SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
SquareX Podcasts
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
1
Why Cyber Needs Better Storytelling | Jeremy Ladner, Founder and CEO, The CISO Signal Podcast
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29Field CISO John Carse of SquareX sits down with Jeremy Ladner of The CISO Signal to discuss the critical art of storytelling in cybersecurity leadership. In this episode of Be Fearless podcasts, Jeremy reveals why facts alone fail in the boardroom and how AI is rewriting the rules of social engineering and fraud. The conversation covers why hackers…
…
continue reading
1
Decoding Your Digital Footprint | James W., Valens Global Analyst
55:24
55:24
Play later
Play later
Lists
Like
Liked
55:24Host John Carse, Field CISO of SquareX sits down with James W., Valens Global Analyst and creator of the Smoke Signal Newsletter and Burn Signal Podcast. In this episode of The Be Fearless podcast, they discuss the concept of "digital exhaust" and how invisible data trails are weaponized into "weapons of mass disruption". James shares insights from…
…
continue reading
1
Why You Need to Fail to Succeed in Cyber | Andrew Crotty, Cybersecurity Content Creator
57:51
57:51
Play later
Play later
Lists
Like
Liked
57:51Host John Carse, Field CISO at SquareX, sits down with Andrew Crotty aka GingerHacker. In this episode of the Be Fearless podcast, Andrew provides insights into his role advising Army commanders, the evolving security landscape regarding AI agents and hallucinations, and the specific vulnerabilities found in web browsers. Andrew details the mission…
…
continue reading
1
You Won’t Make $100k Starting Out in Cybersecurity | Patrick Gorman, Founder, InfosecPat
1:27:31
1:27:31
Play later
Play later
Lists
Like
Liked
1:27:31Host John Carse, Field CISO at SquareX, sits down with Patrick Gorman, Founder of InfosecPat. In this episode of The Be Fearless podcast, they discuss Patrick's incredible journey from a rough upbringing in Queens and working in construction to becoming a renowned cybersecurity educator with over 100,000 YouTube subscribers. Patrick gets real about…
…
continue reading
1
Browser Security Is Now Essential | Swetha Krishnamoorthi, Industry Principal, Frost & Sullivan
1:01:07
1:01:07
Play later
Play later
Lists
Like
Liked
1:01:07Frost & Sullivan’s Swetha Krishnamoorthi joins Audrey Adeline from SquareX Founder's Office to unpack emerging browser-based threats, including AI-driven phishing, encrypted last-mile exploits, malicious digital assets, and the rise of autonomous AI agents. She explains how Zero Trust browsers evolve beyond isolation, what organizations overlook to…
…
continue reading
1
Building Cyber Resilience That Lasts | Jim Rutt, CIO/CISO, Dana Foundation
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33In this episode of Be Fearless, Aleksandra Melnikova from the SquareX founder’s office speaks with Jim Rutt, CIO and CISO of the Dana Foundation. Jim traces his 25-year journey from marketing to data analytics to leading technology strategy in a major nonprofit, sharing how cybersecurity has shifted from HIPAA compliance to tackling AI-driven threa…
…
continue reading
1
Securing Billions in Aircraft Assets | John Rojas, Vice President, IT, Air Lease
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59Host Aleksandra Melnikova of Founder's Office at SquareX sits down with John Rojas, Vice President, IT, of Air Lease. In this episode of The Fearless Podcast, they discuss John's fascinating transition from Marine Corps communications to managing cybersecurity for one of the world's largest aircraft leasing companies. John shares insights on protec…
…
continue reading
1
Leveling Up in Cybersecurity Today | Girard Kavelines, Technical Writer, TechHouse570
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54In this episode of the Be Fearless podcast, SquareX Field CISO John Carse sits down with Girard Kavelines and discusses how starting out on the help desk gave him fresh perspectives and practical insights that later shaped his work as a Network/Security Engineer. Girard also elaborates on other topics, schaas how blogging and content creation at Te…
…
continue reading
1
Securing Health Data Through Governance, Not Firefighting | Michael Ruppe, Group CISO, Adcubum AG
