The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
VCISO Podcasts
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 278 ~ Watch Now ~
53:06
53:06
Play later
Play later
Lists
Like
Liked
53:06In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership. From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead. 🔥 What We’ll Cover: 1️⃣ AI-Driven Threats & Deepfakes – How attackers are using AI to …
…
continue reading
1
Mastering Integrated ISO Management Systems | Interview with Jim Moran
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29In this episode of Secure and Simple Podcast, hosted by Dejan Kosutic, we are joined by Jim Moran, founder of Simplify ISO and member of the ISO Committee 280. With over 30 years of experience in consulting and various ISO standards, Jim shares his insights on the High-level Structure (HLS) of ISO management standards and the integration of various…
…
continue reading
1
CCT 294: Config Management Essentials - CISSP Domain 7
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Send us a text A single Windows shortcut can open the door to espionage—and that’s exactly where we begin. We break down a fresh LNK exploit campaign to show how hidden command execution and DLL sideloading slip past busy teams, then pivot into the core defense most organizations underuse: disciplined configuration management. From baselines and ve…
…
continue reading
1
CvCISO Podcast Episode 71 Happy Halloween with Jo Moldenhauer
1:04:10
1:04:10
Play later
Play later
Lists
Like
Liked
1:04:10Summary In this episode of the CVC So Podcast, host Andy welcomes a diverse group of cybersecurity professionals, including Joe Moldenhauer, who shares her inspiring journey from the casino industry to becoming a cybersecurity analyst. The conversation emphasizes the importance of community, support, and purpose in the cybersecurity field, as well …
…
continue reading
1
Choose Competence, Not Cheap: Smart Vendor Selection for Leaders
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14On this episode of Breakfast Bytes, Felicia King tells the story of how simple, everyday choices—like a tax method or an internet contract—become high-stakes business decisions. Through vivid examples about mileage rates, S‑corp elections, and a seven‑year ISP contract that could cost tens of thousands, she reveals how knowledge turns ambiguity int…
…
continue reading
Send us a text Quantum threats aren’t waiting politely on the horizon, and neither should we. We kick off with Signal’s bold move to deploy post-quantum encryption, unpacking the “belt and suspenders” approach that blends classical cryptography with quantum-resistant algorithms. No jargon traps—just clear takeaways on why this matters for privacy, …
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
Patrick Rost, owner and advisor at InfoSecurity Blueprint, joins Greg Schaffer to discuss his journey from a technology enthusiast to an information security entrepreneur. Patrick shares insights on helping small and midsized businesses take their first steps toward better security—emphasizing that information security is about managing business ri…
…
continue reading
1
CCT 292: Analyze Test Output and Generate Reports (Domain 6.4)
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Send us a text One DNS bug shouldn’t take your business offline—but it did for thousands. We open with the AWS East outage to show how a single point of failure in DNS can cascade through critical systems, then get tactical about building resilience that actually holds up under stress. From multi‑region architecture and failover planning to budget …
…
continue reading
1
CCT 291: CISSP Rapid Review Exam Prep (Domain 7) - Part #2
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48Send us a text You can harden your network and still miss the front door: aging edge devices with elevated access, thin logging, and long‑ignored firmware. We dig into the uncomfortable truth behind “set it and forget it” firewalls, VPNs, and gateways, then lay out a practical Domain 7 playbook that helps you detect faster, respond cleaner, and rec…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
S7E48 - A Conversation with Walter Haydock
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Walter Haydock, founder of StackAware, joins Greg Schaffer to discuss how AI-powered companies can manage cybersecurity, privacy, and compliance risks using the ISO 42001 AI governance framework. Learn why AI literacy matters, what organizations can learn from Amazon’s AI missteps, and how to make smarter risk decisions in the age of generative AI.…
…
continue reading
1
CCT 290: CISSP Rapid Review Exam Prep (Domain 7) - Part #1
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Send us a text Headlines about a massive F5 Big-IP exposure aren’t noise—they’re a masterclass in why Security Operations must be disciplined, fast, and auditable. We open with what the F5 situation means for enterprise risk, patch urgency, and long-term persistence threats, then shift into a practical, exam-ready walkthrough of CISSP Domain 7. The…
…
continue reading
1
Reverse Engineering, AI, and the Economics of Malware with Danny Quist| DailyCyber 277 ~Watch Now ~
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22AI, Reverse Engineering & the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Danny Quist, Chief Technology Officer at PolySwarm, to unpack the intersection of AI, reverse engineering, and cybersecurity economics. Danny brings nearly two decades of experience leading research and anal…
…
continue reading
1
CCT 289: Practice CISSP Questions - Role Based, Mandatory, Discretionary and ABAC (Domain 5)
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25Send us a text Quantum isn’t a distant sci‑fi threat—it's shaping security decisions right now. We open with what NIST’s new post‑quantum FIPS 203/204/205 actually mean for your crypto roadmap, why “harvest now, decrypt later” raises the stakes for long‑lived data, and how the 2035 federal mandate will ripple through contractors, audits, and CMMC. …
…
continue reading
1
CvCISO Podcast Episode 69 James Keltgen and Live Testing of Your IR Plan
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17Takeaways Incident response plans are essential for effective cybersecurity management. Situational awareness is crucial for identifying potential threats. Communication during an incident is key to effective management. Training new employees quickly can reduce vulnerabilities. Creating a positive culture around cybersecurity encourages reporting …
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
S7E47 - A Conversation with Students
1:44:14
1:44:14
Play later
Play later
Lists
Like
Liked
1:44:14Recently The Virtual CISO Moment podcast host Greg Schaffer was asked to participate in a question and answer session with students at Minnesota State University who are using his book Information Security for Small and Midsized Businesses as part of their studies. In this special and extended episode, a recoding of that conversation, they talk abo…
…
continue reading
1
CCT 288: CISSP Rapid Review Exam Prep (Domain 6)
50:27
50:27
Play later
Play later
Lists
Like
Liked
50:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv https://www.jeffersonfisher.com/ A spike in ransomware on the factory flo…
…
continue reading
1
CISO Roles, Talent Crisis & AI Tools with Michael Reichstein | DailyCyber 276 ~ Watch Now ~
1:03:31
1:03:31
Play later
Play later
Lists
Like
Liked
1:03:31CISO Roles, Talent Crisis & AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Michael Reichstein, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and …
…
continue reading
1
CCT 287: Practice CISSP Questions - Deep Dive (Domain 5)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Send us a text Leadership churn is reshaping security from the top down. We open the door on why CISO tenures are shrinking to 18–26 months and what that says about pressure, culture, compensation, and board-level risk literacy. From startups that stretch leaders thin to enterprises that treat security as a cost center until the breach, we map the …
…
continue reading
1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading
1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading
1
S7E46 - A Conversation with Andrew Staton
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26
…
continue reading
1
Volunteer Work in Cybersecurity Nonprofits | Interview with Aruneesh Salhotra
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04By Dejan Kosutic
…
continue reading
1
CCT 286: Access Controls - Role Based, Rule Based and Many More Controls (Domain 5.4)
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A headline‑grabbing data leak is the wake‑up call; what you do next is th…
…
continue reading
1
CvCISO Podcast Episode 68 The Password That Shut Down a 158-Year-Old Business
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:16In this episode, the hosts discuss the cyber attack on Knights of Old, a 158-year-old logistics company that was shut down due to a ransomware attack. They explore the preventable nature of the incident, the lessons learned, and the role of Virtual Chief Information Security Officers (VCSOs) in advising clients on cybersecurity best practices. The …
…
continue reading
1
The Truth About Cybersecurity Careers: Why Certifications and Degrees Aren't Enough
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58On this episode of Breakfast Bytes, Felicia King addresses the challenges and misconceptions surrounding careers in information technology and cybersecurity. Drawing on decades of experience interviewing hundreds of candidates, Felicia dispels common myths about what it takes to become employable in IT. Key Themes: Myth-Busting: Many believe that d…
…
continue reading
1
CCT 285: Practice CISSP Questions - Evaluate and Apply Security Governance Principles (Domain 1.3)
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies o…
…
continue reading
1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading
1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading
In this episode of The Virtual CISO Moment, Greg Schaffer welcomes Brad Mathis, Senior Information Security Consultant at Keller Schroeder, for a wide-ranging discussion that spans four decades in technology and cybersecurity. From his early days repairing computers and catching his first virus, to leading security teams and serving as a virtual CI…
…
continue reading
1
CCT 284: Evaluate and Apply Security Governance Principles (Domain 1.3)
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security governance represents one of the most misunderstood yet critical…
…
continue reading
1
CvCISO Podcast Episode 67 Mental Health & Stress Resources for vCISOs
47:01
47:01
Play later
Play later
Lists
Like
Liked
47:01Summary In this episode, the hosts discuss the anxiety that VCSOs face in their roles, exploring coping mechanisms, the importance of transparency, and how to handle mistakes. They delve into the phenomenon of the Sunday blues, share personal experiences, and emphasize the value of community support and learning from scenarios. The conversation hig…
…
continue reading
1
CCT 283: Practice CISSP Questions - Security Controls for Developers (Domain 8.3)
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Send us a text Dive into the critical world of software development security with Sean Gerber as he tackles Domain 8.3 in this knowledge-packed CISSP Question Thursday episode. We examine fifteen challenging questions that address the security controls essential for protecting code throughout the development lifecycle. Discover why static applicati…
…
continue reading
1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading
1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading