Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Best Practices Podcasts

show episodes
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
Artwork

4
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
EDUCAUSE Exchange gathers the voices of the higher ed IT community to share advice, anecdotes, best practices, and more around topics important to our industry. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
IT Unplugged

M2 Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Leadership with Darrell W. Gunter is a program is to inform the audience of the best practices in Leadership and to share the practical steps to improve the efficiency and effectiveness of your business, sales team, departments, etc. Leadership focuses on the latest and hottest topics to ensure that our listener is kept abreast of the latest trends in leadership. Our interviews will focus on leaders from the international, national, and local communities to discuss their thoughts and best pr ...
  continue reading
 
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
Artwork

1
Out of the Hourglass

Nolan Consulting Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Out of the Hourglass, presented by Nolan Consulting Group, is here to help Small Business Owners and Contractors alike visualize their goals, develop their team & build sustainable growth. You'll hear from our panel of NCG Coaches on a variety of topics, guest speakers from top industry resources, Business Owners sharing best practices and a focus on strategies across sales, marketing, business planning, human resources and more. We're here to take you "out of the hourglass" and reach YOUR S ...
  continue reading
 
Artwork

1
Federal Executive Forum

Federal News Network | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Navigate every market. Accelerate every launch. Medical Device Global Market Access by Pure Global is the audio briefing that turns the world’s most confusing regulatory pathways into clear, actionable roadmaps. If you’re a MedTech founder, RA/QA leader, product manager, or investor who needs to get devices cleared anywhere from Austin to Abu Dhabi, this show is your shortcut. Why listen? • Step-by-step playbooks – We decode EU MDR, U.S. 510(k), Brazil’s ANVISA, China’s NMPA, and 25 + other ...
  continue reading
 
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
  continue reading
 
Artwork

1
REBOOT [Something]

Trilogy Innovations, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
REBOOT [something] is a video podcast hosted by Trilogy Innovations, Inc. Each episode we "reboot" a specific [topic] related to federal government IT contracting, cutting-edge technologies, products, services, standards, and best practices leveraged in the world software and systems engineering for government customers. The acquisition of federal operations has an immense impact on West Virginia's economy, and we believe that knowledge sharing and open discussions like these are the best wa ...
  continue reading
 
Artwork

1
InTechnology

Camille Morhardt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Artwork

1
CXO Voices

CXO REvolutionaries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
SecureBriefing

SecureBriefing

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
SecureBriefing is where we breakdown events or topics that are relevant to the security, safety, loss prevention, law-enforcement or cybersecurity industry. We don't go into great detail we just want to give you a 3-minute description.
  continue reading
 
Artwork

1
Compliance Therapy™

Risk. Security. Compliance. Get It Together.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
  continue reading
 
“The Phishing Report” is about technology and safely using these tools in today’s world. Whether you are in a big business, small business, governmental agency or nonprofit organization, protecting yourself from online harm and protecting your identity from theft is pretty important. Max Gibbard, from TeamLogic IT, in collaboration with special guests and subject matter experts in the cybersecurity arena, will share current research and best practices from across the industry. Each episode w ...
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
Ativion Pulse

Ativion Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Ativion Pulse is a podcast exploring the dynamic world of education technology and the critical role of secure remote access in today's learning environments. Join us as we delve into the latest trends, challenges, and best practices in ed-tech, featuring insightful conversations with industry experts, educators, and technology leaders. We'll discuss topics such as: Securing student data: Protecting sensitive information in a remote and increasingly digital world. Improving remote learning e ...
  continue reading
 
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
  continue reading
 
Loading …
show series
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Carlos Cruz, founder of Metanoia Consulting in Portugal. They discuss essential best practices for creating and managing policies, procedures, plans, and other documents for compliance with ISO standards and cybersecurity regulations. Carlos shares insights on the disti…
  continue reading
 
Guest: Craig H. Rowland, Founder and CEO, Sandfly Security Topics: When it comes to Linux environments – spanning on-prem, cloud, and even–gasp–hybrid setups – where are you seeing the most significant blind spots for security teams today? There's sometimes a perception that Linux is inherently more secure or less of a malware target than Windows. …
  continue reading
 
Canada's medical device market is a significant opportunity, but navigating its regulatory framework, the CMDR (SOR/98-282), is essential for market entry. This episode provides a comprehensive overview of the Canadian Medical Devices Regulations, from its risk-based classification system to licensing, quality management, and post-market surveillan…
  continue reading
 
This episode dissects the critical MDCG 2024-3 guidance issued in March 2024, which outlines the European Union's expectations for a Clinical Investigation Plan (CIP). We explore how this document harmonizes the EU MDR and ISO 14155:2020, establishing the best-practice blueprint for planning medical device studies. We break down the essential compo…
  continue reading
 
On this Month's episode of Smells Like Identity Hygiene, we chat with JetBlue Director IAM, Governance and Compliance, E. Angie WoodruffDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our webs…
  continue reading
 
This episode breaks down the essential requirements of the UK MDR 2002, outlining the critical transition deadlines for moving from CE marking to the new UKCA mark. We cover the specific dates manufacturers need to know for 2028 and 2030, the mandatory role of the UK Responsible Person (UKRP), and the conformity assessment process with UK Approved …
  continue reading
 
This episode demystifies the U.S. FDA's 21 CFR Part 812 regulation for Investigational Device Exemptions (IDEs). We explore the purpose of an IDE, the critical differences between significant and non-significant risk device studies, and the corresponding regulatory requirements for sponsors, investigators, and IRBs to ensure compliance during clini…
  continue reading
 
What if you could slash your hiring time from 44 days to just 5? In this can’t-miss interview, Chris Keith of Hirexe shares how his AI-powered platform is turning chaos into clarity for MSP recruitment. From scraping “real CV” data to delivering vetted candidates at lightning speed, Chris reveals the secrets behind his revolutionary process and how…
  continue reading
 
Uncle Marv welcomes Chris Champion, an entrepreneur deeply embedded in AI-powered business automation and podcasting. They cover AI's explosive growth, its impact on various industries including IT, legal, and transportation, and the necessity of integrating AI into workflows. Chris shares how AI agents help scale his productivity and how entrepren…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss: WinRAR Zero-Day Exploited in RomCom Attacks (1:44) New EDR Killer Popular with Ransomware Groups (4:30) Data Breach Reveal Kimsuky Inner Workings (11:31)…
  continue reading
 
This episode provides a comprehensive overview of the U.S. FDA's 21 CFR Part 11, detailing the essential compliance requirements for medical device companies using electronic records and signatures. We explore the core tenets of system validation, data integrity through audit trails, and the standards for legally binding electronic signatures, prov…
  continue reading
 
If you’ve ever dreaded those endless compliance audits, this one’s for you! I’m joined by Mark Heather from ComplianceAide, and we break down how MSPs can slash audit time by up to 85%, onboard in minutes, and deliver polished, board-ready compliance reports without adding a single person to the payroll. This AI-powered platform isn’t just fast — i…
  continue reading
 
Join Brandon as he sits down with Nick, Claims and Carrier Compliance Specialist at M2 Logistics, to explore the sophisticated world of freight fraud and how technology is being weaponized on both sides of this battle. In this episode, we dive deep into: How phishing attacks are targeting logistics brokers to steal credentials and post fraudulent l…
  continue reading
 
In episode 148 of Cybersecurity Where You Are, Sean Atkinson is joined by Rob Reese, Cyber Incident Response Team Manager at the Center for Internet Security® (CIS®); Dustin Cox, Cyber Incident Response Team Analyst at CIS; and Cliff Moten, Manager, Cybersecurity Solutions Engineering at CIS. Together, they discuss how organizations can use Managed…
  continue reading
 
Back in 2022, we sat down with Sheldon Stewart, Owner & President of Stewart Painting to talk about his early journey building a board of directors—well, we're back for round two to see how things have actually played out! This time we're joined by Sheldon's daughter Shayla Wilkinson, who's now wearing two hats as both marketing manager and board m…
  continue reading
 
Allegra Guinan of Lumiera helps leaders turn uncertainty about AI into confident, strategic leadership. In this conversation, she brings some actionable insights for navigating the hype and complexity of AI. The discussion covers challenges with implementing responsible AI practices, the growing importance of user experience and product thinking, a…
  continue reading
 
Join Brandon from M2 Technology as he sits down with Kelly and Aslinn from Women in Technology Northeast Wisconsin to discuss the real challenges facing women in tech and the practical steps everyone can take to create more inclusive workplaces. Key Topics Covered: -Why "you can't be what you can't see" matters in tech careers -Practical allyship s…
  continue reading
 
The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems. Join Secure Talk host Justin Beals for a critical co…
  continue reading
 
