The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
VCISO Podcasts

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading

1
ISO-as-a-Service and AI: Innovation in Consultancy | Interview with Alexander Jaber
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Alexander Jaber, CEO of Compliant Business Solutions GmbH, a consulting company from Germany. They discuss ISO 27001 as a service, an innovative approach that combines consulting, policy writing, software, and certification into a cohesive package. Alexander shares insi…
…
continue reading

1
Risk, Revenue, and Responsibility: The vCISO’s Real Job
1:01:30
1:01:30
Play later
Play later
Lists
Like
Liked
1:01:30In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
…
continue reading

1
CCT 263: Practice CISSP Questions - Secure Defaults and Defense in Depth (CISSP Domain 3.1)
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27Send us a text Security vulnerabilities lurk in the most unexpected places – even in your home internet modem. Today we kick off with breaking news about a security flaw discovered in Cox modems that could potentially allow unauthorized access to run malicious commands on connected devices. While Cox reports fixing the issue within 24 hours, this r…
…
continue reading

1
Christine Chasse merged Healthcare AI and Law | Hear her story!
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42ABOUT THIS EPISODE: The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 3 featuring Christine Chasse RN, JD, MSN, NE-C, CIPPUS, AIGP. Christine recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of her insights. Christine is an Attorney with a focus on Regulatory and Compliance, and Da…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading
Nick Eicken is the founder of CyberAuthority and a seasoned Virtual Chief Information Security Officer (vCISO) with deep roots in both military and civilian cybersecurity leadership. A U.S. Army veteran who built top-secret communication networks as a signal officer, Nick transitioned to the private sector where he’s guided organizations across non…
…
continue reading

1
Building IoT Trust: Budgeting, Community, and the Hacker Mindset with Ted Harrington
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Ted Harrington (Founder of IoT Village, Executive Partner for Independent Security Evaluators, Author, Speaker, and Podcaster) examines the ongoing challenges and progress in IoT security, emphasizing how community initiatives, the hacker mindset, and business-oriented communication can drive real change in the industry. Ted and Phil Wylie discuss …
…
continue reading

1
CCT 262: Secure Defaults and Defense in Depth (CISSP Domain 3.1)
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12Send us a text The medieval castle with its moat, high walls, and sentries provides the perfect metaphor for modern cybersecurity. Just as each defensive element served a specific purpose in protecting the castle, today's information security requires multiple layers working in concert to safeguard digital assets. Shon Gerber opens this episode wit…
…
continue reading

1
CCT 261: CISSP Rapid Review Exam Prep - Domain 1 - Part II
46:57
46:57
Play later
Play later
Lists
Like
Liked
46:57Send us a text Microsoft recently released 137 security patches, with 14 critical vulnerabilities that could allow attackers to seize control of Windows systems with minimal user interaction. Among these, the Windows authentication negotiation flaw rated at 9.8 severity poses a significant threat to all current Windows versions. For security profes…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Show Notes: https://securityweekly.com/bsw-403…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
…
continue reading

1
The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
…
continue reading

1
CCT 260: CISSP Rapid Review Exam Prep - Domain 1 - Part I
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12Send us a text Ready to conquer CISSP Domain 1? This rapid review episode delivers essential knowledge on security and risk management fundamentals that form the cornerstone of information security practice. We begin with a timely discussion on preventing ransomware through exfiltration controls, noting the alarming shift where 90% of ransomware at…
…
continue reading
From the Middle Tennessee ISACA Conference, Cool Springs, Tennessee, March 2025. Stacy Mill is a seasoned cybersecurity and IT executive with a track record of leading complex technology initiatives in both the public and private sectors. She has served as CTO for the State of Kansas, VP of IT and CISO at Nashville Electric Service, and global CISO…
…
continue reading

1
Unmasking the IT Assessment Myth: Why Most Are Just Sales Tools
28:22
28:22
Play later
Play later
Lists
Like
Liked
28:22In this episode of Breakfast Bytes, host Felicia King delves into the controversial world of IT assessments, often considered a deceptive sales tool rather than a vital business instrument. Drawing from years of experience, Felicia shares her insights into the improper paradigms surrounding assessments, highlighting how they frequently mislead busi…
…
continue reading

1
The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Con…
…
continue reading

1
CCT 259: CISSP Practice Questions - Data Classification (Domain 2.1)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
From Boardroom to Backend: Cybersecurity Tactics for Emerging Tech in Finance
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Amy Chaney, SVP Technology, COO for Citi, shares a seasoned perspective on driving technological transformation and robust security in large financial institutions. The episode explores practical guidance for aligning business cases with emerging technologies like AI, highlights the importance of agile security policies, and emphasizes the critical…
…
continue reading

1
Role of EU Cybersecurity Bodies and How to Cooperate With Them | Interview with Brian Honan
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Brian Honan, the CEO of BH Consulting, to discuss the evolving landscape of cybersecurity and its governance, particularly in the EU. Brian shares insights on the role of European cybersecurity bodies like ENISA and the importance of cybersecurity in business operations…
…
continue reading

1
EP 151: Trust, But Verify: How HITRUST is Reshaping Assurance
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29In this episode of the Virtual CISO Podcast, host John Verry and guest Chris Schaeffer discuss the HITRUST framework, its evolution, and its significance in the cybersecurity landscape. They delve into the Common Security Framework (CSF), the different assessment models (E1, I1, R2), and how HITRUST compares to other frameworks like SOC 2 and ISO 2…
…
continue reading

1
CCT 258: Data Classification and Protection in the CISSP Exam (Domain 2.1.1)
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38Send us a text Effective data classification isn't just about regulatory compliance—it's the foundation of your entire security program. Whether you're preparing for the CISSP exam or leading security initiatives at your organization, understanding how to identify, categorize, and protect sensitive information is critical to your success. This epis…
…
continue reading

1
Love for his family was his fuel to conquer the AIGP certification!
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05ABOUT THIS EPISODE:The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 2 featuring Albert Kittoe, Project Manager, Scrum Master. Albert recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of his insights.The burning desire to protect his family drove Albert to sit for the AIGP exam.Plea…
…
continue reading

1
CCT 257: Practice CISSP Questions - Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Send us a text Check us out at: https://www.cisspcybertraining.com/ Ethical dilemmas lurk around every corner in cybersecurity, ready to challenge even the most technically competent professionals. Sean Gerber tackles these moral minefields head-on in this thought-provoking episode focused on CISSP Domain 1.1, presenting fifteen real-world ethical …
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading
In this episode, Greg Schaffer interviews James Pham, CEO and co-founder of Opsin, who shares his unique journey from chemistry medalist in high school to tech entrepreneur. James discusses how his academic and professional path took him from studying in Korea and working in Singapore to pursuing his entrepreneurial dream in the U.S., eventually ea…
…
continue reading

1
CCT 256: Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
34:53
34:53
Play later
Play later
Lists
Like
Liked
34:53Send us a text Ethical leadership lies at the heart of effective cybersecurity practice. In this episode, we dive deep into Domain 1.1 of the CISSP certification, exploring professional ethics and their critical importance for security professionals. The episode opens with a sobering look at the current landscape of cyber warfare, examining how Isr…
…
continue reading
In this episode of Security Conversations from The Virtual CISO Moment, Greg Schaffer sits down with Mick Grayson, a seasoned cybersecurity professional with a wealth of experience in both the public and private sectors. Together, they explore the evolving challenges of managing risk in an increasingly complex threat landscape, the importance of me…
…
continue reading

1
CCT 255: Practice CISSP Questions - Understanding APIs and the Security Principles (Domain 8.5)
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06Send us a text The pursuit of AI expertise has reached staggering heights in the cybersecurity world. Meta reportedly offering "billion-dollar salaries" and $100 million sign-on bonuses to lure OpenAI talent reveals just how valuable the intersection of AI and security has become. This episode explores why security professionals should seriously co…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading

1
CISO Cyber Insurance Empowerment - Peter Hedberg, Stephan Jou, Morey Haber - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading

1
S7E31 - A Conversation with Wil Klusovsky
32:06
32:06
Play later
Play later
Lists
Like
Liked
32:06In this episode of Security Conversations from The Virtual CISO Moment, we’re joined by Wil Ku, a seasoned cybersecurity leader with deep expertise in risk management, security strategy, and governance. With a background that spans both public and private sectors—including leadership roles at top consulting firms and critical infrastructure organiz…
…
continue reading

1
Coaching as a Service for Human-Centric Cybersecurity | Interview with Dominic Vogel
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52In this episode of the Secure and Simple Podcast, host Dejan Kosutic sits down with Dominic "Dom" Vogel, president of Vogel Cyber Leadership and Coaching. Dom shares his unique journey from traditional cybersecurity consulting to a more human-focused coaching approach. He emphasizes the importance of building strong, empathetic relationships within…
…
continue reading

1
CCT 254: Understanding APIs for the CISSP Exam (Domain 8.5)
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Send us a text Cybersecurity vulnerabilities continue to emerge in unexpected places, as evidenced by the recent Iranian-backed attacks on U.S. water treatment facilities through poorly secured Unitronics PLCs. This alarming development sets the stage for our deep dive into API security - a critical yet often overlooked aspect of modern cybersecuri…
…
continue reading

1
CvCISO Podcast Episode 56: AI and Its Societal Impact
56:44
56:44
Play later
Play later
Lists
Like
Liked
56:44Summary In this episode, the hosts discuss the pervasive influence of AI in our lives, particularly its implications for education, creativity, and ethical considerations. They explore the rapid deployment of AI technologies without adequate understanding or guidelines, the accountability of AI developers, and the potential for manipulation of info…
…
continue reading

1
CCT 253: Practice CISSP Questions - Conduct logging and monitoring activities (Domain 7.2)
25:09
25:09
Play later
Play later
Lists
Like
Liked
25:09Send us a text Security professionals face a constant battle to keep up with evolving threats, and our latest CISSP Question Thursday podcast delivers critical insights into one of the most fundamental cybersecurity capabilities: effective logging and monitoring. The episode begins with a warning about a sophisticated attack campaign targeting recr…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading