Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Rsac Podcasts

show episodes
 
Artwork

1
RSA Conference

RSA Conference

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Artwork

1
Tech Pulse

Tech Pulse Podcasters

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
  continue reading
 
Loading …
show series
 
In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
  continue reading
 
Are you wondering about the emerging technologies and shifting market dynamics that might shape your strategy for 2026 and beyond? Then this episode is for you. Get a detailed look at how three big shifts could dramatically impact plans and strategies for the year ahead (and get a preview for one of our upcoming 2026 Predictions reports, to boot).…
  continue reading
 
Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
  continue reading
 
In this episode of Inside the Network, we sit down with Sumit Dhawan, CEO of Proofpoint, one of the largest private cybersecurity companies in the world. With over $2 billion in ARR, Proofpoint protects 85 of the Fortune 100 and is on a bold path toward $5 billion in revenue by 2030. Sumit’s journey is a masterclass in modern leadership. Having gra…
  continue reading
 
In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR. Jay’s journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-…
  continue reading
 
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
  continue reading
 
The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
  continue reading
 
In this episode of Inside the Network, we sit down with Michelle Zatlyn, Co-founder and President of Cloudflare, one of the most iconic Internet infrastructure companies in the world. From its launch during the depths of the 2009 financial crisis to today’s $70 billion market cap and 5 million+ customers, Cloudflare has become a cornerstone of glob…
  continue reading
 
Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
  continue reading
 
Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out b…
  continue reading
 
In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complex…
  continue reading
 
In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growin…
  continue reading
 
In this episode of Breaking Badness, Kali Fencl sits down with Audra Streetman, a former journalist turned threat intelligence analyst at Splunk. Audra shares her journey from local newsrooms to the frontlines of cybersecurity, detailing how her storytelling skills translate directly into threat research.Audra walks us through how ransomware attack…
  continue reading
 
In this episode of Inside the Network, we sit down with Joe Levy, CEO of Sophos, a 40-year-old cybersecurity company that has quietly become one of the most important global players, serving over 600,000 organizations and generating over $1 billion in revenue. Throughout his career, Joe has operated with a founder's mindset: thinking in bets, build…
  continue reading
 
In this RSA Conference 2025 special episode, we dive into the evolving world of cyberattribution, AI-powered threat tactics, and real-world incident response in AWS and GCPenvironments.Our guests include:● Tal Darsan and Etay Maor from Cato Networks, discussing stealthy attacker techniques,AI-powered evasion, and lessons from ransomware groups like…
  continue reading
 
Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
  continue reading
 
If there’s one constant in business today, it’s change. New partnerships, new strategies, and new risks are popping up in all areas. In this episode, we look at three major changes taking place in the B2C, B2B, and enterprise application spaces and tap our analysts for their guidance on how to manage these changes.…
  continue reading
 
In this RSA Conference 2025 special episode, we explore two critical frontiers shaping thefuture of cybersecurity.First, Jon DiMaggio (Author of The Ransomware Diaries, Analyst1) breaks down the hiddensupply chains behind ransomware gangs, including the economics of affiliate betrayal and thechallenge of accurate attribution. He walks us through hi…
  continue reading
 
Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
  continue reading
 
Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
  continue reading
 
Join Jamal Khan and Jennifer Johnson as they explore the evolving landscape of AI in healthcare, focusing on its applications, ethical considerations, data privacy, and the role of Chief AI Officers. This discussion highlights the importance of governance, patient consent, and the potential of AI to improve healthcare workflows while addressing dat…
  continue reading
 
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
  continue reading
 
In this RSAC special episode of Inside the Network, we sit down not with one, but two remarkable guests from the center of the cybersecurity world. First, we’re joined by Andy Cao, COO of ProjectDiscovery, a company focused on open-source vulnerability management tools, which won the "Most Innovative Startup" award at the RSA Conference 2025 Innova…
  continue reading
 
As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
  continue reading
 
In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
  continue reading
 
In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
  continue reading
 
Quantum computing represents a significant shift in computational power, offering both opportunities and challenges for securing sensitive data. Join the Connection Security Center of Excellence team as we delve into the transformative threats that quantum computing poses for cybersecurity and the countermeasures we should be considering to address…
  continue reading
 
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
  continue reading
 
Summary In this episode of the DTC podcast, Deepak Jeevankumar interviews Karl Mattson, a senior security leader at Endor Labs, discussing the RSA Conference's significance in cybersecurity, the impact of AI on security, and the current concerns of CISOs. They explore strategies for startups to maximize their presence at the conference and the impo…
  continue reading
 
SUMMARY In this conversation, Deepak Jeevankumar interviews Ben Carr, the Chief Security and Trust Officer at Halcyon Security, discussing the evolving landscape of cybersecurity, particularly in relation to AI and the RSA Conference. They explore the challenges of AI adoption in enterprises, the changing role of the CISO, and the importance of bui…
  continue reading
 
SUMMARY In this episode, Deepak Jeevankumar interviews Renee Gutmann, a seasoned CISO with extensive experience attending the RSA Conference. They discuss the evolution of the conference, advice for new CISOs, emerging trends in cybersecurity, the role of AI and automation, and the future challenges posed by quantum computing. Rene shares insights …
  continue reading
 
In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
  continue reading
 
In this episode, we look at the ongoing fallout from two healthcare data breaches involving Oracle servers and what the on-again, off-again tariffs could mean for CIOs. Then we discuss the rising prominence of social media influencers in the B2B space — and why tapping your own employees could be a smart move.…
  continue reading
 
In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
  continue reading
 
In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
  continue reading
 
In this episode of Inside the Network, we sit down with Dug Song, the legendary co-founder and former CEO of Duo Security. Dug's journey is nothing short of iconic—he turned a side project into a cybersecurity powerhouse with over 50,000 customers and a $2.35 billion exit to Cisco. In a world obsessed with unicorn status and funding hype, Dug stand…
  continue reading
 
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
  continue reading
 
With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
  continue reading
 
In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play