Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Data Privacy Compliance Podcasts
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
Privacy On The Ground is where privacy meets real life. Discussions about privacy in relation to government policy, legal compliance, or tech can be complicated and inaccessible. But the meaning of privacy and how data use affects us in our real lives is anything but: It is contextual and tangible. That’s what we aim for with Privacy on the Ground. In this podcast, you’ll hear talks and stories that reflect what privacy means for real people and real lives. Privacy On The Ground is a product ...
…
continue reading
Control Risks and legal and compliance experts discuss issues ranging from challenging investigations to complex regulatory issues.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
The AMaT podcast celebrates the work done by healthcare professionals to improve patient safety using clinical audit, quality improvement, compliance, and other governance processes. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Y'all Street Law Podcast is your home of everything Texas Business Law!
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Welcome to The Safety Meeting, the podcast that makes you smarter about current trends and best practices in workforce safety. From employee engagement to actionable data, and everything in between, tune in to hear how you can work more safely.
…
continue reading
A podcast about data innovation, regulations and data privacy. We will bring you exciting and inspiring stories from the frontiers of data and privacy management. Think AI, fairness, privacy-compliance, synthetic data, data literacy, and more. Hosted by Alexandra Ebert, MOSTLY AI's Chief AI & Data Democratization Officer. If you have any suggestions or questions, send a voice recording or an email to [email protected]!
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading
An irreverent take on the world. May include interesting views on cybersecurity, data privacy and GRC stuff. But mainly two middle-aged men chewing the fat.
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
…
continue reading
The Original Source is a podcast about all things AI, plagiarism, and more.
…
continue reading
Welcome to Health+Tech — Our podcast explores issues and trends at the intersection of healthcare, technology and innovation The podcast is presented by the firm’s Digital Health, Technology and Innovation Group, which helps clients navigate transactional, regulatory and compliance challenges in areas such as telehealth, data privacy and security, and health information technology. McGuireWoods is a full-service firm providing legal and public affairs solutions to corporate, individual, and ...
…
continue reading
Navigate every market. Accelerate every launch. Medical Device Global Market Access by Pure Global is the audio briefing that turns the world’s most confusing regulatory pathways into clear, actionable roadmaps. If you’re a MedTech founder, RA/QA leader, product manager, or investor who needs to get devices cleared anywhere from Austin to Abu Dhabi, this show is your shortcut. Why listen? • Step-by-step playbooks – We decode EU MDR, U.S. 510(k), Brazil’s ANVISA, China’s NMPA, and 25 + other ...
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
By the time the California Privacy Rights Act (CPRA) goes into effect on January 1, 2023, employers doing business in California will be required to implement a broad privacy and information security compliance program for the personal information of employees, independent contractors, and job applicants who reside in California. The Littler CPRA Podcast Series is designed to help covered employers attain a basic understanding of their compliance obligations. This series also will examine up ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
This is GDPR Beyond Borders, a short-run series where we bring you conversations live from an international forum on GDPR. This forum featured panels and presentations from leading thinkers and practitioners in data privacy and designed specifically for an American B2B marketing audience.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Discusses a broad range of technology ethics topics. Hosted by Daniel Smith, Associate Director of Content and Education at CITI Program. New episodes every month. Learn more at about.citiprogram.org.
…
continue reading

1
Compliance Checklist for UK Data (Use and Access) Act
54:10
54:10
Play later
Play later
Lists
Like
Liked
54:10Send us a text The UK Data (Use and Access) Act (DUAA) is the most significant UK privacy law change since GDPR—raising maximum fines from £500,000 to £17.5M and expanding enforcement to cookies, DSARs, children’s data, international transfers, and automated decision-making. In this session, privacy law expert Robert Bateman explains: Key DUAA chan…
…
continue reading

1
Navigating Canada's MedTech Market: A Guide to the CMDR
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09Canada's medical device market is a significant opportunity, but navigating its regulatory framework, the CMDR (SOR/98-282), is essential for market entry. This episode provides a comprehensive overview of the Canadian Medical Devices Regulations, from its risk-based classification system to licensing, quality management, and post-market surveillan…
…
continue reading

1
The Smart Home Unlocked: Privacy and Security Risks
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Smart home devices offer unparalleled convenience, from voice-controlled assistants and automated thermostats to video doorbells that let you see who's at your door. However, this interconnectedness comes at a significant cost, as these devices continuously collect vast amounts of personal data, from daily habits and purchases to biometric informat…
…
continue reading
In this episode, Jennifer Oelenberger, President of EHR Concepts, joins us to share the MIPS 2025 framework in plain language—along with strategies to improve category scores, avoid common pitfalls, and make MIPS part of your everyday workflow. Learn more about Medcurity: https://medcurity.com Visit EHR Concepts: https://ehrconcepts.com #Healthcare…
…
continue reading

1
EU Clinical Trial Blueprint: Unpacking the MDCG 2024-3 Guidance
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19This episode dissects the critical MDCG 2024-3 guidance issued in March 2024, which outlines the European Union's expectations for a Clinical Investigation Plan (CIP). We explore how this document harmonizes the EU MDR and ISO 14155:2020, establishing the best-practice blueprint for planning medical device studies. We break down the essential compo…
…
continue reading

1
The Digital Freedom Collective: Navigating Rights in the Connected World
1:36:46
1:36:46
Play later
Play later
Lists
Like
Liked
1:36:46In an era defined by unprecedented digital connectivity, we often find ourselves facing a paradox: immense convenience coupled with a profound loss of control over our personal data and online experiences. This podcast delves into the critical implications of surveillance capitalism and algorithmic manipulation on our privacy, freedom of expression…
…
continue reading

1
When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by ...
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
…
continue reading

1
Estonia's Digital Frontier: Navigating the E-Journey of Identity and Smart Cities
1:08:09
1:08:09
Play later
Play later
Lists
Like
Liked
1:08:09Join us as we explore how Estonia transformed from a post-Soviet state into a global leader in digital governance, offering nearly all government services online and attracting entrepreneurs worldwide through its e-Residency program. We'll delve into the remarkable benefits of this digital revolution, from unparalleled convenience and citizen trust…
…
continue reading

1
Navigating the UKCA Transition: Key Deadlines for Medical Device Manufacturers
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55This episode breaks down the essential requirements of the UK MDR 2002, outlining the critical transition deadlines for moving from CE marking to the new UKCA mark. We cover the specific dates manufacturers need to know for 2028 and 2030, the mandatory role of the UK Responsible Person (UKRP), and the conformity assessment process with UK Approved …
…
continue reading
You might think a single ransomware attack is just a tech hiccup—but tell that to the medical practice that shut its doors permanently because of one. In this episode, we dissect what really happens when cybersecurity goes sideways, peeling back the layers of tech jargon to expose the raw, messy fallout of a breach. It’s less “oops, I forgot my pas…
…
continue reading
Recorded Live from Las Vegas, NV on 8/7/25Sponored By:MongoDBThreatLockerLogic Hazard LabsElisityBedrock DataMimic
…
continue reading

1
EP01 - Solving AI Privacy at Scale: The Synthetic Data Revolution
0:56
0:56
Play later
Play later
Lists
Like
Liked
0:56EPISODE 01 - COMING SEPTEMBER 1ST How do you innovate with AI while protecting privacy? Mario Scriminaci, CPO of Mostly AI, breaks down how synthetic data is revolutionizing enterprise AI development while staying compliant with emerging regulations. From GDPR challenges to the EU AI Act, discover how enterprises are solving the privacy-innovation …
…
continue reading

1
Unlocking U.S. Clinical Studies: A Deep Dive into 21 CFR Part 812
3:31
3:31
Play later
Play later
Lists
Like
Liked
3:31This episode demystifies the U.S. FDA's 21 CFR Part 812 regulation for Investigational Device Exemptions (IDEs). We explore the purpose of an IDE, the critical differences between significant and non-significant risk device studies, and the corresponding regulatory requirements for sponsors, investigators, and IRBs to ensure compliance during clini…
…
continue reading

1
Asia's Cyber Crossroads: Regulation, Risk, and the Digital Future
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53The Asia-Pacific region stands at a critical juncture, with its fast-growing digital economies confronting an increasingly sophisticated and diverse array of cyber threats, including evolving ransomware attacks, pervasive online scams, and state-backed intrusions. Businesses must navigate a fragmented data governance landscape marked by unique data…
…
continue reading

1
From NIST Standards to Action: A Year of PQC Migration
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift? In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back so…
…
continue reading

1
Moving from Pilot to Profit in Service AI Deployments - with Amit Gupta of Danaher
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46In today’s enterprise landscape, many AI initiatives stall before delivering real business value—especially in service operations, where data lives in disconnected systems and frontline speed is critical. For Amit Gupta, Chief Digital Officer, Life Sciences Manufacturing Industry, at Danaher, overcoming these challenges requires a structured, busin…
…
continue reading

1
Navigating Privacy Compliance When AI Changes Everything
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14Mason Clutter is a Partner and Privacy Lead at Frost Brown Todd Attorneys, previously serving as Chief Privacy Officer for the US Department of Homeland Security. Mason’s practice is at the intersection of privacy, security, and technology. She works with clients to operationalize privacy and security, helping them achieve their goals and build and…
…
continue reading

1
How Startups Can Use GenAI Without Breaking GDPR or Trust
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10Startups love GenAI. But most founders are using it unsafely — and exposing their team, their customers, and their legal risk without even realizing it. In this episode of Startuprad.io, we sat down with Dennis Traub, AI Engineering Specialist at AWS, to unpack what safe adoption of Generative AI really means for founders, CTOs, and product leads. …
…
continue reading

1
Why Addressing Network Vulnerabilities Can’t Wait | Medcurity Live 099
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03In this episode, we talk about Network Vulnerability Assessments (NVAs)—how they pinpoint weaknesses like open ports and unsafe accounts before attackers can exploit them, and why they’re key to shutting down easy entry points. We also walk through Medcurity’s new NVA Dashboard, now live in the platform. Instead of static PDFs, you get a real-time,…
…
continue reading

1
Digital Compliance and Data Integrity: Mastering 21 CFR Part 11
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23This episode provides a comprehensive overview of the U.S. FDA's 21 CFR Part 11, detailing the essential compliance requirements for medical device companies using electronic records and signatures. We explore the core tenets of system validation, data integrity through audit trails, and the standards for legally binding electronic signatures, prov…
…
continue reading

1
Australia's Digital Frontier: Cyber Shields and Censorship
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16Australia aims to be a global leader in cybersecurity by 2030, implementing a comprehensive strategy built on six "cyber shields" to protect citizens and businesses from escalating threats like ransomware and identity theft, while also enacting significant privacy reforms. However, these efforts are met with concerns over increasingly broad governm…
…
continue reading

1
AI, Accessibility, and the Art of Teaching: Instructure's Ryan Lufkin on the Changing Role of Educators - S02E04
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42The Original Source Is A Copyleaks Podcast Welcome back to another episode of The Original Source! In our latest episode, host Shouvik Paul engages in an insightful conversation with Ryan Lufkin, Vice President of Global Academic Strategy Instructure, the parent company of Canvas. With over 25 years of experience in the EdTech industry, Ryan offers…
…
continue reading

1
An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems. Join Secure Talk host Justin Beals for a critical co…
…
continue reading

1
Africa's Digital Frontier: Navigating Opportunity and Cyber Risk
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Africa is undergoing a profound digital transformation, driven by its mobile-first connectivity, innovative fintech solutions, and a burgeoning tech startup ecosystem, which together offer unprecedented opportunities for financial inclusion and economic growth across the continent. However, this rapid digitalization is accompanied by significant cy…
…
continue reading

1
FDA's New QMSR: Aligning with ISO 13485 and What It Means For You
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This episode dives into the FDA's monumental shift from the Quality System Regulation (21 CFR Part 820) to the new Quality Management System Regulation (QMSR). We break down the incorporation of ISO 13485:2016, the critical effective date of February 2, 2026, and the specific additions and changes manufacturers must be aware of. We cover the new te…
…
continue reading

1
International Data Transfers with Kellie du Preez and Danie Strachan
57:38
57:38
Play later
Play later
Lists
Like
Liked
57:38In this comprehensive episode of Privacy in Practice, hosts Kellie du Preez and Danie Strachan dive deep into the complex world of international data transfers, one of the most technical and misunderstood areas of privacy compliance. What You'll Learn: What qualifies as an international data transfer How hidden transfers via cloud services, APIs, S…
…
continue reading

1
Turning AI Vision Into Value in Financial Services - with Kelly Dempski of Turing
17:18
17:18
Play later
Play later
Lists
Like
Liked
17:18Today’s guest is Kelly Dempski, Head of Solutions for Banking, Financial Services, and Insurance (BFSI) at Turing. Turing is one of the world’s fastest-growing Artificial Intelligence companies, working with the world’s leading AI labs to advance frontier model capabilities and leveraging that work to build real-world AI systems that help businesse…
…
continue reading

1
EP05 - Beyond the AI Hype: How Investors Pick Tomorrow's Winners
0:50
0:50
Play later
Play later
Lists
Like
Liked
0:50EPISODE 05 - COMING SEPTEMBER 29TH How do investors separate billion-dollar opportunities from expensive research projects when AI technology changes every six months? Andreas Goeldi, Partner at b2venture, reveals how European VCs evaluate AI infrastructure companies to win in tomorrow's world.By David Yacov Habib
…
continue reading

1
Ethical AI Solutions and Their Impact on Life Sciences and Beyond - with Dr. Steffen Hoffmann of Bosch
17:18
17:18
Play later
Play later
Lists
Like
Liked
17:18Today’s guest is Dr. Steffen Hoffmann, Managing Director of Bosch UK. Dr. Hoffmann joins Emerj Editorial Director Matthew DeMello to explore the strategic deployment of AI across industrial sectors, from manufacturing operations to internal business systems. Dr. Hoffmann shares how AI is helping manufacturers address upstream process variables to r…
…
continue reading

1
EP 152: Granular, Persistent, Zero Trust: The Case for File-Level Security
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18By John Verry
…
continue reading

1
Decoding 21 CFR Part 814: A Guide to the FDA's Premarket Approval Pathway
3:56
3:56
Play later
Play later
Lists
Like
Liked
3:56This episode provides a detailed overview of the FDA's Premarket Approval (PMA) process, governed by 21 CFR Part 814. We explore the requirements for Class III medical devices, the necessary components of a PMA submission, including non-clinical and clinical data, the FDA's review timeline and procedures, and the post-approval responsibilities of m…
…
continue reading

1
Latin America's Digital Reckoning: Breaches, Vulnerability, and Mexico's New Data Shield
17:17
17:17
Play later
Play later
Lists
Like
Liked
17:17Latin America has become a hotspot for cyber activity, with countries like Chile, Mexico, and Colombia experiencing significant data breaches and ransomware attacks on critical infrastructure. This widespread vulnerability is often fueled by frequently outdated cybersecurity measures, a talent gap, and a pervasive lack of awareness at high levels o…
…
continue reading

1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading

1
Ciberseguridad en LATAM: La Región Más Vulnerable y su Batalla por la Resiliencia Digital
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09América Latina se ha convertido en un objetivo principal para los ciberdelincuentes, siendo considerada la región menos preparada globalmente a pesar de su rápida digitalización, lo que ha expuesto a empresas y gobiernos a un aumento exponencial de ciberataques. Exploraremos incidentes críticos como el ataque de ransomware Conti en Costa Rica, las …
…
continue reading

1
FDA's New Cyber Mandate: Navigating the 2023 Medical Device Security Rules
3:16
3:16
Play later
Play later
Lists
Like
Liked
3:16This episode breaks down the FDA's transformative final guidance on medical device cybersecurity issued in September 2023. We explore the new legal authorities granted by the Food and Drug Omnibus Reform Act (FDORA), the definition of a "cyber device," and the critical requirements for premarket submissions, including the Secure Product Development…
…
continue reading

1
Safeguarding the Smart City: Hong Kong's Cyber Resilience in the AI Era
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52This episode delves into how Hong Kong is bolstering its cybersecurity through landmark legislation like the Protection of Critical Infrastructures (Computer Systems) Bill, which sets strict security protocols and reporting obligations for essential services. We explore the city's extensive collaborative initiatives, from the Cyber Security and Tec…
…
continue reading

1
Post-Brexit MedTech: Your Guide from FDA to UKCA Marking
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13This episode breaks down the essential steps for medical device manufacturers with FDA clearance to successfully enter the post-Brexit UK market. We clarify why FDA approval isn't recognized by the MHRA and detail the two main pathways to achieving UKCA certification: leveraging the CE mark transition period and direct conformity assessment. Learn …
…
continue reading

1
The Digital Panopticon: Your ID, Their Control
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20This episode uncovers how global digital ID systems, paired with stringent age verification and online surveillance laws, are systematically eroding personal privacy and online anonymity. We delve into the comprehensive collection of biometric and behavioral data, examining how it creates a "digital twin" of every individual and enables cross-borde…
…
continue reading

1
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
…
continue reading

1
One Audit, Five Markets: Navigating the Medical Device Single Audit Program
3:14
3:14
Play later
Play later
Lists
Like
Liked
3:14This episode demystifies the Medical Device Single Audit Program (MDSAP), a unified approach that allows MedTech manufacturers to satisfy the quality management system requirements of five major markets—Australia, Brazil, Canada, Japan, and the U.S.—through a single audit. Learn about its history, the audit cycle, and the specific benefits for acce…
…
continue reading

