Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Cybersecurity Compliance Podcasts
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
Lee Frazier and his team of experts bring you the latest in Cybersecurity, IT, and HIPAA HITECH news along with segments each episode covering their views and advice on topics such as mobile devices, PC recommendations, compliance issues such as HIPAA HITECH and PCI, cybersafety, emerging technologies, IT for healthcare, and listener questions. One episode each month is followed up with a free live webinar where podcast listeners/viewers can get more in depth info on the topic and bring thei ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy. We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives. Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
With new legal risks and regulatory challenges constantly arising, how can we stay current and be best prepared? Join us for Compliance & Legal Risk, a podcast brought to you by Georgetown Law and EY. In each episode, host Ronald J. Coleman (“RJ”) will interview thought leaders in areas relating to legal risk and regulatory compliance, such as anti-corruption, privacy, cybersecurity, automation, and eDiscovery.
…
continue reading

1
Zero Trust Unleashed: Fortifying Data and Navigating Compliance in the AI Era
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56This episode delves into how Zero Trust principles revolutionize an organization's data protection strategy by adopting a "never trust, always verify" approach, continuously authenticating every user, device, and connection to minimize the attack surface and limit lateral movement. We explore key design components such as robust data security contr…
…
continue reading

1
Coaching as a Service for Human-Centric Cybersecurity | Interview with Dominic Vogel
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52In this episode of the Secure and Simple Podcast, host Dejan Kosutic sits down with Dominic "Dom" Vogel, president of Vogel Cyber Leadership and Coaching. Dom shares his unique journey from traditional cybersecurity consulting to a more human-focused coaching approach. He emphasizes the importance of building strong, empathetic relationships within…
…
continue reading
Ever wonder how top MSPs break through the noise and get deals done? Dmitrius Garcia, president and co-founder of XAmplify, joins Uncle Marv to share the company’s journey from product-centric to service-first. Learn how XAmplify’s AI agent and analytics platform are helping MSPs turn complex jargon into clear value propositions, track every campai…
…
continue reading

1
Identity Unlocked: Balancing Security, User Experience, and Efficiency
17:54
17:54
Play later
Play later
Lists
Like
Liked
17:54In a world where identity is recognized as the new perimeter, organizations face the critical challenge of balancing robust security measures with seamless user experiences and operational efficiency in identity management. This episode delves into key strategies such as implementing phishing-resistant Multi-Factor Authentication (MFA) and password…
…
continue reading

1
Timus Networks: SASE for the Channel (EP 859)
19:13
19:13
Play later
Play later
Lists
Like
Liked
19:13Pinar Ormeci shares how Timus Networks is empowering MSPs with always-on zero trust, granular firewall policies, and rich reporting. The episode covers the company’s move to Tampa, their focus on the channel, and the latest innovations in network security. Why Listen: Learn how shared gateways make SASE accessible for small clients Discover smart V…
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading

1
Episode 395: Next Generation Pipelines Research and Development Act with Rep. Randy Weber
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this episode of the Pipeliners Podcast, host Russel Treat speaks with U.S. Representative Randy Weber of Texas about his background, the energy profile of his district, and his motivation for co-sponsoring the Next Generation Pipeline Research and Development Act. Their conversation explores the strategic importance of energy infrastructure on t…
…
continue reading

1
Exploring BTEX 2025: Insights and Innovations
58:21
58:21
Play later
Play later
Lists
Like
Liked
58:21In this episode, KJ discusses the insights and experiences shared by various presenters at CDW Canada's Business Technology Expo (BTEX) 2025, highlighting the significance of the event in showcasing technological advancements and strategies for businesses. Key themes include the transition to Windows 11, the importance of cybersecurity, the evoluti…
…
continue reading

1
3332: Coinbase - The Rise of Agentic Commerce and What It Means for Developers
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10As AI continues to dominate headlines and crypto continues to evolve behind the scenes, the real story may lie in their convergence. In this episode of Tech Talks Daily, I sat down with Dan Kim from Coinbase to discuss how these two technologies are shaping the future of digital commerce and development. Dan leads the Coinbase Developer Platform, a…
…
continue reading

