Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Nis2 Podcasts

show episodes
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Artwork
 
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork

1
Safety Corner

Florian Wagner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Der Podcast für die Safety Community. Expert:inn:en im Gespräch über Safety Engineering und Management im Kontext von großen, komplexen Systemen. About the host: Florian Wagner is a Functional Safety Consultant with msg Plaut Austria. He has worked in Automotive, Railway and Aerospace projects. Mehr erfahren: https://safetycorner.wagnerflorian.eu/index.php/de/der-host
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Loading …
show series
 
Want a quick map of EU compliance for engineers? How do you classify AI by risk and tell users when AI is used? When do you send a 24-hour heads-up and a one-month report after an incident? Does NIS2 make your board liable and your logs mandatory? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our …
  continue reading
 
In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
  continue reading
 
Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
  continue reading
 
Which parts of AI Act, NIS2, DORA, and DSA overlap so you can cover more with less? What basics raise your baseline fast: central logs, backups, risk assessments, and human-in-the-loop governance? Could a simple mailing list make incident comms painless? We are always happy to answer any questions, hear suggestions for new episodes, or hear from yo…
  continue reading
 
Claude Brown, Jeffrey Stern, and Simon Hugo explore the various securitization structures within the data center sector, followed by an in-depth discussion on the environmental and social implications of data centers. This episode concludes with a comprehensive market overview of investment trends in the data center industry.…
  continue reading
 
In this episode of The Collective Podcast, our host Jordy Decock sits down with MVPs Thijs Lecomte and Robbe van den Daele as they unpack the journey from traditional SIEM and XDR deployments to Microsoft's Unified Security Operations platform. The deprecation of the Sentinel UI by August 2026 makes this migration inevitable. Our experts share thei…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Jim Moran, founder of SimplifyISO, to discuss the importance and methods of simplifying ISO management systems. Jim, with over 30 years of consulting experience, shares valuable insights on how overly complex management systems can hinder employee unders…
  continue reading
 
How cyber criminals are weaponising AI to defeat your threat detection and response Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks Thom Langfo…
  continue reading
 
Markus Lai joins Steve in-studio in Lund, Sweden to explore the significance of education and professional development in the security technology industry. As the Regional Manager Engineering & Training - Northern Europe, Markus discusses various learning styles, the importance of certifications, and the role of employers in facilitating continuous…
  continue reading
 
Identity is the new perimeter, are you prepared? Join Rui Shantilal, Group VP Cyber Trust and guest Aiert Azueta, Head of IAM Devoteam Cyber Trust as they uncover how Identity & Access Management (IAM) has become the front line of modern cybersecurity. In this episode, discover how Zero Trust, passwordless authentication, and AI are reshaping digit…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO at Advisera, welcomes Carlos Cruz, founder of Metanoia Consulting and a seasoned expert in ISO standards. Carlos and Dejan share best practices for performing internal audits across various ISO standards, including ISO 27001, and other cybersecurity frameworks such as NIS2 an…
  continue reading
 
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
  continue reading
 
In this episode of Security Tech Talk, commercial real estate and marketing expert Sienna Cacan delves into the transformative post-pandemic shifts in commercial real estate. She and Steve talk about how the growing demand for high-quality office spaces and advancements in PropTech are reshaping the industry. Sienna shares her expertise on the crit…
  continue reading
 
Is MCP just another server you need to threat model, patch, and monitor? How do you keep users from over-privileged access, block LLM injection, and stop blind spots? We unpack the VentureBeat article https://venturebeat.com/security/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise with real-world tips. We are always happy …
  continue reading
 
Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
  continue reading
 
Are AI-powered cyberattacks really the existential threat vendors claim? Or are we being sold fear to fuel product sales? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Andre Lynch, Senior Sales Engineer at ConnectWise, to cut through the AI marketing noise and reveal wh…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Steve Winterfeld, a seasoned security consultant, fractional CISO, and author of the book 'Cyber Warfare Techniques, Tactics, and Tools for Security Practitioners.' The discussion revolves around the relevance of cyber warfare for companies, the differen…
  continue reading
 
Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats Thom Langford, Host, teissT…
  continue reading
 
In this episode of our AI-enabled e-discovery series, host Anthony Diana sits down with Reed Smith’s Marcin Krieger and Gravity Stack’s Sharri Wilner to unpack Relativity aiR: Relativity’s embedded generative AI framework for e-discovery. The conversation breaks down how aiR differs from traditional TAR/CAL, what it means to treat prompts as a “rev…
  continue reading
 
In this episode of Security Tech Talk, Steve is joined by Kieran Byrne, A&E Manager at Axis Communications, for a deep and practical conversation about sustainability, total cost of ownership, and the evolving legislative landscape shaping the security industry. Kieran and Steve discuss how sustainability has evolved beyond “green initiatives” into…
  continue reading
 
Continuing our series on AI-enabled e-discovery, Anthony Diana, Therese Craparo, and Samantha Walsh tackle the thorniest privilege challenges and real-world use cases. They explore how AI – from tried and true technology-assisted review (TAR) to emerging generative AI – can accelerate privilege identification, sharpen quality control, and streamlin…
  continue reading
 
Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
  continue reading
 
AI doesn’t sleep, doesn’t forget, and doesn’t forgive. Are you prepared? Join Hugo Mestre, Executive Director & Head of Cyber Trust Portugal and co-host Rui Shantilal as we explore how AI is revolutionising cybersecurity, but also supercharging cybercrime. Listen to this episode to learn about: How AI is transforming threat detection & response. Th…
  continue reading
 
It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing. This p…
  continue reading
 
In this episode of the Secure and Simple Podcast, Dejan Kosutic, CEO of Advisera, interviews Paul C Dwyer, founder and CEO of Cyber Risk International and president of the ICTTF. They discuss digital resilience from a business and strategic standpoint, the role of company boards in cybersecurity, and how to effectively bridge the communication gap …
  continue reading
 
What does NIS2 really mean for your day-to-day security operations? In this episode of The Collective Podcast, host Jordy Decock sits down with Michael Van Horenbeeck, Microsoft Security MVP and CEO of The Collective, to unpack how organizations can move from NIS2 compliance checklists to measurable resilience. They explore why 24-hour incident rep…
  continue reading
 
Peter Dempsey, a seasoned expert in the security industry with over 30 years of experience, joins Security Tech Talk to discuss the rapid evolution of the data centre market, driven largely by advancements in AI and the increasing demand for digital infrastructure. Peter and Steve’s conversation covers the challenges of power supply, the importance…
  continue reading
 
We break down 10 years of HashiConf and this year's Terraform-heavy news. What do Terraform Actions with Ansible, Stacks GA, and HCP-only features mean for day two work? Is open source getting left behind, and is OpenTofu worth a look? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our listeners. D…
  continue reading
 
When ransomware hits, you have hours- not days- to respond. But should you prioritise survival or evidence preservation? And why are small businesses now the primary targets? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Detective Chief Superintendent Barry Walsh, head …
  continue reading
 
How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
  continue reading
 
Anthony Diana is joined by Therese Craparo and Marcin Krieger to start a new series on AI-enabled e-discovery. This series will look at practical and legal issues related to the use of AI in e-discovery, with a focus on actual use cases rather than theoretical discussions. Topics for this episode include how AI is currently being used in e-discover…
  continue reading
 
In this episode of Secure and Simple Podcast, hosted by Dejan Kosutic, we are joined by Jim Moran, founder of Simplify ISO and member of the ISO Committee 280. With over 30 years of experience in consulting and various ISO standards, Jim shares his insights on the High-level Structure (HLS) of ISO management standards and the integration of various…
  continue reading
 
"Just defend better and you won't need resilience." It's the logic trap that's burning out CISOs worldwide - but what if the entire premise is wrong? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Dr. Paul Guckian, author of "Systematic Cyber Risk: Why CISOs Can't Fix Cy…
  continue reading
 
Reed Smith’s Jason Garcia, Gerard Donovan, and Tyler Thompson are joined by Databricks’ Suchismita Pahi and Christina Farhat for a spirited discussion exploring one of the most urgent debates of our era: Should AI be regulated now, or are we moving too fast? Settle in and listen to a dynamic conversation that delves into the complex relationship be…
  continue reading
 
Steve and Axis’ David Needham delve into the evolution of security technology and discuss Axis' innovative “Power of One” campaign is reshaping the landscape with seamless tech integration and hybrid security solutions. We'll explore the growing demand for holistic security approaches, the benefits of cloud solutions, and the integration of hybrid …
  continue reading
 
Most businesses think a password manager solves their identity problem. The truth? It's only the beginning. In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Sean O'Neill, Category Manager at Brigantia, to uncover why relying on basic password tools leaves organisations dan…
  continue reading
 
Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
  continue reading
 
"Humans are the weakest link." It's cybersecurity's most repeated phrase - but what if treating people as threats is actually making us less secure? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Dr. Louise O'Hagan, Cybersecurity Governance Programme Manager and cyber ps…
  continue reading
 
Can AI really help us build more secure software? What’s working in practice right now, and where do the tools still fall short? Mattias and Paulina share their views. We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our listeners. DevSecOps Talks podcast LinkedIn page DevSecOps Talks podcast website…
  continue reading
 
In this episode, Leigh Harper (Associate Director for Security at Cundall), explores the link between security and sustainability in urban development. With experience across various regions, she stresses the need to integrate security measures early in master planning. Leigh discusses the importance of coordination with architects to balance aesth…
  continue reading
 
70% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
  continue reading
 
In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
  continue reading
 
In this episode, Dejan Kosutic, CEO at Advisera, chats with Thom Langford, CTO of the EMEA region at Rapid7 and a director at (TL)2 Security. Thom shares invaluable insights from his 30-year career in cybersecurity, focusing on creating a business-aligned cybersecurity strategy and building a cybersecurity culture. Learn why understanding your busi…
  continue reading
 
Are you prepared for DORA and NIS2, the EU regulations fundamentally reshaping the cybersecurity landscape? For many organisations in the financial and critical infrastructure sectors, navigating these new frameworks presents a significant challenge, moving beyond a simple checklist to demand true operational resilience. In this episode of Cyber Ta…
  continue reading
 
It’s been a while since OpenTofu was released to the public, so we wanted to check in on where it stands today. How is the community adopting it? What’s the public sentiment? And how does it differ from Terraform in terms of features? This time we’re joined by Cole Bittel, an experienced SRE, platform engineer, and contributor to OpenTofu. He share…
  continue reading
 
SIEM. XDR. SOAR. Three acronyms that dominate cybersecurity conversations but what do they really mean for your business in 2025? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson are joined by Leigh Cockell, Principal Sales Engineer at ConnectWise, to cut through the nois…
  continue reading
 
Steve welcomes Leo Levit, chair of ONVIF (Open Network Video Interface Forum), to talk about the evolution of IP security standards. Leo and Steve discuss ONVIF's journey from its founding by Axis, Bosch, and Sony in 2008, overcoming initial skepticism, to becoming the standard for interoperability. Leo highlights ONVIF's growth, noting the increas…
  continue reading
 
In this episode of the Secure and Simple podcast, host Dejan Kosutic interviews George Kesteven, CEO of Frontex, who shares his experience in corporate governance. They discuss the critical importance of proper documentation and knowledge management in organizations for effective governance and compliance. The conversation covers the fundamentals o…
  continue reading
 
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play