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45In this episode of Be Fearless podcast, Adcubum AG Group CISO Michael Ruppe sits down with Aleksandra Melnikova from SquareX Founder's Office and shares how he moved from law and business into cybersecurity and became a CISO in his twenties. He breaks down how industry certifications (of which he has 30) helped him bridge theory and practice, stand…
…
continue reading
1
Being Prepared for the Unthinkable | Tiffiny Bryant, Co-Host, Stats on Stats
57:23
57:23
Play later
Play later
Lists
Like
Liked
57:23Knowing your incidence response playbook is one thing, but is it ingrained deeply enough in your team for execution when disaster strikes? Tiffiny Bryant, Co-Host of the Stats on Stats Podcast and Information Security Analyst at Shipt, shares her powerful journey from the military into cybersecurity, and how she now raises awareness about the field…
…
continue reading
1
Are Enterprises Ready for AI Browsers and Automated SOCs? | Vriti Magee, Founder, Mawa:ga Consulting
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Vriti Magee, Founder and Principal of Mawa:ga Consulting, sits down with John Carse to explore the collision between AI innovation and enterprise security. In this episode, Vriti and John discuss the journey toward autonomous SOCs, the real risks of new browser AI agents like OpenAI's Atlas, and how innovation and governance mature each other inste…
…
continue reading
1
The Ability to Decompose Problems Separates Great Leaders | Tim Anderson, Deputy CISO, ID.me
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Tim Anderson shares two decades of cybersecurity expertise — starting with business continuity work to his current role protecting millions of digital identities as Deputy CISO of ID.me. In this episode, he breaks down why identity has become the new perimeter in security architecture, why browser security remains mission-critical for enterprise en…
…
continue reading
1
Security and Tech Leaders Should Be Peers | Mohana Balakrishnan, CTO, Schools Insurance Authority
46:00
46:00
Play later
Play later
Lists
Like
Liked
46:00Mohana Balakrishnan, Chief Technology Officer at Schools Insurance Authority, shares his remarkable journey as a geophysicist discovering chromite deposits in Canada to leading technology and security for California schools. In this conversation, Mo opens up about why he transitioned from CISO to CTO, shares his philosophy on AI adoption and discus…
…
continue reading
1
Why Ransomware Still Keeps Winning | Adrian Sanabria, Principal Researcher, The Defenders Initiative
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09Adrian Sanabria, Principal Researcher at The Defenders Initiative joins Field CISO John Carse to dissect why security keeps failing despite massive investments in tools and compliance frameworks. In this episode, John turns the tables and puts Adrian (also the Main Host of Enterprise Security Weekly) in the hot seat — discussing why focusing on che…
…
continue reading
1
Small-Medium Businesses Are Hackers' Path of Least Resistance | Royce Markose, CISO, Vistrada
36:21
36:21
Play later
Play later
Lists
Like
Liked
36:21Royce Markose, CISO at Vistrada, shares his journey from breaking apart computers as a kid to leading cybersecurity for billion-dollar organizations. He dives into why hackers are shifting from endpoints to SaaS and browser attacks, how AI is transforming security risks, and how vendors should best pitch to CISOs and pull them into the conversation…
…
continue reading
1
Deepfakes, Disinformation & AI Agent Security | Alfredo Ramirez IV, Senior Director Analyst, Gartner
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Alfredo Ramirez IV, Senior Director Analyst, Emerging Technologies & Trends at Gartner, sits with Audrey Adeline from the SquareX Founder’s Office to discuss the latest market trends from his vantage point: “agent washing” where vendors rebrand simple automation as AI agents, why machine identities are becoming the fastest-growing attack surface, a…
…
continue reading
1
Growth, Risk Management, Culture: Why CISOs Operate Like CEOs | Bithal Bhardwaj, CEO, Gramax