This episode dives into the FDA's monumental shift from the Quality System Regulation (21 CFR Part 820) to the new Quality Management System Regulation (QMSR). We break down the incorporation of ISO 13485:2016, the critical effective date of February 2, 2026, and the specific additions and changes manufacturers must be aware of. We cover the new te…
  continue reading
 
Hey friends — in this one I talk with Dexter Caffey from Smart Eye Technology about stopping cybercriminals with continuous biometric security. No keys, no fobs — just your face and a camera. From banks and law firms to medical offices, this could be the next standard for MSP security. Why Listen: Learn how continuous authentication works Stop remo…
  continue reading
 
Choosing a network monitoring platform isn’t one-size-fits-all. In this episode, I compare Auvik and Domotz head-to-head, sharing my hands-on experiences and candid MSP feedback. We’ll talk integrations, multi-site dashboards, NetFlow analytics, and reverse proxy simplicity. You’ll hear real-world pros and cons to help you avoid costly trial-and-er…
  continue reading
 
🎙️ New Episode of Leadership with Darrell W. Gunter 🎙️ In this episode, I’m joined by Sol Rosenberg, Chief Revenue Officer at Underline Science, for an insightful conversation you won’t want to miss. We dive into the critical question: “Why Should You Record Your Conference?” — exploring how event organizers can boost both revenue and reach by reth…
  continue reading
 
Guest: Dominik Swierad, Senior PM D&R AI and Sec-Gemini Topics: When introducing AI agents to security teams at Google, what was your initial strategy to build trust and overcome the natural skepticism? Can you walk us through the very first conversations and the key concerns that were raised? With a vast array of applications, how did you identify…
  continue reading
 
This episode provides a detailed overview of the FDA's Premarket Approval (PMA) process, governed by 21 CFR Part 814. We explore the requirements for Class III medical devices, the necessary components of a PMA submission, including non-clinical and clinical data, the FDA's review timeline and procedures, and the post-approval responsibilities of m…
  continue reading
 
This episode breaks down the FDA's transformative final guidance on medical device cybersecurity issued in September 2023. We explore the new legal authorities granted by the Food and Drug Omnibus Reform Act (FDORA), the definition of a "cyber device," and the critical requirements for premarket submissions, including the Secure Product Development…
  continue reading
 
This episode breaks down the essential steps for medical device manufacturers with FDA clearance to successfully enter the post-Brexit UK market. We clarify why FDA approval isn't recognized by the MHRA and detail the two main pathways to achieving UKCA certification: leveraging the CE mark transition period and direct conformity assessment. Learn …
  continue reading
 
Hosts: Justin Shelley - https://unhackmybusiness.com Bryan Lachapelle - https://www.b4networks.ca/ Guest: Jolie Grace Wareham, CEO of Protosec - https://protasec.com/ Your vendors could be your biggest cybersecurity weakness. In this eye-opening episode, cybersecurity advisor Jolie Grace Wareham shares a real case where a small business lost a sign…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Jocelyn Houle - https://www.jocelynhoule.com/ Small businesses are racing to adopt AI, but most are unknowingly creating massive security vulnerabilities. In this episode, veteran AI expert Jocelyn Houle reveals why "everything is a data …
  continue reading
 
Dan sits down with guests Mark Daniel Ward and Katie Sanders from The Data Mine at Purdue University to explore how higher education is evolving to meet the demands of the AI-driven workforce. They share how their program blends interdisciplinary learning, corporate partnerships, and real-world data science projects to better prepare students acros…
  continue reading
 
This episode demystifies the Medical Device Single Audit Program (MDSAP), a unified approach that allows MedTech manufacturers to satisfy the quality management system requirements of five major markets—Australia, Brazil, Canada, Japan, and the U.S.—through a single audit. Learn about its history, the audit cycle, and the specific benefits for acce…
  continue reading
 
Join me as I chat with Nat about the transition from managed services to building an AI-driven solution for ticket management and documentation. Nat shares candid insights from the PitchIT bootcamp, talks integrations with IT Glue and other platforms, and reveals their vision for empowering techs and boosting MSP margins. Whether it’s learning how …
  continue reading
 
Securing FDA approval is a major milestone, but it's only the first step for entering the Saudi Arabian market. This episode breaks down the essential, non-negotiable requirements of the Saudi Food and Drug Authority (SFDA) for medical device listing. We detail the mandatory Technical File Assessment (TFA) route, the crucial role of the in-country …
  continue reading
 
