A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Dataprotection Podcasts
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Are you an entrepreneur who feels trapped by the very business you created? If you want to know the secret to breaking through your current ceiling, the answer won’t be found in the shiniest new AI tool or the latest online course guaranteed to 10X your revenue. The answer is found in listening to those people who have been exactly where you are today–and have overcome. This is the podcast for Nebraska entrepreneurs who feel stuck navigating the reality of owning a business. Steve Kanne is y ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
The GDPR Guy - the podcast dedicated to all things privacy, hosted by Carl Gottlieb - the trusted privacy advisor to leading tech companies, helping them gain maximum advantage through the right privacy strategy. Each episode Carl will be providing information, insights and inspiration to help you on your privacy journey. You’ll find show notes and useful resources on the website, https://CarlGottlieb.com, as well as details for getting in touch with Carl directly.
…
continue reading
I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure. But what if we took a little different route. In this episode we're going to explore how AI can help make your people better at managing…
…
continue reading

1
Unlocking Business Intelligence with Strategic Data
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14As a founder or CEO, do you struggle to understand what your business data is telling you? This episode we have Julian Caldwell, an experienced CIO, to provide a clear framework for building business intelligence systems. Learn how proper processes and cloud solutions can transform raw data into actionable insights, enabling better-informed decisio…
…
continue reading
Discussing the ever-expanding threat landscape is something we do a lot on Security Breach, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phishing schemes, ransomware, and of course, the role artificial intelligence continues to play in making the good guys smarter and the bad guys tougher …
…
continue reading

1
What makes an AI governance professional: A discussion with Ashley Casovan
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07Nearly a year ago, the IAPP expanded its mission in response to a rapidly changing digital environment to include AI governance, digital responsibility and cybersecurity law. The mission expansion took place a year after the IAPP hired Ashley Casovan to lead its first-ever AI Governance Center. Since then, Casovan has led the development of the cen…
…
continue reading

1
Essential Strategies to Prepare Your Business for Funding and Freedom
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22How do you position your business to attract the right funding and maximize profit? Mark Hasebroock, founder of Dundee Venture Capital, reveals the core principles of financial health for entrepreneurs. Learn why "cash is oxygen" and how mastering your operating expenses can prevent profit erosion. Discover strategies for proper pricing, understand…
…
continue reading

1
Cure Me or Kill Me - The Little Things That Escalate Attacks
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that comprise the building blocks of stronger cybersecurity plans and successful defensive strategies. Spoiler alert – that comes through again … and again…
…
continue reading

1
Behind the camera with "Privacy People" documentarian and privacy pro Stephen Bolinger
46:46
46:46
Play later
Play later
Lists
Like
Liked
46:46As the privacy profession surpasses the quarter-century mark and enters into a brave new world of artificial intelligence and digital entropy, it’s worth taking a look back to assess how far the profession has come. That’s exactly what long-time privacy pro Stephen Bolinger embarked upon when he decided to film a documentary on the rise of the priv…
…
continue reading

1
Break Through the Ceiling: Reigniting Stagnant Business Growth Now
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09Is your business growth stagnant, feeling like you've hit an invisible ceiling? Steve Kanne and Jamie Bumgardner dive into why businesses plateau and, more importantly, how to break through. They reveal the critical steps to reignite growth, from redefining your company's core mission and vision to the often-overlooked power of process adjustments …
…
continue reading

1
Being 'Proactively Paranoid, Not Paralyzed'
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture. However, regardless of the environment, there cont…
…
continue reading

1
InfoSec Beat: Industrialization of Zero-day Exploits
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38Why are zero-day exploits becoming a bigger threat to enterprises? In this episode, Accenture CISO Kris Burkhardt and Ryan Whelan, who leads Cyber Intelligence for Accenture Security, explore what security professionals need to know about zero days. Learn about common threat actors, the hidden zero-day economy, targets, trends, mitigation, and resi…
…
continue reading

1
Smart Choices for Sustainable Business Growth
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04Confused about the best funding for your business growth? Mark Hasebroock, founder of Dundee Venture Capital, shares invaluable insights on capitalizing your company for sustainable expansion. Discover how to assess your cash needs, the different types of funding available (debt, equity, hybrids), and why building relationships with potential inves…
…
continue reading