1
MSP Owners Group: The New M&A Model (EP 858)
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26How do you keep your MSP thriving after selling? The answer lies in the community-driven vision of the MSP Owners Group. Juan Fernandez shares why this model is so different from traditional private equity buyouts—focusing on leaders who want to stay, grow, and mentor the next generation. Discover why Prodigy Techs and Cool Technology are among the…
…
continue reading

1
Resilient Cyber w/ AJ Yawn - Transforming Compliance Through GRC Engineering
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53In this episode, we sat down with AJ Yawn, Author of the upcoming book GRC Engineering for AWS and Director of GRC Engineering at Aquia, to discuss how GRC engineering can transform compliance. We discussed the current pain points and challenges in Governance, Risk, and Compliance (GRC), how GRC has failed to keep up with software development and t…
…
continue reading
Peter from TruGrid joins Uncle Marv to tackle the myths and realities of RDP security. Peter explains why RDP isn’t the problem—it’s how it’s protected. He shares how TruGrid’s innovative architecture, built on SASE and Zero Trust, is making remote access safer and easier for MSPs, especially in the age of BYOD and cloud adoption. Why Listen: Bust …
…
continue reading

1
The Dragon's AI Engine: Infrastructure, Ambition, and Influence
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56This podcast uncovers China's state-driven campaign to dominate global artificial intelligence, revealing a sweeping national buildout of AI data centers and a strategic fusion of commercial capacity with geopolitical intent. We explore how the People's Republic of China's (PRC) rapid infrastructure expansion, including over 250 AI data centers and…
…
continue reading

1
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conv…
…
continue reading

1
3331: Beyond the Helpdesk: How Zendesk Is Reshaping CX with AI
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32What happens when a customer service platform stops thinking like a vendor and starts operating like a partner? In this episode of Tech Talks Daily, I sit down with Andrew Lawson, EVP and GM for Zendesk Europe, to explore how the company is redefining the future of customer experience through AI, innovation, and a customer-first mindset. Zendesk ma…
…
continue reading

1
Cyber Shield: Navigating NIS2 with ENISA
1:24:00
1:24:00
Play later
Play later
Lists
Like
Liked
1:24:00This podcast is your essential guide to building a robust cybersecurity risk management strategy for network and information systems across Europe, as mandated by the NIS2 Directive. We delve into ENISA's Technical Implementation Guidance, breaking down its core components, such as risk management frameworks, incident handling, and supply chain sec…
…
continue reading

1
3330: PXP - AI, Smart Routing, and the Future of Merchant Payments
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50In a world where payments have evolved from a back-office utility into a strategic business driver, how do you build a platform that truly puts control back into the hands of merchants? On this episode of Tech Talks Daily, I sat down with Dwaine Thomas, CIO of PXP, to explore how the company is transforming the payment landscape with its next gener…
…
continue reading

1
CISO Under Fire: Navigating Personal Liability in the Cyber Age
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25The evolving landscape of cybersecurity now places Chief Information Security Officers (CISOs) at significant personal legal risk, evidenced by landmark cases such as Uber's Joe Sullivan conviction for covering up a data breach and the SEC's charges against SolarWinds' CISO Tim Brown for misrepresenting security practices. This heightened accountab…
…
continue reading

1
3329: NOVI’s Vision for Real-Time AI at the Edge of Space
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53What happens when you stop thinking of satellites as data collectors and start thinking of them as data analysts? That is precisely the shift we explore in today's episode of Tech Talks Daily with Michael Bartholomeusz, CEO of NOVI. Traditionally, Earth observation has relied on satellites to capture massive volumes of raw data, which is then trans…
…
continue reading
Live from PAX 8 Beyond, Uncle Marv chats with Leonard from Rythmz, the MSP-first company bringing portable internet to events and emergencies. Their rugged Pelican cases house bonded SIM cards for unlimited, high-priority data, perfect for powering small chamber events or a 100,000-person concert. Leonard shares how MSPs are cashing in by charging …
…
continue reading

1
Voices of Deception: Navigating the Deepfake Era
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37Deepfake attacks are transforming the cybersecurity landscape by exploiting fundamental human vulnerabilities, creating hyper-realistic, AI-generated audio and video that mimics real individuals, making it increasingly difficult to distinguish between authentic and fabricated content. In the corporate realm, these sophisticated threats enable imper…
…
continue reading
In this engaging conversation, Chris Glanden interviews Kevin Johnson, a seasoned expert in IT and cybersecurity. Kevin shares his extensive journey from system administration to becoming a leader in penetration testing and ethical hacking. He emphasizes the importance of hands-on learning, the evolution of penetration testing standards, and the ro…
…
continue reading

1
Ceasefire’s Here, But Your Shop’s Still a Target: What the DoD CIO Just Told Defense Contractors
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Submit any questions you would like answered on the podcast! 🆓 Need help getting your SPRS score to 110? Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap The Department of Defense just issued a critical cybersecurity memo—and it's not just for …
…
continue reading

1
Controlling the Uncontrollable in IT (EP 855)
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54Live from Pax8 Beyond, Uncle Marv catches up with Brian Weiss, the Tech Stoic, who’s revolutionizing IT with Stoic philosophy. Running iTech Solutions, Brian focuses on people, process, and technology—helping clients navigate outages with practical solutions like backup internet or power redundancies. His Stoic mindset keeps his team grounded, emph…
…
continue reading
Join Anton and Kate in their first episode of the new season as they dive into the fascinating world of academic research in privacy compliance with their special guest, Ardi Kolah, founder of the esteemed Journal of Data Protection and Privacy. Here's what you'll learn in this episode: ❓00:34: How academic insights can boost your privacy career. ❓…
…
continue reading

1
3328: Building Practical, Scalable AI with TELUS Digital Solutions
22:58
22:58
Play later
Play later
Lists
Like
Liked
22:58Just two years ago, the launch of GPT-4 required the support of hundreds of experts, intensive computing power, and vast coordination. Today, that same process could be executed by a team of five. That is not an exaggeration. It is a signal of just how rapidly AI development is accelerating. In this episode of Tech Talks Daily, I’m joined by Gagan …
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/107184577/admin/dashboard/ ISO 27001 – Information Security Management Systems: https://www.iso.org/standard/27001 What's new in the 2022 version: https://kirkpatrickprice.c…
…
continue reading

1
Resilient Cyber w/ Patrick Duffy: Securing the Modern Workspace
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32In this episode of Resilient Cyber, we chat with Patrick Duffy, Product Manager at Material Security, on Securing the Modern Workspace. The conversation will include discussions about the increased adoption of cloud office suites, limitations of traditional security approaches, and a deep dive into how Material Security is tackling issues such as s…
…
continue reading

1
Zensai: Training Made Simple for MSPs (EP 854)
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51Uncle Marv welcomes Kathleen Lord, Chief Revenue Officer at Zensai, to the show live from Pax8 Beyond in Denver. They dive into why compliance is broken and how MSPs can bridge the gap between technology implementation and user adoption. Kathleen explains how Zensai’s learning management system, built natively into Microsoft Teams, makes training s…
…
continue reading

1
Multi-Cloud Fortress: Securing Your Distributed Digital Frontier
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09Multi-cloud environments offer immense flexibility but introduce complex security challenges, from fragmented identities and inconsistent policies to critical visibility gaps across diverse platforms. This podcast delves into the most impactful practices, including unified identity and access management, advanced AI-driven automation, and centraliz…
…
continue reading

1
How to Know You’re Not Charging Enough (EP 853)
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32Ever wondered what it’s like to face a client who suddenly wants to pay less—while secretly discovering they’ve already shopped around and found your rates are actually half the competition? Uncle Marv shares a jaw-dropping story about pricing, client loyalty, and the emotional rollercoaster of running an IT business. Should you run DHCP on a serve…
…
continue reading

1
3327: MetricStream - How AI Is Reshaping Governance, Risk and Compliance (GRC)
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39When I last spoke with Gaurav Kapoor five years ago, we were in the thick of a global pandemic. Remote work was still a novelty for many, AI was a distant concept for most businesses, and regulatory frameworks were trying to keep pace with the speed of technological change. Fast forward to today, and the conversation around AI and governance, risk,…
…
continue reading
Ever wonder why some MSPs struggle with Macs while others thrive? Justin Esgar, founder of an Apple-focused MSP and host of All Things MSP, pulls back the curtain on what it really takes to manage Macs at scale. From hilarious conference stories to the secrets of Mac deployment and security, this episode is packed with actionable insights for MSPs …
…
continue reading

