RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
RSA Conference Podcasts
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Tech guru and veteran CNBC and Bloomberg journalist Eric Chemi takes on modern business and what it takes to break through from a journalist’s perspective. It’s all about being assertive (!!) in a way that wins friends and nurtures relationships – what we at Bospar have branded “Politely Pushy”. From CEOs, founders and investors, to IT experts, luminaries, and other interesting sorts, Eric delivers straight talk in a relaxed “let’s have coffee” conversation that’s interesting, fast-paced, an ...
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The ThreatReal Podcast covers Information Security news, events, and trends in cybersecurity with a technical focus. Join hosts Matt Scheurer and Micah K. Brown as they dig deep into the threats impacting enterprise environments and home networks. Discussion topics around threats include the actors, the hunting, the intelligence, the modeling, and more! Visit us online at https://threatreel.com
…
continue reading

1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading

1
Common Vulnerability Scoring System: Unpacking What's New in Version Four
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
…
continue reading

1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading

1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading

1
Does Your Company Need an Analyst Relations Program?
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41As part of a comprehensive and proactive PR strategy, analyst relations is an ongoing activity that relies on tight company branding and an experienced team. Eric Chemi takes a deep dive into AR with Bospar experts, Brandy and AJ.By Eric Chemi
…
continue reading

1
Hiring for the Present Is Hurting the Future of Cybersecurity: Why “Entry-Level” Rarely Means Entry | A Conversation with John Salomon | Redefining CyberSecurity with Sean Martin
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38⬥GUEST⬥ John Salomon, Board Member, Cybersecurity Advisors Network (CyAN) | On LinkedIn: https://www.linkedin.com/in/johnsalomon/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecur…
…
continue reading

1
Season 3 Finale: Top Insights, Hacks, and Lessons from the Frontlines of AI Security
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Send us a text To close out Season 3, we’re revisiting the standout insights, wildest vulnerabilities, and most practical lessons shared by 20+ AI practitioners, researchers, and industry leaders shaping the future of AI security. If you're building, breaking, or defending AI/ML systems, this is your must-listen roundup. Full transcript, video, and…
…
continue reading

1
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean Martin
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51⬥GUEST⬥ Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Websit…
…
continue reading

1
Breaking and Securing Real-World LLM Apps
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31Send us a text Fresh off their OWASP AppSec EU talk, Rico Komenda and Javan Rasokat join Charlie McCarthy to share real-world insights on breaking and securing LLM-integrated systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/breaking-and-securing-real-world-llm-apps Ask ChatGPT Thanks for chec…
…
continue reading

1
Encore: Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
…
continue reading
Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out b…
…
continue reading

1
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
…
continue reading

1
How Red Teamers Are Exposing Flaws in AI Pipelines
41:46
41:46
Play later
Play later
Lists
Like
Liked
41:46Send us a text Prolific bug bounty hunter and Offensive Security Lead at Toreon, Robbe Van Roey (PinkDraconian), joins the MLSecOps Podcast to break down how he discovered RCEs in BentoML and LangChain, the risks of unsafe model serialization, and his approach to red teaming AI systems. Full transcript, video, and links to episode resources availab…
…
continue reading

1
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chie…
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading

1
Securing AI for Government: Inside the Leidos + Protect AI Partnership
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Send us a text On this episode of the MLSecOps Podcast, Rob Linger, Information Advantage Practice Lead at Leidos, join hosts Jessica Souder, Director of Government and Defense at Protect AI, and Charlie McCarthy to explore what it takes to deploy secure AI/ML systems in government environments. Full transcript, video, and links to episode resource…
…
continue reading

1
The Human Firewall: People-First Cybersecurity
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and hum…
…
continue reading

1
Courage and Resilience : Getting it, Keeping it, and Growing it
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
…
continue reading
Send us a text Jason Haddix, CEO of Arcanum Information Security, joins the MLSecOps Podcast to share his methods for assessing and defending AI systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/holistic-ai-pentesting-playbook. Thanks for checking out the MLSecOps Podcast! Get involved with th…
…
continue reading

1
Unmasking the Risks of Generative AI Deception
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading
Welcome to AI University! At Bospar, we understand that AI isn’t going anywhere. So instead of resisting, we are embracing AI and leveraging the power it holds to help us do our jobs better. Courtney Merolle and Kyle Ankney, our professors at AI University, join Eric Chemi to talk through how we thoughtfully leverage AI in our day-to-day operations…
…
continue reading
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
AI Agent Security: Threats & Defenses for Modern Deployments
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Send us a text Researchers Yifeng (Ethan) He and Peter Rong join host Madi Vorbrich to break down their paper "Security of AI Agents." They explore real-world AI agent threats, like session hijacks and tool-based jailbreaks, and share practical defenses, from sandboxing to agent-to-agent protocols. Full transcript with links to resources available …
…
continue reading

1
Mental Health Awareness Month: How Bospar Supports Its Employees
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30At Bospar, we’ve been proudly remote before it was trendy, but working from anywhere doesn’t mean escaping the pressures of PR. In this Mental Health Awareness Month episode of Politely Pushy, we get candid about the unique mental health challenges of remote communications professionals. From always-on expectations to navigating digital burnout, we…
…
continue reading

1
Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve.…
…
continue reading

1
Beyond Learning to Code: How to Get Kids Curious About Cybersecurity
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
…
continue reading
Send us a text Part 2 with Gavin Klondike dives into autonomous AI agents—how they really work, the attack paths they open, and practical defenses like least-privilege APIs and out-of-band auth. A must-listen roadmap for anyone building—or defending—the next generation of AI applications. Full transcript with links to resources available at https:/…
…
continue reading
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
…
continue reading

