Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

RSA Events Podcasts

show episodes
 
Artwork
 
World-changing ideas. For free. For everyone. Featuring the world’s most exciting public thinkers, innovators and changemakers, RSA talks bring people and ideas together to shape a better future for all.
  continue reading
 
Artwork

51
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
RSAC

RSAC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
  continue reading
 
Loading …
show series
 
The 2025 RDI address will be delivered by incoming Master Johanna Gibbons RDI, founding partner of J&L Gibbons and founding director of Landscape Learn. Johanna is a Landscape Architect, Founding Partner of J&L Gibbons established in 1986 and Founding Director of social enterprise Landscape Learn. She studied at Edinburgh College of Art and is a Fe…
  continue reading
 
As physical and digital threats collide, converged security models that unite physical and cyber protections under one strategy are becoming more essential. John Scimone, Chief Security Officer for Dell Technologies, offers guidance for CISOs looking to bridge physical and cyber security into one cohesive strategy.…
  continue reading
 
⬥EPISODE NOTES⬥ Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal,…
  continue reading
 
What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
  continue reading
 
AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
  continue reading
 
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
  continue reading
 
⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
  continue reading
 
As the Government looks to appoint a new Freelance Champion for the creative industries we delve into the findings of the latest State of the Nations report from Creative PEC on Arts, Culture and Heritage workforce. Dr Mark Taylor will unveil the findings and plot the freelancer journey in the creative industries. A panel of guests including Yasmin…
  continue reading
 
⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
  continue reading
 
A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
  continue reading
 
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This …
  continue reading
 
Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
  continue reading
 
Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
  continue reading
 
⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Insights, Trends & Straight Talk from the Expo Floor & Events around town. 00:00 ...coming up 00:22 introduction & agenda 03:03 who are you wearing? 06:28 sponsorship - Cybersecurity Growth Membership E-Learning & Community 08:08 hot topic - RSA Conference 2025…
  continue reading
 
⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
  continue reading
 
Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
  continue reading
 
It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
  continue reading
 
⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
  continue reading
 
What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
  continue reading
 
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
  continue reading
 
Ufi VocTech Trust and the RSA are delighted to unveil the recommendations of the Digital Badging Commission. Over the past 18 months, the Digital Badging Commission has brought together leading minds across education, technology, policy and employment to reimagine and define the essential steps required for digital badges and credentials to transfo…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. Dive into our recap of Black Hat, DEF CON and BSides Las Vegas fr…
  continue reading
 
During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
  continue reading
 
In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
  continue reading
 
Over 13% of 16-24-year-olds in the UK are now classified as NEET – not in education, employment or training – with a growing number also economically inactive and disengaged from the workforce altogether. This crisis is costing the UK economy billions in lost productivity and social support, while placing young people at greater risk of poor mental…
  continue reading
 
⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
  continue reading
 
SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
  continue reading
 
Organizations often spend a lot of time ensuring they're complying with cybersecurity standards and regulations, but often, accessibility standards are overlooked. Accessibility, in a sense, starts with compliance as well. However, cybersecurity vendors, platforms, and programs often don't know these standards exist, don't know the legal ramificati…
  continue reading
 
With opportunities for digital connection at an all-time high, and loneliness now a public health concern, are we truly more connected – or just more networked? Join us in the RSA Great Room for a panel exploring whether technology is helping us form meaningful relationships or simply keeping us online. Journalist and founder of The Logging Off Clu…
  continue reading
 
We’re delighted to welcome you to the 2025 RSA Spark Showcase – a month-long exhibition spotlighting the most outstanding ideas in response to RSA Spark’s purpose-led briefs. From reimagining community spaces to innovative solutions for social connection and wellbeing, the showcase captures the energy and potential of the next generation of problem…
  continue reading
 
⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
  continue reading
 
With a population of 2 million people and a strategic location at the heart of the UK, the national growth story must include a prosperous East Midlands. Join us at RSA House as we set out the recommendations in the final report of the East Midlands Inclusive Growth Commission, a bold, region-wide economic plan commissioned by Mayor Claire Ward and…
  continue reading
 
As we face the challenges of climate change, inequality, and environmental degradation, we know that simply sustaining is not enough. To achieve this, we need a radical reimagining of our current systems – from economic and political to food and energy. And we need a new collective story for humanity. One that celebrates our fundamental interconnec…
  continue reading
 
Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
  continue reading
 
Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
  continue reading
 
AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
  continue reading
 
⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
  continue reading
 
At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. 00:00 ...coming up 00:13 introduction & agenda 05:21 who are you …
  continue reading
 
Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Our first roadmap walkthrough of what has been developed on the Cybersecurity Growth platform and what is planned. 00:00 introduction 00:16 our development approach 03:08 sponsorship - Cybersecurity Growth Membership E-Learning & Community 03:54 what's been rel…
  continue reading
 
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Let's chat about real-world cyber attacks. Let's share some stories together. Let's learn and grow together. 00:00 introduction & agenda 00:54 who are you wearing? 06:55 sponsorship - Cybersecurity Growth Membership E-Learning & Community 07:44 Scattered Spider…
  continue reading
 
Join us in London, Osaka and online for the second event in our global partnership with the UK at Expo 2025. The UK has a rich history of advancing women’s rights. In 1918, the Representation of the People Act granted voting rights to women over 30, with equal suffrage achieved in 1928. From the Equal Pay Act of 1970 to the Equality Act of 2010, tr…
  continue reading
 
The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
  continue reading
 
New course, Practical Uses of Secure Controls Framework. A 1 hour course covering how to leverage frameworks to build robust security, compliance and privacy programs. This includes implementing capability maturity models, integrating the NIST Cybersecurity Framework, and how to get buy-in from your business executives. This course has video, writt…
  continue reading
 
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts * Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later. 🔐 Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services 🟢 Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.co…
  continue reading
 
In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play