The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
VCISO Podcasts
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~ In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and techni…
…
continue reading
1
Mastering Internal Audits for ISO Standards | Interview with Carlos Cruz
1:05:55
1:05:55
Play later
Play later
Lists
Like
Liked
1:05:55In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO at Advisera, welcomes Carlos Cruz, founder of Metanoia Consulting and a seasoned expert in ISO standards. Carlos and Dejan share best practices for performing internal audits across various ISO standards, including ISO 27001, and other cybersecurity frameworks such as NIS2 an…
…
continue reading
1
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills require…
…
continue reading
1
CCT 304: Software Development Security (CISSP Domain 8)
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single malicious insider flipped Disney menus to Wingdings and tampered…
…
continue reading
1
Seeing Is Not Believing: How to Spot AI-Generated Video
17:10
17:10
Play later
Play later
Lists
Like
Liked
17:10In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google’s Nano Banana, making it harder to separate reality from fiction. To…
…
continue reading
1
Seeing Is Not Believing: How to Spot AI-Generated Video
17:10
17:10
Play later
Play later
Lists
Like
Liked
17:10In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google's Nano Banana, making it harder to separate reality from fiction. To…
…
continue reading
1
CVCISO podcast episode 75 Special Richard Stroble and Respecting the Importance of our Health
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37Summary In this episode, the hosts and guests discuss the importance of health—mental, physical, and spiritual—in the context of their professional lives in security. They share personal experiences with health challenges, strategies for maintaining well-being, and the significance of accountability in both personal and professional realms. The con…
…
continue reading
1
Why Are You Outsourcing Buyer Intimacy to Gartner?!?
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49The Gartner debate keeps resurfacing on LinkedIn. Skeptics vs. pragmatists vs. the "it depends" crowd. Same arguments. Same camps. Same circular conversation. Everyone's missing the point. After having hundreds of direct conversations between vendors and CISOs, I've come to a controversial conclusion: The analyst relations industry exists because m…
…
continue reading
1
AI, Fraud & the CTO: Navigating Counterparty Risk
28:11
28:11
Play later
Play later
Lists
Like
Liked
28:11Host Felicia King weaves a sharp, personal narrative that ties together AI, fraud, vendor selection, and the critical role of a competent CTO. With candid anecdotes and hard-earned lessons, she explains why tightly-scoped AI — used by skilled experts with robust governance — can feel like a $150K colleague, and why poorly governed AI or flashy vend…
…
continue reading
1
CCT 303: Domain 6 Deep Dive Questions - Domain 6.5
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A headline about hacked nanny cams is more than a cautionary tale—it’s a …
…
continue reading
In this episode, host Greg Schaffer interviews Thomas Sweet, an award-winning CIO/CTO and 2023 Tech Titan Emerging CTO, who shares his unconventional journey from civil engineering to enterprise IT and cybersecurity leadership. Tom reflects on his early days at NEC, Microsoft, GM Financial, and more, offering key lessons learned while leading globa…
…
continue reading
1
CCT 302: Security Audits and the CISSP Exam
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv If audits feel like paperwork purgatory, this conversation will change yo…
…
continue reading
1
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills require…
…
continue reading
1
CCT 301: CISSP Questions Deep Dive - Zero Trust
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Zero trust isn’t a checkbox or a buzzword; it’s a mindset shift that chan…
…
continue reading
1
CvCISO Podcast Episode 74 Special Guest Dan Ovick and Holiday Awareness Resources
52:46
52:46
Play later
Play later
Lists
Like
Liked
52:46Summary In this episode of CBC So Podcast, the hosts discuss various aspects of cybersecurity, particularly focusing on the upcoming holiday season and the associated risks. They introduce their guests, including Dan Ovick, who shares his journey in cybersecurity and the importance of community networking. The conversation shifts to holiday cyberse…
…
continue reading
1
CCT 300: Failing Securely, Simply, Separation of Duties, KISS and Zero Trust (CISSP)
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security programs fail when they try to do everything at once. We walk th…
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
S7E52 - A Conversation with Chuck Anderson
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This Thanksgiving-week episode welcomes back Chuck Anderson, IT consultant at Reliant Managed Services, for a deep dive into some of the biggest shifts in cybersecurity and technology over the past year and a half. Chuck and Greg explore the rapid rise of AI (good and bad), the looming disruption of quantum computing—especially its impact on encryp…
…
continue reading
1
The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~
1:01:10
1:01:10
Play later
Play later
Lists
Like
Liked
1:01:10The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product…
…
continue reading
1
CCT 299: Practice CISSP Questions - Data Security Controls
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19Send us a text Words can trigger audits, budget panic, or calm execution, and few words carry more weight than “leak” and “breach.” We unpack the real differences, the legal and regulatory implications of each, and how precise language shapes incident response. From there, we get hands-on with CISSP-ready concepts—data states, DLP, CASB, DRM, minim…
…
continue reading
1
Exploring Cyber Warfare: Risks, Strategies, and Solutions | Interview with Steve Winterfeld
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Steve Winterfeld, a seasoned security consultant, fractional CISO, and author of the book 'Cyber Warfare Techniques, Tactics, and Tools for Security Practitioners.' The discussion revolves around the relevance of cyber warfare for companies, the differen…
…
continue reading
1
CCT 298: Determining Data Controls - CISSP
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A graphing calculator running ChatGPT might make headlines, but our real …
…
continue reading
1
CvCISO Podcast Episode 73 Glen Legus, CvCISO Foundations Course Instructor
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18Summary In this episode of the CBC So podcast, host Andy and guests discuss various aspects of information security, including the importance of context in decision-making, market trends, and the value of leadership in security practices. They share personal stories and insights on navigating business challenges, the role of confidence, and the evo…
…
continue reading
1
OWASP Top 10 for 2025: What’s New and Why It Matters
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the importance of getting involved with the release candidate to provide feedback and suggestions. The conve…
…
continue reading
1
OWASP Top 10 for 2025: What's New and Why It Matters
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the importance of getting involved with the release candidate to provide feedback and suggestions. The conve…
…
continue reading
1
CCT 297: Practice CISSP Questions - Investigation Types (Domain 1.6)
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single compromised API key can undo months of hard work. We open with a…
…
continue reading
1
S7E51 - A Conversation with Dave McKenzie
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In this episode of The Virtual CISO Moment, host Greg Schaffer speaks with Dave McKenzie, co-founder and director of Damn Good Security and a seasoned cybersecurity leader based in Scotland. Dave shares his fascinating journey from aspiring pilot to IT support technician, to leading security operations for major organizations, and ultimately launch…
…
continue reading
1
CCT 296: Compliance and Contractual Requirements (Domain 1.4)
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A tiny payload hidden in a legitimate-looking NuGet package can sit insid…
…
continue reading
1
Meet NEO 1X: The Robot That Does Chores and Spies on You?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48The future of home robotics is here — and it’s a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an always-connected humanoid in your home, and why it’s definitely not the “Robot Rosie” we were promised. ** Link…
…
continue reading