Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Nis2 Podcasts

show episodes
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

3801
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork

1
Safety Corner

Florian Wagner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Der Podcast für die Safety Community. Expert:inn:en im Gespräch über Safety Engineering und Management im Kontext von großen, komplexen Systemen. About the host: Florian Wagner is a Functional Safety Consultant with msg Plaut Austria. He has worked in Automotive, Railway and Aerospace projects. Mehr erfahren: https://safetycorner.wagnerflorian.eu/index.php/de/der-host
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Loading …
show series
 
What does NIS2 really mean for your day-to-day security operations? In this episode of The Collective Podcast, host Jordy Decock sits down with Michael Van Horenbeeck, Microsoft Security MVP and CEO of The Collective, to unpack how organizations can move from NIS2 compliance checklists to measurable resilience. They explore why 24-hour incident rep…
  continue reading
 
Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
  continue reading
 
Are AI-powered cyberattacks really the existential threat vendors claim? Or are we being sold fear to fuel product sales? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Andre Lynch, Senior Sales Engineer at ConnectWise, to cut through the AI marketing noise and reveal wh…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Steve Winterfeld, a seasoned security consultant, fractional CISO, and author of the book 'Cyber Warfare Techniques, Tactics, and Tools for Security Practitioners.' The discussion revolves around the relevance of cyber warfare for companies, the differen…
  continue reading
 
Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats Thom Langford, Host, teissT…
  continue reading
 
In this episode of our AI-enabled e-discovery series, host Anthony Diana sits down with Reed Smith’s Marcin Krieger and Gravity Stack’s Sharri Wilner to unpack Relativity aiR: Relativity’s embedded generative AI framework for e-discovery. The conversation breaks down how aiR differs from traditional TAR/CAL, what it means to treat prompts as a “rev…
  continue reading
 
In this episode of Security Tech Talk, Steve is joined by Kieran Byrne, A&E Manager at Axis Communications, for a deep and practical conversation about sustainability, total cost of ownership, and the evolving legislative landscape shaping the security industry. Kieran and Steve discuss how sustainability has evolved beyond “green initiatives” into…
  continue reading
 
Continuing our series on AI-enabled e-discovery, Anthony Diana, Therese Craparo, and Samantha Walsh tackle the thorniest privilege challenges and real-world use cases. They explore how AI – from tried and true technology-assisted review (TAR) to emerging generative AI – can accelerate privilege identification, sharpen quality control, and streamlin…
  continue reading
 
Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
  continue reading
 
AI doesn’t sleep, doesn’t forget, and doesn’t forgive. Are you prepared? Join Hugo Mestre, Executive Director & Head of Cyber Trust Portugal and co-host Rui Shantilal as we explore how AI is revolutionising cybersecurity, but also supercharging cybercrime. Listen to this episode to learn about: How AI is transforming threat detection & response. Th…
  continue reading
 
It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing. This p…
  continue reading
 
In this episode of the Secure and Simple Podcast, Dejan Kosutic, CEO of Advisera, interviews Paul C Dwyer, founder and CEO of Cyber Risk International and president of the ICTTF. They discuss digital resilience from a business and strategic standpoint, the role of company boards in cybersecurity, and how to effectively bridge the communication gap …
  continue reading
 
Peter Dempsey, a seasoned expert in the security industry with over 30 years of experience, joins Security Tech Talk to discuss the rapid evolution of the data centre market, driven largely by advancements in AI and the increasing demand for digital infrastructure. Peter and Steve’s conversation covers the challenges of power supply, the importance…
  continue reading
 
When ransomware hits, you have hours- not days- to respond. But should you prioritise survival or evidence preservation? And why are small businesses now the primary targets? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Detective Chief Superintendent Barry Walsh, head …
  continue reading
 
How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
  continue reading
 
Anthony Diana is joined by Therese Craparo and Marcin Krieger to start a new series on AI-enabled e-discovery. This series will look at practical and legal issues related to the use of AI in e-discovery, with a focus on actual use cases rather than theoretical discussions. Topics for this episode include how AI is currently being used in e-discover…
  continue reading
 
In this episode of Secure and Simple Podcast, hosted by Dejan Kosutic, we are joined by Jim Moran, founder of Simplify ISO and member of the ISO Committee 280. With over 30 years of experience in consulting and various ISO standards, Jim shares his insights on the High-level Structure (HLS) of ISO management standards and the integration of various…
  continue reading
 
"Just defend better and you won't need resilience." It's the logic trap that's burning out CISOs worldwide - but what if the entire premise is wrong? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Dr. Paul Guckian, author of "Systematic Cyber Risk: Why CISOs Can't Fix Cy…
  continue reading
 
Reed Smith’s Jason Garcia, Gerard Donovan, and Tyler Thompson are joined by Databricks’ Suchismita Pahi and Christina Farhat for a spirited discussion exploring one of the most urgent debates of our era: Should AI be regulated now, or are we moving too fast? Settle in and listen to a dynamic conversation that delves into the complex relationship be…
  continue reading
 
Steve and Axis’ David Needham delve into the evolution of security technology and discuss Axis' innovative “Power of One” campaign is reshaping the landscape with seamless tech integration and hybrid security solutions. We'll explore the growing demand for holistic security approaches, the benefits of cloud solutions, and the integration of hybrid …
  continue reading
 
