Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Enterprise Security Risk Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Innovation Tales explores the human side of digital transformation. Hosted by Alexandre Nevski, a seasoned expert in enterprise tech and innovation, each episode features candid conversations with leaders tackling real-world challenges—from leveraging AI to rethinking workflows. Packed with actionable insights and lessons learned, this podcast is perfect for senior managers, team leads, and executives seeking to drive meaningful change. Subscribe now and visit innovation-tales.com to explore ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
…
continue reading
DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. The audience can expect A-list guests, the latest enterprise news, hot startups, insight from influencers, and much more. Tweet questions to #DisrupTV or @DisrupTVShow.
…
continue reading
Welcome to the Enterprise Influencers Podcast where we explore the inner workings of large organizations and the people and technologies that help them get things done. We’re your hosts Patrick Falgoust and Giles Hamson. We’ve both worked as consultants and within the IT departments for some of the world’s largest organizations. We’ll be bringing you candid discussions with industry leaders that are helping to shape the future of enterprise technology and exploring what influences the decisi ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
20MinuteLeaders features the world's prominent leaders for short conversations about their journeys and insights.
…
continue reading
Discover new opportunities and navigate the challenges of expanding your global footprint with Outside the Box with Asendia USA: The International e-Commerce Podcast. Debuted in January 2024, "Outside the Box with Asendia USA", is designed to educate U.S.-based brands, marketplaces, and e-tailers on cutting-edge global shipping strategies. With a strong emphasis on education, the podcast serves as a resource to guide e-tailers through the complexities of international logistics and evolving ...
…
continue reading
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
…
continue reading
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
…
continue reading
How do you build, scale, and secure AI without the fluff? Building AI is a podcast about the people and systems behind modern artificial intelligence. Host David Yacov speaks with engineers, founders, CISOs, and GTM leaders shaping AI infrastructure: from synthetic data and MLOps to privacy, regulation, and model risk. If you’re working in AI infrastructure, compliance, or strategy, this show is your map to what’s next. New episodes every week 🎙️
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
Dive into the world of artificial intelligence with 'Leveraging AI,' a podcast tailored for forward-thinking business professionals. Each episode brings insightful discussions on how AI can ethically transform business practices, offering practical solutions to day-to-day business challenges. Join our host Isar Meitis (4 time CEO), and expert guests as they turn AI's complexities into actionable insights, and explore its ethical implications in the business world. Whether you are an AI novic ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
…
continue reading
Almost $5 trillion dollars are spent on Information Technology (IT) annually. Cut through the hype and learn about the real needs, and problems that IT solves for your enterprise. Join us as we dive deep into case studies with providers and learn how IT can make your business better.
…
continue reading
Andersen in Nigeria is an independent tax, transfer pricing and accounting advisory services firm with a worldwide presence through the member firms and collaborating firms of Andersen Global.
…
continue reading
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
…
continue reading
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in “Top 25 Regulatory Compliance Podcasts You Must Follow in 2020” by Feedspot.
…
continue reading
AI Journal Podcast. Your go-to source for the latest breakthroughs, trends, and insights in the world of Artificial Intelligence. Every episode brings you up-to-date with breaking news, in-depth analyses, and real-world applications of AI shaping industries and redefining the future. From advancements in machine learning to the ethics of AI, we cover it all—delivering the most relevant updates directly to your ears. Whether you’re an enthusiast, a professional, or simply curious about the te ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading

1
Heather Simek: MSP Life, Lessons & Leadership (EP 872)
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15Ever wondered what happens when a global IT giant acquires a renowned marketing firm? Tune in as Heather Simek and I unpack the Kaseya-TMT deal and its real impact on MSPs. From the inside scoop on industry rumors to how this move reshapes marketing, peer groups, and community, Heather brings her signature candor and expertise. Plus, we share stori…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading

1
Outsourcing Procurement for MSPs (EP 871)
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16Are you an MSP owner still stuck handling procurement late into the night? In this episode, Rayanne Buchianico reveals how ABC Solutions’ new outsourced procurement service can give you your time—and your weekends—back. Hear how her team’s hands-on, white-labeled solution integrates seamlessly with your PSA, keeps your margins intact, and lets you …
…
continue reading

1
From Morocco to Meta How AI is Reshaping Power, Policy, and the Office
5:40
5:40
Play later
Play later
Lists
Like
Liked
5:40Episode Summary: In this episode, we explore how Morocco is leading Africa’s ethical AI future with a landmark partnership and bold national strategy. Then we unpack new research exposing why today’s most advanced AI agents still fail basic office tasks. From there, we head to the classroom as top MBA programs like Chicago Booth embed AI deeply int…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
…
continue reading

1
17 part 2: Unlocking e-Commerce Growth in Mexico – Logistics, Compliance & Innovation
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19In Part 2 of this mini episode, co-hosts Nick Agnetti and Jason Rowland explore the benefits of Asendia’s Laredo, TX facility for direct, compliant deliveries into Mexico—and how it helps customers avoid common logistics challenges. Subscribe to our email list Request a consultationBy Asendia USA
…
continue reading

1
AI ROI for Patient Insights and Better Eligibility Rates in Clinical Trials - with Michael Zaiac of Daiichi Sankyo
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today’s guest is Michael Zaiac, Head of Medical Oncology for Europe and Canada at Daiichi Sankyo. Michael joins the platform in a special episode focused on how AI is driving measurable ROI in clinical trials — particularly in eligibility and driving diversity in patient populations. Their conversation explores how life sciences teams are applying …
…
continue reading

1
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
…
continue reading

1
Smarter Compliance Through Transparent AI Deployment - with Miranda Jones of Emprise Bank
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44Today’s guest is Miranda Jones, SVP Data & AI Strategy Leader at Emprise Bank, to explore how banks can design AI systems that balance compliance obligations, customer expectations, and employee experience. Miranda unpacks why explainability shouldn’t be an afterthought—and how embedding transparency into AI workflows helps institutions avoid costl…
…
continue reading

1
3341: Lessons from the Coursera 2025 Global Skills Report
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40Are we preparing people as quickly as we’re preparing machines? That’s the uncomfortable question at the heart of Coursera’s 2025 Global Skills Report, and the starting point for my conversation with Nikolaz Foucaud, Coursera’s Managing Director for EMEA. As the UK jumps more than 20 spots in global skills rankings and countries like Singapore and …
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-492
…
continue reading
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
…
continue reading
Ever struggled to get your clients to care about cybersecurity? Adam Anderson from ThreatCaptain shares how their platform helps MSPs translate complex cyber risks into clear financial impacts that business leaders understand. Find out how one MSP turned a simple simulation into $7,000 in new monthly revenue, and why talking dollars and cents is th…
…
continue reading

1
204 | The Ultimate AI Showdown: Comparing Image Generation tools with Rory Flynn
35:13
35:13
Play later
Play later
Lists
Like
Liked
35:13Can you really trust AI to create brand-worthy images — without a designer? If you're leading a business, you know how much time and budget visuals can drain. But what if you could generate high-quality, on-brand images in minutes — with tools you already have? In this power-packed episode, AI image expert Rory Flynn joins Isar Meitis for part thre…
…
continue reading

1
From Risk to Opportunity: Building Trust in the AI Era
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32In the age of AI, customer trust is a hard-won commodity. Join us in this episode of AWS Executive Insights as we speak with Matt Saner, AWS Security Solutions Architect Manager, about the critical intersection of AI, security, and customer trust. AWS security evangelist Clarke Rodgers sits down with Matt to learn how AWS collaborates with customer…
…
continue reading

1
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
1:07:15
1:07:15
Play later
Play later
Lists
Like
Liked
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading

1
AI and Learning: Creating Meaningful Educational Experiences with Juliette Denny
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22Traditional learning methods often struggle to keep learners engaged—rigid formats, passive content, and a lack of personalization. But could AI offer a better way? In this episode of Innovation Tales, we sit down with Juliette Denny, a trailblazer in learning technology, to explore how AI is revolutionizing education and corporate training. From g…
…
continue reading

1
How AI is Orchestrating the Insurance Supply Chain - with Marc Fredman of CCC Intelligent Solutions
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Today’s guest is Marc Fredman, Chief Strategy Officer at CCC Intelligent Solutions. Marc joins Emerj CEO and Head of Research Daniel Faggella to discuss how leading insurers are using AI to manage growing complexity across the insurance supply chain — from vehicle damage assessment to claim settlement and subrogation. He breaks down where AI is alr…
…
continue reading
Send the hosts a message - try it now! TL;DR: Did you miss us? Yes, we're back with Sam Masiello and we're talking about whatever is on his mind. Well ...there's geopolitics and Iranian hackers and frankly we need to talk about what it means for your security program. Thanks for joining us, Sam! YouTube Video: https://youtube.com/live/H-4ZktBIUDE D…
…
continue reading

1
Ingram Micro Ransomware: Lessons for MSPs (EP 869)
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17The Ingram Micro cyber incident sent shockwaves through the IT world, but it’s more than just a headline—it’s a wake-up call for MSPs and IT providers everywhere. In this episode, I’m joined by Michael Crean to discuss the real impact, the lessons we all need to learn, and why compassion and community matter most when crisis hits. Let’s turn disrup…
…
continue reading

1
3340: How Criteo Is Using AI to Redesign the Future of Retail Experiences
34:38
34:38
Play later
Play later
Lists
Like
Liked
34:38What happens when AI moves from experimental tool to everyday shopping assistant? In this episode of Tech Talks Daily, I’m joined by Liva Ralaivola, Head of the Criteo AI Lab, to unpack how artificial intelligence is reshaping the way we discover, compare, and purchase products online. Speaking to me from the south of France, Liva shares insights f…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Treb Ryan, Sagi Rodin, Amir Ofek, Artyom Poghosyan, Ajay Amlani, Ajay Gupta - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
…
continue reading
Ever wish you could turn those low-fit contracts into real cash—or acquire new clients without the headaches of traditional M&A? Matt Yesbeck, co-founder of MSPX, reveals how his platform is turning managed service contracts into currency. Hear the story behind the first marketplace designed for MSPs to buy, sell, and value contracts, and learn how…
…
continue reading

1
EP233 Product Security Engineering at Google: Resilience and Security
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Guest: Cristina Vintila, Product Security Engineering Manager, Google Cloud Topic: Could you share insights into how Product Security Engineering approaches at Google have evolved, particularly in response to emerging threats (like Log4j in 2021)? You mentioned applying SRE best practices in detection and response, and overall in securing the Googl…
…
continue reading

1
Power, Policy & Platforms: The New AI Battleground
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49Episode Summary In this episode, we explore four pivotal developments shaping the global AI landscape. We begin with a stark warning from cybersecurity firm CyXcel, which reveals that many UK companies are unprepared for AI-related threats despite growing adoption. Then, we shift to Capgemini’s launch of its Resonance AI Framework, designed to help…
…
continue reading

1
3339: How Cisco Is Preparing for a World Powered by Agentic AI and Quantum Computing
30:22
30:22
Play later
Play later
Lists
Like
Liked
30:22How do we prepare for a world where AI agents work together, networks think for themselves, and quantum teleportation is no longer just science fiction? I recently caught up once again with Vijoy Pandey, SVP and GM of Outshift by Cisco, live at Cisco Live in San Diego, for a wide-ranging conversation about what comes next at the edge of AI and quan…
…
continue reading

1
Is Your Business Data Safe? Why File Encryption Matters in Malaysia’s Digital Economy
0:51
0:51
Play later
Play later
Lists
Like
Liked
0:51As Malaysia’s digital economy rapidly grows, so do cyber threats. File encryption is vital for protecting sensitive business data against breaches, ransomware, and insider threats. It ensures compliance with the Personal Data Protection Act (PDPA), builds stakeholder trust, and secures data across remote work environments. Especially crucial for SM…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
…
continue reading

1
Keeping the Patient Voice in De-Identified Data Models - with Brad Kennedy of Orlando Health
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health. Brad joins Emerj Senior Editor Matthew DeMello to explore what it takes to implement AI across a complex care environment. From improving patient experience to easing clinician burdens, Kennedy highlights the need for precision, transparency, and collab…
…
continue reading
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
…
continue reading

1
Episode 69: Vendor Risk Oversight and Auditing
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
…
continue reading

1
Episode 68: Vendor Contracts, SLAs, and Performance Metrics
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
…
continue reading

1
Episode 67: Security Procurement: RFPs, RFIs, and Vendor Selection
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
…
continue reading

1
Episode 66: ROI and Cost-Benefit Analysis for Security Investments
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 64: Financial Management Principles for Security Leaders
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
…
continue reading

1
Episode 63: Strategic Security Planning Frameworks (TOGAF, SABSA)
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
…
continue reading

1
Episode 62: Aligning Security with Organizational Objectives
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
…
continue reading

1
Episode 61: Autonomous Security Operations Centers and Future Trends
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
…
continue reading

1
Episode 60: Emerging Tech in Security: AI and Machine Learning
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
…
continue reading

1
Episode 59: Virtualization Security Overview
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
…
continue reading

1
Episode 58: Mobile Device Security Essentials
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
…
continue reading
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
…
continue reading