Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Enterprise Security Risk Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

701
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
The Security Bench

Duronke Owoleso

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Artwork

1151
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Enterprise AI Defenders

The AI in Enterprise Software Podcast Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO of Abnormal AI.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
  continue reading
 
Description: Creating AI Trust is a very complex and hard problem. It is not clear what it is and how it can be operationalized. We will demystify what is Trustworthy AI, efficient adoption and leveraging it for reducing risks in AI programs. McKinsey reports indicates companies seeing the biggest bottom-line returns from AI—those that attribute at least 20 percent of EBIT or profitability to their use of AI—are more likely than others to follow Trustworthy AI best practices, including expla ...
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

4
Technical Debt: Design, risk and beyond

Maxim Silaev & Nikita Golovko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We talk to experienced architects and technology leaders about the architectural choices they’ve made — the good, the bad, and the costly. From scaling systems to integrating legacy platforms, from misaligned domains to governance gaps, we discuss how architecture impacts technical debt. You’ll hear honest stories of architectural missteps, what teams learned from them, and how they built systems designed not just to work, but to last.
  continue reading
 
Artwork
 
Enterprising Investor is the flagship podcast of CFA Institute and the definitive program for the investment management industry. As stewards of the investment industry, Enterprising Investor will feature intimate conversations with some of the most influential people from the world of finance about the topics that matter most to investment professionals.
  continue reading
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
Artwork

1
Alt Investing Made Easy

AltInvestingMadeEasy LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join attorneys Sarah Florer and Roland Roland Wiederaenders as they navigate through the maze of market jargon and reveal the secrets of diversifying your portfolio. Whether you're a seasoned investor or taking your first step toward financial freedom, we empower you with the knowledge and insights you need to thrive in the dynamic landscape of alternative assets. Get ready to transform how you invest, inspiring a new way of thinking about your finances, and discover how to make your money w ...
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Discover new opportunities and navigate the challenges of expanding your global footprint with Outside the Box with Asendia USA: The International e-Commerce Podcast. Debuted in January 2024, "Outside the Box with Asendia USA", is designed to educate U.S.-based brands, marketplaces, and e-tailers on cutting-edge global shipping strategies. With a strong emphasis on education, the podcast serves as a resource to guide e-tailers through the complexities of international logistics and evolving ...
  continue reading
 
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
  continue reading
 
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
  continue reading
 
Artwork

1
the CYBER5

Nisos, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
  continue reading
 
"Open conversations. Real technology. AI for growth." Open Tech Talks is your weekly sandbox for technology: Artificial Intelligence, Generative AI, Machine Learning, Large Language Models (LLMs) insights, experimentation, and inspiration. Hosted by Kashif Manzoor, AI Evangelist, Cloud Expert, and Enterprise Architect, this Podcast combines technology products, artificial intelligence, machine learning overviews, how-tos, best practices, tips & tricks, and troubleshooting techniques. Whether ...
  continue reading
 
Welcome to the Enterprise Influencers Podcast where we explore the inner workings of large organizations and the people and technologies that help them get things done. We’re your hosts Patrick Falgoust and Giles Hamson. We’ve both worked as consultants and within the IT departments for some of the world’s largest organizations. We’ll be bringing you candid discussions with industry leaders that are helping to shape the future of enterprise technology and exploring what influences the decisi ...
  continue reading
 
Artwork

1
The Union

Krista Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
  continue reading
 
Artwork

1
DisrupTV

DisrupTV

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. The audience can expect A-list guests, the latest enterprise news, hot startups, insight from influencers, and much more. Tweet questions to #DisrupTV or @DisrupTVShow.
  continue reading
 
Artwork

1
Buying Tech

Richard Ellis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
The Data Diva Talks Privacy Podcast The Debbie Reynolds “The Data Diva” Talks Privacy Podcast features thought-provoking discussions with global leaders on the most pressing data privacy challenges facing businesses today. Each episode explores emerging technologies, international laws and regulations, data ethics, individual rights, and the future of privacy in a rapidly evolving digital world. With listeners in more than 130 countries and 2,900 cities, the podcast delivers valuable insight ...
  continue reading
 