1
Beyond Prompt Injection: AI’s Real Security Gaps
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Choosing the Right Social Media Platforms for B2B Success
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48In this episode, we dive into the world of social media marketing for B2B businesses. With so many platforms to choose from, how do you know which ones will give you the best ROI? We break down the top social media channels for B2B companies, highlighting their unique benefits, potential drawbacks, and strategies for leveraging each platform to bui…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
Green is the New Office: Sustainability & the WFH Revolution
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39This Earth Day, we're diving into how the work-from-home movement is reshaping our environmental impact. Bospar Principal, Curtis Sparrer, joins Eric Chemi to examine how companies can implement sustainable practices that benefit both the environment and their bottom line.By Eric Chemi
…
continue reading

1
Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16Christina Morillo, Head of Information Security at the National Football League’s New York Giants joins Ann on this week's episode of Afternoon Cyber Tea. Christina discusses the ins and outs of building a resilient cybersecurity strategy, the importance of entering organizations with curiosity—not checklists—and why listening is always her first s…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean Martin
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
…
continue reading

1
Unpacking the Cloud Security Alliance AI Controls Matrix
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53Send us a text In this episode of the MLSecOps Podcast, we sit down with three expert contributors from the Cloud Security Alliance’s AI Controls Matrix working group. They reveal how this newly released framework addresses emerging AI threats—like model poisoning and adversarial manipulation—through robust technical controls, detailed implementati…
…
continue reading

1
The Power of Contributed Content: Crafting Stories That Resonate with Your Audience
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36As part of a comprehensive content strategy, contributed content, such as bylines or op-eds, is a powerful tool that builds credibility and carves out a space for your voice within your industry. In this episode of Politely Pushy, Bospar Chief Content Officer Paula Bernier and Content Director Joann Whitcher join Eric Chemi to analyze the effective…
…
continue reading

1
Public Relations in the Tech Industry: Building Relationships with the Media
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18Whether you’re just beginning your career in media relations or trying to garner media attention for your company’s latest announcement, don’t skip this episode of Politely Pushy! Tune in with Bospar media experts Brent Shelton, Ryan Quintana, and Eric Chemi as they offer insights into the unique challenges of tech PR and strategies for building st…
…
continue reading

1
Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for cybersecurity and relentless dedication to learning and marketing helped him build an independent media…
…
continue reading
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
…
continue reading

1
From Pickle Files to Polyglots: Hidden Risks in AI Supply Chains
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21Send us a text Join Keith Hoodlet from Trail of Bits as he dives into AI/ML security, discussing everything from prompt injection and fuzzing techniques to bias testing and compliance challenges. Full transcript with links to resources available at https://mlsecops.com/podcast/from-pickle-files-to-polyglots-hidden-risks-in-ai-supply-chains Thanks f…
…
continue reading

1
Third Party & Vendor Risk Management: The Program Committee's Perspective
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
…
continue reading

1
Guiding the Guide: Influence in Crisis Mode
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33This Podcast explores the essential skills needed to effectively influence leadership during a crisis. It begins by exploring different roles of crisis management and attendees will learn the importance of understanding what motivates the stakeholders and how aligning with these priorities enhances influence and explores the importance of building …
…
continue reading

1
Building Resilient Security Teams with Ryan Field
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Ryan Field, Executive Vice President & Chief Information Security Officer at Bank of Hawaii joins Ann on this week's episode of Afternoon Cyber Tea. With over two decades of experience in IT and cybersecurity, Ryan shares his approach to security leadership; and the importance of fostering collaboration and diverse perspectives. He discusses the un…
…
continue reading

1
Building and Securing Intelligent Workflows: Why Your AI Strategy Needs Agentic AI Threat Modeling and a Zero Trust Mindset | A Conversation with Ken Huang | Redefining CyberSecurity with Sean Martin
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10⬥GUEST⬥ Ken Huang, Co-Chair, AI Safety Working Groups at Cloud Security Alliance | On LinkedIn: https://www.linkedin.com/in/kenhuang8/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this e…
…
continue reading

1
Rethinking AI Red Teaming: Lessons in Zero Trust and Model Protection
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52Send us a text Full transcript with links to resources available at https://mlsecops.com/podcast/rethinking-ai-red-teaming-lessons-in-zero-trust-and-model-protection This episode is a follow up to Part 1 of our conversation with returning guest Brian Pendleton, as he challenges the way we think about red teaming and security for AI. Continuing from…
…
continue reading

1
Detection vs. Noise: What MITRE ATT&CK Evaluations Reveal About Your Security Tools | A Conversation with Allie Mellen | Redefining CyberSecurity with Sean Martin
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06⬥GUEST⬥ Allie Mellen, Principal Analyst, Forrester | On LinkedIn: https://www.linkedin.com/in/hackerxbella/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE NOTES⬥ In this episode, Allie Mellen, Principal Analyst on the Security and…
…
continue reading

1
AI Security: Map It, Manage It, Master It
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Send us a text Full transcript with links to resources available at https://mlsecops.com/podcast/ai-security-map-it-manage-it-master-it In part one of our two-part MLSecOps Podcast episode, security veteran Brian Pendleton takes us from his early hacker days to the forefront of AI security. Brian explains why mapping every AI integration is essenti…
…
continue reading