What does it really mean to sell your MSP and stay in the game? On this episode, I chat with Paco LeBron—fresh off selling a majority stake in ProdigyTeks and stepping up as CEO for MSP Owners Group. Paco drops hard-won insights on leadership, the pitfalls of transactional M&A, and why a company’s soul matters more than just financials. If you want…
  continue reading
 
Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into: Akira Ransomware Exploiting a Potential Zero Day Plague Backdoor Emerges as Silent Intruder Evolving Tactics of North Korean Att…
  continue reading
 
This episode demystifies the process of obtaining medical device approval in Japan for companies that already have FDA clearance. We explore the critical differences between the two systems and outline the essential steps manufacturers must take, from appointing a local representative to preparing a Japan-specific submission dossier and navigating …
  continue reading
 
I sit down with cybersecurity thought leader David Meister, who leads global MSP efforts at Check Point Software, to talk big trends and smart strategies for MSPs in 2025. We dissect Checkpoint’s new ransomware report, the rise of AI-powered phishing emails, and why attackers are shifting focus to extortion. David gets candid about the challenges o…
  continue reading
 
In episode 147 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security® (CIS®); and Kaitlin Drape, Hybrid Threat Intelligence Analyst at CIS. Together, they discuss how to actualize threat intel for the purpose of building effective de…
  continue reading
 
This episode demystifies the process for medical device manufacturers who have U.S. FDA approval and are targeting the Indian market. We clarify that while FDA registration is beneficial, it does not replace the mandatory import license from India's Central Drugs Standard Control Organization (CDSCO). We outline the essential steps, including appoi…
  continue reading
 
Jim Langevin, former chair of the Congressional Cyber Caucus and Democratic Congressman from Rhode Island, reflects on his belief that cybersecurity remains a bipartisan issue. He emphasizes the importance of collaboration between government and the private sector, and the potential of artificial intelligence in enhancing cybersecurity. Timestamps:…
  continue reading
 
What does cybersecurity look like when you're protecting the world's largest streaming service and content studio? Jason Chan, who built and led Netflix's security team for over a decade, takes us behind the scenes of securing one of the most transformative companies in modern history. From Netflix's humble beginnings as a DVD-by-mail service to it…
  continue reading
 
Guest: Kim Albarella, Global Head of Security, TikTok Questions: Security is part of your DNA. In your day to day at TikTok, what are some tips you’d share with users about staying safe online? Many regulations were written with older technologies in mind. How do you bridge the gap between these legacy requirements and the realities of a modern, mi…
  continue reading
 
Join State Treasurer Rachael Eubanks and her guest, Ryan Laruwe, executive director of Treasury’s Michigan Infrastructure Council (MIC) as they discuss MIC's new 'Dig Once' Portal, the Asset Management Champions training program, and the importance of infrastructure work to all Michiganders. RESOURCES Michigan Infrastructure Council (MIC) website M…
  continue reading
 
What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
  continue reading
 
This episode explores the process for medical device manufacturers to enter the South Korean market after receiving FDA approval. We delve into the specifics of the Ministry of Food and Drug Safety (MFDS) requirements, comparing its risk-based classification and submission pathways to the U.S. system. The discussion focuses on the practical steps f…
  continue reading
 
This episode demystifies the globally recognized standard IEC 62366-1:2015, which governs the application of usability engineering to medical devices. We explore how this process-oriented standard is critical not just for user satisfaction, but for ensuring patient safety by minimizing use-related risks. Learn about the key phases, from defining us…
  continue reading
 
This episode delves into the critical cybersecurity standard IEC 81001-5-1, published in 2021. We explore its origins, its comprehensive lifecycle approach to securing health software, and its growing importance for regulatory approval in key global markets like the EU, US, and Japan. Manufacturers will learn what the standard requires and why comp…
  continue reading
 
We unpack how AI is reshaping hiring decisions, shifting job roles, and creating new expectations for professionals — from engineers to marketers. They explore the rise of AI-assisted teams, the growing compensation bubble, why continuous learning is now table stakes, and how some service providers are quietly riding the AI wave. Featuring: Chris B…
  continue reading
 
This episode demystifies the Medical Device Single Audit Program (MDSAP), a framework allowing a single audit to satisfy the regulatory requirements of five different countries. We explore its history, the participating authorities, the benefits for manufacturers—including reduced audit fatigue and faster market access—and how the program streamlin…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play