Podcasts about Chief information security officer

  • 735PODCASTS
  • 1,723EPISODES
  • 35mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 10, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Chief information security officer

Show all podcasts related to chief information security officer

Latest podcast episodes about Chief information security officer

AWS - Conversations with Leaders
Beyond Human Identity: AI Agents, Security Culture, and Defense

AWS - Conversations with Leaders

Play Episode Listen Later Mar 10, 2026 23:02


What does it mean to secure the world's largest hyperscale cloud, while AI rewrites the rules of identity, threat detection, and security culture? In this episode of AWS Executive Insights: Security Series, Clarke Rodgers sits down with Amy Herzog, Chief Information Security Officer at AWS, for a candid conversation on what it takes to lead security at scale in the age of AI.Amy draws on her experience leading consumer AI products to argue that security should accelerate innovation, not hinder it. She explores how AWS is deploying AI for defense, why agentic AI demands a rethink of identity, and how the Security Guardians program embeds security culture across the entire organization.

Jacobs: If/When
Resilience by Design: Safeguarding Water Utilities From Cyber Threats

Jacobs: If/When

Play Episode Listen Later Mar 6, 2026 19:31


According to Check Point Research and Reuters, cyberattacks on U.S. utilities in 2024 increased nearly 70% compared to the year before, leading to an average of 69 attacks every week. In 2025, the trend continued, in the U.S and globally. What can water utilities do to protect themselves from these digital threats?   The answer is a nuanced one, as the challenges extend beyond outdated software and ageing infrastructure. Most water utilities globally are undergoing rapid digital transformation to respond to higher demands from communities, councils and authorities. This has opened more opportunities for cyberthreats, driving more challenges for cybersecurity in Operational Technology (OT) environments. Unlike conventional Information Technology (IT) systems, OT systems directly control pumps, valves, and treatment processes. An attack on OT can have immediate, real-world consequences for water quality, safety and public health.   The OT environment at Hampton Roads Sanitation District (HRSD) is a success story as it protects one of the largest regional water and wastewater utilities in the U.S., servicing more than 20 counties and cities and 1.5 million people. Thanks to its signature program of embedded visibility, governance and consequence-driven planning, it can serve as a blueprint for water utilities globally.   Today we'll talk about how to apply this cybersecurity blueprint with Ben Stirling, Director, Cybersecurity & OT at Jacobs, and Roger Caslow, Chief Information Security Officer, Hampton Roads Sanitation District.

The Leadership Podcast by Niels Brabandt / NB Networks

What should a Chief Information Security Officer focus on during the first 100 days in the role? In this episode of the Leadership Podcast, Niels Brabandt interviews cybersecurity strategist and author JC Gaillard. Drawing on decades of experience in financial institutions and global organisations, JC Gaillard explains why the first hundred days of a CISO are critical for establishing long term cybersecurity impact. The discussion explores leadership, governance and execution in cybersecurity and introduces JC Gaillard's 666 framework for navigating the early months of a new CISO role. Topics include: • Why many CISOs struggle to create lasting impact • The cybersecurity spiral of failure in large organisations • The leadership nature of the modern CISO role • The 666 framework for the first 100 days • Moving beyond compliance towards real business value • Why execution is the central challenge of cybersecurity strategy This conversation between Niels Brabandt and JC Gaillard provides strategic insights for executives, board members and cybersecurity leaders responsible for protecting modern organisations. Guest: JC Gaillard Host: Niels Brabandt Contact Niels Brabandt: https://www.linkedin.com/in/nielsbrabandt/ Niels Brabandt's Leadership Letter: https://expert.nb-networks.com/ Niels Brabandt's Website: https://www.nb-networks.biz/ 

Cracking Cyber Security Podcast from TEISS
teissTalk: Why your security team is burned out and what to do about it

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Mar 5, 2026 46:59


Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burnout while increasing wellbeing and limiting turnover among security teamsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Johann van Duyn, Chief Information Security Officer, DO & COhttps://www.linkedin.com/in/johannvanduyn/Don Gibson, Chief Information Security Officerhttps://www.linkedin.com/in/don-gibson-cyber/Cavan Fabris, Partner - Head of Data & Cyber, RPChttps://www.linkedin.com/in/cavan-fabris/

Cybercrime Magazine Podcast
CISO Confidential. AI's Impact On Cyber. Deneen DeFiore, United Airlines & Bobby Ford, Doppel.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 4, 2026 15:46


Deneen DeFiore is the Vice President & Chief Information Security Officer at United Airlines. In this episode, she joins host Charlie Osborne and Bobby Ford, Bobby Ford, Chief Strategy and Experience Officer at Doppel, to discuss AI's mark on the cybersecurity world. This episode of CISO Confidential is brought to you by Doppel. Learn more about our sponsor at https://doppel.com.

The CyberWire
The parallel war online.

The CyberWire

Play Episode Listen Later Mar 2, 2026 37:18


Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero-day targeting Ivanti Connect Secure devices. A North Korea-linked group targets air-gapped systems. Monday business breakdown. On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. Tim Starks from CyberScoop has the latest goings on at CISA. Microsoft says the slop stops here.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop as he is discussing ongoing challenges at CISA. If you are interested in this topic, you can learn more here. Afternoon Cyber Tea On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. You can hear the full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. Selected Reading US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates (SecurityWeek) Western Cybersecurity Experts Brace for Iranian Reprisal (BankInfo Security) Pakistan's Top News Channels Hacked and Hijacked With Anti-Military Messages (Hackread) Anthropic confirms Claude is down in a worldwide outage (Bleeping Computer) Trump Orders Government to Stop Using Anthropic After Pentagon Standoff (New York Times) OpenAI Will Deploy AI in US Military Classified Networks (GovInfo Security) Senate Health Cyber Bill Clears Committee Hurdle (GovInfo Security) Double whammy: Steaelite RAT bundles data theft, ransomware (The Register) CISA warns that RESURGE malware can be dormant on Ivanti devices (Bleeping Computer) North Korean APT Targets Air-Gapped Systems in Recent Campaign (SecurityWeek) Astelia secures $35 million in combined seed and Series A funding. (N2K Pro Business Briefing) Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash (Windows Latest) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Government Huddle with Brian Chidester
202: The One with the Former Department of the Interior CISO

The Government Huddle with Brian Chidester

Play Episode Listen Later Feb 27, 2026 30:04


Lou Eichenbaum, former Chief Information Security Officer at the U.S. Department of the Interior and current Federal CTO at ColorTokens joins the show for a deep dive into the evolving world of federal cybersecurity. We dive into firsthand insights on what it really means to balance mission enablement with effective risk management and why today's CISO must act not just as a security expert, but as an executive risk manager focused on resilience, communication, and strategic alignment. We unpack what real zero trust implementation looks like beyond the buzzword, why micro-segmentation is foundational to preventing lateral movement and building mission resilience, and how federal agencies can move beyond compliance checklists toward meaningful security outcomes. We also discuss candid perspectives on what drives cybersecurity priorities inside federal agencies and and how zero trust principles will play a critical role in protecting both IT and critical infrastructure systems in the years ahead.

interior ciso chief information security officer former department department of the interior federal cto
Shaun Newman Podcast
#1007 - Tom Luongo & LTC Steven Murray

Shaun Newman Podcast

Play Episode Listen Later Feb 25, 2026 65:01


We discuss Iran, Mexico and Alberta Independence. Tom Luongo is a former research chemist, amateur dairy goat farmer, libertarian, and economist whose work can be found on Zero Hedge and Newsmax Media. He hosts the Gold Goats ‘n Guns Podcast.LTC Steven Murray is a retired U.S. Army Lieutenant Colonel who served as an Information Warfare Officer and Cyber Defense Battalion Commander. With extensive experience in cyber operations and intelligence, he commanded units supporting the United States Pacific Command, U.S. Army Pacific Forces, and the National Security Agency. He was deployed to Iraq during Operation Enduring Freedom, earning a Bronze Star, and has held roles such as Chief Information Security Officer for a large medical company. Tickets to Cornerstone Forum 26': https://www.showpass.com/cornerstone26/Silver Gold Bull Links:Website: https://silvergoldbull.ca/Email: SNP@silvergoldbull.comText Grahame: (587) 441-9100Bow Valley Credit UnionBitcoin: www.bowvalleycu.com/en/personal/investing-wealth/bitcoin-gatewayEmail: welcome@BowValleycu.com Get your voice heard: Text Shaun 587-217-8500

The Tech Blog Writer Podcast
Drata And The Rise Of The Chief Trust Officer In The AI Era

The Tech Blog Writer Podcast

Play Episode Listen Later Feb 20, 2026 32:24


Have you ever wondered why "compliance" still gets treated like a slow, spreadsheet-heavy chore, even though the rest of the business is moving at machine speed? In this episode of Tech Talks Daily, I sit down with Matt Hillary, Chief Information Security Officer at Drata, to talk about what actually changes when AI and automation land in the middle of governance, risk, and compliance. Matt brings a rare viewpoint because he lives this day-to-day as "customer zero," running Drata internally while also leading IT, security, GRC, and enterprise apps. We get practical fast. Matt shares how AI-assisted questionnaire workflows can turn a 120-question security assessment from a late-afternoon time sink into something you can complete with confidence in minutes, then still make it upstairs in time for dinner. He also explains how automation flips the audit dynamic by moving from random sampling to continuous, full-population checks, using APIs to validate evidence at scale, without hounding control owners unless something is actually wrong. We also talk about what security leadership really looks like when the stakes rise. Matt reflects on lessons from his time at AWS, why curiosity and adaptability matter when the "canvas" keeps changing, and how customer focus becomes the foundation of trust. That theme runs through the whole conversation, including the idea that the CISO role is steadily turning into a chief trust officer role, where integrity, transparency, and credibility under pressure matter as much as tooling. And because burnout is never far away in security, we dig into the human side too. Matt unpacks how automation can reduce cognitive load, but also warns about swapping one kind of pressure for another, especially when teams get trapped producing endless dashboards and vanity metrics instead of focusing on the few measures that actually reduce risk. To wrap things up, Matt leaves a song for the playlist, Illenium's "You're Alive," plus a book recommendation, "Lessons from the Front Lines, Insights from a Cybersecurity Career" by Asaf Karen, which he says stands out for how it treats the human side of security leadership. If you're thinking about modernizing compliance in 2026 without losing the human element, his parting principle is simple and powerful: be intentional, keep asking why, and spend your limited time on what truly matters. So where do you land on this shift toward continuous trust, do you see it becoming the default expectation for buyers and auditors, and what should leaders do now to make sure automation reduces pressure instead of quietly adding more? Share your thoughts with me, I'd love to hear how you're approaching it.

Das Ohr am Netz
Schutzschild Deutschland: Wie resilient sind unsere digitale Infrastrukturen?

Das Ohr am Netz

Play Episode Listen Later Feb 18, 2026 64:22 Transcription Available


Ob Stromnetze, Krankenhäuser, Logistikzentren oder Rechenzentren – nahezu alle kritischen Infrastrukturen sind heute digital vernetzt und damit unmittelbar vom Internet abhängig. Cyberangriffe, Ransomware, Desinformationskampagnen oder gezielte Angriffe auf Lieferketten zeigen, dass Verwundbarkeit längst nicht mehr nur physisch, sondern vor allem digital entsteht. Mit dem KRITIS-Dachgesetz und der Umsetzung der NIS2-Richtlinie reagiert Deutschland auf diese veränderte Bedrohungslage. Ziel ist es, kritische Einrichtungen systematisch gegen Cyberangriffe, hybride Bedrohungen und systemische IT-Ausfälle abzusichern. Doch stärkt der neue Rechtsrahmen tatsächlich die Resilienz im digitalen Raum oder erhöht er vor allem die regulatorische Komplexität für Unternehmen und Behörden? In dieser Folge von „Das Ohr am Netz“ diskutieren Sidonie Krug und Sven Oswald die sicherheitspolitischen, regulatorischen und operativen Dimensionen des neuen Gesetzes. Klaus Landefeld, Vorstand bei eco – Verband der Internetwirtschaft e.V., ordnet das Gesetz ordnungspolitisch ein: Handelt es sich um einen Paradigmenwechsel oder primär um einen Ordnungsrahmen? Welche Risiken entstehen durch parallele Compliance-Strukturen mit NIS2? Und droht eine formale Pflichterfüllung statt echter Resilienz? Die operative Perspektive bringt Lisa Fröhlich, Corporate Communications bei Link11, ein. Sie analysiert die aktuelle DDoS-Bedrohungslage und erläutert, warum Webseiten längst geschäfts- und versorgungskritische Infrastruktur sind. Im Fokus stehen Prävention, Reaktionsfähigkeit und die organisatorische Verantwortung für IT-Resilienz. Die sicherheitspolitische Einordnung übernimmt Oberst Guido Schulte, Chief Information Security Officer bei der Bundeswehr. Er erklärt, welche Rolle KRITIS im Kontext gesamtstaatlicher Verteidigungsfähigkeit spielt, wie hybride Bedrohungen „unterhalb der Schwelle“ wirken und wie Bundeswehr, Wirtschaft und Behörden im Ernstfall zusammenarbeiten. Die Folge beleuchtet das Spannungsfeld zwischen Regulierung und strategischer Resilienz – und fragt, wie belastbar Deutschlands Schutzschild tatsächlich ist. --- Redaktion: Erik Jödicke, Christin Müller, Irmeline Uhlmann, Anja Wittenburg Schnitt: David Grassinger Moderation: Sidonie Krug, Sven Oswald Produktion: eco – Verband der Internetwirtschaft e.V.

Future-Proof
242. Secure the firm, with Luke Kiely

Future-Proof

Play Episode Listen Later Feb 17, 2026 36:58


What does cybersecurity really mean for today's CPA firms? In this episode, we sit down with Luke Kiely, Chief Information Security Officer at SmartVault and Chief Security Officer at ComplyWise, to explore why cybersecurity is no longer just an IT issue, but a firm-wide responsibility.Luke breaks down how most breaches still begin with a simple email and a distracted click, why busy season increases vulnerability, and the practical safeguards firms can put in place without a massive IT budget.This episode offers clear, actionable insight into protecting client data and securing the future of your firm.Resources:Luke Kiely LinkedIn ProfileSmartVaultComplyWiseFTC Safeguards Rule OverviewIRS Publication 4557 – Safeguarding Taxpayer Data

Thinking Crypto Interviews & News
Helping Wall Street to Tokenize Assets! | Christopher Russell

Thinking Crypto Interviews & News

Play Episode Listen Later Feb 16, 2026 14:52 Transcription Available


Christopher Russell, Head of Tokenization and Chief Information Security Officer at tZERO Group, sat down with me for an interview at the Halborn Access 2026 Summit at the NYSE. We discussed how tZERO is helping TradFi institutions tokenize assets on-chain.Brought to you by

@BEERISAC: CPS/ICS Security Podcast Playlist
#120: Use of Deception Solutions in Energy Sector Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 14, 2026 9:02


Podcast: Energy TalksEpisode: #120: Use of Deception Solutions in Energy Sector CybersecurityPub date: 2026-02-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiscover how digital twins of online infrastructure can be used to fool attackers In this episode of Energy Talks, host Simon Rommer, OT Security Consultant at OMICRON, and his guest. Christoph Kukovic, Chief Information Security Officer at Verbund AG, Austria's leading energy company and one of the largest producers of hydroelectricity in Europe, discuss the critical roles of IT and OT in power systems cybersecurity, focusing on the use of deception solutions. Deception solutions aim to create realistic online environments for attackers. The idea is to challenge them with a digital twin of the online infrastructure so that they attack the deception solution instead of the real infrastructure. Christoph shares his insights with Simon into his personal cybersecurity journey, the challenges faced in implementing innovative cybersecurity measures, and the development of his company's own deception solutions. The conversation delves into the importance of collaboration, the need for realistic simulations, the difference between honeypot and deception solutions, and testing deception solutions in real-world scenarios. Get more information about OT cybersecurity for power grids . We welcome your questions and feedback. Simply send us an email to podcast@omicronenergy.com. Please join us to listen to the next episode of Energy Talks.The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Energy Talks
#120: Use of Deception Solutions in Energy Sector Cybersecurity

Energy Talks

Play Episode Listen Later Feb 13, 2026 9:02


In this episode of Energy Talks, host Simon Rommer, OT Security Consultant at OMICRON, and his guest, Christoph Kukovic, Chief Information Security Officer at Verbund AG , Austria's leading energy company and one of the largest producers of hydroelectricity in Europe, discuss the critical roles of IT and OT in power systems cybersecurity, focusing on the use of deception solutions to fool attackers and protect online infrastructure.

Becker’s Healthcare Podcast
Greg Sieg on Building a Resilient Cybersecurity Program Across a Growing Health System

Becker’s Healthcare Podcast

Play Episode Listen Later Feb 10, 2026 13:55


In this episode, Greg Sieg, Chief Information Security Officer at the University of Michigan Health Regional Network, shares how his team is standardizing cybersecurity frameworks across acquisitions while balancing people, process, and technology. He discusses identity governance, machine security, M&A integration, and why culture, communication, and partnership are essential to protecting healthcare organizations as care expands beyond hospital walls.

Becker’s Healthcare Digital Health + Health IT
Greg Sieg on Building a Resilient Cybersecurity Program Across a Growing Health System

Becker’s Healthcare Digital Health + Health IT

Play Episode Listen Later Feb 10, 2026 13:55


In this episode, Greg Sieg, Chief Information Security Officer at the University of Michigan Health Regional Network, shares how his team is standardizing cybersecurity frameworks across acquisitions while balancing people, process, and technology. He discusses identity governance, machine security, M&A integration, and why culture, communication, and partnership are essential to protecting healthcare organizations as care expands beyond hospital walls.

TALRadio
Why Most Leaders Are One Click Away From a Cyber Disaster | Olympic Minds

TALRadio

Play Episode Listen Later Feb 9, 2026 42:55


Cybersecurity isn't an IT problem—it's a leadership problem.In this episode, Sherry Winn talks with Dean Sapp, Chief Information Security Officer at Filevine, about how small leadership oversights can lead to massive financial losses.Here are some key takeaways from this episode:The simplest protection most leaders still don't useHow AI-powered scams are fooling even smart executivesWhy processes—not panic—are the best defense against fraudThis is a real-world conversation every leader needs to hear before something goes wrong.Don't miss this episode. Tune in nowGuest: Dean SappHost: Sherry WinnSound: Mahesh R.Producer: Archita Puranik

The CUInsight Network
Effective Cybersecurity - Synergent

The CUInsight Network

Play Episode Listen Later Feb 6, 2026 19:28


“Cybersecurity really is just another risk. I think where we complicate it sometimes is in the language we use to talk about it.” - Steve TorinoThank you for tuning in to The CUInsight Network, with your host, Robbie Young, Vice President of Strategic Growth at CUInsight. In The CUInsight Network, we take a deeper dive with the thought leaders who support the credit union community. We discuss issues and challenges facing credit unions and identify best practices to learn and grow together.My guest on today's show is Steve Torino, Chief Information Security Officer at Synergent. Steve's path to cybersecurity was not a straight line, and he didn't grow up dreaming about credit unions or information security. What stayed constant, though, was a deep curiosity about technology and how systems work, which eventually carried him from community banking to national payment processing and ultimately to Synergent.In our conversation, we spend a lot of time talking about what effective cybersecurity governance actually looks like for credit unions and why it is so important. Steve breaks down how governance starts at the board level, how expectations flow through management, and why cybersecurity should be treated like any other form of enterprise risk. We also dig into collaboration and information sharing—one of the credit union movement's biggest strengths, and Steve points to leagues and professional groups as ways that credit unions can learn from one another.As we wrap up the episode, Steve talks about the mentor that influenced his life, how he loves traveling to Dallas, recommends a cybersecurity book that every can use, and more! Enjoy my conversation with Steve Torino!Find the full show notes on cuinsight.com.Connect with Steve:Steve Torino, Chief Information Security Officer of Synergentsynergentcorp.comSteve: LinkedInSynergent: LinkedIn | Facebook | YouTubeBook mentioned: Cybersecurity for Everyone by Cathy Olieslaeger

The Ontic Protective Intelligence Podcast
Bridging Cyber and Physical Security in High-Risk Environments with Wayman Cummings

The Ontic Protective Intelligence Podcast

Play Episode Listen Later Feb 4, 2026 29:14


Manish Mehta sits down with Wayman Cummings, Chief Information Security Officer at Ochsner Health, to explore what cyber-physical security convergence really looks like in practice. Wayman shares how his unconventional path into cybersecurity shaped his leadership style and his perspective on risk in high-stakes environments like healthcare. The conversation dives into insider risk, the role of AI as augmented intelligence, and why most physical threats today begin with digital reconnaissance. Wayman also challenges the idea that convergence is a myth, offering real-world examples of how teams, technology, and trust must come together to make it work. You'll learn: Why convergence fails without people and process alignment Why AI should augment human judgment, not replace it, in security operations How leaders can build credibility, break down silos, and scale security impact in high-risk environments If you're enjoying this episode, please take a moment to rate and review the show.

Afternoon Cyber Tea with Ann Johnson
Trust Is Patient Well-being: Rob Suárez on Cybersecurity in Healthcare

Afternoon Cyber Tea with Ann Johnson

Play Episode Listen Later Feb 3, 2026 27:01


Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield joins Ann on this week's episode of Afternoon Cyber Tea. In the conversation, Rob shares how his career path and personal philosophy have shaped a mission-driven approach to cybersecurity that places patient trust, safety, and privacy at the center of every decision. He discusses the unique challenges of securing a deeply interconnected healthcare ecosystem, the critical role of culture and cyber literacy across organizations, and why transparency and resilience are essential during incidents. The episode also explores secure-by-design principles, the ethical use of AI in healthcare, and how the CISO role is evolving toward a broader focus on trust, collaboration, and human impact.     Resources:  View Rob Suárez on LinkedIn    View Ann Johnson on LinkedIn     Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast   The BlueHat Podcast    Uncovering Hidden Risks            Discover and follow other Microsoft podcasts at microsoft.com/podcasts       Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.  

Caveat
Compliance in the age of surveillance.

Caveat

Play Episode Listen Later Jan 29, 2026 52:54


On today's episode of Caveat, we are joined by Matt Hillary, Chief Information Security Officer at Drata, discussing how AI is reshaping the compliance landscape and what it takes to build trust at AI speed. Ben has the story of Immigration and Customs Enforcement and their extensive use of modern surveillance tools. Dave discusses the Supreme Court's taking of a case involving Facebook tracking pixels and video store rentals. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Links to today's stories: ICE Is Going on a Surveillance Shopping Spree Supreme Court to hear Facebook pixel tracking case Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, a weekly newsletter available exclusively to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K Pro⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ members on ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K CyberWire's⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers the EU launching an investigation of its own into X after the platform's AI chatbot, Grok, was able to be manipulated into generating non-consensual sexualized images. Alongside the EU's investigation, X is also facing pressures from the UK, France, Indonesia, and Malaysia over this incident. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠caveat@thecyberwire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices

Parliament - Live Stream and Question Time
Oral Questions for Thursday 29 January 2026

Parliament - Live Stream and Question Time

Play Episode Listen Later Jan 29, 2026 64:58


Questions to Ministers Hon CARMEL SEPULONI to the Minister for Auckland: Does he stand by his statement, "A safe, thriving central city means more foot traffic, stronger business confidence, more jobs, and more opportunities for everyone, including those currently experiencing hardship"; if not, why not? RIMA NAKHLE to the Minister of Health: What recent announcements has he made about improving access to urgent care for South and East Aucklanders? RICARDO MENÉNDEZ MARCH to the Minister for Social Development and Employment: Is the Civil Defence Payment available for people impacted by the severe weather events recognised by local states of emergency declared on 20 and 21 January 2026; if not, why not? Hon Dr AYESHA VERRALL to the Minister of Health: Does he stand by his statement that the Ministry of Health's review into the ManageMyHealth data breach will "identify lessons to strengthen protections for patient data held by the private sector"; if so, does Health New Zealand currently have a Chief Information Security Officer role dedicated to primary care? RYAN HAMILTON to the Minister for Tourism and Hospitality: What recent announcements has she made about supporting major events in New Zealand? Hon WILLOW-JEAN PRIME to the Minister of Education: Does she stand by her statement that "the numbers for the future are looking really good" in response to reports of a teacher shortage, with 445 vacancies listed in the Education Gazette at the start of the school year; if so, why? TAMATHA PAUL to the Minister of Housing: Does he support increasing housing supply to make housing more affordable; if so, why is the coalition considering weakening housing intensification laws? TIM VAN DE MOLEN to the Minister for Trade and Investment: What recent announcements has he made about strengthening New Zealand's relationship with India? Hon GINNY ANDERSEN to the Minister for Economic Growth: Does she agree with the Minister of Finance's July 2024 statement that "cost of living relief is on its way"; if so, why? Dr VANESSA WEENINK to the Minister for Mental Health: What recent announcements has he made about mental health co-response teams? MARIAMENO KAPA-KINGI to the Minister for Emergency Management and Recovery: Does he intend for the Emergency Management Bill (No 2) to establish funding to support community and marae preparedness to respond to extreme weather emergencies? SHANAN HALBERT to the Minister for Vocational Education: How many young people in New Zealand were not engaged in education, employment, or training for the September 2025 year compared to the September 2023 year?

Shaun Newman Podcast
#983 - E.M. Burlingame & LTC Steven Murray

Shaun Newman Podcast

Play Episode Listen Later Jan 14, 2026 83:45


EM Burlingame is an author, green beret, and currently is a Senior Research Fellow at the National Foundation for Integrative Medicine where he founded and leads the Jason Dawson and Stewart McGurk Brain Health Research Fellowship.LTC Steven Murray is a retired U.S. Army Lieutenant Colonel who served as an Information Warfare Officer and Cyber Defense Battalion Commander. With extensive experience in cyber operations and intelligence, he commanded units supporting the United States Pacific Command, U.S. Army Pacific Forces, and the National Security Agency. He was deployed to Iraq during Operation Enduring Freedom, earning a Bronze Star, and has held roles such as Chief Information Security Officer for a large medical company. Tickets to Cornerstone Forum 26': https://www.showpass.com/cornerstone26/Tickets to the Mashspiel:https://www.showpass.com/mashspiel/Silver Gold Bull Links:Website: https://silvergoldbull.ca/Email: SNP@silvergoldbull.comText Grahame: (587) 441-9100Bow Valley Credit UnionBitcoin: www.bowvalleycu.com/en/personal/investing-wealth/bitcoin-gatewayEmail: welcome@BowValleycu.com Prophet River Links:Website: store.prophetriver.com/Email: SNP@prophetriver.comUse the code “SNP” on all ordersGet your voice heard: Text Shaun 587-217-8500EM Burlingame is an author, green beret, and currently is a Senior Research Fellow at the National Foundation for Integrative Medicine where he founded and leads the Jason Dawson and Stewart McGurk Brain Health Research Fellowship.

