Merttens is joined by Julian Schoemig, CEO and Co-founder of Diesta, to explore why payments and settlements remain one of the insurance industry’s biggest unsolved problems, and what it will take to fix them. From his early days selling boxing machines to Munich pubs to underwriting aviation at Munich Re, Julian’s career has…
…
continue reading