Artwork

1
Culture of Compliance

Frazier & Deeter Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in "Top 25 Regulatory Compliance Podcasts You Must Follow in 2020" by Feedspot.
  continue reading
 
Artwork

1
Data Science Conversations

Damien Deighan and Philipp Diesinger

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Data Science Conversations Podcast hosted by Damien Deighan and Dr Philipp Diesinger. We bring you interesting conversations with the world’s leading Academics working on cutting edge topics with potential for real world impact. We explore how their latest research in Data Science and AI could scale into broader industry applications, so you can expand your knowledge and grow your career. Every 4 or 5 episodes we will feature an industry trailblazer from a strong academic back ...
  continue reading
 
Join Prescriptive’s own Paul Di Liegro, Senior Sales Executive, as he interviews lawyers, doctors, athletes, and interesting personalities from all walks of life. Paul’s curiosity leads to the uncovering of his guests’ most impactful life stories, and Paul illuminates the connection between life’s important lessons and being a better sales rep. Business, Brains & the Bottom Line is the leading podcast by and for Enterprise IT decision-makers. Read more at https://www.prescriptive.solutions/p ...
  continue reading
 
Artwork

3651
What the futr

Sandesh & Chris | futr connect

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What the futr is a biweekly podcast that explores the intersection of AI, sales, and humanity. Hosted by Sandesh Patel and Chris Brandt, each episode features AI startup founders and tech leaders sharing real stories, their value proposition, and visions for the future—structured like a smart first-call sales meeting. It’s all about making AI make sense for businesses—and helping people stay informed, not left behind.
  continue reading
 
Loading …
show series
 
Building Career Resilience in the Age of Generative AI Every week, we explore how AI and technology are changing the way we work and learn. This episode dives into the question I get asked the most, How is Generative AI changing every career? Let's unpack why it matters, how it's shifting roles and skills, and what you can do to lead this change in…
  continue reading
 
A newly identified Android spyware targeted Galaxy devices for close to a year, including users in the Middle East, researchers exclusively tell TechCrunch. In addition, the congressional research office confirmed a breach, but did not comment on the cause. A security researcher suggested the hack may have originated because CBO failed to patch a f…
  continue reading
 
How do leaders thrive in the age of AI? In this episode, hosts Vala Afshar and R "Ray" Wang talk with Dr. David Bray, Sue Gordon, and Barry O’Sullivan about leadership, trust, and decision-making in an AI-driven world. Discover how visionary leaders are balancing innovation with responsibility, empowering teams, and staying grounded in human values…
  continue reading
 
The proposal received more than 75% approval. Musk can earn the $1 trillion in shares over the next 10 years if Tesla hits a number of milestones. Plus Musk said he expects Tesla to be able to put all the Cybercabs it builds on the road, and thanked Waymo for 'paving the path.' Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
The Consumer Product Safety Commission is warning Peloton users to stop using the affected bikes immediately. Also, Snap said today that it has signed a deal with AI-powered search engine Perplexity to power a new chatbot. As part of the deal, Perplexity will pay Snap $400 million in cash and equity. Learn more about your ad choices. Visit podcastc…
  continue reading
 
Australia now has so much solar power that the government will require utilities to sell customers free electricity for three hours per day. Apple is turning to Google's technology to help revamp Siri and power a slate of upcoming features for the voice assistant. Blue Origin's first New Glenn launch in January mostly went well, and now the long-de…
  continue reading
 
Sean Olsen, founder of the Olsen Law Firm, shares the lessons every entrepreneur needs to hear about standing out in a crowded market. From using storytelling to build a memorable brand to turning client experience into your most powerful marketing tool, Sean offers a roadmap for competing against bigger players with bigger budgets. He also dives i…
  continue reading
 