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59Bithal Bhardwaj, CEO at Gramax, spent over two decades as a cybersecurity leader across GE and GMR Group before making the leap to CEO. In this conversation, he reveals why the transition was surprisingly seamless, shares war stories from managing a 48-hour coordinated attack on critical infrastructure, and explains why security vendors shouldn't r…
…
continue reading
1
“Procurement is the Gateway into Your Enterprise” | Marian Newsome, Founder, Ethical Tech Matters
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20Marian Newsome, Founder of Ethical Tech Matters and an IEEE CertifAIEd Lead Assessor (Top 100 Globally), sits down with SquareX Field CISO John Carse to unpack why most organizations are dangerously unprepared for AI governance. They dive into real-world failures, discuss the three fundamental principles for AI governance, and why browser security …
…
continue reading
1
Social Engineering LLMs Like Humans | J Wolfgang Goerlich, CISO, Oakland County, Michigan Government
43:54
43:54
Play later
Play later
Lists
Like
Liked
43:54J Wolfgang Goerlich, CISO for Oakland County Michigan Government, shares his unconventional path from wanting to be a hacker after watching the movie "Hackers" to leading government cybersecurity. In this conversation, Wolfgang breaks down why LLMs are surprisingly easy to manipulate using the same social engineering tactics that work on humans, wh…
…
continue reading
1
Balancing Security, Culture, and Velocity | Kane Narraway, Head of Enterprise Security, Canva
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28Kane Narraway, Head of Enterprise Security at Canva, shares how he went from digital forensics in UK law enforcement to protecting millions of users' creative workflows today. He breaks down why marketing and sales teams are more vulnerable than engineers to attacks, his framework for balancing security with velocity and culture, and why security a…
…
continue reading
1
Why Community Matters More Than Certifications | Dr. Nathan Fisk, USF & Cyber Florida
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38Join us as Dr. Nathan Fisk, Associate Professor of Cybersecurity Education of USF and Cyber Florida Academic Director, discusses the importance of community in cybersecurity education. In this episode, Nathan explains how formal education has drifted away from the hacker culture that actually builds effective security professionals. He shares insig…
…
continue reading
1
Scaling Security Without Friction | Cezary Piekarski, Group CISO, Standard Chartered
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58Cezary Piekarski, Group CISO at Standard Chartered, joins us to share hard-earned wisdom from 25+ years securing financial institutions globally. In this episode of the Be Fearless podcast, Cezary shares how Standard Chartered scales security without becoming a bottleneck, draws fascinating parallels between today's AI security challenges and buffe…
…
continue reading
1
What You Don't Know About Your Certificates Can Hurt You | Eric Mizell, Field CTO, Keyfactor
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43Eric Mizell, Field CTO and VP Field Engineering at Keyfactor, breaks down why digital certificates are the security blind spot most companies don't know they have. From his early days fixing Novell networks to helping enterprises manage millions of IoT identities, Eric shares war stories about expired certificates that couldn't send breach alerts, …
…
continue reading
1
Basic Cyber Hygiene Wins in Healthcare | Ben Waugh, BISO, Datavant
42:28
42:28
Play later
Play later
Lists
Like
Liked
42:28Ben Waugh, BISO at Datavant, drops some hard truths about healthcare security - like how the most damaging breaches aren't from sophisticated nation-state actors, but from attackers exploiting basic gaps while security teams obsess over complex threats. With nearly two decades securing critical infrastructure at companies like Redox and Twilio, Ben…
…
continue reading
1
Why Banks Need Two Defender Personas | Sandip Wadje, Global Head of Emerging Tech Risk, BNP Paribas
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Sandip Wadje, Managing Director and Global Head of Emerging Technology Operational Risks & Intelligence at BNP Paribas, reveals the hidden challenges of securing one of the world's largest banks in an AI-driven world. From his unconventional journey starting in a TV factory to now influencing global regulatory guidelines, Sandip shares how the brow…
…
continue reading
1
Why Hospital Cyber Breaches Hit Different | Martin Holzworth, CISO, UnitingCare Queensland
43:44
43:44
Play later
Play later
Lists
Like
Liked
43:44Martin Holzworth, CISO at UnitingCare Queensland, brings 25 years of cybersecurity to this episode of the Be Fearless Podcast. In this conversation with Aleksandra Melnikova, Martin shares hard-won insights about protecting patient data, managing supply chain risks in healthcare, and why securing browsers has become non-negotiable in today’s threat…
…
continue reading
1
The High Stakes in Defense Sector Security | Brad Berkson, CEO, Miles Space
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07Brad Berkson, CEO of Miles Space, sits down with John Carse to discuss his journey from McKinsey partner to serving as a former Pentagon senior official operations, to now pioneering space technology. Brad shares eye-opening insights about how most security breaches come from basic housekeeping failures rather than sophisticated attacks, his dot-co…
…
continue reading
1
A Veteran's Approach to Federal Cybersecurity | Sarah Cleveland, Senior Director, ExtraHop
57:28
57:28
Play later
Play later
Lists
Like
Liked
57:28With years directing cyber operations in the United States Air Force as a Cyber Officer, Sarah Cleveland brings a unique perspective to cybersecurity. In this conversation with John Carse, she discusses how military risk calculation differs from corporate approaches, shares practical insights on selling cybersecurity to federal agencies, why nation…
…
continue reading
1
"Your Foundation Needs to be Strong" | Yaamini Mohan, Security Engineer, Dell EMC
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Drawing from her experience at Dell and Infosys, Security Engineer Yaamini Mohan breaks down why getting your security basics right — boring stuff like passwords, patching, and MFA— will move the needle much more than any expensive AI-powered solution. In this conversation with SquareX Field CISO John Carse, she also discusses how the shift to clou…
…
continue reading
1
Navigating Security in the Nordics | Morgan Svensson & Stefan Tapper, Grant Thornton Sweden
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Morgan Svensson and Stefan Tapper, CIO and CISO of Grant Thornton Sweden respectively, reveal how they navigate the constant tension between business innovation and security requirements. From their shared history at a Scandinavian airline to their current roles protecting one of Sweden's largest professional services firms, they discuss the intric…
…
continue reading
1
How Diverse Leadership Shapes AI's Future in Security | Felicita Sandoval, CEO & Founder, SENP-X
52:38
52:38
Play later
Play later
Lists
Like
Liked
52:38Felicita Sandoval, CEO/Founder of Sentient Perspectives (SENP-X) and security professional at LiveRamp, breaks down how to navigate the rapidly changing world of AI and cybersecurity. In this episode, Felicita shares practical insights on building security-first AI adoption in enterprises. She discusses the challenges of browser AI agents accessing…
…
continue reading
1
Every Employee is a Function of Security | Martin Hinton, Editor, Cyber Insurance News & Information
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15Martin Hinton, award-winning journalist and Executive Editor of Cyber Insurance News & Information, (https://www.youtube.com/@CyberInsuranceNews) breaks down why companies are dangerously unprepared for today’s modern threatscape. Drawing from his 30+ years in media and his deep dive into cyber insurance, Martin shares insights about the devastatin…
…
continue reading
1
Security Through Observability: From Manufacturing to AI | Chidi Alams, CIO, Just Born
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42Join Chidi Alams, CIO at Just Born (makers of PEEPS®, HOT TAMALES®, and MIKE AND IKE®), as he breaks down how a 100-year-old candy company navigates digital transformation in the 21st century. In this episode of the Be Fearless Podcast, Chidi shares hard-won insights from his journey across Fortune 500 companies, including why manufacturing lines a…
…
continue reading
1
Why Security Can't Lag Behind Anymore | Stan Lee, CISO of EarnIn
51:37
51:37
Play later
Play later
Lists
Like
Liked
51:37Stan Lee didn't start in cybersecurity - he has a biochemistry degree from UCLA and worked his way up from IT helpdesk to becoming CISO at major companies like PayPal, Palo Alto Networks, and now EarnIn. His unique journey across industries gives him a perspective that most security leaders don't have, especially when it comes to the speed differen…
…
continue reading
1
Why Punishing Employees on Phishing Tests Doesn't Work | Craig Taylor, CEO and Co-Founder, CyberHoot
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34Craig Taylor, Founder and CEO of CyberHoot, joins us to explain why traditional phishing tests that punish employees are fundamentally broken. Drawing from his decades-long cybersecurity career, Craig shares the story of a $24,000 gift card scam that inspired him to build CyberHoot - a platform that rewards good security behaviors instead of punish…
…
continue reading
1
From Dark Web Ops to Enterprise Security | Clint Kehr, Senior Instructor/Training Architect, Cybrary
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58Clint Kehr brings a unique perspective to cybersecurity, having gone from training personnel in dark web investigations as a former federal agent to transforming penetration testing in one of America's biggest banks. Now a Senior Instructor and Cybersecurity Architect, Clint shares stories from his undercover work, bridging the gap between security…
…
continue reading
1
The Simplest Answer Is Usually Right in Cybersecurity | Travis Farral, VP & CISO, Archaea Energy
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Travis Farral, Vice President and CISO at Archaea Energy, joins us to share hard-earned wisdom from securing everything from oil giants to renewable energy startups. In this episode, Travis shares how even non-nation-state actors are getting stronger, the need for browser-level protection and why hiring the wrong person hurts more than not hiring a…
…
continue reading
1
Never Stop Learning, Ask the Right Questions | Tom Hollingsworth, Practice Lead, Tech Field Day
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Tom Hollingsworth, the "Networking Nerd" and Tech Field Day's Event Lead, sits down with SquareX Field CISO John Carse to share his 20+ year journey in enterprise networking and how he helped build one of tech's most influential community events. From troubleshooting school networks to orchestrating conversations between vendors and independent tho…
…
continue reading
1
AI Literacy Is the New Survival Skill | Olivia Heslinga, Founder of AI for Good Denmark
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23Olivia Heslinga, founder of AI for Good Denmark and AI literacy consultant, joins SquareX Field CISO John Carse to discuss the (security) implications of AI's rapid evolution. They dive into how browser AI agents can compromise your entire digital life with just basic permissions, why third-party AI tools are essentially viruses infiltrating organi…
…
continue reading
1
90% of Breaches Come Down to Just Two Simple Mistakes | Patrick Benoit, vCISO, Cyber Risk Insights
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19Patrick Benoit, President and Virtual CISO of Cyber Risk Insights, breaks down three decades of cybersecurity evolution and reveals why most organizations keep making the same fundamental mistakes. From protecting global enterprises like Brink's across 53 countries to small manufacturers, Patrick shares insights about the shift from perimeter think…
…
continue reading
1
AI Will Replace Tier 1 Security Analysts | Clea Ostendorf, CEO/Co-Founder, Wolfpack Security
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42Clea Ostendorf, co-founder of Wolfpack Security, breaks down why security programs fail to get developer buy-in and shares her journey from sales to building a security consultancy. She reveals the real problems behind vulnerability management chaos, explains why most pentesting findings are just "boring" basics like outdated versions and hardcoded…
…
continue reading
1
Netflix Phishing & Security for... Pizza? | Stephen Bennett, Global CISO, Domino's Pizza Enterprises
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52Stephen Bennett, Global CISO at Domino's Pizza, shares his unconventional journey from getting electrocuted while tinkering with TVs as a kid to protecting one of the world's largest pizza brands across 12 markets and millions of digital transactions. He discusses unique cybersecurity challenges like credential stuffing attacks, managing security a…
