Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Enterprise Security Risk Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Public Risk Management

Public Risk Management Association (PRIMA)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
  continue reading
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Enterprise AI Defenders

The AI in Enterprise Software Podcast Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Innovation Tales

Alexandre Nevski

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Innovation Tales explores the human side of digital transformation. Hosted by Alexandre Nevski, a seasoned expert in enterprise tech and innovation, each episode features candid conversations with leaders tackling real-world challenges—from leveraging AI to rethinking workflows. Packed with actionable insights and lessons learned, this podcast is perfect for senior managers, team leads, and executives seeking to drive meaningful change. Subscribe now and visit innovation-tales.com to explore ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Artwork
 
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
  continue reading
 
Artwork

1
AWS Executive Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
  continue reading
 
Artwork

1
DisrupTV

DisrupTV

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. The audience can expect A-list guests, the latest enterprise news, hot startups, insight from influencers, and much more. Tweet questions to #DisrupTV or @DisrupTVShow.
  continue reading
 
Welcome to the Enterprise Influencers Podcast where we explore the inner workings of large organizations and the people and technologies that help them get things done. We’re your hosts Patrick Falgoust and Giles Hamson. We’ve both worked as consultants and within the IT departments for some of the world’s largest organizations. We’ll be bringing you candid discussions with industry leaders that are helping to shape the future of enterprise technology and exploring what influences the decisi ...
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Discover new opportunities and navigate the challenges of expanding your global footprint with Outside the Box with Asendia USA: The International e-Commerce Podcast. Debuted in January 2024, "Outside the Box with Asendia USA", is designed to educate U.S.-based brands, marketplaces, and e-tailers on cutting-edge global shipping strategies. With a strong emphasis on education, the podcast serves as a resource to guide e-tailers through the complexities of international logistics and evolving ...
  continue reading
 
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
  continue reading
 
Artwork

1
The Union

Krista Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
  continue reading
 
How do you build, scale, and secure AI without the fluff? Building AI is a podcast about the people and systems behind modern artificial intelligence. Host David Yacov speaks with engineers, founders, CISOs, and GTM leaders shaping AI infrastructure: from synthetic data and MLOps to privacy, regulation, and model risk. If you’re working in AI infrastructure, compliance, or strategy, this show is your map to what’s next. New episodes every week 🎙️
  continue reading
 
Artwork

1
the CYBER5

Nisos, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
  continue reading
 
Artwork

1
Leveraging AI

Isar Meitis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Dive into the world of artificial intelligence with 'Leveraging AI,' a podcast tailored for forward-thinking business professionals. Each episode brings insightful discussions on how AI can ethically transform business practices, offering practical solutions to day-to-day business challenges. Join our host Isar Meitis (4 time CEO), and expert guests as they turn AI's complexities into actionable insights, and explore its ethical implications in the business world. Whether you are an AI novic ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
  continue reading
 
Artwork

1
Tech Deep Dive

ITBroker.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Almost $5 trillion dollars are spent on Information Technology (IT) annually. Cut through the hype and learn about the real needs, and problems that IT solves for your enterprise. Join us as we dive deep into case studies with providers and learn how IT can make your business better.
  continue reading
 
Artwork

4
Buying Tech

Richard Ellis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
  continue reading
 
Artwork

1
Culture of Compliance

Frazier & Deeter Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in “Top 25 Regulatory Compliance Podcasts You Must Follow in 2020” by Feedspot.
  continue reading
 
Artwork

1
AI Journal

Manish Balakrishnan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
AI Journal Podcast. Your go-to source for the latest breakthroughs, trends, and insights in the world of Artificial Intelligence. Every episode brings you up-to-date with breaking news, in-depth analyses, and real-world applications of AI shaping industries and redefining the future. From advancements in machine learning to the ethics of AI, we cover it all—delivering the most relevant updates directly to your ears. Whether you’re an enthusiast, a professional, or simply curious about the te ...
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Loading …
show series
 
Ever wondered what happens when a global IT giant acquires a renowned marketing firm? Tune in as Heather Simek and I unpack the Kaseya-TMT deal and its real impact on MSPs. From the inside scoop on industry rumors to how this move reshapes marketing, peer groups, and community, Heather brings her signature candor and expertise. Plus, we share stori…
  continue reading
 
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
  continue reading
 
Are you an MSP owner still stuck handling procurement late into the night? In this episode, Rayanne Buchianico reveals how ABC Solutions’ new outsourced procurement service can give you your time—and your weekends—back. Hear how her team’s hands-on, white-labeled solution integrates seamlessly with your PSA, keeps your margins intact, and lets you …
  continue reading
 
Episode Summary: In this episode, we explore how Morocco is leading Africa’s ethical AI future with a landmark partnership and bold national strategy. Then we unpack new research exposing why today’s most advanced AI agents still fail basic office tasks. From there, we head to the classroom as top MBA programs like Chicago Booth embed AI deeply int…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
  continue reading
 
In Part 2 of this mini episode, co-hosts Nick Agnetti and Jason Rowland explore the benefits of Asendia’s Laredo, TX facility for direct, compliant deliveries into Mexico—and how it helps customers avoid common logistics challenges. Subscribe to our email list Request a consultationBy Asendia USA
  continue reading
 
Today’s guest is Michael Zaiac, Head of Medical Oncology for Europe and Canada at Daiichi Sankyo. Michael joins the platform in a special episode focused on how AI is driving measurable ROI in clinical trials — particularly in eligibility and driving diversity in patient populations. Their conversation explores how life sciences teams are applying …
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
  continue reading
 