Technology isn’t the only aspect of the security industry that’s evolving. The very definition of “security” is changing, so the way practitioners approach security must change with it. SecurityInfoWatch Associate Editor Samantha Schober brings Mary Gates, CEO of GMR Security Consulting Group, to the table to discuss the company’s rebranding effort…
  continue reading
 
Researchers at Microsoft have developed a new simulation environment for testing AI agents, revealing surprising weaknesses in the current state-of-the-art. Also, Penn experienced a data breach on Friday as hackers sent messages boasting of the hack to the university community. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12) Malicious NPM Packages (7:20…
  continue reading
 
On Episode 33 of Enterprise AI Defenders, hosts Evan Reiser (CEO and co-founder, Abnormal AI) and Mike Britton (CIO, Abnormal AI) sit down with Lester Godsey, Chief Information Security Officer at Arizona State University, to discuss how ASU is building an ambitious, campus-wide AI strategy. With more than 200,000 users, ASU has deployed an in-hous…
  continue reading
 
The Information reports that Anthropic expects to generate as much as $70 billion in revenue and $17 billion in cash flow in 2028. The growth projections are fueled by rapid adoption of Anthropic’s business products, a person with knowledge of the company’s financials said. And despite its imprecision, the fourth "Master Plan" is a centerpiece of T…
  continue reading
 
In Part 2 of this series, our co-hosts continue their conversation with Chas Gorham, Vice President, Sales of International Bridge and Tom Foley, Vice President Government Affairs & Client Retention of Asendia USA. They discuss how shipping to Alaska, Hawaii, and Puerto Rico is treated as domestic—eliminating cross-border compliance hurdles—and how…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
For Investors Exploring Cross-Border Opportunities: How Raising Capital in the UAE Really Works Dubai is often seen as a place of limitless wealth and easy capital—but the reality of raising money in the United Arab Emirates is far more structured and relationship-driven than most realize. In this episode, international attorney Sarah Florer sits d…
  continue reading
 
Meta said that Facebook Dating has 1.77 million daily active users in the US between ages 18-29. Also, core parts of the ClickUp release were possible because of its acquisition of Qatalog. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
What’s the real difference between monitoring and observability—and why does it matter in enterprise environments? In this episode, Brad Bussie is joined by Paige Cruz and Bill Hineline of Chronosphere to challenge outdated approaches and reveal how culture, cost, and complexity are shaping the future of observability in enterprise IT. Topics Cover…
  continue reading
 
TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Send us a text In Episode 261 of The Data Diva Talks Privacy Podcast, Debbie Reynolds, The Data Diva, talks with Jesse Kirkpatrick, Co Director at the Mason Autonomy and Robotics Center at George Mason University, about the rapidly expanding adoption of generative artificial intelligence and the significant risks that accompany this high velocity o…
  continue reading
 
In today’s episode, Steve sits down with Dr. Tunisha Singleton, Director of Clinical and Sport Psychology Services at University of Arizona and a leading expert in how media, technology, and culture shape the human experience. Dr. Singleton highlights that authenticity and humanity still matter despite all the technology around us, and the two disc…
  continue reading
 
Elon Musk and Sam Altman are still taking swipes at each other on Musk’s social media platform X. Also, a majority of consumers say they’re worried about data centers driving up electricity costs. Is the industry prepared for a possible backlash? Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Open Tech Talks welcomes Lirone Glikman, author of The Super Connectors Playbook, global speaker, and relationship-building strategist. We dig into practical ways founders, students, and leaders can build authentic relationships, present with clarity, and sustain a personal brand without sounding salesy, especially now that AI makes everyone's writ…
  continue reading
 
Risk expert and author Richard Bookstaber joins guest host Genevieve Hayman, senior researcher at CFA Institute, to explore why traditional financial models often fail to capture the real dynamics of markets. Drawing from decades of experience — from hedge funds to the US Treasury — Bookstaber unpacks how human behavior, feedback loops, and network…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play