…
continue reading
1
The CISO Championing Women in Cybersecurity | Eric Gray, BeLux CISO, Kyndryl
37:42
37:42
Play later
Play later
Lists
Like
Liked
37:42Eric Gray, BeLux CISO at Kyndryl, shares his unique journey from Royal Bank of Canada to becoming one of only two Canadians living in Luxembourg. In this episode, he also discusses the cybersecurity landscape across highly regulated European environments, the critical importance of supporting women in cybersecurity as a board member of Women Cyber …
…
continue reading
1
Why The Nigerian Scam Still Works After 30 Years | John Dunne, Head of Security, Grant Thornton UK
40:40
40:40
Play later
Play later
Lists
Like
Liked
40:40John Dunne, Head of Security at Grant Thornton UK, shares his remarkable 30-year journey from training as a chef to becoming one of the UK's most experienced cybersecurity leaders. John reveals why recruiting people from hospitality backgrounds makes better security professionals than traditional tech graduates, and explains why the decades-old Nig…
…
continue reading
1
From Curiosity to Command: Managing Security Risks in the Age of AI | Grace Yu, Director, HPE
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29Grace Yu, Director of Cyber Risk and Policy, GRC at Hewlett Packard Enterprise, shares her unconventional journey from handling a live TV crisis in Singapore to becoming a cybersecurity leader in Silicon Valley. Among the topics discussed are how AI agents are creating new security vulnerabilities, the competitive reality of the U.S. job market and…
…
continue reading
1
Why Business-Aligned Security Wins | Coleen Coolidge, ex-CISO Segment and Twilio, Startup Advisor
48:58
48:58
Play later
Play later
Lists
Like
Liked
48:58Coleen Coolidge, ex-CISO of Segment and Twilio and startup advisor, didn't start in cybersecurity - she was a new project manager who got thrown into the deep end, but that discomfort launched an 18-year career that would see her build security teams from scratch at companies like Segment and Twilio. Now advising early-stage startups, Coleen shares…
…
continue reading
1
Ransomware Negotiations Exposed: When Attackers Call | Guy Segal, SVP, Head of Corp Dev, Sygnia
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Guy Segal, Head of Corporate Development at Sygnia, takes us through his journey from military intelligence to building cybersecurity teams across Asia. Guy reveals why ransomware thrives despite decades of security knowledge, shares war stories from actual negotiations and breaks down why AI is making language barriers irrelevant for cybercriminal…
…
continue reading
1
"You Can't Block Innovation" | Tal Arad, Former CTO and CISO of Carlsberg Group
45:14
45:14
Play later
Play later
Lists
Like
Liked
45:14Tal Arad, former CTO at Carlsberg Group, accidentally fell into cybersecurity after telling his military commander he knew computers from working at a shop. In this episode, Tal shares hard lessons about building trust with existing teams, why blocking AI always fails, and stories about Carlsberg's famous beer perks that fill the office every Tuesd…
…
continue reading
1
Leading Through AI Disruption: A CTO's Journey Across Fortune 500s | Rathi Murthy, CTO, Varo Bank
49:48
49:48
Play later
Play later
Lists
Like
Liked
49:48Rathi Murthy, CTO at Varo Bank and former CTO of Expedia, Gap, & Verizon, shares her journey from software engineer to C-level executive across Fortune 500 companies. She reveals how curiosity drives career growth, why browser security is now critical for all organizations, and how AI is democratizing intelligence. Rathi also discusses finding an a…
…
continue reading
1
WeChat, Passwords & Cyber Risk: Securing Asia's Legal Industry | Konrads Klints, CISO, Rajah & Tann
50:39
50:39
Play later
Play later
Lists
Like
Liked
50:39Konrads Klints, CISO at Rajah and Tann Asia, shares his journey from hacker to leading cybersecurity for one of Asia's most prestigious law firms. In this episode of the Be Fearless Podcast, Konrads reveals why law firms top ransomware target lists, how business email compromise attacks plague the legal industry, and cultural cybersecurity challeng…
…
continue reading