Today’s guest is Miranda Jones, SVP Data & AI Strategy Leader at Emprise Bank, to explore how banks can design AI systems that balance compliance obligations, customer expectations, and employee experience. Miranda unpacks why explainability shouldn’t be an afterthought—and how embedding transparency into AI workflows helps institutions avoid costl…
  continue reading
 
Are we preparing people as quickly as we’re preparing machines? That’s the uncomfortable question at the heart of Coursera’s 2025 Global Skills Report, and the starting point for my conversation with Nikolaz Foucaud, Coursera’s Managing Director for EMEA. As the UK jumps more than 20 spots in global skills rankings and countries like Singapore and …
  continue reading
 
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
  continue reading
 
Ever struggled to get your clients to care about cybersecurity? Adam Anderson from ThreatCaptain shares how their platform helps MSPs translate complex cyber risks into clear financial impacts that business leaders understand. Find out how one MSP turned a simple simulation into $7,000 in new monthly revenue, and why talking dollars and cents is th…
  continue reading
 
Can you really trust AI to create brand-worthy images — without a designer? If you're leading a business, you know how much time and budget visuals can drain. But what if you could generate high-quality, on-brand images in minutes — with tools you already have? In this power-packed episode, AI image expert Rory Flynn joins Isar Meitis for part thre…
  continue reading
 
In the age of AI, customer trust is a hard-won commodity. Join us in this episode of AWS Executive Insights as we speak with Matt Saner, AWS Security Solutions Architect Manager, about the critical intersection of AI, security, and customer trust. AWS security evangelist Clarke Rodgers sits down with Matt to learn how AWS collaborates with customer…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Traditional learning methods often struggle to keep learners engaged—rigid formats, passive content, and a lack of personalization. But could AI offer a better way? In this episode of Innovation Tales, we sit down with Juliette Denny, a trailblazer in learning technology, to explore how AI is revolutionizing education and corporate training. From g…
  continue reading
 
Today’s guest is Marc Fredman, Chief Strategy Officer at CCC Intelligent Solutions. Marc joins Emerj CEO and Head of Research Daniel Faggella to discuss how leading insurers are using AI to manage growing complexity across the insurance supply chain — from vehicle damage assessment to claim settlement and subrogation. He breaks down where AI is alr…
  continue reading
 
Send the hosts a message - try it now! TL;DR: Did you miss us? Yes, we're back with Sam Masiello and we're talking about whatever is on his mind. Well ...there's geopolitics and Iranian hackers and frankly we need to talk about what it means for your security program. Thanks for joining us, Sam! YouTube Video: https://youtube.com/live/H-4ZktBIUDE D…
  continue reading
 
The Ingram Micro cyber incident sent shockwaves through the IT world, but it’s more than just a headline—it’s a wake-up call for MSPs and IT providers everywhere. In this episode, I’m joined by Michael Crean to discuss the real impact, the lessons we all need to learn, and why compassion and community matter most when crisis hits. Let’s turn disrup…
  continue reading
 
What happens when AI moves from experimental tool to everyday shopping assistant? In this episode of Tech Talks Daily, I’m joined by Liva Ralaivola, Head of the Criteo AI Lab, to unpack how artificial intelligence is reshaping the way we discover, compare, and purchase products online. Speaking to me from the south of France, Liva shares insights f…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
  continue reading
 
Ever wish you could turn those low-fit contracts into real cash—or acquire new clients without the headaches of traditional M&A? Matt Yesbeck, co-founder of MSPX, reveals how his platform is turning managed service contracts into currency. Hear the story behind the first marketplace designed for MSPs to buy, sell, and value contracts, and learn how…
  continue reading
 
Guest: Cristina Vintila, Product Security Engineering Manager, Google Cloud Topic: Could you share insights into how Product Security Engineering approaches at Google have evolved, particularly in response to emerging threats (like Log4j in 2021)? You mentioned applying SRE best practices in detection and response, and overall in securing the Googl…
  continue reading
 
Episode Summary In this episode, we explore four pivotal developments shaping the global AI landscape. We begin with a stark warning from cybersecurity firm CyXcel, which reveals that many UK companies are unprepared for AI-related threats despite growing adoption. Then, we shift to Capgemini’s launch of its Resonance AI Framework, designed to help…
  continue reading
 
How do we prepare for a world where AI agents work together, networks think for themselves, and quantum teleportation is no longer just science fiction? I recently caught up once again with Vijoy Pandey, SVP and GM of Outshift by Cisco, live at Cisco Live in San Diego, for a wide-ranging conversation about what comes next at the edge of AI and quan…
  continue reading
 
As Malaysia’s digital economy rapidly grows, so do cyber threats. File encryption is vital for protecting sensitive business data against breaches, ransomware, and insider threats. It ensures compliance with the Personal Data Protection Act (PDPA), builds stakeholder trust, and secures data across remote work environments. Especially crucial for SM…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
  continue reading
 
Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health. Brad joins Emerj Senior Editor Matthew DeMello to explore what it takes to implement AI across a complex care environment. From improving patient experience to easing clinician burdens, Kennedy highlights the need for precision, transparency, and collab…
  continue reading
 
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
  continue reading
 
Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
  continue reading
 
Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
  continue reading
 
Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
  continue reading
 
As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
  continue reading
 
Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
  continue reading
 
Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
  continue reading
 
Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
  continue reading
 
Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
  continue reading
 
As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
  continue reading
 
Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
  continue reading
 
Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
  continue reading
 
With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
  continue reading
 
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play