Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
SC Media and Axonius are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
SC Media and Axonius are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading
Mergers and acquisitions are complex processes often driven by financial, operational, and positioning goals. However, critical cybersecurity risks, stemming from overlooked areas like integrating divergent security cultures, unknown user practices, and complex data separation, frequently go undiscussed during negotiations. This neglected perspecti…
…
continue reading
From the ISACA Middle Tennessee conference, March 2025. Dan Houser is a vCISO; 2024 Chair of the Board, ISC2; advisory strategist board member, NACD Certified Director, and more. He enables the business to take on more risk, safely, to acquire new markets, open new countries of operation and make connections that were impossible before. He helps or…
…
continue reading

1
Breaking Into Cybersecurity and Future Trends with Henrik Parkkinen
35:21
35:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:21In this episode of Life of a CISO, Dr. Eric Cole interviews Hendrik Parkkinen, a seasoned cybersecurity expert from Sweden with over 20 years of experience, mostly in consulting and security strategy. They discuss Henrik’s journey into cybersecurity, emphasizing how passion and curiosity play a crucial role in succeeding in the field. Henrik shares…
…
continue reading

1
Live from CISO XC DFW: Unfiltered Lessons in Modern Cybersecurity
21:29
21:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:29Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
…
continue reading

1
Bridging the Gap: Collaboration Between Legal and Cyber with Carly Duvall Le Riche | The GC+CISO Connection Show
34:36
34:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:36In this episode of The GC+CISO Connection Show, host Shawn Tuma sits down with Carly Duvall Le Riche, General Counsel for Cariloop, to discuss the critical intersection of legal and cybersecurity in today’s business landscape. With experience spanning technology, privacy, and risk management, Carly shares her unique perspective on how legal and cyb…
…
continue reading

1
SPECIAL: Don Eijndhoven over solliciteren als CISO en meer
53:18
53:18
나중에 재생
나중에 재생
리스트
좋아요
좋아요
53:18In deze allereerste special van CISO praat verwelkom ik een speciale gast: Don Eijndhoven. Ervaren CISO en oprichter van de Dutch Cyberwarfare Community. Ik praat met hem over solliciteren, over de (on)zin van assessments en we delen over en weer "war-stories" van dingen die we hebben meegemaakt. Een feest der herkenning voor anderen denk ik zo. En…
…
continue reading
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Tim Jacobs, vp, CISO, Commonwealth Care Alliance. In this episode: Starting from zero Prepare for decisive decisions Working back from unacceptable Disco…
…
continue reading
In this episode of CISO Tradecraft, host G Mark Hardy delves into the emerging concept of Model Context Protocol (MCP) and its significance in AI and enterprise security. Launched by Anthropic in November 2024, MCP is designed to standardize how AI systems interact with external data sources and applications. Hardy explores how MCP differs from tra…
…
continue reading
In this episode of The New CISO, host Steve Moore speaks with Ben, Director of Group Security and Architecture at Bilfinger, about the role of self-awareness, confidence, and communication in effective cybersecurity leadership. Ben shares his unconventional path to becoming a CISO, how he applies the “done is better than perfect” philosophy, and wh…
…
continue reading

1
Mapping the Modern Attack Surface: Fintech’s Evolving Risk Frontier - Erika Dean - CSP #212
30:47
30:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:47In this episode, Erika Dean dives into the evolution of attack surface management (ASM) in financial tech. From foundational strategies to future-focused threats, she explores how shifts in the fintech landscape demand deeper organizational awareness, ongoing tabletop exercises, and proactive preparation. This segment is sponsored by Axonius. Visit…
…
continue reading
A tabletop exercise is a discussion-based simulation designed to help teams determine how to respond to a crisis. These exercises provide a safe environment to test and refine an organization's incident response plan and identify weaknesses in processes. By engaging key personnel in simulated scenarios, tabletop exercises allow for practicing decis…
…
continue reading

1
Mitigating Evolving Cyber Threats: The Power of Preparedness and Continuous Management
18:44
18:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:44Evolving cyber threats are a significant business risk that boards and executives must oversee, moving beyond simply protecting systems to building resilience. This episode explores how a focus on preparedness, including robust incident response plans and regular testing, combined with continuous management like ongoing monitoring and adapting stra…
…
continue reading