Most businesses think a password manager solves their identity problem. The truth? It's only the beginning. In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Sean O'Neill, Category Manager at Brigantia, to uncover why relying on basic password tools leaves organisations dan…
  continue reading
 
Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
  continue reading
 
"Humans are the weakest link." It's cybersecurity's most repeated phrase - but what if treating people as threats is actually making us less secure? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Dr. Louise O'Hagan, Cybersecurity Governance Programme Manager and cyber ps…
  continue reading
 
In this episode, Leigh Harper (Associate Director for Security at Cundall), explores the link between security and sustainability in urban development. With experience across various regions, she stresses the need to integrate security measures early in master planning. Leigh discusses the importance of coordination with architects to balance aesth…
  continue reading
 
70% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
  continue reading
 
In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
  continue reading
 
In this episode, Dejan Kosutic, CEO at Advisera, chats with Thom Langford, CTO of the EMEA region at Rapid7 and a director at (TL)2 Security. Thom shares invaluable insights from his 30-year career in cybersecurity, focusing on creating a business-aligned cybersecurity strategy and building a cybersecurity culture. Learn why understanding your busi…
  continue reading
 
Are you prepared for DORA and NIS2, the EU regulations fundamentally reshaping the cybersecurity landscape? For many organisations in the financial and critical infrastructure sectors, navigating these new frameworks presents a significant challenge, moving beyond a simple checklist to demand true operational resilience. In this episode of Cyber Ta…
  continue reading
 
SIEM. XDR. SOAR. Three acronyms that dominate cybersecurity conversations but what do they really mean for your business in 2025? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson are joined by Leigh Cockell, Principal Sales Engineer at ConnectWise, to cut through the nois…
  continue reading
 
Steve welcomes Leo Levit, chair of ONVIF (Open Network Video Interface Forum), to talk about the evolution of IP security standards. Leo and Steve discuss ONVIF's journey from its founding by Axis, Bosch, and Sony in 2008, overcoming initial skepticism, to becoming the standard for interoperability. Leo highlights ONVIF's growth, noting the increas…
  continue reading
 
In this episode of the Secure and Simple podcast, host Dejan Kosutic interviews George Kesteven, CEO of Frontex, who shares his experience in corporate governance. They discuss the critical importance of proper documentation and knowledge management in organizations for effective governance and compliance. The conversation covers the fundamentals o…
  continue reading
 
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls…
  continue reading
 
Steve invites SecureLogiq’s Ben Yoxall to explore the transformative power of optimized storage solutions in video surveillance and security systems. Ben talks about how these innovations not only drive cost efficiency but also align with sustainability goals, offering a competitive edge in today's eco-conscious market. Delve into the evolving IT i…
  continue reading
 
Hybrid work, SaaS adoption, and multi-cloud environments have changed the rules. Traditional VPNs and perimeter firewalls are not enough to keep users and data safe. Microsoft’s Global Secure Access (GSA) introduces a new identity first model that ties access directly to who the user is, the device they are on, and the conditions of the request. In…
  continue reading
 
In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Carlos Cruz, founder of Metanoia Consulting in Portugal. They discuss essential best practices for creating and managing policies, procedures, plans, and other documents for compliance with ISO standards and cybersecurity regulations. Carlos shares insights on the disti…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & …
  continue reading
 
In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
  continue reading
 
Analysing how your teams cope with a cyber incident or a failure scenario Learning from crises - building resilience strategies to mitigate future incidents Building a cyber resilient mindset within your infosec team and in the wider organisation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise…
  continue reading
 
In this episode of the Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson shine a light on one of the unsung heroes of modern IT - Network Managed Services. It's not flashy. It's not trending. But it is the foundation that keeps your business running. The team reflects on why more organisations -…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Alexander Jaber, CEO of Compliant Business Solutions GmbH, a consulting company from Germany. They discuss ISO 27001 as a service, an innovative approach that combines consulting, policy writing, software, and certification into a cohesive package. Alexander shares insi…
  continue reading
 
My Data Room, your Patient PortalWhat if every patient had a dedicated, secure digital space — designed just for them?Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and cons…
  continue reading
 
High tariffs would significantly impact data center projects, through increased costs, supply chain disruptions and other problems. Reed Smith’s Matthew Houghton, John Simonis and James Doerfler explain how owners and developers can attenuate tariff risks throughout the planning, contract drafting, negotiation, procurement and construction phases. …
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Brian Honan, the CEO of BH Consulting, to discuss the evolving landscape of cybersecurity and its governance, particularly in the EU. Brian shares insights on the role of European cybersecurity bodies like ENISA and the importance of cybersecurity in business operations…
  continue reading
 
Risk-based prioritising using severity scoring and patch analysis Escaping the silo trap - bridging the gap between IT and security teams Automate rules to handle high-severity vulnerabilities and zero-days Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://w…
  continue reading
 
Inside the War Room – What a Modern SOC Really Looks Like Think your SOC is ready? Think again. In this episode, our host Jordy Decock sits down with Sander Bougrine (SOC Operations Lead) and Jani Vleurinck (Detection Engineering Lead) from The Collective, for an unfiltered look inside the engine room of modern cybersecurity: the Security Operation…
  continue reading
 
In this episode seasoned expert in the physical security industry Baldvin Gislason Bern, discusses the critical transformation of cybersecurity regulations and compliance. The conversation delves into Baldwvin's journey from researcher to cybersecurity pioneer, highlighting the industry's pivotal shift towards cybersecurity – starting in 2014. Key …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play