The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cyber Security Consultant Podcasts
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
…
continue reading
LegalFuel is the official Florida Bar Podcast. This monthly series is brought to you by The Practice Resource Center of The Florida Bar and will feature esteemed leaders in law discussing new and innovative topics. Its purpose is to help members of The Florida Bar as well as attorneys from other states run better practices and provide better legal services to their clients. Disclaimer: The views expressed by the participants of this program are their own and do not represent the views of, no ...
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
The Tech Leaders Podcast brings you candid conversations with established technology leaders, at some of the world's most incredible organisations. From the challenges of sustainable growth, through to continuous innovation and everything in-between. These are the behind-the-scenes stories and personal anecdotes of inspirational leaders at the forefront of the digital revolution.
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading

1
Entreprenures Worldwide Podcast hosts RICHARD WARD & ROSAMOND STENHOUSE
Worldwide Entrepreneurs Podcast Richard Ward and Rosamond Stenhouse
Hosts CELEBRITY ENTREPRENEUR RICHARD WARD & serial entrepreneur ROSAMOND STENHOUSE ON Entrepreneurs Worldwide Podcast The “how-to” BUSINESS PODCAST We’ve spent decades building international companies across industries — now we’re speaking with the founders, experts, and change-makers shaping the future of business. From hard-won lessons to global strategies, we get to the heart of “How to” make businesses survive everything you’re going to face. Where deep experience meets real-world expert ...
…
continue reading
Brief conversations with entrepreneurs, innovators, and company founders
…
continue reading
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
…
continue reading

1
The Human Side of Cyber Resilience with Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
…
continue reading
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
…
continue reading
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv https://www.jeffersonfisher.com/ A spike in ransomware on the factory flo…
…
continue reading

1
What Happened to Hacker Culture? [Threat Vector]
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
…
continue reading

1
Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading

1
Chetan Conikee: Create narratives of your journey. [CTO]
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading

1
No honor among thieves. [Research Saturday]
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
…
continue reading
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
…
continue reading

1
Unsecurity Episode 248: Unveiling & Mapping Government Vulnerabilities with Seth Bowling
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Join us for another episode of the Unsecurity Podcast as Megan, Brad, and Seth Bowling, lead researcher and developer at FRSecure, dive into the evolving landscape of cybersecurity for city and county governments. Seth shares how Mirrored Defense's innovative heat map visualizes the attack surface across the U.S. and presents surprising findings fr…
…
continue reading

1
Cyber defenders pulled into deportation duty.
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
…
continue reading

1
CCT 287: Practice CISSP Questions - Deep Dive (Domain 5)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Send us a text Leadership churn is reshaping security from the top down. We open the door on why CISO tenures are shrinking to 18–26 months and what that says about pressure, culture, compensation, and board-level risk literacy. From startups that stretch leaders thin to enterprises that treat security as a cost center until the breach, we map the …
…
continue reading

1
#09 - Hoe veranderen AI-agents jouw werk? – Met Merwin de Jongh, founder van Repetive, AnyID en Building Blocks
49:54
49:54
Play later
Play later
Lists
Like
Liked
49:54Merwin de Jongh is een techondernemer in hart en nieren. In 2013 richtte hij samen met Alexander van Eerden het bedrijf Building Blocks op, een data science- en AI-specialist die in 2022 werd overgenomen door CM.com. Tegenwoordig is Merwin onder meer betrokken bij AnyID en Midpoint Brabant en start hij een nieuw AI-avontuur: Repetive. Zijn drijfvee…
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading

1
Critical GoAnywhere bug fuels ransomware wave.
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23By N2K Networks
…
continue reading
…
continue reading

1
Oracle zero-day serves up persistent access.
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
…
continue reading

1
CCT 286: Access Controls - Role Based, Rule Based and Many More Controls (Domain 5.4)
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A headline‑grabbing data leak is the wake‑up call; what you do next is th…
…
continue reading

1
2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
…
continue reading

1
Sloane Menkes: What is the 2%? [Consultant] [Career Notes]
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
…
continue reading

1
Sloane Menkes: What is the 2%? [Consultant]
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
…
continue reading

1
China’s stealthiest spy operation yet. [Research Saturday]
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
…
continue reading
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
…
continue reading
AI and Marketing are reshaping how businesses operate and grow. In this episode of The Backstory on Marketing and AI, we explore the role of revenue operations, automation, and AI enabled Market Research. Learn how companies can move beyond founder-led sales and create scalable, repeatable revenue engines. Discover why recurring revenue is essentia…
…
continue reading
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat…
…
continue reading

1
CCT 285: Practice CISSP Questions - Evaluate and Apply Security Governance Principles (Domain 1.3)
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies o…
…
continue reading
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
…
continue reading
AI and Marketing are reshaping industries at lightning speed. In this episode of The Backstory on Marketing and AI, we dive deep into how AI is transforming workflows, advertising, and education. We explore the DRIVE-F framework that empowers professionals to interact with AI effectively. Learn why providing direction, defining roles, and focusing …
…
continue reading

1
Fighting the Rising Tide of Scams with Carsten Helm
20:07
20:07
Play later
Play later
Lists
Like
Liked
20:07A fake invoice. A dubious text message. Most of us have brushed off a scam attempt at some point. But what happens when someone falls for one and what responsibility do banks have in stopping it? In this episode of BCG on Compliance, host Hanjo Seibert speaks with Carsten Helm, one of Europe’s leading voices in anti-financial crime. With over 15 ye…
…
continue reading
CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign th…
…
continue reading
A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira rans…
…
continue reading
AI is changing marketing at lightning speed. In this episode of The Backstory on Marketing and AI, we explore how AI enabled Market Research is disrupting digital strategies and reshaping industries. Key themes include: How AI accelerates research and campaign design Why adding humanity to AI content matters Navigating HIPAA compliance in healthcar…
…
continue reading

1
CCT 284: Evaluate and Apply Security Governance Principles (Domain 1.3)
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security governance represents one of the most misunderstood yet critical…
…
continue reading

1
Government Pledges Remuneration for JLR Cyber Attack Victims
3:28
3:28
Play later
Play later
Lists
Like
Liked
3:28- Government Pledges Remuneration for JLR Cyber Attack Victims . - Dutch Cyber Attack: Latest Updates and Global Repercussions - African Banks Tighten Defenses Amid Rising Ransomware Threats. - UN Warns of Escalating Cybersecurity Risks in Developing Nations. - Experts Debate: Is Africa Ready for AI-Driven Cyber Threats? Support the show Remember..…
…
continue reading

1
When Lawyers Become Targets: Protecting Law Firms from Scams and Fraud
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50Attorneys and law firms are increasingly being targeted by sophisticated scams, including phishing schemes, fraudulent check scams, wire fraud, and even identity theft. These scams can cause devastating financial losses, erode client trust, and damage professional reputations. In today’s episode host Jamie Moore welcomes Steve Weisman, lawyer and n…
…
continue reading