1
Cybersecurity Posture: Methodologies, Mindsets, and Maturity
17:42
17:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:42This episode delves into the essential methodologies and services organizations use to assess their cybersecurity posture. We explore techniques like Enterprise Risk Assessments, Threat Analysis, Vulnerability Management and Assessment, and Penetration Testing. Learn how understanding attacker tactics and human behavior through methods like Social …
…
continue reading
Security practitioners and small and midsized business owners often do not pay necessary attention to the legal aspects of security and privacy. Thomas Ritter is an attorney and co-owner at Ritter Gallagher, a data privacy and cybersecurity law firm. Ritter Gallagher provides clients of all sizes with governance, risk management and compliance solu…
…
continue reading

1
Securing the AI Frontier: Unmasking LLM and RAG Vulnerabilities
15:17
15:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
15:17Large language models present new security challenges, especially when they leverage external data sources through Retrieval Augmented Generation (RAG) architectures . This podcast explores the unique attack techniques that exploit these systems, including indirect prompt injection and RAG poisoning. We delve into how offensive testing methods like…
…
continue reading
Deze column is oorspronkelijk verschenen op het platform Security Innovation Stories: https://www.securityinnovationstories.com/microsoft-trekt-de-stekker-uit-het-icc-maar-niemand-weet-wie-op-de-knop-drukte-of-waarom/
…
continue reading

1
Cyber Resilience in Finance: Planning, Responding, and Recovering
12:54
12:54
나중에 재생
나중에 재생
리스트
좋아요
좋아요
12:54The financial sector is a frequent target for cyberattacks, facing a staggering rise in cases and significant costs from data breaches. Preparing for these threats requires understanding ransomware-as-a-service (RaaS), phishing, and other malicious activities, as well as implementing robust cybersecurity programs and incident response plans. This e…
…
continue reading
The 2025 Worldwide Threat Assessment by the Defense Intelligence Agency describes a rapidly changing global security environment where national security threats are expanding, fueled by advanced technology. It identifies key regional security flashpoints, including threats to the U.S. Homeland and Southern Border, China's assertiveness in the Indo-…
…
continue reading

1
The Great Digital Crackdown of 2025: Inside the Global Fight Against Cybercrime
15:56
15:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
15:562025 saw unprecedented international law enforcement efforts shatter major cybercrime networks like the LummaC2 infostealer, the Cracked and Nulled forums, the 8Base ransomware gang, and the Zservers bulletproof hosting service. These coordinated operations, involving over 20 nations and resulting in thousands of server seizures, disrupted criminal…
…
continue reading

1
Navigating the AI Compliance Maze: Building Trustworthy Systems in a Regulated World
18:20
18:20
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:20Artificial intelligence is rapidly transforming industries, but its increasing power necessitates robust governance and compliance. This episode delves into the evolving global regulatory landscape, exploring key frameworks like the EU AI Act and the NIST AI Risk Management Framework that aim to ensure AI systems are safe, transparent, and accounta…
…
continue reading

1
The CISO Role Is Changing—Are You Ready to Lead? (at CISO XC ATX)
21:40
21:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:40Sponsor: Infoblox (www.infoblox.com) 🎙 EP66: Building CISO Community – Live from CISO XC Austin (Presented by Infoblox) The Professional CISO Show with David Malicoat From DFW to Austin and beyond, the CISO XC community is expanding—fueled by genuine connection, trust, and shared purpose. In this live episode from CISO XC ATX, David Malicoat sits d…
…
continue reading
In this new episode of Life of a CISO, Dr. Eric Cole opens with one of his most powerful guiding principles: “Let data drive decisions, not emotions.” Drawing from his experiences traveling and meeting with top executives, he emphasizes the importance of making decisions based on reliable data rather than emotional impulses. He challenges listeners…
…
continue reading

1
AI & The SOC Analyst: From Alert Fatigue to Augmentation
13:51
13:51
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:51Discover how Artificial Intelligence is reshaping the demanding world of the Security Operations Center, moving beyond the overwhelming volume of alerts and analyst burnout that plague traditional SOCs. We explore how AI automates routine tasks, enhances threat detection, and accelerates incident response, freeing up human analysts for higher-value…
…
continue reading

1
Cloud Threat Deep Dive: Learning Resilience from Real-World Breaches
14:34
14:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:34Explore the latest cloud security landscape by analyzing recent real-world breach cases from the CSA Top Threats Deep Dive. We dive into the technical details, business impacts, and contributing factors like misconfigurations, inadequate identity management, and supply chain weaknesses. Gain crucial insights and actionable takeaways to enhance your…
…
continue reading

1
Joe Sullivan, Bug Bounties & CISO Liability: The Legal View with Aravind Swaminathan
1:26:11
1:26:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:26:11Sponsor: Magic Mirror Security (www.magicmirrorsecurity.com/thpc) 🎙 When the Lawyers Come for CISOs — Aravind Swaminathan on Risk, Responsibility & the Law Guest: Aravind Swaminathan, Global Co-Chair, Cybersecurity & Data Privacy, Orrick Episode Summary CISOs have always managed risk — but are they ready to manage legal exposure? In this gripping e…
…
continue reading

1
The Weakest Link: Navigating the Perilous Digital Supply Chain
16:53
16:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:53In today's interconnected world, supply chains are increasingly vulnerable to sophisticated cyberattacks. This episode explores the primary threats impacting these vital networks, from exploiting trust relationships with third-party vendors to the dangers of malware and compromised software. We'll discuss the pervasive threat of ransomware attacks,…
…
continue reading
For our milestone 200th conversation, Caleb Mattingly joins us. He is the founder of Secure Cloud Innovations. He is a a cybersecurity professional with a passion for solving complex challenges and building innovative solutions that empower organizations to stay secure in an ever-evolving digital landscape. With a deep understanding of security fra…
…
continue reading

1
Why Learn Security Fundamentals When We Could Just Chase Our Tails?
34:01
34:01
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:01All links and images for this episode can be found on CISO Series. I host this week’s episode, David Spark (@dspark), producer of CISO Series and Jesse Whaley, CISO, Amtrak. Joining them is their guest Vaughn Hazen, CISO, CN. In this episode: The classics endure The rules of the rail "Prove It. With data." It's all just software A huge thanks to ou…
…
continue reading
Web 3.0 Explained: Business Cases, Security, and Future Prospects | CISO Tradecraft In this episode of CISO Tradecraft, host G Mark Hardy welcomes special guest Aaron Markell to discuss the intricacies of Web 3.0. They explore the evolution from Web 1.0 and Web 2.0 to the decentralized structure of Web 3.0, describing its application in various ind…
…
continue reading

1
Bridging the Gap: Translating Cyber Risk for the Boardroom
13:37
13:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:37Welcome to "Bridging the Gap: Translating Cyber Risk for the Boardroom." In today's complex digital landscape, Chief Information Security Officers (CISOs) face the crucial challenge of communicating intricate technical risks in a way that resonates with executive leaders and board members. This podcast explores how CISOs can effectively translate t…
…
continue reading

1
THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI
27:11
27:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:11Sponsor: Netskope (www.netskope.com) On Location at CISO XC ATX: www.cisoxc.com THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI In this special episode recorded live at CISO XC’s inaugural Austin event, host David Malicoat brings you ground-level conversations with leaders shaping modern cybersecurity—from national defense t…
…
continue reading

1
The Resilient CISO: Navigating Stress and Sustaining Security Leadership
12:47
12:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
12:47The role of the Chief Information Security Officer (CISO) is more critical and demanding than ever, placing leaders in a persistent high-stress environment. This podcast delves into the unique pressures faced by CISOs and cybersecurity professionals, including the immense responsibility and potential for blame, resource constraints, excessive workl…
…
continue reading

1
Converging Worlds: Securing IoT, OT, and Critical Infrastructure
27:32
27:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:32The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vulnerabilities and expands the attack surface for cyb…
…
continue reading

1
Zero Trust for Critical Infrastructure: Securing the OT/ICS Backbone
35:28
35:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:28Delve into the essential and intricate application of Zero Trust (ZT) principles within Operational Technology (OT) and Industrial Control Systems (ICS) environments. This episode explores the unique challenges of securing critical infrastructure, where safety, reliability, and availability are primary objectives, and legacy systems, unique protoco…
…
continue reading

1
Cyber Resilience Through Bundling: The Regulatory Challenge
17:53
17:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:53Explore the emerging practice of bundling cyber insurance with security products and services, a strategy aimed at enhancing cyber resilience by incentivizing policyholders to adopt proactive security measures from the outset. This episode delves into the potential benefits, such as encouraging better cyber hygiene, aligning the long-term goals of …
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole shines a spotlight on a critical blind spot that many Chief Information Security Officers overlook: legal liability. While CISOs are often highly skilled and technically knowledgeable, it’s what they don’t know—particularly about their legal exposure—that can put them at serious risk. Dr. Cole explai…
…
continue reading
From the ISACA Middle Tennessee conference March 2025. Darin McCloy is the VP Security and Compliance, CISO at PolicyCo. He is also the Cyber Security, Compliance, and Risk Adviser at Clarity Cyber Assurance, providing Cyber Security and Compliance consultation for clients in a wide range of industry verticals. He helps businesses and government ad…
…
continue reading

1
Column: 95,6% van de security professionals vond deze column de beste column ooit
4:13
4:13
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:13Deze column is oorspronkelijk verschenen op de website van Security Innovation Stories:
…
continue reading

1
Beyond the URL: Decoding Domain Intelligence Threats in 2024
14:40
14:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:40In the ever-evolving digital landscape, security teams face the immense challenge of evaluating over a hundred million newly observed domains registered each year. This episode dives into how analytical methods are providing crucial insights into domain intelligence threats. We explore techniques like domain attribute analysis to identify patterns …
…
continue reading

1
US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork
45:55
45:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
45:55Explore the complex and rapidly evolving landscape of US state data privacy laws, drawing on insights from recent legislative developments across states like California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Tennessee, and Texas, plus Washington's focused health data act. We b…
…
continue reading
Josh Graves is the Director of Business Development at Foojee. Foojee creates solutions for their clients that improve productivity, combining passion for Apple products with love of training others in order to improve businesses using Macs, iPhones, and iPads. Join our discussion as we discuss the security of Apple products and whether I should ch…
…
continue reading

1
I’m Not Looking Down at You, I’m Looking Down at What You’re Doing
41:40
41:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:40All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is our sponsored guest, Saket Modi, co-founder and CEO, SAFE Security. In this episode: Elevating AI to table stakes Security for the real …
…
continue reading

1
Beyond Encryption: Ransomware's New Game & Top Exploits of 2024
18:22
18:22
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:22Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major groups following takedowns like LockBit, Dharma, …
…
continue reading

1
Mapping the Modern Attack Surface: Fintech’s Evolving Risk Frontier - Erika Dean - CSP #212
30:47
30:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:47In this episode, Erika Dean dives into the evolution of attack surface management (ASM) in financial tech. From foundational strategies to future-focused threats, she explores how shifts in the fintech landscape demand deeper organizational awareness, ongoing tabletop exercises, and proactive preparation. This segment is sponsored by Axonius. Visit…
…
continue reading

1
#232 - Inside The 2025 Verizon Data Breach Investigations Report
26:25
26:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:25Join G Mark Hardy, host of CISO Tradecraft, as he breaks down the latest insights from the 2025 Verizon Data Breach Investigations Report (DBIR). In this episode, discover the top 10 takeaways for cybersecurity leaders including the surge in third-party breaches, the persistence of ransomware, and the human factors in security incidents. Learn acti…
…
continue reading

1
"Data Is the Hot Potato”: CISO XC Austin Gets Real on AI & Governance
26:10
26:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:10Sponsor: Infoblox (www.infoblox.com) 🎙 The Professional CISO Show – Episode 63 Live from CISO XC Austin: Real Talk on AI, Data Governance & CISO Careers Sponsored by Infoblox 🎧 Episode Summary In this dynamic episode recorded live at CISO XC Austin, host David Malicoat sits down with cybersecurity thought leader and attorney Shawn Tuma, and former …
…
continue reading

1
The Accelerating Threat Landscape: Inside Modern Cybercrime
15:39
15:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
15:39Delve into the complex and rapidly transforming world of cyber threats. This episode examines notorious ransomware groups like Black Basta, LockBit, BlackCat/ALPHV, Phobos/8Base, Medusa, and Clop, exploring their Ransomware-as-a-Service (RaaS) models and distinctive tactics, techniques, and procedures (TTPs). We also discuss state-sponsored cyber w…
…
continue reading

1
Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge
10:34
10:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
10:34In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the growing sophistication of financial cyberattacks, hi…
…
continue reading

1
The Accelerating Adversary: Inside the 2025 Threat Landscape
13:52
13:52
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:52Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the surge in automated reconnaissance, the evolving da…
…
continue reading

1
2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
42:13
42:13
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:13This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
…
continue reading