1
Beyond the Daily Grind: Practical Steps to Becoming a True Business Leader
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42Are you a business owner constantly frustrated, stuck in the daily grind instead of leading your company? This episode offers a clear roadmap to transition from being a doer to an effective leader. Steve Kanne and Jamie Bumgardner, co-founders of Prime Secured, share their two decades of experience, revealing how emotional control, deliberate pract…
…
continue reading
Feeling stuck in your business, even at your breaking point? Steve Kanne shares his incredible journey from farm life to co-founding a tech company, facing down a 50% revenue loss, an economic meltdown, and a devastating flood. Discover how a critical mentorship and a relentless focus on rebuilding with discipline and purpose not only saved his bus…
…
continue reading

1
Why More Hackers Are Logging On Than Breaking In
32:27
32:27
Play later
Play later
Lists
Like
Liked
32:27We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key i…
…
continue reading
Who are you? This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessi…
…
continue reading
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. The difference is that Howard Grimes, the CEO of the Cybersecurity Manufactur…
…
continue reading

1
InfoSec Beat: Careers in Information Security – Client Data Protection
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Kyle Friedman, who leads Security Contracting and Request for Proposal Support for our Information Security Client Data Protection team. She ensures that we have the right provisions in our proposal responses and contracts t…
…
continue reading
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. A g…
…
continue reading

1
301: Why AI Fails Without the Right Data (And How to Fix It) - View Systems Inc.
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Joel Christner, CEO of View Systems, talks about why so many enterprise AI projects fall flat—despite powerful models and high expectations. The culprit? Bad or disorganized data. Joel explains how fragmented tools, shadow IT, and poor data hygiene create major roadblocks to AI success. He shares how View Systems built a platform to solve this—stre…
…
continue reading
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people? I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused …
…
continue reading

1
InfoSec Beat: Reacting to and Interpreting Incidents in the News
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34Reports of cyber incidents crowd the headlines. How do you separate truth from misinformation? What happens next? Get a behind-the-scenes look at Accenture’s cyber incident response playbook. Accenture CISO Kris Burkhardt and his guests, Adam Long, global lead of Accenture’s Cyber Incident Response Team within Accenture Information Security, and Mi…
…
continue reading

1
299: Data Storage: The Unsung Hero of Every Crisis You Avoid - Infinidat
24:12
24:12
Play later
Play later
Lists
Like
Liked
24:12Eric Herzog, CMO of Infinidat, joins The Gumbo to break down the modern enterprise storage landscape—from ransomware resilience and AI integration to CapEx vs. OpEx tradeoffs. From why CIOs still undervalue storage in cybersecurity strategies to the real-world consequences of ignoring performance and ransomware recovery, this conversation dives dee…
…
continue reading

1
New York State of Mind: A discussion with NYC Chief Privacy Officer Michael Fitzpatrick
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04As chief privacy officer of the biggest city in the United States, it’s safe to say that Michael Fitzpatrick doesn’t have your normal, run-of-the-mill job. As part of New York’s Office of Technology and Innovation, the Office of Information Privacy provides guidance to more than 175 agency privacy officers across the city. It also works closely wit…
…
continue reading

1
298: The Battle for AI Supremacy Isn’t About Models—It’s About Infrastructure - Thunder Compute
33:32
33:32
Play later
Play later
Lists
Like
Liked
33:32Carl Peterson, CEO of Thunder Compute uncovers how Thunder Computer is redefining GPU utilization by enabling network-attached virtual GPUs—dramatically slashing costs and democratizing access. Carl shares the startup's Y Combinator origin story, the impact of DeepSeek, and how virtualization is transforming AI development for individuals and enter…
…
continue reading

1
297: Preparing for Data Privacy 2.0: What the Experts Aren’t Telling You - ClicData
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal confusion, how AI is becoming a vital tool for compliance, and why simply knowing Python won’t future-proo…
…
continue reading

1
Privacy in the age of robotics: A discussion with Erin Relford
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Autonomous robots with embedded artificial intelligence are growing more common across industry sectors. So-called “embodied AI,” collects vast amounts of data through its sensors and changes how humans interact with technology. As embodied AI becomes more common and continues to drive innovation, it also creates new challenges for ethical uses of …
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
296: 5 Trends That Will Separate Data Winners from Losers in 2025 - Yellowbrick Data
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
…
continue reading

1
InfoSec Beat: The Golden Age of Managed Security Services Reinvention
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10Can the way Accenture delivers managed security services be reinvented? Accenture CISO Kris Burkhardt poses this question to guest Rex Thexton, chief technology officer of Accenture Security, who gives a definite yes. Rex shares several exciting opportunities possible in the next 12 to 18 months. Listen to learn more about the prospects of AI-power…
…
continue reading

1
Unsecure Webcam Was All a Ransomware Group Needed
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simulta…
…
continue reading

1
295: How to Turn Your Backups Into Business Intelligence - Eon
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
…
continue reading

1
294: Why Cybersecurity Isn’t Just for Hackers Anymore - Aspen Institute
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48Yameen Huq, Director of Cybersecurity Programs at the Aspen Institute explores the often-overlooked non-technical skills needed in cybersecurity, the evolving cyber policy landscape in Washington D.C., and the critical importance of aligning cyber investments with real-world business outcomes. From AI-enhanced policy development to economic-driven …
…
continue reading

1
293: The Fear Every CISO Has But Rarely Admits - Loreta Today
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
…
continue reading
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
…
continue reading

1
292: Avoiding Cyber Disaster: Is Your Company DORA Compliant? - N2WS
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
…
continue reading

1
291: Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware - Commvault
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
…
continue reading

1
On privacy and technology with Dan Solove
47:08
47:08
Play later
Play later
Lists
Like
Liked
47:08Privacy law and technological advancements have a deep and intertwined history that go back to at least the 1890s with Samuel Warren and Louis Brandeis's article "The Right to Privacy," which was prompted by camera technology. George Washington University Law Professor Dan Solove has long studied and written about privacy law. He published several …
…
continue reading
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
…
continue reading

1
290: Your Old Tapes Might Be a Goldmine for Hackers – Here’s Why! - Insurgo
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss why traditional shredding and degaussing aren’t enough. Insurgo’s groundbreaking tech ensures data is t…
…
continue reading

1
289: The Enterprise Backup Industry’s Worst Nightmare? - S2|DATA
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08W. Curtis Preston, aka "Mr. Backup," reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
…
continue reading

1
Observations of an Ethical Hacking Researcher
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker land…
…
continue reading

1
288: From Data Chaos to Control: The Future of Cloud Backup - Backblaze
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the company public. We explore rising storage costs, AI-driven data explosion, ransomware defense strategies…
…
continue reading

1
Regulating online safety: A chat with Australia eSafety Commissioner Julie Inman-Grant
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24Australia made waves in 2024 after it passed an amendment to the Online Safety Act of 2021, which introduces a legal minimum age of 16 to create and use an account for certain social media platforms in Australia. It also requires platforms within scope to implement age-gating practices. As Australia’s first eSafety Commissioner, Julie Inman-Grant, …
…
continue reading

1
287: The Secret Weapon NFL Teams Use for Game-Changing Decisions! - OSNEXUS
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
…
continue reading
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware,…
…
continue reading

1
286: CEOs Beware: Ignoring Your Data Could Cost You Everything - The Data Group
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
…
continue reading

1
285: Hackers Are One Step Ahead – Can You Recover Your Backups? - DCIG
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
…
continue reading

1
US state AI legislation in 2025: A discussion with Connecticut State Sen. James Maroney
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22Though it came close in recent years, federal privacy legislation is not likely top of mind as a new administration takes the reigns in Washington, DC. The same likely goes for federal AI governance and safety legislation with a divided Congress and executive branch that promotes a deregulatory posture. That means state-level privacy and AI bills w…
…
continue reading
While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics. So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to indust…
…
continue reading

1
284: How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 - Memcyco
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
…
continue reading