The CyberWire
Michael Scott: A team of humble intellects. [Information security] [Career Notes]

The CyberWire

Play Episode Listen Later Jan 4, 2026 9:37


Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Michael Scott: A team of humble intellects. [Information security]

Career Notes

Play Episode Listen Later Jan 4, 2026 9:37


Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Talking Cloud with an emphasis on Cloud Security
97-Talking Cloud Podcast with Joshua Scott, CISO at Hydrolix

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Jan 4, 2026 62:26


In this episode, I interview Joshua Scott, the Chief Information Security Officer at Hydrolix. We discuss the evolving role of the CISO, the importance of relationships in security, and the opportunities and risks presented by AI in the cybersecurity landscape. Joshua shared insights on prompt engineering, the future of AI in the workforce, and the need for continuous learning in the security field. Our conversation also touches on the complexities of modern security protocols and the importance of user-centric solutions. I hope you enjoy it!    

Outcomes Rocket
What We Don't Know: Leading AI Governance with Humility and Clarity with Anahi Santiago, Chief Information Security Officer at ChristianaCare

Outcomes Rocket

Play Episode Listen Later Dec 22, 2025 23:40


This podcast is brought to you by Outcomes Rocket, your exclusive healthcare marketing agency. Learn how to accelerate your growth by going to⁠ outcomesrocket.com AI is advancing rapidly in healthcare, but what happens behind the scenes when a system attempts to adopt it responsibly? In this episode, Anahi Santiago, Chief Information Security Officer at ChristianaCare, shares how a tech-forward health system is embracing AI across clinical workflows, operations, and cybersecurity. She explains the governance rubric they've created to assess every new use case and the challenge of keeping pace with teams eager to deploy AI without fully grasping the clinical, ethical, and operational risks. Anahi emphasizes the importance of shared risk ownership and equal voices across departments as the organization navigates the unknowns in a rapidly evolving landscape. She also reflects on how tools like Copilot boost productivity and how new guidance from the Healthcare Sector Coordinating Council will shape her next steps. If you want to hear how one of the nation's most forward-leaning CISOs is steering AI innovation with clarity and candor, tune in! Resources Connect with and follow Anahi Santiago on LinkedIn. Follow ChristianaCare on LinkedIn and visit their website!

Software Lifecycle Stories
Evolving Security Practices with Ben Wilcox

Software Lifecycle Stories

Play Episode Listen Later Dec 14, 2025 52:05


In this episode of the Software People Stories, my guest Ben Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch. Ben shares his fascinating journey from building a web hosting business as a teenager to his current role as CTO and CISO at ProArch. Ben discusses the evolution of his career, his involvement in various projects, and the ever-changing landscape of security, especially with the advent of AI. He also provides valuable insights into how enterprises should approach security, the complexities of data localization, and the importance of a continuous security model. The conversation also delves into career advice for aspiring IT and security professionals.00:00 Introduction and Guest Welcome00:42 Early Career and Web Hosting Business02:49 Transition to Software Development03:51 Joining Advisor Group and Pro05:06 Challenges of Running a Business as a Teenager07:55 Learning and Growth in a Larger Company09:14 Becoming a CISO and Security Focus12:21 Evolving Security Landscape and AI15:01 Data Security and Insider Risk Management20:51 Zero Trust Environments and Legacy Systems23:58 Sleepless Nights and Security Concerns25:50 Balancing Innovation and Security26:11 Finding Joy in Leadership26:54 Navigating the CTO and CISO Roles28:55 Keeping Up with Technology Trends31:27 Hyper-Personalization and Security Risks36:02 The Role of Open Source in Security41:03 Career Advice for Aspiring Security Professionals45:35 The Impact of AI on Security Jobs49:11 Conclusion and Contact InformationThe timestamps are approximate, and after the intro that is about 90 seconds.For more closer timestamps, add 90 seconds to the labels aboveBen Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch, where he leads the company's cloud, security, and AI enablement strategy. With more than 20 years of experience spanning software engineering, cybersecurity, and enterprise architecture, Ben helps organizations modernize their technology foundations while navigating the evolving threat landscape.Ben's career began in hands-on development and infrastructure work, giving him a deep technical grounding that informs his leadership today. He has built and led high-performing engineering teams, guided complex cloud migrations, and designed modern security programs that balance innovation with risk management. At ProArch, he works closely with clients to architect AI-ready, scalable systems that drive business transformation.Connect with Ben: https://www.linkedin.com/in/ben-wilcox

Irish Tech News Audio Articles
AWS Security Agent and the Rise of AI Agents

Irish Tech News Audio Articles

Play Episode Listen Later Dec 12, 2025 7:57


AI agents are moving from experimental tools to everyday enterprise workflows. Reporting live from AWS re:Invent 2025 in Las Vegas for Irish Tech News, I attended a press-only briefing titled Security and the Rise of AI Agents, where senior AWS leaders Amy Herzog, Chief Information Security Officer, Hart Rossman, Vice President in the Office of the CISO, Gea Rinehouse, Vice President of Security Services and Neha Rungta, Director of Applied Science outlined how the company intends to manage this transition. AWS is pushing ahead with autonomous agents, but only within a security model built on long-standing principles: identity, governance, compliance and clear oversight. What is an AI Agent? An AI agent is a software system that uses artificial intelligence to carry out tasks autonomously in pursuit of a specific goal. Unlike chatbots that only respond to prompts, an agent can reason, plan and take action across different steps of a workflow. It can use tools such as web services or APIs, monitor its progress and adjust its approach as conditions change. Over time, it can improve its performance based on the data and experience it gathers. This distinction matters, because the rise of agents raises new questions about accountability, access, oversight and safety. Security First AWS chief executive Matt Garman shaped much of the week's discussion. Speaking about the reality facing engineering teams, he noted: "Every customer wants their products to be secure, but you have trade-offs. Where do you spend your time? Do you improve the security of existing features, or do you ship new ones?" The briefing returned to this point several times. AWS's position is that strong design-stage security reduces the tension between improvement and innovation. Agents are seen as an opportunity to reinforce security, not dilute it. AWS Security Agent One of the major announcements at re:Invent was the preview of AWS Security Agent. The tool brings several security checks forward in the development process. It reviews designs, analyses code, gathers richer signals for incident response and performs penetration testing that reflects real system behaviour rather than generic patterns. AWS Security Agent is one of the new Frontier Agents introduced at re:Invent, a family of autonomous tools designed to handle multi-step tasks across development, security and operations. Neha Rungta described the significance of this shift. She called the Security Agent "one of these frontier AI agents, a sophisticated class of AI agents that are autonomous and scalable and can work for long periods without human intervention. Security doesn't have to be an afterthought." She added that AWS is expanding its proof-based assurance tools so teams can understand correctness without being specialists in system logic. The broader point is that verification needs to be continuous, not episodic. Guardrails for Autonomy The panel stressed that agents must operate within strict boundaries. Updated policy controls in Amazon Bedrock AgentCore allow organisations to specify what an agent can do, which systems it can reach and how its actions are logged and reviewed. Hart Rossman remarked that each major technology shift has increased the demands placed on security teams. With agents running for extended periods and across more systems, the real pressure points now are scale and speed. Guardrails are essential. The Sandbox Approach A theme repeated throughout the session was the use of sandbox environments. AWS encouraged organisations to test new agents in isolation before considering production use. This allows teams to observe long-running behaviour, confirm access paths, check escalation rules and understand how an agent reacts under different conditions. The sandbox was presented as a practical way to build confidence gradually rather than relying on assumptions. Inside the Press Briefing Questions focused on monitoring autonomy, preventing agents from widening their scope...

BigIDeas On The Go
Why Agent Identity Is Now a Security Priority

BigIDeas On The Go

Play Episode Listen Later Dec 10, 2025 31:58


AI agents are moving fast, and security teams are scrambling to keep up.Join us as Heather Ceylan, SVP & Chief Information Security Officer at Box, who has spent the last several years leading security teams through rapid change from the explosive growth years at Zoom to her current work shaping Box's AI posture.Heather shares what it actually feels like to run security at a time when agents can be created in minutes, permissions matter more than ever, and governance committees are struggling to keep pace. She explains why treating agents as identities fundamentally changes the model, how MCP servers introduce new exposure points, and why her team is embedding AI directly into SOC work, design reviews, and vulnerability remediation.It's a grounded look at how a CISO makes sense of AI while everything around the role continues to shift.In this episode, you'll learn:Why agents need their own identities and permissions rather than inheriting access from the people who create themHow SOC teams can shift from constant alert triage to real threat hunting with the help of AI agentsHow AI can speed up vulnerability remediation by creating pull requests that engineers only need to review and mergeThings to listen for: (00:00) Meet Heather Ceylan(00:58) Career path from healthcare to Zoom to Box(03:58) Risks of AI agents accessing unstructured content(05:18) Why agent identity and permissions are the new priority(06:50) The challenge of discovering and governing ephemeral agents(08:16) How sandboxes and policies support safe experimentation(09:20) AI governance gaps and the need for dedicated ownership(13:10) Defining AI governance across technical and legal domains(16:17) The rise of MCP servers and new exposure points(18:05) Four AI bets transforming Box's SOC and security workflows(23:31) KPIs and measuring AI's impact on security teams(25:27) Resource trade-offs when adopting AI in security(27:58) Managing the complexity of model selection and trust(29:58) Should companies form dedicated AI security teams?

Late Night Health
LNH Holiday Scams 12 5 25

Late Night Health

Play Episode Listen Later Dec 7, 2025 7:36 Transcription Available


Scammers don't take the holidays off — and neither should your online security. In this eye-opening interview, host Mark Alyn speaks with Jeff Lunglhofer, Chief Information Security Officer at Coinbase, about the rising wave of online scams targeting consumers right now. From fake investments and crypto fraud to social media and dating app scams, Jeff reveals the biggest red flags to watch for, how scammers manipulate urgency and secrecy, and what powerful new tools are being used to stop fraud in real time. He also discusses the Tech Against Scams Coalition — a major cross-industry effort featuring Coinbase, Meta, and Match Group — and their innovative Scamberry Pie Pop-Up campaign designed to educate consumers in a fun, unforgettable way. If you've ever received a suspicious message, investment pitch, or “too good to be true” offer — this interview could save you from becoming the next victim.#ScamAwareness #CyberSecurity #OnlineSafety #CryptoScams #HolidayScams #Coinbase #TechAgainstScams #DigitalFraud #ConsumerAlert #MarkAlynBecome a supporter of this podcast: https://www.spreaker.com/podcast/late-night-health-radio--2804369/support.

Late Night Health Radio
LNH Holiday Scams 12 5 25

Late Night Health Radio

Play Episode Listen Later Dec 7, 2025 7:36 Transcription Available


Scammers don't take the holidays off — and neither should your online security. In this eye-opening interview, host Mark Alyn speaks with Jeff Lunglhofer, Chief Information Security Officer at Coinbase, about the rising wave of online scams targeting consumers right now. From fake investments and crypto fraud to social media and dating app scams, Jeff reveals the biggest red flags to watch for, how scammers manipulate urgency and secrecy, and what powerful new tools are being used to stop fraud in real time. He also discusses the Tech Against Scams Coalition — a major cross-industry effort featuring Coinbase, Meta, and Match Group — and their innovative Scamberry Pie Pop-Up campaign designed to educate consumers in a fun, unforgettable way. If you've ever received a suspicious message, investment pitch, or “too good to be true” offer — this interview could save you from becoming the next victim.#ScamAwareness #CyberSecurity #OnlineSafety #CryptoScams #HolidayScams #Coinbase #TechAgainstScams #DigitalFraud #ConsumerAlert #MarkAlynBecome a supporter of this podcast: https://www.spreaker.com/podcast/late-night-health-radio--2804369/support.

The New CISO
Just Starting in Security? Here's What You Need to Succeed

The New CISO

Play Episode Listen Later Dec 4, 2025 49:47


In this episode of The New CISO, host Steve Moore speaks with Iain Paterson, Chief Information Security Officer at Well Health Technologies, about his unconventional path into cybersecurity and the lessons learned from building programs across industries—from banking and healthcare to breach response and beyond.From skipping college to take an eight-month technical boot camp to leading enterprise security programs, Iain shares how curiosity, hands-on experience, and communication skills shaped his journey. He opens up about the realities of hiring in cybersecurity, why foundational IT work still matters, and how soft skills like empathy and composure are essential for effective leadership. Iain also reflects on leading through high-stress incidents, including the Ashley Madison breach, and explains why staying calm, communicating clearly, and maintaining emotional intelligence define the “new CISO.”Key Topics Covered:A nontraditional start: skipping college for certifications and hands-on learningWhy technical foundations—servers, networks, and support—still matterThe problem with “boilerplate” resumes and lack of real-world experienceWhy soft skills are a security superpower: communication, patience, and empathyTransitioning from technician to business enabler in cybersecurityHow early help desk experience builds composure and problem-solving abilityLessons from running vulnerability management in large-scale bankingLearning resilience and resourcefulness as a one-person security team in healthcareBehind the scenes of the Ashley Madison breach: stress, responsibility, and empathyWhy composure, calm communication, and credibility matter in crisis responseThe leadership evolution from technical expert to executive decision-makerBuilding peer networks and finding mentorship to combat isolation as a CISOIain's story highlights how real experience, emotional intelligence, and community support transform good technologists into exceptional leaders. His insights remind us that cybersecurity isn't just about defense—it's about communication, composure, and connection.

