Jason of Udesign is a proactive education & marketing provider now operating mostly in the digital marketing space, after two decades of bricks & mortar operations & training 1.2 million delegates. We leverage various types of learning interventions mostly delivered through digital formats also enabling people to become self-sustaining entrepreneurs through our E.A.S.I.® Entrepreneur brand & partner affiliate products. We also assist existing business by boosting their own sales & marketing ...
…
continue reading
Jason Muller Podcasts
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
A digital campfire where the host and guests discuss topics of the day, conservation efforts, tips and techniques to better your experiences afield, and share our member's stories. Turkey Call All Access is the Official Podcast of the Nation Wild Turkey Federation.
…
continue reading
Tommy Dassalo doesn't know how to do anything so he's attempting to assemble a Complete Guide To The Human Experience by chatting with different guests about what they've learned, what they've always known, and what they feel the stupidest about. New episodes every Wednesday! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Features the best of host David Wolf's long running podcast series. Each episode is a deep dive into entrepreneurs and small business. Guests span across the spectrum of subject matter including Finance, Marketing, Operations, Startups, Human Resources, Raising Capital, Franchising and much more. Wolf is the founder of Audivita Holdings, LLC, an audio production company that produces audiobooks and podcasts. For more information: www.podcastandradio.com www.audiobooksolution.com
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Bev Killick: Stalk A Future Rock Star, Become The Face Of Incontinence.
1:04:30
1:04:30
Play later
Play later
Lists
Like
Liked
1:04:30BEV KILLICK has been crushing it in comedy clubs around Australia for decades, appearing in heaps of movies and TV shows along the way. She joins me this week to chat about meeting her husband while starting out in stand-up at the Espy, working in a theatre restaurant in Townsville, her friendship with a UFC champion and her legendary tales of publ…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Mike Goldstein & Frankie Rowsthorn: Host A Perth Talk Show, Bully Your Sibling.
59:08
59:08
Play later
Play later
Lists
Like
Liked
59:08This week I'm joined by Perthonalities MIKE GOLDSTEIN and FRANKIE ROWSTHORN! We figure out the etiquette of gossiping about other comedians, hear about Frankie and her dad on The Amazing Race, how to pretend that you're into muscle cars, living with a bunch of yucky boys and HEAPS more! How To Do Everything is on Patreon! Sign up now at Patreon.com…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Scott Aukerman: Grill The Perfect Democracy Sausage, Sit Front Row For Beyoncé.
1:06:51
1:06:51
Play later
Play later
Lists
Like
Liked
1:06:51The host of Comedy Bang Bang and the co-creater / writer / director of Between Two Ferns, SCOTT AUKERMAN joins me TWICE this week! (sorta.) We break down the differences in the democratic process between our two countries, I share a troubling conversation about AI that I overheard, we nerd out over concert technology and I discover Scott's childhoo…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Emma Holland & Rhi Down: Befriend Lisa McCune & Kick Off At The Park
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31I'm up in Brisbane this weekend so I made time to catch up with EMMA HOLLAND and RHI DOWN! It's a VERY loose one this week as we chat about pregnancy, Emma's friendship with Lisa McCune, pretending to be a tour guide, starting fights at the park and heaps, heaps more! How To Do Everything is on Patreon! Sign up now at Patreon.com/HowToDoEverything …
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
Luka Muller & Alex Ward: Get Abducted Overseas & Find The Perfect Password
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37This week I'm joined by LUKA MULLER and ALEX WARD! Luka busts me for having a stupid password on an old social media account, I've stayed in the world's oldest hotel, Wardy's been ripped off by a taxi driver and Luka tells us an absolute odyssey of a yarn about being driven around by a sweet older man in Vietnam. If you're in Queensland, come and s…
…
continue reading
1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading
1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading
1
Kyle Kinane: Crash A Houseboat & Break Up A Couple
1:07:14
1:07:14
Play later
Play later
Lists
Like
Liked
1:07:14
…
continue reading
1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading
1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading
1
Myf Warhurst: Survive The Rapture & Smoke During A Stand-Up Set
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57From Triple J, Bang On, Spicks & Specks, and her new podcast The Moment, MYF WARHURST joins me today! We get trivial about how to make the perfect platter for a dinner party, we get deep about how to be alone and love yourself, we unearth a cringe-inducing story about one of my earliest stand-up gigs and of course: we gush about our pets. Something…
…
continue reading
1
EP 114 2025 NWTF Conservation Week: Preserving Our Hunting Heritage
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42It is an exciting time in the NWTF Education and Outreach arena, especially as we continue to grow our programs. The NWTF's vision has always been to unite a nation through the power of the outdoors, and through talking with NWTF education and outreach staff, one can see how far we've come. To celebrate National Hunting and Fishing Day for 2025, we…
…
continue reading
1
EP 113 2025 NWTF Conservation Week: Western Region
46:02
46:02
Play later
Play later
Lists
Like
Liked
46:02In this episode of the NWTF podcast, we explore what makes the West unique — and why conservation here matters to all of us. The American West is a region of unmatched beauty and opportunity, but also one of incredible complexity. From rugged mountains to sprawling deserts, its vast public lands provide vital wildlife habitat and unparalleled acces…
…
continue reading
1
EP 112 2025 NWTF Conservation Week: Midwestern Region
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42The NWTF has just launched its bold new Roots to Roost Initiative — a groundbreaking, cross-boundary conservation effort set to make a landscape-scale impact across the Midwest. This initiative bolsters the organization's conservation, policy, and education efforts to increase wild turkey populations and conserve the diverse ecosystems they depend …
…
continue reading
1
EP 111 2025 NWTF Conservation Week: Great Plains Region
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36In this episode of the NWTF Turkey Call All Access Podcast NWTF staff members from the Great Plains region explore the vital connection between wild turkeys, riparian ecosystems, and NWTF's Waterways for Wildlife Initiative. Together, they break down why riparian corridors—those narrow but powerful "ribbons of life" along rivers and streams—are so …
…
continue reading
1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading
1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading
1
Scott Dooley & Jason Chatfield: Hoodwink The CIA & Live At The M&M's Store
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03SCOTT DOOLEY and JASON CHATFIELD beam in to the show this week, LIVE from Times Square (yes, really). We learn what it takes to bluff your way in to a dinner with the CIA, as well as discussing Dools being with me when I got owned by an Uber driver, forgetting a joke onstage that I've done a billion times, the origins of Lululemon and so much more!…
…
continue reading
1
EP 110 2025 NWTF Conservation Week: Southeastern Region
55:11
55:11
Play later
Play later
Lists
Like
Liked
55:11The NWTF's Habitat for the Hatch initiative just wrapped up its second year, improving nesting and brood-rearing habitat across the Southeast at an accelerated pace. The initiative is made possible by NWTF state chapters, partners, staff and a shared dedication to the wild turkey. In this episode of the Turkey Call All Access podcast, we're joined …
…
continue reading
1
EP 109 2025 NWTF Conservation Week: Northeastern Region
55:28
55:28
Play later
Play later
Lists
Like
Liked
55:28There's always something new to learn when you sit down with a group of NWTF biologists and foresters. Our Forests and Flocks Initiative just celebrated its first successful year of many to come, and we wanted to know what this past year looked like for the Northeast. For anyone who wants to learn more about the initiative or wants to hear more abo…
…
continue reading
1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading
1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading