Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Risk Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
Artwork

1
Risk Parity Radio

Frank Vasquez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Artwork

151
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
Artwork

1
Guardstreet

WJOB Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Guard Street is a leading holistic cybersecurity provider, specializing in world-class proactive and emergency solutions. As a boutique, we are dedicated to assisting clients with information security risk management which includes risk quantification, compliance across many frameworks, penetration tests and the ability to predict, prevent, detect and respond to security incidents in a fast-moving, distributed landscape.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
AI Risk Reward

Alec Crawford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
  continue reading
 
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
  continue reading
 
Artwork

1
Great Security Debate

The Great Security Debate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

51
Distilled Security Podcast

Justin Leapline, Joe Wynn, and Rick Yocum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
  continue reading
 
Artwork

1
Hidden Forces

Demetri Kofinas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
Artwork

1
THE SAFE CAST

Boss Security Screens

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Loading …
show series
 
What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-s…
  continue reading
 
In this Global Security Briefing Factal editor Sarah Burke and Emergent Risk International analyst Cameron Evers dive deep into four nations in Africa's unique situations, how they got there and what the business intelligence professional needs to pay attention to next. Kieran O'Leary wrapped up with a preview for Iraq's election. As always, the Br…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
AI has gone fully consumer, from voice recipes in the kitchen to bots that schedule your day. But when that same tech walks into the office, what happens to privacy, security and trust? In this episode, we explore the blurred line between consumer AI convenience and enterprise AI chaos. What starts as smart personalisation quickly becomes a complia…
  continue reading
 
In this episode, Raj Krishnamurthy speaks with Tony Martin-Vegue, seasoned risk practitioner, speaker, and co-chair of the FAIR Institute San Francisco chapter. Tony shares decades of lessons learned from leading cyber risk management at Netflix, Gap, and other major enterprises—showing how to move from qualitative heat maps to quantitative insight…
  continue reading
 
In this episode we answer emails from Arun, Neil, and Stephen. We discuss intermediate accumulation portfolios, when you start needing bonds and being a good family man; favorite listener episodes #436 and #441, and an analysis of Thurman portfolios and what they are missing. Links: Episode 436 Video Summary: https://drive.google.com/file/d/1WQ1hvo…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Send us a text In Conversation with Kathy Lavinder In this powerful and wide-ranging episode, Yolanda “YoYo” Hamblen sits down with Kathy Lavinder, one of the most respected and experienced global recruiters in the physical security sector. With 25 years at the helm of her specialist search firm, Kathy brings clarity, honesty, and deep industry ins…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security stra…
  continue reading
 
We speak with Dhawal Sharma, Executive Vice President & Head of Product Strategy at Zscaler on the latest innovations in zero trust to enhance security, simplify access management, and significantly reduce legacy infrastructure costs. Dhawal Sharma is a visionary leader and expert in cloud security who currently serves as Executive Vice President a…
  continue reading
 
We speak with Deepen Desai, Chief Security Officer & Executive Vice President of Cyber & AI Engineering at Zscaler on the latest zero trust and AI innovations empowering organisations to secure their digital transformation journeys and stay ahead of evolving threats. With nearly two decades of expertise in cybersecurity, Deepen is regarded as a pio…
  continue reading
 
Navigating Social Security can feel like running through an airport for a connecting flight—one wrong move could cost you thousands. Ready to make sure you don’t miss out on the benefits you’ve worked for all your life? In this episode, April Schoen breaks down the crucial Social Security decisions every retiree faces—and reveals the game-changing …
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
In this episode of The Virtual CISO Moment, host Greg Schaffer speaks with Dave McKenzie, co-founder and director of Damn Good Security and a seasoned cybersecurity leader based in Scotland. Dave shares his fascinating journey from aspiring pilot to IT support technician, to leading security operations for major organizations, and ultimately launch…
  continue reading
 
Ever wondered what happens to your online accounts when you’re gone? 💭 This week, we’re joined by Erin Bury, Co-founder and CEO of Willful, to talk about the importance of digital estate planning — what it is, why it matters, and how to make it easier. Erin breaks down how to protect your online accounts, manage your digital legacy, and give your l…
  continue reading
 
TL;DR: Patching. Your least favorite thing. Well, it turns out that most of the work we have been doing in the last 20+ years has been for nothing. Robert "RSnake" Hansen's theory, backed by a lot of data, seems to point to a much bigger problem in cyber, and it's time we talk about it. Rob's Closing Keynote that started this conversation: https://…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. Introducing Our Technical Series: The Building Blocks of SAP Role Design. In the first episode of our new Technical Series, we unpack the foundations of SAP authorisations — what they are, how they function, and why they matte…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical podcast episode, we dive deep into a crucial piece of the SAP authorisation puzzle — authorisation default values. You’ll discover: How authorisation defaults determine which checks are performed during…
  continue reading
 
In our latest episode, we unpack four stories that reveal the complex intersection of technology, accountability, and governance in today's digital landscape. **🔍 The Mamdani "Hack" That Fooled Millions** How did a simple news broadcast get misinterpreted as a cyberattack? We dive into the viral incident from NYC Mayor-elect Zohran Mamdani's victor…
  continue reading
 
Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud …
  continue reading
 
Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans t…
  continue reading
 
Today’s special episode features Steve’s recent Business Matters broadcast interview with Juliette Foster, featuring conversation about critical cybersecurity challenges facing organizations today. Steve and Juliette discuss targeted phishing, the growing threat of Crime-as-a-Service, the increase in AI-driven cybercrime, and more. Key Takeaways: C…
  continue reading
 
Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vul…
  continue reading
 
In Episode 18 of the Distilled Security Podcast, Justin Leapline, Joe Wynn, and Rick Yokum recap their time at TRISS, share lessons on storytelling and women in tech, and break down the recent AWS us-east-1 DNS/DynamoDB outage, the Microsoft Front Door global disruption, and the F5 BIG-IP incident. 🔍 We discuss: - TRISS highlights: panels, communit…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this episode of the At the Boundary podcast, Dr. Tad Schnaufer moderates a panel discussion on key insights from the 2025 Cyber Bay Conference. Joining him are Dr. Linda Nhon, Resident Fellow at GNSI; Dr. George Burress, Professor and Chair of the Department of Criminology at the University of South…
  continue reading
 
CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
  continue reading
 
🎙️ Episode Summary Episode 90 of The Professional CISO Show kicks off the GPSEC DFW series, recorded live in Dallas. Host David Malicoat welcomes Andy Lux, Kendall Reese, and Patrick Gillespie for a dynamic discussion on risk leadership, AI governance, and OT security. Together, they explore how the role of the CISO is evolving — from managing cont…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
  continue reading
 
In Episode 448 of Hidden Forces, Demetri Kofinas speaks with Nathan Benaich, founder and general partner of Air Street Capital and the creator of the annual State of AI Report, an open-access compendium that tracks advances across AI research, industry, policy, and geopolitics. Nathan Benaich and Demetri spend the first hour of their conversation e…
  continue reading
 
In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com, interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them …
  continue reading
 
In this episode we answer emails from Dave, Isaiah, and Ian. We discuss back-testing tools, revisit UPRO and leverage from the last episode, the inherent biases and incentives for retail financial advisors to recommend underspending and using underspending plans larded with window dressings, and revisit a limited 401k and a retirement scenario from…
  continue reading
 
Please enjoy this encore of Career Notes. Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to…
  continue reading
 
Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play