1
The CISO Crucible: Navigating Cyber's New Frontier
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05Today's cybersecurity leaders face immense pressure from a persistent talent shortage, escalating cyber threats, and dynamic economic and regulatory landscapes. Their roles are rapidly evolving from purely technical oversight to strategic business risk management, encompassing areas like AI strategy and comprehensive talent development. This podcas…
…
continue reading

1
Innovative Events for MSP Growth (EP 851)
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03What does it take to stand out in the MSP world? Join Uncle Marv and event management expert Amy Slater as they unpack the power of community, collaboration, and smart event planning. From organizing intimate Lunch and Learns to orchestrating large-scale panels, Amy reveals how Innovative Events supports MSPs and small businesses in finding their v…
…
continue reading

1
Risky Business #797 -- Stuxnet vs Massive Ordnance Penetrators
1:02:16
1:02:16
Play later
Play later
Lists
Like
Liked
1:02:16On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people i…
…
continue reading

1
3326: Inside HALOS: How AI and Cameras Are Changing Frontline Safety
17:30
17:30
Play later
Play later
Lists
Like
Liked
17:30In today’s episode of Tech Talks Daily, I sat down with Matt Dawes, Head of Enterprise Sales at HALOS, to explore the fast-moving world of security technology and how body-worn cameras are rapidly transforming the way businesses approach accountability, staff safety, and incident response. HALOS is rethinking body-worn video with a fresh approach t…
…
continue reading
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
…
continue reading

1
Travel, Food & IT with Brook Lee (EP 850)
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32Join Uncle Marv and Brook Lee as they swap stories from the road, sharing the secrets to building authentic vendor relationships and the value of thinking outside the box. From event etiquette to real-world onboarding challenges, they share stories and strategies that will help you spot the best fit for your business. Plus, get ready for a world to…
…
continue reading

1
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
1:11:17
1:11:17
Play later
Play later
Lists
Like
Liked
1:11:17SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading

1
Automating MSP Success with Cyft (EP 849)
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27Ever feel like your MSP is drowning in data but starved for context? Jeffrey Newton, co-founder of CYFT, shares how his AI-driven platform is giving MSPs real-time situational awareness—automating documentation, enriching tickets, and ensuring techs have the right info before they even pick up a call. Listen to why “best practice” may not always be…
…
continue reading

1
Mind the Gap: The Psychology of Security Risk
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Explore the fascinating disconnect between how we feel about security and the actual risks we face, a phenomenon rooted in deep-seated human psychological biases. This podcast delves into why our brains are ill-equipped for modern threats, often leading to irrational decisions and the prevalence of "security theater" over genuine protection. We exa…
…
continue reading

1
Episode 394: Electricity Demand and Gas Pipelining with Jimmy Stewart
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48This episode of the Pipeliners Podcast features Jimmy Stewart from the Ohio Gas Association discussing the growing intersection between electrical demand and natural gas infrastructure. The conversation explores historical trends in electricity generation, the shifting role of natural gas as a baseload power source, and the increasing pressure from…
…
continue reading

1
Proxmox, Docker & Containers Explained (EP 848)
47:12
47:12
Play later
Play later
Lists
Like
Liked
47:12If you’ve ever dreamed of building your own home lab or wondered how to get started with Synology, Unraid, or TrueNAS, this episode is for you. Uncle Marv and Mike Wieger break down the pros and cons of each platform, explain the magic of Docker and containerization, and share practical tips for home automation and security. Get inspired to tinker,…
…
continue reading

1
3325: Universal Robots Cobots and Collaborative Robotic Automation
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53How do we bridge the skills gap in UK manufacturing while pushing the boundaries of automation technology? In this episode of Tech Talks Daily, I sit down with Mark Gray, UK and Ireland Country Manager at Universal Robots, to explore how collaborative robots, or cobots, are rewriting the rules for companies big and small. Universal Robots, founded …
…
continue reading

1
Secure Endpoint Management with Devicie (EP 847)
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34What if you could manage hundreds of Intune tenants without ever repeating the same task? Colin Britton shares how Devicie’s runbooks and automation tools make it possible, while also providing deep insights into endpoint health and security. Learn about their new Reporting Connector for Edge for Business and how it brings browser security into foc…
…
continue reading