Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Cybersecurity Best Practices Podcasts
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Description: Creating AI Trust is a very complex and hard problem. It is not clear what it is and how it can be operationalized. We will demystify what is Trustworthy AI, efficient adoption and leveraging it for reducing risks in AI programs. McKinsey reports indicates companies seeing the biggest bottom-line returns from AI—those that attribute at least 20 percent of EBIT or profitability to their use of AI—are more likely than others to follow Trustworthy AI best practices, including expla ...
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
REBOOT [something] is a video podcast hosted by Trilogy Innovations, Inc. Each episode we "reboot" a specific [topic] related to federal government IT contracting, cutting-edge technologies, products, services, standards, and best practices leveraged in the world software and systems engineering for government customers. The acquisition of federal operations has an immense impact on West Virginia's economy, and we believe that knowledge sharing and open discussions like these are the best wa ...
…
continue reading
Leadership with Darrell W. Gunter is a program is to inform the audience of the best practices in Leadership and to share the practical steps to improve the efficiency and effectiveness of your business, sales team, departments, etc. Leadership focuses on the latest and hottest topics to ensure that our listener is kept abreast of the latest trends in leadership. Our interviews will focus on leaders from the international, national, and local communities to discuss their thoughts and best pr ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
EDUCAUSE Exchange gathers the voices of the higher ed IT community to share advice, anecdotes, best practices, and more around topics important to our industry. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Out of the Hourglass, presented by Nolan Consulting Group, is here to help Small Business Owners and Contractors alike visualize their goals, develop their team & build sustainable growth. You'll hear from our panel of NCG Coaches on a variety of topics, guest speakers from top industry resources, Business Owners sharing best practices and a focus on strategies across sales, marketing, business planning, human resources and more. We're here to take you "out of the hourglass" and reach YOUR S ...
…
continue reading
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
…
continue reading
The CompTIA IT Fundamentals+ PrepCast is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and launc ...
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Navigate every market. Accelerate every launch. Medical Device Global Market Access by Pure Global is the audio briefing that turns the world’s most confusing regulatory pathways into clear, actionable roadmaps. If you’re a MedTech founder, RA/QA leader, product manager, or investor who needs to get devices cleared anywhere from Austin to Abu Dhabi, this show is your shortcut. Why listen? • Step-by-step playbooks – We decode EU MDR, U.S. 510(k), Brazil’s ANVISA, China’s NMPA, and 25 + other ...
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
…
continue reading
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
…
continue reading
A interview series where information security marketing executives share their stories, insights, best practices. For more information, check out: https://cybersecuritysalesinsider.substack.com and https://aphinia.com/
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
1
Podcast Gurus: Interviews on Podcasting, Podcast Growth, Podcast Marketing, Content Strategy & PR
GHA Marketing Ltd
The weekly interview show where podcasters, PRs, business & marketing leaders come to talk about the best practices in podcasting. You can listen to all our episodes and read our articles on https://ghapodcast.com/. Topics for the show include: B2B Marketing, B2B Podcasting, Podcasting, Podcast, B2B Lead Generation, Lead Gen, Backlink Generation, SEO Optimization, PR with podcasting
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
SecureBriefing is where we breakdown events or topics that are relevant to the security, safety, loss prevention, law-enforcement or cybersecurity industry. We don't go into great detail we just want to give you a 3-minute description.
…
continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
continue reading
1
AAOS Now Podcast
American Academy of Orthopaedic Surgeons | American Association of Orthopaedic Surgeons
Welcome to the new AAOS Now podcast — part of The Bone Beat Orthopaedic Podcast Channel. Each episode offers expert insight and advice to help orthopaedic surgeons stay informed, enhance their practices, and provide the best possible care for their patients. The AAOS Advocacy Podcast has wrapped, but you can still listen to or download past episodes here. The AAOS Now Podcast will also cover orthopaedic advocacy topics in upcoming episodes. Brought to you by the American Academy of Orthopaed ...
…
continue reading
“The Phishing Report” is about technology and safely using these tools in today’s world. Whether you are in a big business, small business, governmental agency or nonprofit organization, protecting yourself from online harm and protecting your identity from theft is pretty important. Max Gibbard, from TeamLogic IT, in collaboration with special guests and subject matter experts in the cybersecurity arena, will share current research and best practices from across the industry. Each episode w ...
…
continue reading
Overwhelmed by CMMC? It doesn't have to be an expensive nightmare. Learn about assessments, timelines, and practical steps to achieve compliance without the jargon.
…
continue reading
1
Best Practices for Writing Policies and Procedures | Interview with Carlos Cruz
1:23:00
1:23:00
Play later
Play later
Lists
Like
Liked
1:23:00In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Carlos Cruz, founder of Metanoia Consulting in Portugal. They discuss essential best practices for creating and managing policies, procedures, plans, and other documents for compliance with ISO standards and cybersecurity regulations. Carlos shares insights on the disti…
…
continue reading
1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading
1
Navigating FDA Export Certificates: Timelines, Fees, and 2024 Updates
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55This episode demystifies the process of obtaining a Certificate to Foreign Government (CFG), also known as a Free Sale Certificate (FSC), from the US FDA. We cover the official timelines for issuance, the specific government fees you can expect to pay, and the critical procedural shift to electronic-only certificates that took effect in early 2024.…
…
continue reading
1
Certificate of Free Sale: Who Is Eligible to Apply?
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20This episode clarifies the complex eligibility requirements for obtaining a Certificate of Free Sale (FSC) for medical device exports. We dissect the critical differences between the regulatory frameworks in the United States and the European Union, explaining precisely who—from manufacturer to exporter to authorized representative—can legally appl…
…
continue reading
1
Internship Rewind - Class of 2025 Retrospective
53:56
53:56
Play later
Play later
Lists
Like
Liked
53:56Welcome to the REBOOT [Something] podcast by Trilogy Innovations and hosted by Farrah Ahmed (Digital Marketing Intern 2025). As our 2025 internship comes to a close, we sat down with this year's interns to look back upon the last 12 weeks of progress, lessons learned, and accomplishments achieved. From the impacts of personal mentorship to the chal…
…
continue reading
1
AI Red Teaming Guide for Beginners in 2025
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16This episode delves into the critical field of AI Red Teaming, a structured, adversarial process designed to identify vulnerabilities and weaknesses in AI systems before malicious actors can exploit them. The Certified AI Security Professional (CAISP) course is specifically designed to advance careers in this field, offering practical skills in exe…
…
continue reading
1
Unlocking the FDA 510(k) with Your Japanese PMDA Approval
3:05
3:05
Play later
Play later
Lists
Like
Liked
3:05Many companies believe that getting medical device approval in Japan might fast-track their entry into the U.S. market. This episode breaks down that misconception and reveals the strategic pathway that actually exists. We explore how the FDA’s Abbreviated 510(k) program allows manufacturers to leverage their existing PMDA data, focusing on the cru…
…
continue reading
1
From China to Brazil: Navigating ANVISA without NMPA Reliance
3:52
3:52
Play later
Play later
Lists
Like
Liked
3:52This episode clarifies whether a medical device approved by China's NMPA can benefit from an expedited registration process with Brazil's ANVISA. We detail the full Brazilian regulatory requirements, including classification, the role of a Brazil Registration Holder (BRH), B-GMP certification, and the AREE program, explaining why NMPA approval does…
…
continue reading
1
From Brazil to the US: Unpacking ANVISA and FDA 510(k) Pathways
3:44
3:44
Play later
Play later
Lists
Like
Liked
3:44This episode tackles a common question from MedTech manufacturers: can a successful ANVISA registration in Brazil streamline the path to FDA 510(k) clearance in the United States? We explore the reality of regulatory reliance between these two key markets, clarifying the one-way nature of current frameworks and outlining how your existing ANVISA te…
…
continue reading
1
The Cybersecurity Podcast Model to Build Trust without Ads, Sponsors or Marketing - Dave Chatterjee
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Look into the "3 Ways to Generate Leads With Your Podcast" E-book for free here on our website! (https://ghapodcast.com) In this episode of Podcast Gurus, we sit down with Dave Chatterjee, professor at Duke University, author of Cybersecurity Readiness: A Holistic and High-Performance Approach, and host of the Cybersecurity Readiness Podcast. Dave …
…
continue reading
1
AI and Third-Party Security "Danger Zone": 2025 Annual Data Security and Compliance Risk Report
55:35
55:35
Play later
Play later
Lists
Like
Liked
55:35Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks' Data Security and Compliance Risk: 2025 Annual Survey Report, which introduces the industry's first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterpr…
…
continue reading
1
From NMPA to CE Mark: Bridging the Regulatory Gap
3:55
3:55
Play later
Play later
Lists
Like
Liked
3:55This episode breaks down the essential differences between China's NMPA approval and the EU's rigorous MDR CE marking process. We explore the key gaps in regulatory philosophy, clinical data requirements, and post-market surveillance that manufacturers must bridge to expand from the Chinese to the European market.Key Questions:• Is my NMPA approval…
…
continue reading
1
Podnutz Pro Replay “Time to Make the Donuts” (EP 898)
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39Floods, failed DIY, and donut debates! This episode covers everything from home catastrophes to the practical realities of IT support when clients do things their own way. This episode with Matt delivers more laughs, hard lessons, and hands-on IT advice than a week in the field. Why listen: Learn how a simple bathtub disaster led to a total home ov…
…
continue reading
Listen as Technology Solutions Consultant Aida Dillman from Osaic talks about the importance of integrations. Aida defines what integrations are, the three major types, and what steps you can take to use them in your practice. With integrations, you can reduce errors, reduce manual entry of data, and save valuable time.…
…
continue reading
1
Salesforce Attack Fallout, Axios Abuse, and Cloud Ransomware
23:19
23:19
Play later
Play later
Lists
Like
Liked
23:19Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John & detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31) Storm-0501 Shifts Ransomware Attacks to Cloud (6:36) APT29 Microsoft 365 Campaign Disrupted (1…
…
continue reading
1
From NMPA to FDA: Leveraging China Approval for U.S. Market Entry
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This episode details the process for medical device manufacturers to obtain FDA 510(k) clearance in the United States after securing Class III approval from China's NMPA. We explain that there is no direct reciprocity and outline how to strategically leverage existing Chinese technical documentation, clinical data, and testing reports. The focus is…
…
continue reading
1
From Tokyo to Brussels: Navigating the EU MDR After Japan Shonin
3:24
3:24
Play later
Play later
Lists
Like
Liked
3:24Securing Shonin approval in Japan is a huge regulatory achievement, but it doesn’t guarantee a simple path to the European market. This episode breaks down the key differences between Japan's PMD Act and the EU's demanding Medical Device Regulation (MDR). We explore the critical gaps manufacturers must address in their Quality Management System, te…
…
continue reading
1
The Money Mindset Shift for Entrepreneurs to Regulate Stress and Find True Security with Erin Gray
42:28
42:28
Play later
Play later
Lists
Like
Liked
42:28Look into the "3 Ways to Generate Leads With Your Podcast" E-book for free here on our website! (https://ghapodcast.com) In this episode of Podcast Gurus, we sit down with Erin Gray, founder of Generate a Life Well Lived and creator of the Your Money, Your Rules podcast. Erin blends financial wisdom with spiritual and energetic principles to help p…
…
continue reading
Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. Rob Lee is the Chief of Research and Head of Faculty at SANS Institute and runs his own consulting business specializing in information security, incident response, threat hunting, and digital forensics. With more than 20 years of e…
…
continue reading
1
Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42In episode 151 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode: 01:12. The importance of consolidating security operations and using what already exists 03:18. The promise of g…
…
continue reading
1
Ep. 245: Don’t Hit Snooze on 2026 Planning – Why Now is the Time to Start Your Annual Plan
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39When the Summer days start fading, we start planning! Today we’re diving into the importance of starting your 2026 planning now - at the very least, getting those dates on the calendar in October or November. From vision setting and SWOT analysis to identifying Planning Discussion Items and breaking them into 90-day action steps, we explore the too…
…
continue reading
1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading
1
From Europe to Down Under: A Guide to TGA Approval with Your CE Mark
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27This episode breaks down the process of using your existing European CE Marking to register a medical device in Australia. We cover the essential role of Manufacturer's Evidence, the TGA's application process and timelines, potential audits, and the latest on fees and charges, providing a clear roadmap for MedTech companies looking to enter the Aus…
…
continue reading
1
66. Turn Hackers Into Your Security Team - with Grant McCracken
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ | Bryan Lachapelle - https://www.b4networks.ca/ Guest: Grant McCracken - https://darkhorse.sh What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug …
…
continue reading
1
Season 1 - Episode 14 (Pedro Kertzman & Sam Flockhart)
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17How does a military intelligence background translate to cyber threat intelligence? Sam Flockhart, a former UK military intelligence operator who now heads threat management at a global bank, reveals the fascinating journey and powerful parallels between these worlds. Sam opens up about his transition from conventional military intelligence to the …
…
continue reading
1
Al Meets Identity: A Conversation at the Cyber Frontier with Ed Amoroso
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58On this Month's episode of Smells Like Identity Hygiene, we chat with Founder and CEO of TAG Infosphere Ed AmorosoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHER…
…
continue reading
1
Operationalizing Responsible AI in Healthcare
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Today in Trustworthy AI: De-risk adoption of AI I am honored to be speaking with a industry thought leader Nicoleta J. Economou-Zavlanos, PhD, is the Director of the Duke Health - AI Evaluation & Governance Program and the founding director of the Algorithm-Based Clinical Decision Support (ABCDS) Oversight initiative. She leads Duke Health’s effort…
…
continue reading
1
De Novo Submissions: Will Your CE Mark Data Pass FDA Scrutiny?
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48This episode explores how medical device manufacturers can effectively use their existing CE mark clinical data for an FDA De Novo submission for a novel technology. We delve into the FDA's expectations for foreign data, common gaps between EU and US requirements, and the strategic importance of the Pre-Submission program to de-risk market entry.• …
…
continue reading
1
From Europe to Japan: Leveraging Your CE Mark for PMDA Approval
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53Navigating Japan's rigorous PMDA approval process can be challenging, even for devices that already have a CE mark. This episode demystifies the requirements for a Shonin application, explaining how manufacturers can leverage their existing CE mark data. We break down the critical differences and synergies between the EU and Japanese regulatory sys…
…
continue reading
1
CE Mark to FDA 510(k): A Guide for MedTech Manufacturers
3:24
3:24
Play later
Play later
Lists
Like
Liked
3:24This episode demystifies the process for manufacturers who have an EU CE mark under the MDR and are seeking FDA 510(k) clearance. We break down the crucial differences and similarities between the two regulatory systems, explaining how to leverage existing technical documentation and what new requirements and strategic considerations, like selectin…
…
continue reading
1
From Europe to Brazil: Bridging the CE Mark and ANVISA Gap
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09This episode demystifies the process of bringing a CE-marked medical device to the Brazilian market. We break down the critical differences between European requirements and Brazil's ANVISA regulations, focusing on the essential documentation, testing, and certification gaps that manufacturers must address for successful registration.• Is a CE mark…
…
continue reading
1
From MDR to NMPA: A Strategic Guide to China Market Entry
3:22
3:22
Play later
Play later
Lists
Like
Liked
3:22This episode details the strategic process for transitioning a medical device with a European CE mark under MDR to achieve Class II or III registration with China's NMPA. We break down the unique requirements, from local representation to in-country testing and clinical evaluation pathways, providing a clear roadmap for manufacturers looking to ent…
…
continue reading
1
How Lawyers Can Build Credibility and Grow Practices through Podcasting with J. Craig Williams
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21Look into the "3 Ways to Generate Leads With Your Podcast" E-book for free here on our website! (https://ghapodcast.com) In this episode of Podcast Gurus, we're joined by J. Craig Williams, a renowned trial lawyer, founder of The Williams Law Corporation, and host of the legal podcast Lawyer 2 Lawyer. Craig shares his journey from starting his own …
…
continue reading
Matt Mulcahy shares the blueprint for launching MSP Cyber in 2025. We cover what it really costs, what tools matter, where MSPs are going wrong with value, and why combining IT with digital marketing is a game-changer. Why Listen: Learn the real startup costs of an MSP today Why Miami’s IT market is still wide open Shifting value away from just hel…
…
continue reading
1
From CE to UKCA: Navigating the UK Medical Device Transition
3:49
3:49
Play later
Play later
Lists
Like
Liked
3:49This episode breaks down the essential steps for medical device manufacturers with a CE mark to comply with UK regulations for Great Britain. We cover the extended deadlines for CE mark recognition, the immediate requirements for MHRA registration and appointing a UK Responsible Person (UKRP), and the process for achieving UKCA conformity assessmen…
…
continue reading
1
Unlocking the Canadian MedTech Market: Beyond the CE Mark
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30This episode demystifies the process for CE-marked device manufacturers to obtain a Health Canada Medical Device Establishment Licence (MDEL) for selling in Canada. We break down the crucial differences between an MDEL and a product-specific Medical Device Licence (MDL), clarify who needs to hold an MDEL, and explain why having a CE mark is not a s…
…
continue reading
1
IT Modernization and Transformation Strategies in Government Progress and Best Practices 2025
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00How are government leaders are transforming legacy systems, streamlining operations and harnessing cutting-edge technologies to deliver better services? See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading
1
New Silk Typhoon Attacks, the Cybercriminal Recruitment Underworld, and More!
26:26
26:26
Play later
Play later
Lists
Like
Liked
26:26Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40) Hackers Abuse Linux Files to Drop Malware (3:50) Silk Typhoon Attacks Cloud Supply Chains (7:21) ReliaQuest Uncovers Cybercr…
…
continue reading
Daniel and Chris sit with Citadel AI’s Rick Kobayashi and Kenny Song and unpack AI safety and security challenges in the generative AI era. They compare Japan’s approach to AI adoption with the US’s, and explore the implications of real-world failures in AI systems, along with strategies for AI monitoring and evaluation. Featuring: Rick Kobayashi –…
…
continue reading
1
Ep. 244: Beating the Drum – Setting the Table for Sales Success with Gavin Hepp
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45Join us as we welcome Gavin Hepp, Co Founder of Webfoot Home Improvements and newest addition to the Nolan Sales Coaching team. Gavin shares his passion for "Setting the Table" - the critical foundation of every successful sales interaction that makes customers comfortable and sets clear expectations from the start. We dive deep into practical comm…
…
continue reading
1
Cracking the Code: Japan's PMD Act & QMS Requirements
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25This episode provides a focused guide to Japan's medical device regulations. We explore the relationship between the overarching PMD Act and the detailed QMS requirements of MHLW Ordinance 169. Learn about the crucial 2021 harmonization with ISO 13485:2016, the key differences that remain, and how the Japanese audit process presents unique challeng…
…
continue reading
1
Episode 150: A Roundtable Chat to Celebrate 150 Episodes
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27In episode 150 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Chad Rogers, Sr. Manager, Digital Media Services, at the Center for Internet Security® (CIS®); Rudy Uhde, Video Editor at CIS; and David Bisson, Sr. Content Strategist at CIS. Together, they use a roundtable chat to celebrate 150 episodes of Cybersecurity Wher…
…
continue reading
1
Radia Perlman: Spanning Tree, Networking Lessons & SharkFest Keynote
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18In this special interview, I sit down with Radia Perlman — the visionary computer scientist and inventor of the Spanning Tree Protocol (STP), often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today. Radia shares her journey as a pioneer in networkin…
…
continue reading
1
Cyber Crises & Lessons Learned DDOS US Stock Markets
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41Disaster.Stream takes you inside the world of high-stakes cyber incidents and recovery operations, where seconds matter and lessons shape the future. Hosted by veteran network forensics expert Bill Alderson, this show unpacks the anatomy of disasters—from stock market outages to military communications failures—revealing what really happened, how t…
…
continue reading
1
Pentagon 9/11 Recovery: Lessons in Crisis Response & Readiness
1:04:38
1:04:38
Play later
Play later
Lists
Like
Liked
1:04:38On September 11, 2001, the Pentagon was left crippled by fire, water damage, and destroyed infrastructure after the terrorist attack. Days later, armed guards escorted my team and me into the still-smoldering building to restore critical communications for the U.S. Department of Defense. In this episode, I share that story firsthand — what it was l…
…
continue reading
1
US Military Biometric Systems: Digital War Lessons from Iraq
59:49
59:49
Play later
Play later
Lists
Like
Liked
59:49In this episode of the Disaster.Stream Podcast, host Bill Alderson takes you inside one of the most critical — and least understood — battles of the Iraq and Afghanistan wars: the fight to keep U.S. military biometric intelligence systems running in the middle of the digital war. Bill recounts how he was called by Army G2 at the Pentagon and deploy…
…
continue reading
1
When ATMs Fail: Banking Outages, Black Swans & Digital Risk
1:11:37
1:11:37
Play later
Play later
Lists
Like
Liked
1:11:37In this episode of the Disaster.Stream Podcast, host Bill Alderson sits down with Bill Genovese, CIO Executive Advisor at Kyndryl, to explore one of the most high-stakes failures in modern banking: a nationwide ATM outage during a holiday weekend. Drawing from decades of global experience with IBM, Kyndryl, and Big Four consulting, Genovese shares …
…
continue reading
1
Is Your Insurance Broker Really On Your Side?
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Manufacturing insurance Wisconsin | Risk management consultant | USI Insurance Services | Business insurance broker advocacy Is your insurance broker truly advocating for you? In this episode of IT Unplugged, we sit down with Stephanie Lee, Senior Risk Management Consultant at USI Insurance Services, to discuss how manufacturers can tell if their i…
…
continue reading
Ever been told, “You’re too expensive”? Yeah, me too. In this episode, I share how I deal with prospects who quote me lower rates from “their guy” — and why I never match those prices. Instead, I focus on flipping the conversation to value, downtime costs, and the trust that keeps clients with me for decades. Why Listen: Learn why I never match low…
…
continue reading