Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Cybersecurity Compliance Podcasts
Cyber Security Compliance and IT Jobs
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're new to cybersecurity or loo ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices, lawyers and professionals working in a law firm with an operational and / or leadership role. Visi ...
…
continue reading
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
Innovation in compliance brings you interviews with industry leading experts who are changing the way practitioners approach compliance. Host Tom Fox, the Compliance Evangelist and Voice of Compliance is driving the conversation about compliance into the 2020s and beyond with his focus on innovations for the compliance practitioner and the compliance profession. If you want to learn how to bring business solutions to compliance problems to more fully operationalize compliance, this is the po ...
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading

1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Alex Whitaker interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy. We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives. Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading

1
Volunteer Work in Cybersecurity Nonprofits | Interview with Aruneesh Salhotra
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04By Dejan Kosutic
…
continue reading

1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading

1
The Global Tech Tangle: AI, Censorship, and the 2025 Compliance Crisis
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03This year marks a high-stakes moment for digital governance as major legislation like the EU AI Act, DORA, and India's DPDPA see major enforcement, imposing new obligations on enterprises worldwide. We analyze how algorithmic logic and frameworks like the EU Digital Services Act (DSA) are compelling global censorship by targeting "misleading" or "h…
…
continue reading

1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading

1
The Vanguard Crisis: Why $10.5 Trillion in Cyber Costs Can’t Buy Enough Talent
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10The global annual costs associated with cybersecurity are forecasted to reach a staggering 10.5 trillion by the end of 2025. Despite this immense financial backdrop, 80% of Chief Information Security Officers (CISOs) believe they operate with insufficient budgets to ensure robust security measure, contributing to an overwhelming 88% of CISOs functi…
…
continue reading

1
Did Anyone Even Ask If It Was OK? - Ep 531
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19Ah, success stories—where marketing meets warm fuzzies… and sometimes federal investigations. This week, we’re dissecting how one healthcare group turned a few heartfelt patient testimonials into a compliance catastrophe. From missing consent forms to deleting everything in a panic, it’s a cautionary tale of what happens when your privacy policies …
…
continue reading

1
Shadow War: Hacktivism, Proxies, and Iran's Digital Empire
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06This podcast explores how Iran's strategy of asymmetric warfare hinges on sophisticated state-sponsored groups like APT42 and IRGC-backed hacktivist networks to achieve strategic goals while maintaining plausible deniability. We investigate the operations of digital proxies, including CyberAv3ngers and Handala Hack, as they target U.S. political ca…
…
continue reading

1
Kevin Powers: From Academic to Practical Cybersecurity
50:39
50:39
Play later
Play later
Lists
Like
Liked
50:39Kevin Powers, Faculty Director of the Masters of Legal Studies in Cybersecurity Risk and Governance at Boston College Law School, began his professional and academic journey when he volunteered for a task force exploring cybersecurity education at Boston College. Rather than developing a purely technical curriculum, he advocated for an interdiscipl…
…
continue reading

1
AI, EDR, and Hacking Things - PSW #896
2:04:54
2:04:54
Play later
Play later
Lists
Like
Liked
2:04:54First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
…
continue reading

1
Red Helm CEO Michael Stratos | MSP + MSSP Leadership & Cybersecurity
20:31
20:31
Play later
Play later
Lists
Like
Liked
20:31Michael Stratos, CEO of Red Helm, shares his journey from Ideal Integrations to building a leading MSP + MSSP cybersecurity company. In this video, Sunny Kaila and Michael discuss: The story behind Red Helm’s rebrand Turning competitors into collaborators in the MSP channel How AI and cybersecurity drive growth for MSPs Red team, pen testing, and c…
…
continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading
All links and images can be found on CISO Series. Check out this post by Evgeniy Kharam for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Ryan Dunn, Leader of Product and Supply Chain Technology…
…
continue reading

1
Securing Pre-K-12: A Tech Leader's Perspective
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11In this episode of Threat Vector, David Moulton sits down with Mohammed Saleh, Associate Chief Technology and Management Information Systems Officer at Paterson Public Schools. They explore how school districts can balance cybersecurity, accessibility, and affordability while navigating the evolving threat landscape in K-12 education. Mohammed shar…
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Field CTO at Xaliant, David MorimannoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHERE (http…
…
continue reading

1
MSP Journey: Kyle Kenyon, The Pro Tech Guy (EP 914)
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22Uncle Marv welcomes back Kyle Kenyon, “The Pro Tech Guy,” for a lively, no-fluff conversation about cybersecurity, running an MSP, and working smarter — not harder. Kyle opens up about his origins, growing his space, and moving away from “man in the van” operations toward a more structured MSP approach. They dive into key challenges like client edu…
…
continue reading

1
Man in the Van vs. MSP: 10 Years Later (EP 913)
1:05:32
1:05:32
Play later
Play later
Lists
Like
Liked
1:05:32Uncle Marv hosts a special 10-year reunion with Chad Kempt of Fast Computers to revisit their classic “Man in the Van vs. MSP” debate and explore how the world of solo techs and small MSPs has evolved. They dig into shifting vendor landscapes, realistic service models, and why being lean, documented, and relationship-driven still wins in today’s ma…
…
continue reading

