Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
MSSP Podcasts
“Behind every thriving MSP/MSSP is a founder who cracked the growth code—these are their stories.” Founder-led IT leaders share exactly what it takes to break revenue plateaus, eliminate bottlenecks, and build MSP/MSSPs and other companies in the IT space that scale without founder burnout. Hosted by Chris Larcade, fractional CRO and growth strategist, each episode delivers actionable insights, battle-tested strategies, and unfiltered stories from the IT CEOs shaping the industry’s future.
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. These conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical knowledge, and help you identify ways to keep your team ahead of the technological curve, and ensure the challenges around technology are addre ...
…
continue reading
The podcast about Fortinet technology. Episodes can be found at forticast.fortinet.com.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading

1
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
…
continue reading

1
Keeping Teams Aligned During Big Shifts - Lessons for IT Leaders
19:42
19:42
Play later
Play later
Lists
Like
Liked
19:42What happens when your company’s most valuable asset starts holding you back? In this episode of The Growth Guild, Chris Larcade talks with Nathan Flood, CEO of Kinber, about leading through massive business pivots — from selling a multi-million-dollar infrastructure asset to redefining the organization’s mission. Whether you run an MSP, MSSP, or I…
…
continue reading
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
…
continue reading

1
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
…
continue reading
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
…
continue reading
Join new host Deborah McIsaac and her co-hosts for this episode, Daren and Valerie, as they discuss Compliance Risk Management and how it can benefit your business.By Danny Joseph Bergeron
…
continue reading

1
Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
…
continue reading
------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of o…
…
continue reading

1
S17 E08 (VIDEO) The Biggest Mistakes in Healthcare Security
51:00
51:00
Play later
Play later
Lists
Like
Liked
51:00#SecurityConfidential #DarkRhiinoSecurityEd Gaudet is a thought leader on enterprise risk, third-party risk management, and the future of cyber governance in the age of AI. He brings over 25 years of software leadership experience in cybersecurity, risk management, and healthcare IT. Known for driving innovation at companies like Imprivata and Liqu…
…
continue reading

1
S17 E08 The Biggest Mistakes in Healthcare Security
51:00
51:00
Play later
Play later
Lists
Like
Liked
51:00#SecurityConfidential #DarkRhiinoSecurityEd Gaudet is a thought leader on enterprise risk, third-party risk management, and the future of cyber governance in the age of AI. He brings over 25 years of software leadership experience in cybersecurity, risk management, and healthcare IT. Known for driving innovation at companies like Imprivata and Liqu…
…
continue reading

1
S17 E07 (VIDEO) You Think MFA is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading

1
S17 E07 You Think MFA Is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading

1
S17 E06 (VIDEO) Disaster Recovery Isn't Optional
45:51
45:51
Play later
Play later
Lists
Like
Liked
45:51Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading

1
S17 E05 (VIDEO) Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
S17 E05 Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
S17 E04 (VIDEO) Adapting to AI & Rethinking What We Protect
53:22
53:22
Play later
Play later
Lists
Like
Liked
53:22Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
…
continue reading

1
S17 E04 Adapting to AI & Rethinking What We Protect
53:22
53:22
Play later
Play later
Lists
Like
Liked
53:22Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
…
continue reading

1
S17 E03 (VIDEO) Thinking Beyond the Checkbox
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, indus…
…
continue reading
Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, indus…
…
continue reading

1
S17 E02 (VIDEO) Is Your Job Safe From AI?
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
…
continue reading
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
…
continue reading

1
S17 E01 (VIDEO) Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
…
continue reading

1
S17 E01 Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. …
…
continue reading
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
…
continue reading
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
…
continue reading

1
S16 E10 (VIDEO) Will AI Change the Way We Learn
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
…
continue reading
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
…
continue reading

1
S16 E09 (VIDEO) Phishing, Encryption, and Cybersecurity Training
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
…
continue reading

1
S16 E09 Phishing, Encryption, and Cybersecurity Training
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
…
continue reading

1
S16 E08 (VIDEO) Red Flags in Cybersecurity Coaching
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
…
continue reading

1
S16 E08 Red Flags in Cybersecurity Coaching
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
…
continue reading

1
Episode 6 -What to Consider in Governance, Risk, & Compliance, Part 2
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Join Ross as he continues the conversation with Daren Rathbone and Denise England discussing what you need to consider for your business in Governance, Risk, & Compliance.By Danny Joseph Bergeron
…
continue reading

1
S16 E07 (VIDEO) "Hackers Aren’t Breaking In—They’re Logging In"
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
…
continue reading

1
S16 E07 "Hackers Aren’t Breaking In—They’re Logging In"
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
…
continue reading

1
S16 E06 (VIDEO) Inside the Mind of a Former Cybercriminal
57:34
57:34
Play later
Play later
Lists
Like
Liked
57:34#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
…
continue reading

1
S16 E06 Inside the Mind of a Former Cybercriminal
57:34
57:34
Play later
Play later
Lists
Like
Liked
57:34#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
…
continue reading

1
Episode 5 - What to Consider in Governance, Risk, & Compliance
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00Join Ross as he talks with guests Daren Rathbone and Denise England to discuss what you and your organization might need to consider when it comes to Governance, Risk, & Compliance.By Danny Joseph Bergeron
…
continue reading

1
What is the Difference Between and MSP and and MSSP?
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39Join Ross as he speaks with long time coworker and friend, Armando Rivera about MSSP, Security, and some best practices for keep your busines secure.By Danny Joseph Bergeron
…
continue reading

1
Dark Rhiino Security Attends IEC Business Summit
57:43
57:43
Play later
Play later
Lists
Like
Liked
57:43#IECBusinessSummit #DarkRhiinoSecurityTest out our FREE CISO Bot :https://www.darkrhiinosecurity.com------------------------------------------------------------Music by Mykola Sosin from Pixabay------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, ale…
…
continue reading
Join Ross and Deb Walther as they discuss Microsoft's "Copilot," what it is, what it isn't, and how businesses can use it.By Danny Joseph Bergeron
…
continue reading
Sandra has over 25 years of experience in Cybersecurity, IT, and Data Privacy. She transformed her personal nightmare of identity theft into inspiration, helping individuals and businesses protect what matters most from hackers, scammers, and Cybermonsters®. She is a TEDx speaker, podcast host, corporate trainer, and international bestselling autho…
…
continue reading
Join your host, Ross Jordan, as you hear about SkyTerra from it's inception to vision, the attributes that have made SkyTerra what it is, and the vision for where we are going. To view more about SkyTerra Technologies, check out: https://skyterratech.com/ or https://www.linkedin.com/company/skyterra-technologies-inc/.…
…
continue reading

1
S16 E04 Communicate Properly to Your Team
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33Tammy Klotz is a cybersecurity leader with over 20 years in IT and a decade as a CISO for global manufacturing firms. She has transformed cybersecurity programs, driven cultural change, and championed women in technology through mentorship and active involvement in groups like WiCyS and the Cloud Security Alliance. At Versum Materials, she develope…
…
continue reading
#SecurityConfidential #DarkRhiinoSecurityKen Foster is a highly accomplished Security Expert with over 25 years of leadership experience in cybersecurity, infrastructure, and risk management. As a former CISO, technology leader, and US Navy Veteran, he brings a unique blend of strategic and operational expertise in information risk governance, IT e…
…
continue reading
Join your host, Ross Jordan, for an introduction to the earliest days of SkyTerra with co-founder, Darren Schriever. Learn about the reasons for founding the compny and highlights from the early years. Let's get started! To view more about SkyTerra Technologies, check out: https://skyterratech.com/ or https://www.linkedin.com/company/skyterra-techn…
…
continue reading
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. The conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical…
…
continue reading
Allie Hunter is a cybersecurity advocate and the author of Mothers Against Cyber Crime, a book that addresses the challenges parents face in protecting their families online. With a background in psychology, behavioral science, cybersecurity, and marketing, Allie weaves together real-life cyber incidents into compelling stories that offer practical…
…
continue reading

1
S16 E01 Breaking Into Cybersecurity: Job Hunting Tips and Ghost Job Realities
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39#SecurityConfidential #DarkRhiinoSecurity Ken is the former CEO, Executive Producer, and Television Host at Cyber Life. He is the Best-Selling Author of “Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career”. He has been featured in Forbes, Reader's Digest, Tech Republic, Fox, NBC, Dark…
…
continue reading

1
S16 E0 Company Data on ChatGPT: Why What You Share Could Stay Forever
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Jim Love is a strategic consultant and corporate advisor specializing in AI, technology, marketing, and business strategy. He is an accomplished author, journalist, professor, and podcast host, known for producing the popular shows Hashtag Trending and Cybersecurity Today, and is the publisher of Tech Newsday. Jim served as CIO and Chief Content Of…
…
continue reading