What the Tech
Looking Forward: New Year New IT Resolutions for 2026

What the Tech

Play Episode Listen Later Dec 4, 2025 13:28


In this episode of What The Tech, Becky Cross, Vice President of Client Partnerships at FIT, talks through top IT resolutions for 2026 with Jason Collins, Chief Information Security Officer, and Fred Franks, Chief Strategy Officer. They discuss the importance of adopting new technologies like AI to improve efficiency and cybersecurity, the need for thorough planning before implementation, and strategies to manage the balance between innovation and risk. The conversation also covers how businesses can leverage crowd-sourcing from employees for better AI integration and the significance of enhancing existing tools to avoid the 'bright shiny object syndrome.' Tune in to learn practical insights and tips to set strong IT resolutions for the new year.

ITSPmagazine | Technology. Cybersecurity. Society
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 3, 2025 26:22


What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More

Security Visionaries
Disrupt or Defend? An AI Grudge Match

Security Visionaries

Play Episode Listen Later Dec 2, 2025 33:59


Host Emily Wearmouth is joined by Netskope's Chief Digital and Information Officer, Mike Anderson, and Chief Information Security Officer, James Robinson, to discuss the evolving, and often conflicting, mandates of CIOs and CISOs concerning AI adoption. They dive into how to identify high-impact AI projects, the security challenge of shadow AI, and the need for new security models, like Model Context Protocol (MCP), to manage agent-to-agent communication. Additionally, learn about the internal initiatives Mike and James help to drive, such as the "Promptathon" and "AI Ambassador" program, designed to bridge the gap between innovation and security, and get their top tips for both disrupting and defending your organization in the age of generative AI.

Becker’s Healthcare Podcast
Steven Ramirez, Chief Information Security Officer at Renown Health

Becker’s Healthcare Podcast

Play Episode Listen Later Dec 1, 2025 20:00


Steven Ramirez, Chief Information Security Officer at Renown Health, shares insights on improving the end-user experience through continuous adjustments and support. He emphasizes the importance of clearly articulating risk to drive strategic investments and ensuring those investments deliver value. Ramirez also discusses his proactive approach to setting himself up for long-term success in the evolving healthcare landscape.

The Secret Teachings
Campbell's Soup mm! mm! No Good (11/27/25)

The Secret Teachings

Play Episode Listen Later Nov 27, 2025 120:01 Transcription Available


Campbell's soup is in hot water over what Campbell's Vice President and Chief Information Security Officer, Martin Bally, was recorded saying: “We have s**t for f***king poor people. Who buys our s**t? I don't buy f**king Campbell's products barely anymore. It's not healthy now that I know what the f**k's in it. Even in a can of soup, I look at it…'bioengineered meat.'”... “I don't wanna eat a f**king, a piece of chicken that came from a 3D printer. Do you?”Campbell's responded by saying: "We are proud of the food we make, the people who make it and the high-quality ingredients we use. The comments on the recording are not only inaccurate – they are patently absurd. Keep in mind, the alleged comments are made by an IT person, who has nothing to do with how we make our food. If the recording is legitimate, the comments are unacceptable. They do not reflect our values and the culture of our company... The chicken meat used in our soups comes from long-trusted, USDA-approved US suppliers and meets our high quality standards. All of our soups are made with No Antibiotics Ever chicken meat, meaning we don't allow antibiotics to be added to the feed, water, or any commercial vaccines used by our chicken suppliers."But there are some problems here. Campbell's admits on their website that most of their base ingredients are GMO, which are not "high quality" and only imply that more expensive ingredients like meat are very likely to be "bioengineered." Their misleading comments and lies are just reason alone to boycott the company entirely, especially for thanksgiving. *The is the FREE archive, which includes advertisements. If you want an ad-free experience, you can subscribe below underneath the show description.WEBSITEFREE ARCHIVE (w. ads)SUBSCRIPTION ARCHIVE-X / TWITTERFACEBOOKINSTAGRAMYOUTUBERUMBLE-BUY ME A COFFEECashApp: $rdgable PAYPAL: rdgable1991@gmail.comRyan's Books: https://thesecretteachings.info - EMAIL: rdgable@yahoo.com / rdgable1991@gmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-secret-teachings--5328407/support.

The Most Dramatic Podcast Ever with Chris Harrison
Just In Time For Your Thanksgiving Casserole: What's Really In Your Campbell's Soup Can?

The Most Dramatic Podcast Ever with Chris Harrison

Play Episode Listen Later Nov 26, 2025 18:37 Transcription Available


One of the more disturbing stories of the week came out of a secret recording purportedly of a Campbell’s Soup executive. Former employee Robert Garza says he recorded his boss, Campbell’s Vice President and Chief Information Security Officer going on a tirade against the company, its products and some of its Indian Employees. Among the allegations, the man on the recording is heard saying that Campbell’s soup has bioengineered meat, saying he doesn’t wanna eat a piece of chicken that came from a 3D printer. Campbell’s Soup denies those claims and has put the exec on administrative leave while it investigates. Meantime the state of Florida is also investigating those claims and has threatened to shut down Campbell’s in its state if it finds any truth to the allegations.See omnystudio.com/listener for privacy information.

Amy and T.J. Podcast
Just In Time For Your Thanksgiving Casserole: What's Really In Your Campbell's Soup Can?

Amy and T.J. Podcast

Play Episode Listen Later Nov 26, 2025 18:37 Transcription Available


One of the more disturbing stories of the week came out of a secret recording purportedly of a Campbell’s Soup executive. Former employee Robert Garza says he recorded his boss, Campbell’s Vice President and Chief Information Security Officer going on a tirade against the company, its products and some of its Indian Employees. Among the allegations, the man on the recording is heard saying that Campbell’s soup has bioengineered meat, saying he doesn’t wanna eat a piece of chicken that came from a 3D printer. Campbell’s Soup denies those claims and has put the exec on administrative leave while it investigates. Meantime the state of Florida is also investigating those claims and has threatened to shut down Campbell’s in its state if it finds any truth to the allegations.See omnystudio.com/listener for privacy information.

How Men Think with Brooks Laich & Gavin DeGraw
Just In Time For Your Thanksgiving Casserole: What's Really In Your Campbell's Soup Can?

How Men Think with Brooks Laich & Gavin DeGraw

Play Episode Listen Later Nov 26, 2025 18:37 Transcription Available


One of the more disturbing stories of the week came out of a secret recording purportedly of a Campbell’s Soup executive. Former employee Robert Garza says he recorded his boss, Campbell’s Vice President and Chief Information Security Officer going on a tirade against the company, its products and some of its Indian Employees. Among the allegations, the man on the recording is heard saying that Campbell’s soup has bioengineered meat, saying he doesn’t wanna eat a piece of chicken that came from a 3D printer. Campbell’s Soup denies those claims and has put the exec on administrative leave while it investigates. Meantime the state of Florida is also investigating those claims and has threatened to shut down Campbell’s in its state if it finds any truth to the allegations.See omnystudio.com/listener for privacy information.

Rachel Goes Rogue
Just In Time For Your Thanksgiving Casserole: What's Really In Your Campbell's Soup Can?

Rachel Goes Rogue

Play Episode Listen Later Nov 26, 2025 18:37 Transcription Available


One of the more disturbing stories of the week came out of a secret recording purportedly of a Campbell’s Soup executive. Former employee Robert Garza says he recorded his boss, Campbell’s Vice President and Chief Information Security Officer going on a tirade against the company, its products and some of its Indian Employees. Among the allegations, the man on the recording is heard saying that Campbell’s soup has bioengineered meat, saying he doesn’t wanna eat a piece of chicken that came from a 3D printer. Campbell’s Soup denies those claims and has put the exec on administrative leave while it investigates. Meantime the state of Florida is also investigating those claims and has threatened to shut down Campbell’s in its state if it finds any truth to the allegations.See omnystudio.com/listener for privacy information.

Paul's Security Weekly
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422

Paul's Security Weekly

Play Episode Listen Later Nov 19, 2025 56:46


It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Business Security Weekly to share his personal insights. An advocate of CISO Health and Wellness, Yonesy will discuss how we can "Optimize the Operator" by creating harmony with mind and spirit. Segment Resources: https://councils.forbes.com/profile/Yonesy-Nunez-Global-Cybersecurity-Executive-Chain-Bridge-Bank/e79e72a5-4b18-48b1-b5ab-8a0afd47d782 In the leadership and communications segment, CISOs are cracking under pressure, How BISOs enable CISOs to scale security across the business, Great Leaders Empower Strategic Decision-Making Across the Organization, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-422

Paul's Security Weekly TV
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422

Paul's Security Weekly TV

Play Episode Listen Later Nov 19, 2025 56:46


It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Business Security Weekly to share his personal insights. An advocate of CISO Health and Wellness, Yonesy will discuss how we can "Optimize the Operator" by creating harmony with mind and spirit. Segment Resources: https://councils.forbes.com/profile/Yonesy-Nunez-Global-Cybersecurity-Executive-Chain-Bridge-Bank/e79e72a5-4b18-48b1-b5ab-8a0afd47d782 In the leadership and communications segment, CISOs are cracking under pressure, How BISOs enable CISOs to scale security across the business, Great Leaders Empower Strategic Decision-Making Across the Organization, and more! Show Notes: https://securityweekly.com/bsw-422

Business Security Weekly (Audio)
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422

Business Security Weekly (Audio)

Play Episode Listen Later Nov 19, 2025 56:46


It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Business Security Weekly to share his personal insights. An advocate of CISO Health and Wellness, Yonesy will discuss how we can "Optimize the Operator" by creating harmony with mind and spirit. Segment Resources: https://councils.forbes.com/profile/Yonesy-Nunez-Global-Cybersecurity-Executive-Chain-Bridge-Bank/e79e72a5-4b18-48b1-b5ab-8a0afd47d782 In the leadership and communications segment, CISOs are cracking under pressure, How BISOs enable CISOs to scale security across the business, Great Leaders Empower Strategic Decision-Making Across the Organization, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-422

Cybercrime Magazine Podcast
"The Baby Harvest." Cyber Mercenary Sheds Light On Advanced Scam. Chris Rock, SIEMonster.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 10, 2025 16:16


Chris Rock is a cyber mercenary who has worked in the Middle East, US and Asia for the last 30 years, working for both government and private organizations. He is the Chief Information Security Officer and co-founder of SIEMonster. In this episode, Rock joins host Heather Engel to discuss his book, "The Baby Harvest," which sheds light on how criminals are making and raising virtual babies to adulthood to be put on the shelf for money laundering, fraud and drug and firearm importation. • For more on cybersecurity, visit us at https://cybersecurityventures.com

That Tech Pod
The Dual Life of a CTO and CISO: Balancing Risk, Speed, and Innovation with Ben Wilcox

That Tech Pod

Play Episode Listen Later Oct 28, 2025 24:40


This week we sit down with Ben Wilcox, a tech leader who straddles two high-stakes worlds as both Chief Technology Officer and Chief Information Security Officer at ProArch. Ben shares how a teenage interest in “link lists” and web hosting turned into a 25-year career at the intersection of innovation and cybersecurity. We talk about what it really means to balance the drive to move fast with the need to stay secure, and whether those two priorities can truly coexist under one roof.From high-profile AI prompt injection attacks targeting Microsoft Copilot to the growing sophistication of indirect exploits that manipulate corporate systems through AI agents, Ben breaks down what's happening behind the headlines and how companies can protect themselves. He also opens up about his passion for car racing, a world that mirrors his approach to tech: fast, calculated, and always built with safety in mind. Ben then closes with some simple advice: say yes to new things, whether it's tackling the next wave of AI risks or trying something unexpected outside of work, curiosity and courage are what keep you ahead of the curve. Ben Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch, a global IT consulting firm helping enterprises secure their data and accelerate digital transformation through strategic Microsoft partnerships. With more than 25 years of experience in technology leadership, Ben brings a rare dual perspective—driving innovation while protecting the business from ever-evolving cyber threats. Known for making complex topics approachable, he's passionate about helping organizations move fast without breaking things, preparing their infrastructure for AI, and building security into the foundation of innovation. When he's not guiding enterprises through digital change, you might find him on a racetrack, channeling the same balance of speed and precision that defines his work in tech.

The CyberWire
Oracle zero-day serves up persistent access.

The CyberWire

Play Episode Listen Later Oct 6, 2025 23:47


A critical zero-day in Oracle E-Business Suite is under active exploitation.  ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There's been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals.  A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft's Ann Johnson, Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don't spend that ParkMobile settlement all in one place.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea Segment Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation⁠ here⁠ and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. Selected Reading PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News) ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED) Discord blames third-party support outfit for data breach (The Register) Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record) XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer) Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead) Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine) $4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek) Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing) ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer) Vote for Dave! Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our ⁠media kit⁠. Contact us at ⁠cyberwire@n2k.com⁠ to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices