Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Best Practices Podcasts

show episodes
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

51
IT Unplugged

M2 Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork
 
Changing Channels uncovers what it takes to get the next generation of technology to market. Join Larry Walsh, chief analyst and CEO of Channelnomics, for candid conversations with thought leaders, channel chiefs, and partner executives sharing actionable insights, best practices, and lessons learned in a channel that’s constantly changing. Each episode provides expert go-to-market guidance for enhanced performance in the channel.
  continue reading
 
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Artwork
 
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
The ADAS Empowered Podcast aims to educate, inform, and empower industry professionals—collision repair shops, calibration technicians, insurers, and OEMs—on the latest advancements in ADAS technology, calibration best practices, and regulatory trends. The podcast serves as a platform for thought leadership, industry collaboration, and knowledge sharing to ensure safer and more efficient vehicle repairs. For more information at Revv visit us at revvhq.com
  continue reading
 
Leadership with Darrell W. Gunter is a program is to inform the audience of the best practices in Leadership and to share the practical steps to improve the efficiency and effectiveness of your business, sales team, departments, etc. Leadership focuses on the latest and hottest topics to ensure that our listener is kept abreast of the latest trends in leadership. Our interviews will focus on leaders from the international, national, and local communities to discuss their thoughts and best pr ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
  continue reading
 
Artwork

1
PurePerformance

PurePerformance

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The brutal truth about digital performance engineering and operations. Andreas (aka Andi) Grabner and Brian Wilson are veterans of the digital performance world. Combined they have seen too many applications not scaling and performing up to expectations. With more rapid deployment models made possible through continuous delivery and a mentality shift sparked by DevOps they feel it’s time to share their stories. In each episode, they and their guests discuss different topics concerning perfor ...
  continue reading
 
Artwork

4
CMMC Compliance Guide

CMMC Compliance Guide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
Artwork

1
Federal Executive Forum

Federal News Network | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Navigate every market. Accelerate every launch. Medical Device Global Market Access by Pure Global is the audio briefing that turns the world’s most confusing regulatory pathways into clear, actionable roadmaps. If you’re a MedTech founder, RA/QA leader, product manager, or investor who needs to get devices cleared anywhere from Austin to Abu Dhabi, this show is your shortcut. Why listen? • Step-by-step playbooks – We decode EU MDR, U.S. 510(k), Brazil’s ANVISA, China’s NMPA, and 25 + other ...
  continue reading
 
Artwork

1
The Product Podcast

Product School

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted by Product School Founder & CEO Carlos Gonzalez de Villaumbrosia, The Product Podcast features candid conversations with product management executives from the world's best tech companies like Google, Meta, Netflix, Airbnb, and Amazon. New episodes release weekly, unveiling actionable frameworks, unconventional best practices, and real-world examples you can implement immediately. Perfect for senior product managers, directors, and VPs hungry to build better products, stronger teams, ...
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork

4
REBOOT [Something]

Trilogy Innovations, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
REBOOT [something] is a video podcast hosted by Trilogy Innovations, Inc. Each episode we "reboot" a specific [topic] related to federal government IT contracting, cutting-edge technologies, products, services, standards, and best practices leveraged in the world software and systems engineering for government customers. The acquisition of federal operations has an immense impact on West Virginia's economy, and we believe that knowledge sharing and open discussions like these are the best wa ...
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Artwork

1
Security Nation Podcast

Electronic Security Association - ESA

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
  continue reading
 
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
  continue reading
 
Artwork

1
InTechnology

Camille Morhardt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
  continue reading
 
Artwork

1
CXO Voices

CXO REvolutionaries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork

1
AAOS Now Podcast

American Academy of Orthopaedic Surgeons | American Association of Orthopaedic Surgeons

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the new AAOS Now podcast — part of The Bone Beat Orthopaedic Podcast Channel. Each episode offers expert insight and advice to help orthopaedic surgeons stay informed, enhance their practices, and provide the best possible care for their patients. The AAOS Advocacy Podcast has wrapped, but you can still listen to or download past episodes here. The AAOS Now Podcast will also cover orthopaedic advocacy topics in upcoming episodes. Brought to you by the American Academy of Orthopaed ...
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
EDUCAUSE Exchange gathers the voices of the higher ed IT community to share advice, anecdotes, best practices, and more around topics important to our industry. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Loading …
show series
 
A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
  continue reading
 
Cyber threats to government systems continue to grow more sophisticated, and agencies must work closely with each other and private sector partners to strengthen defenses and resilience. What security initiatives have been most effective, and what strategies are shaping the road ahead? See Privacy Policy at https://art19.com/privacy and California …
  continue reading
 
Exclusive interview with Perry Carpenter, a multi-award-winning author, podcaster, and cybersecurity expert. Perry's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, offers invaluable insights into navigating the complexities of AI-driven deception. Send us a text Growth without In…
  continue reading
 
This episode demystifies the mandatory role of the In-China Domestic Agent for foreign medical device manufacturers entering the Chinese market. We explore the legal basis under State Council Order 739, effective June 1, 2021, and detail the agent's critical responsibilities in registration, NMPA communication, post-market surveillance, adverse eve…
  continue reading
 
In this episode of Changing Channels, Larry Walsh sits down with Olivier Zieleniecki, Global Vice President of Worldwide Partners at MongoDB, to discuss how the database innovator is redefining partner collaboration in the era of artificial intelligence. Zieleniecki explains how MongoDB’s ecosystem strategy has evolved from product enablement to ou…
  continue reading
 
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
  continue reading
 
Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience ana…
  continue reading
 
In this episode, Carlos Gonzalez de Villaumbrosia sits down with Meredith Brown, SVP and GM of Trailhead at Salesforce, the global CRM leader trusted by over 150,000 enterprises and powering customer success for the world’s most influential brands. Meredith, a former Chief Product Officer turned product-led community builder, now leads Trailhead—th…
  continue reading
 
In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity. What We Cover: What detection engi…
  continue reading
 
This episode demystifies the role of the Designated Marketing Authorization Holder (DMAH) for medical device companies entering Japan. We explore the critical differences between an MAH and a DMAH, outlining how the DMAH model allows foreign manufacturers to retain full ownership and control of their product approvals. Listeners will learn about th…
  continue reading
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
Ever wonder how someone leaps from an art history degree to leading automation in the MSP world? In this episode, Tara Rummer, Channel Captain at Immy Bot and Advisor with Immense Networks, sits down to unpack her real journey—facing down imposter syndrome, championing neurodiversity, and finding her “aggressively friendly” groove. From early days …
  continue reading
 
While Artificial Intelligence seems to have just popped up when OpenAI brought ChatGPT to the consumer market it has its roots in the mids of the 20th century. But what is it that all of a sudden made it into every conversation we seem to have? Thomas Natschlaeger, Principal Data Scientist at Dynatrace, who has been working in the AI and Machine Le…
  continue reading
 
This episode delves into the essential role of the Australian Sponsor for medical device companies seeking to enter the Australian market. We explain the legal requirements set by the Therapeutic Goods Administration (TGA), the critical responsibilities of a sponsor, and analyze the significant strategic differences between appointing a distributor…
  continue reading
 
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
  continue reading
 
This episode demystifies the process of entering the New Zealand medical device market by focusing on the critical role of the New Zealand Sponsor, a mandatory requirement for all overseas manufacturers. We break down the sponsor's responsibilities as mandated by Medsafe, from the initial notification in the WAND database to the crucial ongoing dut…
  continue reading
 
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
  continue reading
 
This episode demystifies Canada's dual-licensing system for medical devices. We clarify the critical differences between a product-specific Medical Device Licence (MDL) for Class II-IV devices and a company-specific Medical Device Establishment Licence (MDEL) required for Class I manufacturers, importers, and distributors. Learn who needs which lic…
  continue reading
 
Submit any questions you would like answered on the podcast! 🎯 Get your Free SPRS Roadmap Session: https://cmmccomplianceguide.com/free-sprs-roadmap Our experts will review your SPRS score, documentation, and setup to help you hit 110 with a clear action plan at no cost. Prime contractors like Lockheed Martin, Raytheon, and Parker Hannifin are dema…
  continue reading
 
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
  continue reading
 
This episode explores why professionalism, certification, and ethics matter more than ever in the IT sector. Diana Giles talks about her rise as a recognized industry leader, the transition from side hustle to full-time business, and the benefits of clear communication for IT consultants. Hear insights from Diana’s teaching career and community inv…
  continue reading
 
This episode unpacks the essential requirements for placing medical devices on the Swiss market following the lapse of the EU-Switzerland Mutual Recognition Agreement. We explore the role and legal responsibilities of the mandatory Swiss Authorised Representative (CH REP), detail the past compliance deadlines for all device and IVD classes, and exp…
  continue reading
 
This episode opens with a bombshell: Synology finally reversed its drive compatibility policy for NAS units, allowing IT pros and businesses to use third-party drives again—a move that’s sent shockwaves through online forums and social media. I discuss the implications for MSPs and what it means for client storage setups. Next, DattoCon coverage re…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
  continue reading
 
Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
  continue reading
 
This episode delves into the critical role of the European Authorised Representative (EC REP) for non-EU medical device and IVD manufacturers under the MDR and IVDR. We explore how the responsibilities have expanded beyond a simple administrative function to include significant legal liability and active compliance verification, making the choice o…
  continue reading
 
In episode 156 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Stephanie Gass, Sr. Director of Information Security at Center for Internet Security® (CIS®), and Angelo Marcotullio, Chief Information Officer at CIS. Together, they explore how CIS practices what it preaches by using CIS products and services internally, whi…
  continue reading
 
In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Markus Schober, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time. We dig into: 🔹 The hidden value of building your own cyber range 🔹 How IR pros train using real attacks (and wh…
  continue reading
 
This episode provides a comprehensive guide to the Brazil Registration Holder (BRH), a mandatory requirement for foreign medical device manufacturers seeking market access in Brazil. We explore the critical role the BRH plays as the legal holder of the ANVISA registration, detailing their extensive responsibilities from initial submission to post-m…
  continue reading
 
Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
  continue reading
 
Hear from Bradley Gross, one of the tech industry’s top attorneys and founder of Bradley Gross, PA. With over 20 years representing MSPs, Brad shares what every IT pro must know as lawsuits skyrocket around ransomware events. The conversation covers the specifics of contract language, rising legal standards, and how vendor agreements now shape your…
  continue reading
 
This episode breaks down the mandatory FDA requirement for foreign medical device manufacturers to appoint a U.S. Agent. We explore the specific roles, responsibilities, and qualifications of a U.S. Agent, clarifying their function as the essential communication link between your company and the FDA. Learn the key differences between a U.S. Agent a…
  continue reading
 
Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
  continue reading
 
This episode outlines a strategic framework for building powerful and mutually beneficial partnerships in the MedTech industry. We explore how to create a central hub for collaborators and tailor your value proposition to different partner types—from venture capitalists to distributors—all while adhering to core principles like transparency and lon…
  continue reading
 
Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
  continue reading
 
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and complian…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play