1
NIS2 Uitgepakt: Technische Compliance voor een Veerkrachtig Europa
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05De NIS2-richtlijn hervormt het cybersecuritylandschap van Europa, met als doel een hoog gemeenschappelijk beveiligingsniveau te bereiken tegen toenemende cyberdreigingen. Deze aflevering duikt in de essentiële technische implementatierichtlijnen en biedt praktisch advies voor organisaties om cyberrisico's effectief te beheren en te voldoen aan de v…
…
continue reading

1
Scaling Growth in Asset Management with AI-Ready Data - with Frank Hattann of Ocorian
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07What does it really take to bring AI into the heart of financial services—and why are so many firms still stuck in manual mode? In this episode of the ‘AI in Business’ podcast, Frank Hattann, Chief Commercial Officer at Ocorian, joins Emerj Editorial Director Matthew DeMello to explore how legacy financial institutions can unlock real commercial va…
…
continue reading

1
Shore Up or Throw Up - Healthcare’s Latest Cyber Warnings - Ep 521
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56What do hackers, patient scams, and IT help desks with too much trust have in common? They're all making healthcare cybersecurity a lot messier—and a lot more vomit-worthy. In this episode, we dive into how bad actors are not only stealing data but turning patients into direct targets. From sneaky social engineering tactics to “I can’t believe they…
…
continue reading

1
EP04 - AI Encryption vs Blockchain: Lessons from a Unicorn Pivot
0:56
0:56
Play later
Play later
Lists
Like
Liked
0:56EPISODE 04 - COMING SEPTEMBER 22ND What happens when a $1 billion AI privacy unicorn pivots from enterprise AI to blockchain? Jeremy Donato, COO at Zama, reveals why cutting-edge homomorphic encryption struggled in AI markets but thrived in crypto. From enterprise readiness gaps to institutional adoption patterns, discover what this pivot teaches u…
…
continue reading

1
Mobile App Privacy Series Part 2: Privacy Risk Remediation Workshop
59:55
59:55
Play later
Play later
Lists
Like
Liked
59:55Send us a text In this session, Jake Ottenwaelder (Principal Privacy Engineer, Integrative Privacy) explains how privacy teams can detect and remediate third-party SDK risks that lead to CCPA, GDPR, and CPRA violations. You’ll also see a live demo from Muskan Bansal (Software Engineer, Privado.ai) of App Auditor, a privacy risk monitoring tool that…
…
continue reading

1
Cognitive Control: Unpacking BCI Hacking
1:08:43
1:08:43
Play later
Play later
Lists
Like
Liked
1:08:43Dive into the revolutionary world of Brain-Computer Interfaces (BCIs) and their incredible potential to connect human thought directly with technology. This podcast unravels the alarming vulnerabilities of these cutting-edge devices, exploring how they can be subjected to "neural hacking" through remote manipulation, AI-powered attacks, and sensiti…
…
continue reading

1
Beyond FDA Approval: Unlocking the Saudi Arabian MedTech Market
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23Securing FDA approval is a major milestone, but it's only the first step for entering the Saudi Arabian market. This episode breaks down the essential, non-negotiable requirements of the Saudi Food and Drug Authority (SFDA) for medical device listing. We detail the mandatory Technical File Assessment (TFA) route, the crucial role of the in-country …
…
continue reading

1
Hardware Is the Hidden Risk: Ferhat Yaman on PQC, Side-Channel Attacks, and AI Privacy
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22As post-quantum cryptography moves from theory to hardware, organizations can no longer afford to ignore the physical layer of security. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Ferhat Yaman, security researcher at AMD’s Product Security Office, to explore how electromagnetic side-channel attack…
…
continue reading

1
How Privacy is Reshaping the Ad Tech Industry
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Allison Schiff is the Managing Editor at AdExchanger, where she covers mobile, Meta, measurement, privacy, and the app economy. Allison received her MA in journalism from the Dublin Institute of Technology in Ireland (her favorite place) and a BA in history and English from Brandeis University in Waltham, Mass. In this episode… Ad tech companies ar…
…
continue reading

1
Digital Deceptions, Real Dangers: Unmasking Crime in the Crypto Metaverse
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49The metaverse is rapidly transforming into a new digital frontier where immersive experiences meet real-world value, driven by cryptocurrencies and NFTs. However, this exciting evolution has opened a new battleground for sophisticated cybercrimes, including virtual identity theft, deep fake impersonation, NFT hacking, and pervasive social engineeri…
…
continue reading