Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CISO Marketplace Podcasts

show episodes
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Loading …
show series
 
This episode explores the complex division in state mandates between general consumer privacy laws and specific children’s design codes, which often function as separate acts or amendments. We break down how compliance is determined either by broad, quantitative thresholds like annual gross revenue and high data volume, or by the specific service's…
  continue reading
 
Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company D…
  continue reading
 
This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundar…
  continue reading
 
Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine speed, requiring human intervention at only a few critical decision points. Defenders are thrust into an urgent "AI vs. AI arms race," racing to adopt proactive measures like Google's Big Sleep to detec…
  continue reading
 
Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first documented AI-orchestrated cyber espionage campaign. The sophisticated operation, which targeted approximately 30 global organizations including technology companies, financial institutions, and government …
  continue reading
 
Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against the impacts of manipulated, false, and misleading information (MDM). This episode details the crucial "Recognise" stage, where communicators use the FIRST indicators (Fabrication, Identity, Rhetoric, Sym…
  continue reading
 
The 2025 OWASP Top 10 reveals a fundamental shift in application security, showing how threats have transformed from simple code flaws like buffer overflows to exploiting the systemic complexity of cloud-native and microservices architectures. This newest list confirms the continued dominance of Broken Access Control (A01) and spotlights the critic…
  continue reading
 
APIs are the "nervous system" of modern applications, making them the number one attack vector, with flaws like Broken Object Level Authorization (BOLA), Broken Object Property Level Authorization (BOPLA), and Broken Function Level Authorization (BFLA) accounting for a high percentage of breaches. This episode delves into the multi-layered "defense…
  continue reading
 
Driven by a market anticipated to exceed USD 40.6 billion by 2030, DevSecOps Engineers are crucial experts who bridge the gaps between software development, security protocols, and operational efficiency. Successful implementation relies on a socio-technical work system that emphasizes cultural transformation, shared security responsibility, and pr…
  continue reading
 
The Google Threat Intelligence Group (GTIG) has identified a significant shift where adversaries are now deploying novel AI-enabled malware in active operations, moving beyond simple productivity gains observed in 2024. This new operational phase includes "Just-in-Time" AI malware, such as PROMPTFLUX and PROMPTSTEAL, that utilize Large Language Mod…
  continue reading
 
Cybersecurity leaders, including CISOs, face overwhelming job demands and chronic stress, with up to 80% classifying themselves as “highly stressed” due to resource limitations and the ceaseless evolution of threats. This pressure is compounded by alert fatigue—where the relentless influx of noisy, often false-positive alerts causes mental and oper…
  continue reading
 
The COVID-19 pandemic introduced unprecedented volatility and uncertainty (VUCA) to global supply chains, forcing retailers to rapidly pivot their operational strategies to manage severe disruption. This episode explores interview findings revealing how supply chain professionals effectively utilized a blend of proactive strategies, such as digital…
  continue reading
 
Municipalities face escalating cyber threats like devastating ransomware attacks, which have cost cities like Atlanta millions of dollars in recovery and disrupted essential public services. This vulnerability is amplified by the mass deployment of interconnected IoT devices and the convergence of traditional IT with sensitive Operational Technolog…
  continue reading
 
The simultaneous enforcement of the EU’s DORA (January 2025 deadline) and NIS2, alongside the U.S. SEC’s four-day disclosure rule (effective late 2023), has created an increasingly fragmented and high-stakes compliance landscape for global enterprises. This episode details how organizations can move beyond segregated checklists to build a unified c…
  continue reading
 
This episode dissects critical risks specific to Large Language Models (LLMs), focusing on vulnerabilities such as Prompt Injection and the potential for Sensitive Information Disclosure. It explores how CISOs must establish internal AI security standards and adopt a programmatic, offensive security approach using established governance frameworks …
  continue reading
 
Artificial intelligence has fundamentally reshaped the threat landscape, enabling attackers to deploy flawless, context-specific phishing emails and clone the voices of executives, leading to massive losses like the Hong Kong multinational firm that lost $25 million during a deepfake video call scam. With ransomware back on the rise and 77% of CISO…
  continue reading
 
RaaS (Ransomware-as-a-Service) has professionalized cybercrime, turning digital extortion into a resilient business where affiliates leverage sophisticated toolkits for high-stakes attacks on critical sectors. This episode details how threat actors circumvent defenses by compromising high-value systems like VMware ESXi hypervisors and Managed File …
  continue reading
 
The modern Chief Information Security Officer (CISO) role is evolving from a purely technical function to an enterprise risk leadership position, yet many leaders struggle to secure necessary resources due to a fundamental communication gap with the board. This podcast explores how security executives can master "Boardish"—the language of finance, …
  continue reading
 
Third-party relationships expose organizations to major threats across operational, strategic, and legal risk areas, including the significant danger of reputational damage and the potential for loss of intellectual property. Recent managed service provider (MSP) cyberattacks have resulted in catastrophic financial devastation, demonstrating that a…
  continue reading
 
This episode tackles the CISO's strategic mandate: moving beyond subjective assessments, as "Security without true adversarial testing is just an illusion," to achieve objective measurement and resilience. We analyze key vulnerability trends, including the significant surge in hardware, API, and broken access control flaws, recognizing that every A…
  continue reading
 
Cyber threats are evolving at an unprecedented pace, with sophisticated ransomware and supply chain breaches on the rise, contributing to cybercrime costs estimated to exceed $10.5 trillion per year by 2025. We delve into the optimal hybrid SOC model, discussing how organizations leverage AI-driven automation to reduce Mean Time to Detect (MTTD) by…
  continue reading
 
Insider threats are not just technical breaches but fundamentally human failures, where employees exploit their legitimate access due to a complex mix of financial stress, revenge, and unmet expectations. This episode explores how personality traits like narcissism and organizational shortcomings create a "Trust Trap," allowing behavioral precursor…
  continue reading
 
Modern municipalities rely heavily on interconnected IoT devices and sensors to optimize services, creating urban environments that utilize cloud computing and AI for enhanced quality of life. However, this expanded complexity significantly increases the attack surface, making cities attractive targets for cybercriminals executing ransomware and de…
  continue reading
 
We analyze how global Digital ID systems, mandatory age verification laws (like the UK Online Safety Act and Texas SB2420), and anti-encryption pushes (such as EU Chat Control) are converging to form an unprecedented architecture for monitoring human behavior. This convergence is systematically destroying online anonymity by necessitating the colle…
  continue reading
 
The global scam crisis has become an "industrial revolution for fraud," fueled by AI weaponization, deepfakes, and voice cloning that make sophisticated scams nearly indistinguishable from reality, resulting in combined losses across major economies exceeding $70 billion in 2024-2025. We examine how international criminal networks are exploiting in…
  continue reading
 
The modern CISO is facing an aggressive threat landscape driven by the weaponization of AI, leading to hyper-realistic phishing and polymorphic malware, while ransomware remains the top risk (70% of organizations concerned). We dissect the shift in priorities, where operational resilience and business continuity now rank as the number one cybersecu…
  continue reading
 
The global annual costs associated with cybersecurity are forecasted to reach a staggering 10.5 trillion by the end of 2025. Despite this immense financial backdrop, 80% of Chief Information Security Officers (CISOs) believe they operate with insufficient budgets to ensure robust security measure, contributing to an overwhelming 88% of CISOs functi…
  continue reading
 
This podcast explores how Iran's strategy of asymmetric warfare hinges on sophisticated state-sponsored groups like APT42 and IRGC-backed hacktivist networks to achieve strategic goals while maintaining plausible deniability. We investigate the operations of digital proxies, including CyberAv3ngers and Handala Hack, as they target U.S. political ca…
  continue reading
 
The Middle East serves as a hotbed of geopolitics, where rivalries—particularly between Iran and the Saudi/UAE axis—have made the cyber realm the vanguard of statecraft. This episode analyzes how nations deploy asymmetric capabilities, ranging from destructive malware like Shamoon and sophisticated state-sponsored espionage operations (such as APT3…
  continue reading
 
The cybersecurity industry faces a critical global shortage of 3.4 million workers, a deficit compounded by evolving threats, high attrition rates due to burnout, and geopolitical factors such as costly H-1B visa policies. We investigate how major tech hubs like Nama Bengaluru are rising as global capability centers (GCCs) for AI and cybersecurity,…
  continue reading
 
We clarify the distinct but coordinated roles of Incident Response (IR) Plans, Disaster Recovery (DR) Plans, and Business Continuity (BC) Plans, which together form a resilient defense system against modern disruptions. This episode details the foundational controls essential for organizational readiness, emphasizing cyber hygiene basics like Multi…
  continue reading
 
The foundation of digital security is collapsing as autonomous, AI-driven phishing and deepfakes escalate cyber threats, while the looming quantum threat forces organizations to prepare against the risk of nation-states executing "harvest now, decrypt later" (HNDL) attacks. This episode explores the critical strategic response required in 2026: org…
  continue reading
 
The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transforming these unpatched systems into prime targets for sophisticated cyber threats and ransomware attacks. This failure to maintain supported software leads to massive financial liabilities, including pot…
  continue reading
 
Modern conflict, often characterized as Fifth Generation Warfare (5GW), targets the consciousness and subconsciousness of civil populations through invisible, non-attributable cyber and informational attacks. We explore the looming "PSYOP industrial complex," which fuses military psychological operations techniques with hyper-personalized digital m…
  continue reading
 
We break down the crucial differences between the Chief Information Security Officer (CISO), who is responsible for protecting information assets against cyber threats, and the Data Protection Officer (DPO), whose primary focus is ensuring compliance with privacy laws and regulations. The roles face an inherent conflict of interest because the DPO …
  continue reading
 
Ransomware groups, such as Play (also known as Playcrypt), were among the most active groups in 2024 and use advanced methods like double extortion, first exfiltrating data and then encrypting systems, often targeting critical infrastructure globally. Initial access frequently begins with human elements, as phishing remains the top entry point for …
  continue reading
 
This episode explores why cyber insureds are demonstrating enhanced resilience, evidenced by an overall decline in claims severity by more than 50% and a 30% drop in large loss frequency during 1H, 2025. We detail the shifting attacker tactics, including the migration of ransomware to less protected mid-sized firms and the emergence of data exfiltr…
  continue reading
 
This episode dissects the latest ENISA Threat Landscape, revealing how cybercriminal operations remain potent, fueled by resilient Ransomware-as-a-Service (RaaS) models and highly effective vectors like phishing (60%) and vulnerability exploitation (21.3%). We explore how geopolitical conflicts drive state-aligned cyberespionage, particularly from …
  continue reading
 
This year marks a high-stakes moment for digital governance as major legislation like the EU AI Act, DORA, and India's DPDPA see major enforcement, imposing new obligations on enterprises worldwide. We analyze how algorithmic logic and frameworks like the EU Digital Services Act (DSA) are compelling global censorship by targeting "misleading" or "h…
  continue reading
 
2025 marks a high-stakes year for enterprises navigating rapidly shifting obligations as global compliance accelerates across continents, driven by major enactments like India's DPDPA (effective July 2025) and sweeping EU frameworks. We analyze the core tensions between the EU's binding, risk-based frameworks, such as the EU AI Act banning unaccept…
  continue reading
 
We analyze the defining cyber conflicts of 2025, dominated by state-sponsored actors like Volt Typhoon pre-positioning in critical infrastructure and groups like Salt Typhoon compromising global telecommunications networks for espionage. The season also saw ransomware evolve with extreme speed, exemplified by the Akira group's ultra-short dwell tim…
  continue reading
 
Every major AI company, driven by the existential necessity of covering billions in development losses (the "Burn Rate Crisis"), discarded its ethical prohibitions to pursue lucrative defense contracts. This pivot involved companies like OpenAI removing the explicit ban on "military and warfare" and Anthropic creating "Claude Gov" models designed s…
  continue reading
 
This episode explores the global race between governments implementing centralized digital IDs that risk mass surveillance and privacy erosion, versus decentralized models emphasizing Self-Sovereign Identity (SSI). We detail the complex threats posed by non-interoperable systems and "Digital Twins" technology, which aggregates scattered digital foo…
  continue reading
 
Modern organizations face hybrid threats that exploit the inherent gaps between information systems and physical facilities, making security convergence a daily operational necessity. We detail the foundational framework of risk assessment—which combines threat, vulnerability, and consequence—to ensure both physical access points and digital assets…
  continue reading
 
This episode examines the rapid escalation of the Cambodia–Thailand military conflict into cyberspace, driven by 19 distinct nationalist hacktivist groups, including AnonSecKh/BL4CK CYB3R and Keymous, starting immediately after physical clashes in July 2025. These groups leveraged low-complexity tactics like website defacements and mass Distributed…
  continue reading
 
Global supply chains, particularly in critical sectors like technology, are facing unprecedented threats from sophisticated adversaries who exploit vulnerabilities in third-party software and digital ecosystems. This geopolitical reality is driving stringent international regulations, such as the EU's NIS2 Directive and Cyber Resilience Act (CRA), …
  continue reading
 
Cyber incidents are escalating sharply worldwide, characterized by a staggering 21 percent average annual growth rate in disclosed incidents since 2014 and the increasing sophistication of AI-driven attacks like deepfakes and advanced phishing. Despite this escalating threat volume, the global average cost of a data breach recently dropped by 9% to…
  continue reading
 
Sweden's integration into NATO, coupled with sustained, sophisticated cyber operations from state actors like Russia, China, and Iran, has dramatically intensified the threat level against its Critical Infrastructure and Vital Societal Functions (VSF & CI). To combat this escalating threat, Swedish legislation, including the new Cybersecurity Act (…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play