Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
SC Media and Sophos are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading

1
Classroom to Boardroom: How Teaching Makes Leaders Better
51:46
51:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
51:46In this episode of The New CISO, host Steve Moore talks with Nithin Reddy, Global VP of Cybersecurity at Dayforce, about how his dual roles in cybersecurity leadership and education shape his approach to building stronger, smarter teams. Nithin reveals how teaching cybersecurity not only amplifies his impact but also sharpens his communication and …
…
continue reading

1
The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
14:26
14:26
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:26This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs)…
…
continue reading
In this powerful episode of Life of a CISO, Dr. Eric Cole opens by highlighting a key success principle: even the world’s top performers — whether in sports, business, or entertainment — rely on coaches to help them spot their blind spots. Drawing from his deep experience coaching CISOs, Dr. Cole shares that cybersecurity leaders are no different. …
…
continue reading

1
AI, Risk, and Reality: The CISO’s Guide to What’s Coming Next
23:11
23:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:11Sponsor: Netskope (www.netskope.com) EP62 | Building Real Cybersecurity Communities + AI Clarity with Dr. Anand Singh (Live from CISO XC ATX) Sponsored by Netskope What happens when a CISO-led community takes root in a new city — and how do you cut through the noise around AI in cybersecurity? In this special episode recorded live from the inaugura…
…
continue reading
The views and opinions of the speaker do not represent the views and opinions of the FDIC. From ISACA Middle Tennessee Conference March 2025. Linda Finck was hired by the FDIC in December 1989 and currently serves as a Senior IT Examiner in the FDIC Dallas Region. She has: - 30+ years experience in the financial services industry (working for a nat…
…
continue reading

1
Ep 150: Is OSCAL the Future of Security Documentation (& FedRAMP)?
46:47
46:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:47In this episode of the Virtual CISO Podcast, John Verry speaks with Kenny Scott, founder and CEO of Paramify, about the challenges of cyber risk management and the potential of OSCAL (Open Security Controls Assessment Language) in simplifying compliance and documentation processes. They discuss the importance of structured digital communication in …
…
continue reading

1
Get ALL the Challenges of Cybersecurity AND Fewer Resources
40:22
40:22
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:22All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Charles Blauner, formerly of Team8 (at time of recording) and now operating partner, Crosspoint Capital. In this episode: Expanding collective defense Getting tal…
…
continue reading

1
#230 - How To Make Your AI Less Chatty (with Sounil Yu)
44:46
44:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
44:46In this episode of CISO Tradecraft, host G Mark Hardy and guest Sounil Yu delve into the dual-edged sword of implementing Microsoft 365 Copilot in enterprises. While this productivity tool has transformative potential, it introduces significant oversharing risks that can be mitigated with the right strategies. Discover how Sounil and his team at Kn…
…
continue reading

1
Column: Soevereine cloud; de 'vegan kipfilet' van de digitale wereld
4:30
4:30
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:30Deze column is verschenen op de website van Security Innovation Stories: https://www.securityinnovationstories.com/soevereine-cloud-de-vegan-kipfilet-van-de-digitale-wereld/
…
continue reading

1
Maximizing Cyber Liability Insurance: Risk, Relationships & Renewal Strategies - Mandy Andress - CSP #211
33:42
33:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:42Mandy Andress joins our show to discuss leveraging cyber liability insurance for risk reduction. They explore the importance of strong broker relationships and key steps for selecting or renewing a policy—starting with assessing organizational needs. Learn strategies to lower premiums while increasing coverage. Segment Resources: https://www.elasti…
…
continue reading

1
GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
13:16
13:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:16Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the…
…
continue reading
David Kim (DK) is a trusted advisor as an AI, GRC, cybersecurity, and PCI DSS consultant and currently sits on Technical Advisory Boards, Governance Boards. He has centered his entire career around IT topics such as telecommunications, data networking, VoIP, unified communications, network management, information systems security, regulatory compli…
…
continue reading

1
Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor
12:11
12:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
12:11Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which was involved in 60% of breaches this year. We exp…
…
continue reading

1
The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
16:21
16:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:21Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meanin…
…
continue reading

1
Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
16:55
16:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:55Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
…
continue reading

1
Beyond the Blueprint: Learning Cyber Resilience Together
20:26
20:26
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:26Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
…
continue reading

1
EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
15:35
15:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
15:35Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
…
continue reading

1
The 2024 IC3 Report: Unpacking Record Cybercrime Losses
14:02
14:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:02Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole kicks off the 2025 CISO Survival Guide Series, diving deep into the evolving demands on security leaders in today’s fast-moving landscape. With shifting tides in government, corporate trends, and technology, Dr. Cole emphasizes the urgent need for CISOs to master AI governance and threat modeling—not…
…
continue reading

1
Don’t Chase Titles — Build These 3 Things Instead (CISO Advice) with Nathan Wright
40:37
40:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:37🎙️ The Professional CISO Show – Episode 61 Guest: Nathan Wright, CISO at Textron Host: David Malicoat Sponsor: Armis Check out the Armis 2025 Cyberwarfare Report: www.armis.com/cyberwarfare Visit Armis at RSAC, North Hall, Booth N-5457: www. armis.com/rsac2025 🎧 Episode Summary: In this episode of The Professional CISO Show, host David Malicoat sit…
…
continue reading

1
The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
23:37
23:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:37Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
…
continue reading
As featured in Top Cyber News Magazine's 2022 40 Under 40, Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from tech startups to Fortune 500 companies to the United States Department of Defense (DoD). Thomas is also a proud veteran of the United States Army where he served o…
…
continue reading

1
2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
21:31
21:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:31The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persist…
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading

1
#229 - Understanding the Critical Role of CVEs and CVSS
20:06
20:06
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:06In this episode of CISO Tradecraft, host G Mark Hardy delves into the crucial topic of Common Vulnerabilities and Exposures (CVE) and the Common Vulnerability Scoring System (CVSS). Learn about the history, structure, and significance of the CVE database, the recent funding crisis, and what it means for the future of cybersecurity. We also explore …
…
continue reading

1
Navigating Privacy Risks with the NIST Privacy Framework 1.1
16:59
16:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:59This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize…
…
continue reading

1
🔐 From DNS to AI: Insights from CISO XC Austin | The Professional CISO Show EP60 sponsored by Infoblox
35:07
35:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:07Guests: Ryan Rene Rosado & Chris Boykin | Sponsor: Infoblox (www.infoblox.com) Recorded live at CISO XC Austin In this special on-location episode of The Professional CISO Show, host David Malicoat brings you powerful conversations recorded at CISO XC in Austin, where cybersecurity leaders gathered to tackle today’s most pressing challenges—from ca…
…
continue reading
Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how ado…
…
continue reading

1
AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
21:17
21:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:17Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses…
…
continue reading

1
Quantum Leap Security: Navigating the Post-Quantum Cryptography Era
9:45
9:45
나중에 재생
나중에 재생
리스트
좋아요
좋아요
9:45We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sou…
…
continue reading
Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and…
…
continue reading
In the latest episode of Life of a CISO, Dr. Eric Cole kicks things off with an empowering reminder that it's the little things that often make the biggest difference. He challenges listeners to adopt a simple but powerful habit—repeat the affirmation “I am a world-class CISO” at least ten times a day. Why? Because repetition trains the mind to bel…
…
continue reading

1
Voices of CISO XC: Austin’s Cybersecurity Leaders Take the Mic sponsored by Netskope
19:02
19:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:02🎙️ Live from Austin: Conversations from the Inaugural CISO XC ATX | Sponsored by Netskope In this special event episode, The Professional CISO Show hits the road to Austin, Texas for the inaugural CISO XC ATX Conference, where community, innovation, and leadership take center stage. Host David Malicoat sits down with Rich McCrohan of Andromeda Secu…
…
continue reading
This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and …
…
continue reading

1
AI vs. the Expanding Attack Surface: Proactive Defense Strategies
18:07
18:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:07Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibility and how AI provides viable solutions for enhan…
…
continue reading
From the Middle Tennessee ISACA Conference March 19, 2025. Adam Malone is a Leadership Consultant at The Tenacious Operator, a Leadership Consultancy with a focus on developing teams, not solely individuals. He works with Professional Services firms like Accountants, Engineers & Lawyers, Regional Banks, other small to medium businesses. In addition…
…
continue reading

1
Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don’t Matter
40:53
40:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Mike D’Arezzo, executive director of infosec and GRC, Wellstar Health Systems. In this episode: The shift left myth Reconsidering CISO evaluations The power …
…
continue reading
Join host G Mark Hardy on CISO Tradecraft as he welcomes expert Scott Gicking to discuss the Center for Internet Security's (CIS) Controls Self-Assessment Tool (CSAT). Learn what CSAT is, how to effectively use it, and how it can enhance your career in cybersecurity. Stay tuned for insights on creating effective security frameworks, measuring matur…
…
continue reading
Welcome to Deep Dive, where we tackle complex topics head-on. In this episode, we delve into the fascinating and increasingly concerning world of deepfakes: AI-generated audio and visual content designed to deceive. We'll explore the technology behind deepfakes, from face-swapping to voice cloning the threats they pose to individuals, organizations…
…
continue reading
In a world increasingly shaped by digital interactions and artificial intelligence, online scams are becoming more sophisticated and pervasive. Scam Savvy delves into the tactics employed by fraudsters, from exploiting emotions in charity and romance scams to leveraging AI for deepfakes and personalized phishing attacks. We unmask these deceptive p…
…
continue reading

1
Coordinated Cyber Defense: Inside Vulnerability Disclosure Programs (VDP)
23:17
23:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:17This podcast dives into the critical world of vulnerability disclosure programs (VDPs), exploring how organizations and security researchers work together to identify and address security weaknesses. We'll examine the core principles that underpin effective VDPs, including establishing clear reporting channels and defined scopes, the importance of …
…
continue reading
Navigating the complex landscape of U.S. state data privacy laws can be challenging. Join us as we break down the key aspects of these regulations, including consumer rights, business obligations, data breach notification requirements, and enforcement trends. We'll explore the nuances of laws like the California Consumer Privacy Act (CCPA), the Vir…
…
continue reading
In this episode of The New CISO, host Steve Moore speaks with Rich Durost, Chief Information Security Officer at Froedtert ThedaCare Health, about his journey from West Point cadet to cybersecurity leader—and what slicing cake has to do with building effective security programs. Drawing from 23 years in the military and over 15 years in cybersecuri…
…
continue reading
Explore the exciting future of cryptocurrency payments through the lens of cybersecurity and privacy. We delve into the potential benefits and significant risks, offering insights into best practices and the crucial role of regulation in this evolving landscape. www.myprivacy.blog/navigating-the-crypto-landscape-an-in-depth-look-at-privacy-in-the-f…
…
continue reading
Joshua Crumbaugh joins us for a special Thursday edition of The Virtual CISO Moment. With over 20 years of experience in cybersecurity, he is the CEO of PhishFirewall, a company that helps organizations solve their phishing problem. He has a credential in Offensive Security and has published a book on cybersecurity education and awareness. Join us …
…
continue reading
In this powerful new episode of Life of a CISO, Dr. Eric Cole issues a wake-up call to everyone living in the digital age: we are in the middle of a cyber war, and most people are walking around completely unaware. He shares real-life stories of family and friends falling victim to text scams and phishing attacks, driving home the point that if the…
…
continue reading

1
Secure Digital Retail: Navigating Privacy and Compliance
16:23
16:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:23This podcast delves into the critical aspects of data privacy laws like GDPR and the Connecticut Data Privacy Law, alongside the essential Payment Card Industry Data Security Standard (PCI DSS) compliance for e-commerce success. We explore how retailers can craft clear privacy policies, manage user consent effectively, and implement stringent secur…
…
continue reading

1
Inside the DSPM Revolution: Data, Identity & the Future of Security w/ Mohit Tiwari and Anand Singh
45:39
45:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
45:39In this special Industry Series kickoff episode of The Professional CISO Show, host David Malicoat is joined by Mohit Tiwari (CEO & Co-Founder) and Anand Singh (Chief Security and Strategy Officer) of Symmetry Systems for a compelling conversation on the future of data security, the rise of DSPM (Data Security Posture Management), and the emerging …
…
continue reading
As a Principal in the DenSecure team at Wolf & Company, P.C., Sean Goodwin leads and executes cybersecurity projects for clients across various industries, including healthcare, financial services, and retail. He has over a decade of experience in cybersecurity and information security and holds several credentials, such as GSE #271, CISSP, CISA, G…
…
continue reading
Dive deep into the rapidly evolving landscape of AI-powered cyberattacks with insights from cutting-edge research, including the framework for evaluating AI cyber capabilities developed by Google DeepMind. Explore how AI is shifting the balance between offense and defense in cybersecurity, potentially lowering the cost and complexity of sophisticat…
…
continue reading