The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
VCISO Podcasts
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
4
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
1
Penetration Testing & Threat Intelligence: Enhancing Cybersecurity | Interview with Sasa Jusic
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
…
continue reading
1
Special Episode: Inside Weekly Threat-Intel Briefings with a vCISO 💼
18:06
18:06
Play later
Play later
Lists
Like
Liked
18:06Got a question or comment? Message us here! Get an inside look at how weekly threat-intel briefings really work in a mature security program. 🔍⚡ In this special episode, vCISO Jonathan Kimmitt breaks down how raw intel turns into real risk decisions, what trends are hitting organizations right now, and how SOC teams can brief leadership in a way th…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~ In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and techni…
…
continue reading
1
CCT 311: Practice CISSP Questions and AI In The SOC (Domain 3)
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Send us a text Ready to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI’s role: where detection engineering benefits from crisp use cases, …
…
continue reading
1
End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025, and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, t…
…
continue reading
1
CCT 310: Wi-Fi Hopping And Database Defense - CISSP Training
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57Send us a text A neighboring Wi‑Fi, a handful of stolen credentials, and a quiet leap into a high‑value network—the kind of pivot that sounds cinematic until you realize how practical it is. We unpack that playbook and turn it into concrete defenses you can deploy across your environment, from client endpoints and browsers to databases, servers, an…
…
continue reading
1
2025 Predictions: Hits, Misses & What We Learned
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a mixed bag. Additionally, we share insights from past guests, celebrate milestones, and make bold new predictions for …
…
continue reading
1
2025 Predictions: Hits, Misses & What We Learned
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year's forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a mixed bag. Additionally, we share insights from past guests, celebrate milestones, and make bold new predictions for …
…
continue reading
1
CCT 309: Practice CISSP Questions and React-To-Shell (Domain 7.6)
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35Send us a text One unauthenticated request should not be all it takes to compromise your app—but with React-To-Shell, that’s the reality many teams are facing. We unpack what this vulnerability hits across React server components and Next.js app router setups, why default configs can be enough to fall, and how active threat actors are already abusi…
…
continue reading
1
🎄 Holiday Season Security: Preparing Your SOC for the Festive Chaos
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Got a question or comment? Message us here! This week’s SOC Brief dives into why the holidays are prime time for cyberattacks 🎄 from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to st…
…
continue reading
Got a question or comment? Message us here! 🎉🎙️ EPISODE 100 IS LIVE! We’re celebrating 100 episodes of the Secure AF Podcast! This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldn’t be here witho…
…
continue reading
1
CCT 308: Scripted Sparrow BEC and CISSP Incident Response - Domain 7.6
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54Send us a text A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approv…
…
continue reading
1
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions ab…
…
continue reading
1
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions ab…
…
continue reading
1
CVCISO Podcast Ep. 77 Featuring Brian Gibbs and Academy's Launching of the CvCISO Level 3 Courses
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Takeaways Every organization needs information security leadership. Level 3 courses are designed for complex environments. Communication is key for effective risk management. Understanding budgeting is crucial for cybersecurity professionals. Complexity in environments can lead to security vulnerabilities. The role of a VCISO is to provide leadersh…
…
continue reading
1
How to Stop Falling for Fake Cyber Threat Exposure Management (CTEM) Claims
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34Every vendor in exposure management now says they do CTEM. Nick Lanta's response: "You don't even know what you're talking about." This episode with Nick Lantuh (CyberProof) and Amy Chaney (Citibank) breaks down how a methodology became a meaningless marketing term and how buyers can fight back. The reality check: CTEM requires connecting vuln scan…
…
continue reading
1
CCT 307: Practice CISSP Questions - Security Policies and Procedures
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines say the talent shortage is easing, yet nearly half of UK busine…
…
continue reading
**The vCISO In The Green Glass Corner Office Podcast has been re-branded to The Blak Cyber Podcast presents The CISSP Dojo Series** 🎧 The Blak Cyber Podcast presents The CISSP Dojo SeriesThe podcast where we talk about the practical/real-world application of the CISSP CBK.📜 Episode SummaryIn this episode, we go over the "ISC2 Code of Ethics."📚 Oper…
…
continue reading
***The vCISO In The Green Glass Corner Office Podcast has been re-branded to The Blak Cyber Podcast presents The CISSP Dojo Series*** 🎧 The Blak Cyber Podcastpresents The CISSP Dojo Series The podcast where we talk about the practical/real-worldapplication of the CISSP CBK. 📜 Episode Summary Kick-off episode.…
…
continue reading
1
Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16By John Verry
…
continue reading
1
The Reality of Stalking in a Digital Age 🕵️♂️⚠️
56:03
56:03
Play later
Play later
Lists
Like
Liked
56:03Got a question or comment? Message us here! This episode dives into one of the darkest issues cybersecurity intersects with: stalking. Kimmitt and Peters discuss real cases, modern cyberstalking tactics, privacy failures, the challenges of protective orders, and what victims can do to stay safe. If you've ever wondered how digital footprints turn i…
…
continue reading
1
S7E55 - Five Security Trends That Will Force Hard Conversations in 2026
33:23
33:23
Play later
Play later
Lists
Like
Liked
33:23In this special episode of The Virtual CISO Moment, Greg Schaffer shares five cybersecurity predictions for 2026 grounded in real-world patterns — not hype. From the tightening of SOC 2 audits and the rise of “vibe coding” risks, to a coming shakeout in the vCISO market, influencer-driven security shaming, and the growing dangers of contractor misc…
…
continue reading
1
Simplifying ISO Standards: Insights and Best Practices | Interview with Jim Moran
58:01
58:01
Play later
Play later
Lists
Like
Liked
58:01In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Jim Moran, founder of SimplifyISO, to discuss the importance and methods of simplifying ISO management systems. Jim, with over 30 years of consulting experience, shares valuable insights on how overly complex management systems can hinder employee unders…
…
continue reading
1
CCT 306: CISSP Domain 1.5: Understanding Legal, Regulatory, and Compliance Requirements
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when cybersecurity meets the engine room of the business? We…
…
continue reading
1
CVCISO Podcast Episode 76 How to Avoid Scams, Fraud, and Criminals This Christmas
58:19
58:19
Play later
Play later
Lists
Like
Liked
58:19Summary This podcast episode discusses essential cybersecurity tips for the holiday season, emphasizing the importance of situational awareness, identifying scams, and protecting personal information. The hosts share insights on how to navigate online shopping safely, the risks associated with social media sharing, and the significance of educating…
…
continue reading
1
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressiv…
…
continue reading
1
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton's latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressiv…
…
continue reading
1
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~ In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world’s first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats. For decades, safes…
…
continue reading
1
CCT 305: Practice CISSP Questions - Chrome Zero Days And Domain Eight Deep Dive
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines about eight Chrome zero days aren’t just noise—they’re a prompt…
…
continue reading
1
⚠️ React2Shell Zero-Day ⚠️: Chinese Hackers Strike Within Hours
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Got a question or comment? Message us here! A new zero-day is already under active exploitation. This week’s SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do now to reduce exposure and stay ahead of fast-moving threats. 🔐🚨 Support the show Watch full …
…
continue reading
1
Tis the Season for Cybercrime: How Hackers Target Holidays 🎄
35:41
35:41
Play later
Play later
Lists
Like
Liked
35:41Got a question or comment? Message us here! In this #SecureAF episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the #1 thing every organization should do before stepping away for the season. If you’ve ever wondered why cyber incidents always seem to hit when everyone is off work, this …
…
continue reading
1
S7E54 - Cutting Through the AI Hype: Practical Security with Logan Edmonds
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59In this episode of The Virtual CISO Moment, Greg Schaffer sits down with Logan Edmonds, Chief AI Officer at ScaleSight and founder of TTS Cyber, for a lively and insightful discussion on the intersection of AI, cybersecurity, and small to mid-sized business operations. Logan shares his unique journey from studying theology to becoming an AI-driven …
…
continue reading
1
CCT 304: Software Development Security (CISSP Domain 8)
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single malicious insider flipped Disney menus to Wingdings and tampered…
…
continue reading
1
Seeing Is Not Believing: How to Spot AI-Generated Video
17:10
17:10
Play later
Play later
Lists
Like
Liked
17:10In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google’s Nano Banana, making it harder to separate reality from fiction. To…
…
continue reading