Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Dataprotection Podcasts

show episodes
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Are you an entrepreneur who feels trapped by the very business you created? If you want to know the secret to breaking through your current ceiling, the answer won’t be found in the shiniest new AI tool or the latest online course guaranteed to 10X your revenue. The answer is found in listening to those people who have been exactly where you are today–and have overcome. This is the podcast for Nebraska entrepreneurs who feel stuck navigating the reality of owning a business. Steve Kanne is y ...
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
The GDPR Guy

Carl Gottlieb

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The GDPR Guy - the podcast dedicated to all things privacy, hosted by Carl Gottlieb - the trusted privacy advisor to leading tech companies, helping them gain maximum advantage through the right privacy strategy. Each episode Carl will be providing information, insights and inspiration to help you on your privacy journey. You’ll find show notes and useful resources on the website, https://CarlGottlieb.com, as well as details for getting in touch with Carl directly.
  continue reading
 
Loading …
show series
 
I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure. But what if we took a little different route. In this episode we're going to explore how AI can help make your people better at managing…
  continue reading
 
As a founder or CEO, do you struggle to understand what your business data is telling you? This episode we have Julian Caldwell, an experienced CIO, to provide a clear framework for building business intelligence systems. Learn how proper processes and cloud solutions can transform raw data into actionable insights, enabling better-informed decisio…
  continue reading
 
Discussing the ever-expanding threat landscape is something we do a lot on Security Breach, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phishing schemes, ransomware, and of course, the role artificial intelligence continues to play in making the good guys smarter and the bad guys tougher …
  continue reading
 
Nearly a year ago, the IAPP expanded its mission in response to a rapidly changing digital environment to include AI governance, digital responsibility and cybersecurity law. The mission expansion took place a year after the IAPP hired Ashley Casovan to lead its first-ever AI Governance Center. Since then, Casovan has led the development of the cen…
  continue reading
 
How do you position your business to attract the right funding and maximize profit? Mark Hasebroock, founder of Dundee Venture Capital, reveals the core principles of financial health for entrepreneurs. Learn why "cash is oxygen" and how mastering your operating expenses can prevent profit erosion. Discover strategies for proper pricing, understand…
  continue reading
 
As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that comprise the building blocks of stronger cybersecurity plans and successful defensive strategies. Spoiler alert – that comes through again … and again…
  continue reading
 
As the privacy profession surpasses the quarter-century mark and enters into a brave new world of artificial intelligence and digital entropy, it’s worth taking a look back to assess how far the profession has come. That’s exactly what long-time privacy pro Stephen Bolinger embarked upon when he decided to film a documentary on the rise of the priv…
  continue reading
 
Is your business growth stagnant, feeling like you've hit an invisible ceiling? Steve Kanne and Jamie Bumgardner dive into why businesses plateau and, more importantly, how to break through. They reveal the critical steps to reignite growth, from redefining your company's core mission and vision to the often-overlooked power of process adjustments …
  continue reading
 
As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture. However, regardless of the environment, there cont…
  continue reading
 
Why are zero-day exploits becoming a bigger threat to enterprises? In this episode, Accenture CISO Kris Burkhardt and Ryan Whelan, who leads Cyber Intelligence for Accenture Security, explore what security professionals need to know about zero days. Learn about common threat actors, the hidden zero-day economy, targets, trends, mitigation, and resi…
  continue reading
 
Confused about the best funding for your business growth? Mark Hasebroock, founder of Dundee Venture Capital, shares invaluable insights on capitalizing your company for sustainable expansion. Discover how to assess your cash needs, the different types of funding available (debt, equity, hybrids), and why building relationships with potential inves…
  continue reading
 
Are you a business owner constantly frustrated, stuck in the daily grind instead of leading your company? This episode offers a clear roadmap to transition from being a doer to an effective leader. Steve Kanne and Jamie Bumgardner, co-founders of Prime Secured, share their two decades of experience, revealing how emotional control, deliberate pract…
  continue reading
 
Feeling stuck in your business, even at your breaking point? Steve Kanne shares his incredible journey from farm life to co-founding a tech company, facing down a 50% revenue loss, an economic meltdown, and a devastating flood. Discover how a critical mentorship and a relentless focus on rebuilding with discipline and purpose not only saved his bus…
  continue reading
 
We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key i…
  continue reading
 
Who are you? This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessi…
  continue reading
 
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. The difference is that Howard Grimes, the CEO of the Cybersecurity Manufactur…
  continue reading
 
This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Kyle Friedman, who leads Security Contracting and Request for Proposal Support for our Information Security Client Data Protection team. She ensures that we have the right provisions in our proposal responses and contracts t…
  continue reading
 
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. A g…
  continue reading
 
Joel Christner, CEO of View Systems, talks about why so many enterprise AI projects fall flat—despite powerful models and high expectations. The culprit? Bad or disorganized data. Joel explains how fragmented tools, shadow IT, and poor data hygiene create major roadblocks to AI success. He shares how View Systems built a platform to solve this—stre…
  continue reading
 
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people? I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused …
  continue reading
 
Reports of cyber incidents crowd the headlines. How do you separate truth from misinformation? What happens next? Get a behind-the-scenes look at Accenture’s cyber incident response playbook. Accenture CISO Kris Burkhardt and his guests, Adam Long, global lead of Accenture’s Cyber Incident Response Team within Accenture Information Security, and Mi…
  continue reading
 
Eric Herzog, CMO of Infinidat, joins The Gumbo to break down the modern enterprise storage landscape—from ransomware resilience and AI integration to CapEx vs. OpEx tradeoffs. From why CIOs still undervalue storage in cybersecurity strategies to the real-world consequences of ignoring performance and ransomware recovery, this conversation dives dee…
  continue reading
 
As chief privacy officer of the biggest city in the United States, it’s safe to say that Michael Fitzpatrick doesn’t have your normal, run-of-the-mill job. As part of New York’s Office of Technology and Innovation, the Office of Information Privacy provides guidance to more than 175 agency privacy officers across the city. It also works closely wit…
  continue reading
 
Carl Peterson, CEO of Thunder Compute uncovers how Thunder Computer is redefining GPU utilization by enabling network-attached virtual GPUs—dramatically slashing costs and democratizing access. Carl shares the startup's Y Combinator origin story, the impact of DeepSeek, and how virtualization is transforming AI development for individuals and enter…
  continue reading
 
Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal confusion, how AI is becoming a vital tool for compliance, and why simply knowing Python won’t future-proo…
  continue reading
 
Autonomous robots with embedded artificial intelligence are growing more common across industry sectors. So-called “embodied AI,” collects vast amounts of data through its sensors and changes how humans interact with technology. As embodied AI becomes more common and continues to drive innovation, it also creates new challenges for ethical uses of …
  continue reading
 
One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
  continue reading
 
Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
  continue reading
 
Can the way Accenture delivers managed security services be reinvented? Accenture CISO Kris Burkhardt poses this question to guest Rex Thexton, chief technology officer of Accenture Security, who gives a definite yes. Rex shares several exciting opportunities possible in the next 12 to 18 months. Listen to learn more about the prospects of AI-power…
  continue reading
 
Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simulta…
  continue reading
 
Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
  continue reading
 
Yameen Huq, Director of Cybersecurity Programs at the Aspen Institute explores the often-overlooked non-technical skills needed in cybersecurity, the evolving cyber policy landscape in Washington D.C., and the critical importance of aligning cyber investments with real-world business outcomes. From AI-enhanced policy development to economic-driven …
  continue reading
 
Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
  continue reading
 
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
  continue reading
 
Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
  continue reading
 
Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
  continue reading
 
Privacy law and technological advancements have a deep and intertwined history that go back to at least the 1890s with Samuel Warren and Louis Brandeis's article "The Right to Privacy," which was prompted by camera technology. George Washington University Law Professor Dan Solove has long studied and written about privacy law. He published several …
  continue reading
 
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
  continue reading
 
Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss why traditional shredding and degaussing aren’t enough. Insurgo’s groundbreaking tech ensures data is t…
  continue reading
 
W. Curtis Preston, aka "Mr. Backup," reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
  continue reading
 
One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker land…
  continue reading
 
Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the company public. We explore rising storage costs, AI-driven data explosion, ransomware defense strategies…
  continue reading
 
Australia made waves in 2024 after it passed an amendment to the Online Safety Act of 2021, which introduces a legal minimum age of 16 to create and use an account for certain social media platforms in Australia. It also requires platforms within scope to implement age-gating practices. As Australia’s first eSafety Commissioner, Julie Inman-Grant, …
  continue reading
 
Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
  continue reading
 
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware,…
  continue reading
 
Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
  continue reading
 
Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
  continue reading
 
Though it came close in recent years, federal privacy legislation is not likely top of mind as a new administration takes the reigns in Washington, DC. The same likely goes for federal AI governance and safety legislation with a divided Congress and executive branch that promotes a deregulatory posture. That means state-level privacy and AI bills w…
  continue reading
 
While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics. So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to indust…
  continue reading
 
Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play