1
15: Military Vets Gain Cyber Career Ops with Tanium and NPower
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12“That's what they bring to the table, this eye for creativity, critical thinking, problem solving, that we don't see in a lot of other traditional talent pipelines.” That’s the unique skill set that veterans bring to private sector employers—and why they’re so well suited to cybersecurity, where the tech stack and attack strategies keep evolving, s…
…
continue reading

1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
continue reading

1
Guard Duty: A Conversation on Cyber Defense and Digital Resilience
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39LBMC’s Mark Burnette and Bill Dean talk about some of the most common technical security issues that are discovered in penetration testing, as well as some tactics for improving cyber defenses.
…
continue reading

1
Untangling the UEI (Parent), CAGE (Child), NIST-800-171 and CMMC Connection
12:56
12:56
Play later
Play later
Lists
Like
Liked
12:56Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
continue reading
Show Notes Follow Satyajit https://www.linkedin.com/in/satyajit-turumella-0b87955a/ Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitter.com/deookello51 Follow Josephine Olok htt…
…
continue reading

1
Code and Conflict: The Cyber-Geopolitics of the Middle East
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11The Middle East serves as a hotbed of geopolitics, where rivalries—particularly between Iran and the Saudi/UAE axis—have made the cyber realm the vanguard of statecraft. This episode analyzes how nations deploy asymmetric capabilities, ranging from destructive malware like Shamoon and sophisticated state-sponsored espionage operations (such as APT3…
…
continue reading

1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading

1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
continue reading

1
The Human Lag: Why AI Outpaces Operational Readiness
1:01:11
1:01:11
Play later
Play later
Lists
Like
Liked
1:01:11Artificial intelligence is evolving faster than most organizations can operationally absorb. We’ve automated analysis, accelerated response, and even delegated decisions to machines — but our people, processes, and governance are still running at human speed. This week on The CyberCall, I’m joined by Sounil Yu, creator of the Cyber Defense Matrix a…
…
continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading

1
The Data Use, Retention and Disposal Episode
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Show Notes: The Data Use, Retention and Disposal Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the ins and outs of data use, retention and disposal. Join Our Cybersecurity Mission: https://www.li…
…
continue reading

1
The 3.4 Million Gap: Cracking the Code on Cybersecurity's Global Workforce Crisis
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41The cybersecurity industry faces a critical global shortage of 3.4 million workers, a deficit compounded by evolving threats, high attrition rates due to burnout, and geopolitical factors such as costly H-1B visa policies. We investigate how major tech hubs like Nama Bengaluru are rising as global capability centers (GCCs) for AI and cybersecurity,…
…
continue reading

1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading

1
From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Frank X. Shaw, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communic…
…
continue reading

1
Episode 410: Learnings from the AGA PSMS Workshop with Jim Francis
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19In this episode of the Pipeliners Podcast, host Russel Treat sits down with Jim Francis of ENTRUST Solutions Group to reflect on key insights from the recent AGA Pipeline Safety Management System (PSMS) Workshop. Their discussion explores how PSMS implementation has evolved across the industry—from broader organizational engagement and leadership i…
…
continue reading

1
Exploring Sustainable Leadership and Accountability with Gina Cotner
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox welcomes back Gina Cotner, the CEO and founder of Athena Execu…
…
continue reading
By Jason Edwards
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading

1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
continue reading

1
How to Create Assessment Ready CMMC Documentation
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
Secure Our World: Mastering the Fundamentals of Incident Resilience
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21We clarify the distinct but coordinated roles of Incident Response (IR) Plans, Disaster Recovery (DR) Plans, and Business Continuity (BC) Plans, which together form a resilient defense system against modern disruptions. This episode details the foundational controls essential for organizational readiness, emphasizing cyber hygiene basics like Multi…
…
continue reading

1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
Play later
Play later
Lists
Like
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
continue reading

1
Empowering Disability Inclusion Through Technology and Teamwork with John Winfrey
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14Guest Introduction John Winfrey serves as Director of IT at Ardmore Enterprises, a nonprofit organization in Lanham, Maryland, that empowers individuals with intellectual and developmental disabilities. Ardmore provides residential housing, community services, and employment programs that promote independence and inclusion. John brings over 30 year…
…
continue reading

1
Meet the Aggressively Friendly Tara Rummer (EP 912)
38:49
38:49
Play later
Play later
Lists
Like
Liked
38:49Ever wonder how someone leaps from an art history degree to leading automation in the MSP world? In this episode, Tara Rummer, Channel Captain at Immy Bot and Advisor with Immense Networks, sits down to unpack her real journey—facing down imposter syndrome, championing neurodiversity, and finding her “aggressively friendly” groove. From early days …
…
continue reading

1
Crypto Agility and the AI-Driven SOC: Securing the 2026 Enterprise
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29The foundation of digital security is collapsing as autonomous, AI-driven phishing and deepfakes escalate cyber threats, while the looming quantum threat forces organizations to prepare against the risk of nation-states executing "harvest now, decrypt later" (HNDL) attacks. This episode explores the critical strategic response required in 2026: org…
…
continue reading

1
Understanding the Cyber AB’s Role and how CyberComply Supports the CMMC Ecosystem
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
Defining the Line: Understanding CMMC Scope and Boundaries
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Appointment CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading