POPULARITY
Categories
Send us a textWhile we generally don't shy away from politics when it comes to data protection and privacy rights, the conflict in Gaza is not a topic that we would quickly raise on the podcast. Unless data protection plays a role, which it now does.On this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal enter a dimension not seen before on the podcast - a plea for human rights related to Israel and Gaza. The immediate reason for our discussion are two news reports: the registration requirement for humanitarian aid organisations imposed by the Israeli government, and the mass surveillance of phone communications in the Palestinian territories.We recognise this topic is divise, and may not be to everyone's liking. If that is you, maybe skip this week's episode. Sources:https://www.theguardian.com/world/2025/aug/06/microsoft-israeli-military-palestinian-phone-calls-cloudhttps://autoriteitpersoonsgegevens.nl/en/current/ap-aid-organisations-cornered-due-to-israeli-requirement-to-provide-personal-data If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.From zero-day vulnerabilities and machine identity risks to AI-powered attacks and insider threats, Ian shares practical strategies drawn from his experience in military intelligence, offensive cyber operations, and corporate security leadership. Learn how to build resilience, translate cyber risk into business outcomes, and lead with mission-driven clarity in a threat landscape that never slows down.
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss incident response planning. • For more on cybersecurity, visit us at https://cybersecurityventures.com
How should individuals be thinking about generative artificial intelligence at work and at home? Let's find out with our guest Daniel Miessler, whose mission is “Working towards Human 3.0 so we can survive and thrive as humans after AI". Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Website: https://danielmiessler.com/ LinkedIn: https://www.linkedin.com/in/danielmiessler/ X: https://x.com/DanielMiessler Fabric: https://github.com/danielmiessler/fabric Blog Post: https://danielmiessler.com/p/weve-been-thinking-about-ai-all-wrong
In this episode of the Identity at the Center podcast, hosts Jeff and Jim dive into an enriching discussion with Shawna Hofer, Chief Information Security Officer at St. Luke's Health System in Idaho. Discover the vital link between cybersecurity and patient safety, the evolving role of AI in healthcare, and the challenges of integrating new technologies securely. Shawna shares her unique journey from an identity and access management manager to a CISO, offering valuable insights on risk management, data privacy, machine identities, and resilient security infrastructure. This is a must-watch episode for anyone interested in the intersection of healthcare and cybersecurity!Timestamps:00:00 Introduction and Podcast Overview00:37 ID Pro Membership Benefits03:35 Conferences and Events06:03 Introducing Shawna Hofer07:00 Shawna's Journey to CISO10:55 Identity Security in Healthcare13:49 Balancing Security and User Experience19:08 Challenges with IoT in Healthcare24:27 AI in Healthcare Security30:01 Upskilling for AI in Security33:07 The Ever-Improving AI Landscape33:21 Embracing the AI Mindset33:58 Resiliency in Healthcare and AI35:06 The Future of Jobs in an AI-Driven World37:37 Trusting AI in Security Decisions40:56 Learning the Language of Risk43:44 Making the Business Case for Identity45:50 Balancing Security Investments51:48 The Future of Healthcare and AI54:40 Fun and Food: The Potato Question01:02:13 Closing Remarks and FarewellConnect with Shawna: https://www.linkedin.com/in/shawna-hofer-7259b21a/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.com
Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI era. Whether you're a CISO looking to revolutionize your hiring process, a security professional wanting to level up your skills, or just curious about what happens when cybersecurity meets escape room logic, this episode delivers actionable insights you can implement immediately. Key Topics Covered: How Meta CTF's Jeopardy-style competitions work and why they're addictive Real examples of CTF challenges that test critical thinking over pure technical knowledge The shocking rise of AI-assisted interview cheating (and how to spot it) Why "CTF culture" is becoming the new hiring differentiator for top security teams Practical tips for using competitions to build team camaraderie and retention How smaller companies can compete with Big Tech for cybersecurity talent Don't let your next hire fool you with AI-generated answers. Learn how CTF competitions reveal the real problem-solvers from the pretenders. Like, share, and subscribe for more cybersecurity hiring secrets that actually work! #MetaCTF #CybersecurityHiring #CTF #InfoSec #CyberSecurity #AIInterviews #TechRecruiting
Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that's how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, talking with CISOs, and reviewing the press releases, a pattern emerged: much of the messaging sounded the same, making it hard to distinguish the truly game-changing from the merely loud.In this episode of The Future of Cybersecurity Newsletter, I take you behind the scenes to unpack the themes driving this year's announcements. Yes, AI dominated the conversation, but the real story is in how vendors are (or aren't) connecting their technology to the operational realities CISOs face every day. I share insights gathered from private conversations with security leaders — the unfiltered version of how these announcements are received when the marketing gloss is stripped away.We dig into why operational relevance, clarity, and proof points matter more than ever. If you can't explain what your AI does, what data it uses, and how it's secured, you're already losing the trust battle. For CISOs, I outline practical steps to evaluate vendor claims quickly and identify solutions that align with program goals, compliance needs, and available resources.And for vendors, this episode serves as a call to action: cut the fluff, be transparent, and frame your capabilities in terms of measurable program outcomes. I share a framework for how to break through the noise — not just by shouting louder, but by being more real, more specific, and more relevant to the people making the buying decisions.Whether you're building a security stack or selling into one, this conversation will help you see past the echo chamber and focus on what actually moves the needle.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________✦ ResourcesBlack Hat 2025 On Location Closing Recap Video with Sean Martin, CISSP and Marco Ciappelli: https://youtu.be/13xP-LEwtEAITSPmagazine Studio — A Brand & Marketing Advisory for Cybersecurity and Tech Companies: https://www.itspmagazine.studio/ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageCitations: Available in the full article________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.
Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don't do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization's operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Studio: https://www.itspmagazine.studio/Learn more about ITSPmagazine Europe: https://www.itspmagazine.com/europeCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Microsoft warns of high-severity flaw in hybrid Exchange deployments France's third-largest mobile operator suffers breach Dialysis company's April attack affects 900,000 people Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO All links and the video of this episode can be found on CISO Series.com
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Terry O'Daniel, former CISO at Amplitude. In this episode: Beyond prioritization: aligning risk with reality From signals to strategy The Case for Maturity Models Security Starts With Culture Huge thanks to our sponsor, SecurityPal SecurityPal is the leader in Customer Assurance, helping companies accelerate security assurance without compromising accuracy. Their AI + human expertise approach, dynamic Trust Center, and modern TPRM solution eliminate manual work and streamline vendor security at scale. To learn more, visit securitypal.ai.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this solo episode of Life of a CISO, Dr. Eric Cole returns to the mic after a series of interviews to dive deep into the #1 foundational skill every Chief Information Security Officer must master—securing internet-facing servers. With the rising wave of breaches hitting not just Fortune 50 giants but small and mid-size companies, Dr. Cole walks through the exact steps you must take to go back to basics and become a world-class CISO. From identifying forgotten assets to hardening authentication and revamping your patching strategy, this episode is your blueprint to stop attacks before they start. Dr. Cole also shares real-world breach examples, discusses the risks of relying solely on IT, and explains why a functioning change control board and MFA implementation for admins are non-negotiable.
In this inspiring episode of Life of a CISO, Dr. Eric Cole sits down with Zachary Lewis, Chief Information Security Officer at the University of Health Sciences and Pharmacy in St. Louis. With over five years in the CISO seat and a career that spans startups, coal plants, and higher education, Zach shares his unique journey from sysadmin to security leader. This episode offers a front-row seat into what it really takes to pivot into cybersecurity leadership—especially when you're coming from the IT side. Zach breaks down how to make the transition, why leadership trumps deep technical skills at the CISO level, and how to build credibility even when you don't have decades of cyber experience under your belt. But this conversation goes beyond resumes and frameworks. Zach and Dr. Cole dig deep into the realities of leading during a global crisis—Zach took his role just weeks before COVID—and how a ransomware incident became a turning point in proving the strength of his security program. For aspiring CISOs and current security leaders alike, this episode is full of wisdom on how to lead with calm, build board-level trust, and turn unexpected challenges into defining moments. Whether you're just starting out or looking to sharpen your executive edge, Zach's story is a blueprint worth studying.
Hackers hijacked Google's Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers' data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
In this week's episode, we break down Model Context Protocol, or MCP. What is it, why should you care, and how does it change your solutions? We discuss the concept, the architecture, and share our experiences working with MCP solutions.(00:00) - Intro and catching up.(03:02) - Show content starts.Show links- MCP home: modelcontextprotocol.io- Use MCP: Connect to Remote MCP Servers- Build a server: Build an MCP Server- Build a client: Build an MCP Client- modelcontextprotocol/csharp-sdk: The official C# SDK for Model Context Protocol servers and clients.- MCP Dev Days session- Give us feedback!
Join Todd, our COO & CISO, and Nate, our Director of Cybersecurity, as they discuss the recent cyber attack on the city of St. Paul. Recorded on August 6th, this episode dives into the incident's details, the response measures taken by the city, including invoking the Minnesota National Guard, and the implications for other municipalities. Our experts highlight the importance of a mature cybersecurity program, the role of a Security Operations Center (SOC), and the critical need for proactive measures such as eliminating VPNs and implementing application whitelisting. Plus, they touch on business continuity, communication planning, and the financial impact of such cyber incidents. Don't miss this essential discussion for cities and organizations aiming to bolster their cybersecurity defenses.Resources:https://www.stpaul.gov/https://www.stpaul.gov/news/mayor-carter-declare-state-emergency-response-digital-security-incidenthttps://www.northstpaul.org/CivicAlerts.aspx?AID=990https://www.stpaul.gov/news/important-information-city-services-during-digital-security-incident-1https://www.youtube.com/live/6l8Rzhq60Go?si=rkRMOdeKyjbhr-zs00:00 Introduction to the Cyber Attack on St. Paul01:06 Initial Response and Observations03:42 External Support and National Guard Involvement06:13 Incident Response and Communication Strategies08:37 Impact on City Services and Segmentation Importance12:12 Business Continuity and Manual Processes20:22 Financial Implications and Recovery Time26:52 Preventative Measures and Recommendations34:53 Conclusion and Final Thoughts
From SAML to OAuth to FIDO2 to passwordless promises, we unpack what's working—and what's broken—in the world of identity and authentication. Today on the Packet Protector podcast, we're joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about authorization... Read more »
Is adding AI to your environment a software purchase? Or is it more like hiring an employee? Heavy Strategy’s John Burke and Johna Johnson debate whether AI should be treated as just another application you buy and use, or be handled like an employee you’re bringing on staff (complete with background and reference checks, training... Read more »
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest, Rajan Kapoor, CEO of Material Security. In this episode: AI creates security's catch-22 Delegation without abandonment Google's security gaps demand better tools Trust beats sophistication every time A huge thanks to our sponsor, Material Security What if you could get a view of security across Google Workspace–email, documents, and accounts–all in one place? Material Security unifies your Google Workspace security operations, simplifying and strengthening security with continuous monitoring and automatic issue resolution. See how Material Security simplifies your security for GMail, GDrive and Google accounts. Learn more at https://material.security.
From SAML to OAuth to FIDO2 to passwordless promises, we unpack what's working—and what's broken—in the world of identity and authentication. Today on the Packet Protector podcast, we're joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about authorization... Read more »
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that innovation, collaboration, and a new generation of cyber leaders will shape a more secure future. Resources: View Nasrin Rezai on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.
Is adding AI to your environment a software purchase? Or is it more like hiring an employee? Heavy Strategy’s John Burke and Johna Johnson debate whether AI should be treated as just another application you buy and use, or be handled like an employee you’re bringing on staff (complete with background and reference checks, training... Read more »
Microsoft and Google among most affected as zero day exploits jump 46% Vietnamese hackers use PXA Stealer, hit 4,000 IPs and steal 200,000 passwords globally New Plague Linux malware stealthily maintains SSH access Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Explore how CISOs can educate the board, build resilience, and invest effectively in security, with Steve Dubin, ISF CEO, and Margaret Heffernan, a Professor of Practice at the University of Bath School of Management. Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management
In this episode, Greg talks with Jason Jauch, founder of C^2, about the challenges and rewards of delivering cybersecurity to healthcare practices. Jason shares his journey from hands-on IT to virtual CISO, why compliance doesn't equal security, and how his one-stop-shop model helps clients manage risk without the noise. They also discuss upcoming HIPAA changes, niche security gaps in ophthalmology, and how Jason stays grounded through CrossFit.
The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split into two segments. This week, we're discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year anniversary of that thing that happened, Crowdstrike would like to assure you that they're REALLY making sure that thing never happens again Flipping the script How researchers rooted Copilot, but not really talks to check out at Hacker Summer Camp detection engineering tips the Cloud Security Alliance has a new AI Controls Matrix sending in the National Guard to handle a breach! and how to read an AI press release Interview: Guillaume Ross on Building Security from Scratch Guillaume shares his experiences building security from scratch at Canadian FinTech, Finaptic. Imagine the situation: you're CISO, and literally NOTHING is in place yet. No policies, no controls, no GRC processes. Where do you start? What do you do first? Are there things you can get away with that would be impossible in older, well-established financial firms? Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-418
In this enlightening episode of CISO Tradecraft, host G Mark Hardy engages with cybersecurity expert and podcast host Christophe Foulon to explore the multifaceted journey into the field of cybersecurity. The discussion delves into leadership, career development, the challenges of being a Chief Information Security Officer (CISO), and the strategic considerations for those aspiring to excel in this dynamic field.CISO TradeCraft Podcast YouTube: https://www.youtube.com/@cisotradecraftWebsite: https://www.cisotradecraft.com/Christophe Foulon Links:Profile - http://www.christophefoulon.comWebsite - https://www.cpf-coaching.comLinkedin - https://www.linkedin.com/in/christophefoulon/Breaking Into Cybersecurity On Linkedin - https://www.linkedin.com/company/breaking-into-cybersecurity/Breaking Into Cybersecurity On YouTube: https://www.youtube.com/@BreakingIntoCybersecurityBreaking Into Cybersecurity On Podcast: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698Breaking Into Cybersecurity On Website: https://www.cyberhubpodcast.com/breakingintocybersecurityhttps://www.twitch.tv/breakingintocybersecuriyChristophe Foulon Books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://www.amazon.com/dp/1955976007/Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Breaking Into Cybersecurity YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity
Join host G Mark Hardy in another enlightening episode of CISO Tradecraft as he speaks with special guest Christophe Foulon, a seasoned cybersecurity professional and podcast host. In this episode, Christophe delves into his journey from the help desk to cybersecurity expert, the challenges faced by newcomers, and the keys to successfully building and leading cybersecurity teams. Learn about the importance of continuous learning, managing career transitions, and the emotional rewards and challenges of being a CISO. Whether you're an aspiring CISO or looking to advance in your cybersecurity career, this episode offers invaluable insights and practical advice. Christophe's LinkedIn: https://www.linkedin.com/in/christophefoulon/ Christophe's Website: https://christophefoulon.com/ Christophe's Podcast: https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698 Transcripts: https://docs.google.com/document/d/1UytoyelIMezzbtxdPHo5FE_oLiXYS_58 Chapters 00:00 Introduction to the Episode 00:27 Meet the Guest: Christophe Foulon 01:30 Christophe's Journey into Cybersecurity 06:24 The Allure and Challenges of a CISO Role 09:55 Developing Political and Leadership Skills 20:30 Aligning Team Members with Their Strengths 31:34 Navigating HR and Diversity in Cybersecurity 36:29 Becoming a Fractional or Virtual CISO 42:27 Final Thoughts and How to Connect with Christophe
The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split into two segments. This week, we're discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year anniversary of that thing that happened, Crowdstrike would like to assure you that they're REALLY making sure that thing never happens again Flipping the script How researchers rooted Copilot, but not really talks to check out at Hacker Summer Camp detection engineering tips the Cloud Security Alliance has a new AI Controls Matrix sending in the National Guard to handle a breach! and how to read an AI press release Interview: Guillaume Ross on Building Security from Scratch Guillaume shares his experiences building security from scratch at Canadian FinTech, Finaptic. Imagine the situation: you're CISO, and literally NOTHING is in place yet. No policies, no controls, no GRC processes. Where do you start? What do you do first? Are there things you can get away with that would be impossible in older, well-established financial firms? Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-418
Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
Shane Barney, the former CISO at USCIS and currently the CISO for Keeper Security, said the move to zero trust received wide support from the program leaders.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split into two segments. This week, we're discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year anniversary of that thing that happened, Crowdstrike would like to assure you that they're REALLY making sure that thing never happens again Flipping the script How researchers rooted Copilot, but not really talks to check out at Hacker Summer Camp detection engineering tips the Cloud Security Alliance has a new AI Controls Matrix sending in the National Guard to handle a breach! and how to read an AI press release Interview: Guillaume Ross on Building Security from Scratch Guillaume shares his experiences building security from scratch at Canadian FinTech, Finaptic. Imagine the situation: you're CISO, and literally NOTHING is in place yet. No policies, no controls, no GRC processes. Where do you start? What do you do first? Are there things you can get away with that would be impossible in older, well-established financial firms? Show Notes: https://securityweekly.com/esw-418
Our feature guest this week is Josh Peltz, VP of the West for Zero Networks. News from Eldora, COOP Rideshare, Red Canary, Optiv, zvelo and a lot more! Come join us on the Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: New Colorado area code rolls out for dozens of counties Nederland to buy Eldora Mountain Resort with support of ski industry heavy hitters Time to buy? Denver housing market hits highest inventory in 14 years Colorado Driver-Owned Ridershare App Relaunches With Improved Service, Same Benefits for Drivers More shady QR codes found on Denver parking meters Colorado among states to pass privacy laws protecting brain data collected by devices Trump Administration's AI Action Plan and New Executive Orders Offer Strategic Opportunities and Legal Risks for Private Businesses Understanding the threat landscape for MCP and AI workflows Cybersecurity Leadership in 2025: The Strategic Role of CISOs in an AI-Driven Era Addressing Legacy Phishing Detection Failure Upcoming Events: Check out the full calendar ISSA Denver - August Chapter Meeting - 8/13 Colorado = Security Picnic - 8/23 ISSA Pikes Peak - Chapter Meeting - 8/27 ISSA Denver - AI/ML SIG: Agentic AI - 8/27 ISSA Denver - Women in Cyber: From Crisis Response to Boardroom: Becoming a CISO the Unconventional Way - 9/3 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
In this short segment of the Revenue Builders Podcast, we revisit the discussion with veteran sales leader and CRO of RegScale, Eric Erston, to unpack what truly sets top-performing sales teams apart. From the importance of laser focus and understanding your ideal customer persona to evolving qualification strategies and leveraging modern tools to decode human motivation — Eric shares hard-won wisdom from decades in enterprise sales and leadership. Whether you're a rep or a revenue leader, this conversation reveals why success depends on where you spend your time — and who you spend it with.KEY TAKEAWAYS[00:00:25] Top performers exhibit relentless focus — not just on numbers but on aligning activity with outcomes.[00:01:10] Teams with process clarity and metric discipline stand in stark contrast to disorganized teams[00:01:52] The “measure twice, cut once” principle applies in sales — especially in qualification and time prioritization.[00:02:16] Beyond BANT: Success requires knowing the ideal company profile and persona profile — both matter deeply.[00:03:14] Not all CISOs are equal — role scope and influence vary by industry and product category.[00:03:54] Many teams ignore the depth of the human behind the persona — a costly oversight.[00:04:16] Use modern tools (social, blogs, panels, LinkedIn) to research what excites and motivates decision-makers.[00:05:36] There's a work persona and a human persona — both drive behavior. Understand them both.[00:06:00] Success in scale comes not from personal talent, but repeatable frameworks others can execute.QUOTES[00:00:25] "Top performers are always focused… focused on what they sell, their metrics, and what success actually looks like.[00:01:52] "Measure twice, cut once — you can't qualify without knowing what success looks like.[00:02:38] "I didn't spend enough time thinking about the role of the human… I thought if you get to the exec, you're good. Well, maybe."[00:03:54] "We know how they're measured — but we rarely go deeper into what drives them as a person."[00:06:49] "As a seller, I could get deals done. But when you're leading a team, you realize you have to teach those nuances."Listen to the full conversation through the link below.https://revenue-builders.simplecast.com/episodes/mastering-sales-leadership-with-eric-erstonEnjoying the podcast? Sign up to receive new episodes straight to your inbox:https://hubs.li/Q02R10xN0Check out John McMahon's book here:Amazon Link: https://a.co/d/1K7DDC4Check out Force Management's Ascender platform here: https://my.ascender.co/Ascender/
Send us a textThis episode covers a week in privacy which feels light and refreshing. Listen to co-hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal. Topics include an emergency ban in Italy about publishing images about an autopsy, Germany's actions involving Meta, Poland's enforcement on a McDonald's data breach, UK's collaboration with OpenAI, UK's enforcement against spam/spoof scam calls, age-verification in MS, and more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
I had such a wonderful conversation with Channel Sales Leader and Mentor Jen Waltz. As Chief Information Security Officer of Imagenative, Jen is: FOUNDER and CISO. Empowering Your Business to Scale, Secure and Succeed. She helps with: Cybersecurity and Emerging Technologies: Help partners build, deliver, and manage cutting-edge cybersecurity solutions. Enterprise IT & Digital Transformation: Adopt next-gen technology solutions by enabling the right partners, distributors, and vendors. Cloud & SaaS Enablement: Accelerate cloud, cybersecurity, and SaaS adoption across industries. Technology Distribution & Supply Chain: Evolve from traditional logistics providers to digital orchestration. Channel & Partner Ecosystem: Enable VARs, MSPs, and SIs to build profitable, service-led businesses. More about Jen: https://www.linkedin.com/in/jenwaltz/ More about Women Sales Pros - we have a website, we are on LinkedIn, Facebook, and Instagram. We are looking for our 2026 sponsors! Subscribe to our 2x a month news, and share the podcast with others! We'd love a 5 star rating and comments on iTunes if you are so moved! It really makes a difference. subscribe: https://bit.ly/thewspnews Contribute: https://forms.gle/v9rRiPDUtgGqKaXA6 Past News Issues: bit.ly/past_news_issues https://womensalespros.com/podcast/
In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today's cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406
Today's digital entertainment ecosystem spans streaming platforms, mobile applications, gaming networks and content delivery systems—creating unprecedented opportunities and security challenges. Forward-thinking leaders are working to balance seamless user experiences with robust security frameworks in an era where digital content is ubiquitous and consumers demand instant, secure access across every device. Tune in as experts discuss how the evolution of digital entertainment platforms is transforming security paradigms, creating new business models and why protecting the modern media value chain has become a C-suite priority that extends far beyond technical considerations. Featured experts Tony Lauro, Senior Director of Security Strategy, Akamai Technologies Tina Slivka, Vice President, Consult Lead for US Telecom, Media and Technology, Kyndryl
Everyone's talking about AI these days, especially in cybersecurity. Sure, artificial intelligence can boost your defenses, but cybercriminals have noticed too. Now they're crafting phishing emails so believable it's scary and finding clever paths around spam filters while zeroing in on vulnerabilities you didn't even realize were there. Today, Aviad Hasnis joins the show. He's the CTO of Cynet Security and spent years running cybersecurity missions for the Israeli Defense Forces. Aviad's here to help us figure out what the changing threat landscape really means, whether you're leading a corporate giant or just trying to keep your small business safe. From passwords getting scooped up to VPN setups from a decade ago that no one updated, Aviad's seen just about everything go wrong. He also explains why copy-pasting AI-generated code might open you up to attacks you never saw coming. He's big on education, common sense, and making sure you're using multiple security layers. These days even one slip-up can give attackers exactly what they're looking for. Aviad also walks us through supply chain vulnerabilities and why they should keep you up at night. Whether you're the CISO of a Fortune 500 company or you're running a small team with Bob, the go-to tech person juggling 18 other tasks, this episode is packed with practical insights to help you avoid the next big cybersecurity headache. While AI might be reshaping the cybersecurity landscape, staying secure still comes down to thoughtful planning, human judgment, and making sure someone you trust has your back. Show Notes: [01:08] Aviad has been Cynet's Chief Technology Officer for the past five years. Prior to that, he worked in cyber security for the Israeli Army. [02:18] He was always fascinated with computers and technology. When Iran had a technology problem, he realized that cybersecurity was what he wanted to do for the rest of his life. [03:19] Aviad shares a story about his friend's mother being exposed to a scam. She received a phone call from someone pretending to be a police officer. She even installed different executables on her laptop. She didn't realize she was being victimized until she transferred over five grand. [06:07] Social engineering is one of the most dominant ways to gain access. [08:39] The security implications of using AI. [09:30] It's important to have guardrails with how you use AI. [10:28] If you're just copying and pasting code you may copy something that could be vulnerable to exploits. [11:16] People need to be aware of the types of risk and educate themselves. [12:49] Conversations at the C-suite level for implementing AI. [13:43] The challenge is to harness AI the right way without replacing people. [15:18] It's important to use critical thinking when creating with AI. [16:04] AI is helping security by allowing people to consult and get information. You can also introduce vulnerabilities into your application if you just copy and paste from chat GPT without knowing the context. [17:05] The bad guys can also use AI. [17:56] AI has improved the quality of phishing scams. [21:36] Where organizations are missing out when it comes to sniffing out threats. This includes VPNs and SaaS or cloud. [22:52] Employees could be using their home computers to connect to the company VPN and then their kids might download some malware or trojan. Companies need to use two-factor authentication when it comes to VPNs. [24:11] Email phishing can be another way to steal credentials. [27:54] The most effective approach is security layers. [30:40] Another security measure is creating profiles where we know where you're logging in from. [33:35] Is this doom and gloom for small businesses? [34:48] The best solution for small businesses would be to find a company with an all-in-one solution. [37:11] The importance of being proactive, so you can act quickly if you see something suspicious. [38:24] How the move to the cloud affects security. [39:08] Shifting to the cloud is safer. [44:20] New threats on the horizon include threat actors utilizing AI. They love to get control of remote applications. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cynet Security Aviad Hasnis - LinkedIn Aviad Hasnis - Cynet Security
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: Large enterprise security demands drive vendor improvements Technical expertise becomes leadership liability without delegation EDR evolution needs prevention focus Career breaks require personal ownership and strategic timing A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
My guest today, Steve Durbin, shares why empathy, agility, and resilience are vital to managing risk and keeping your organization secure. Steve shares the biggest threats to organizations right now and how empathetic leaders foster the resiliency needed to adapt. We discuss how CISO's and risk officers can create an empathetic culture where trust and transparency flow to help protect the organization. Steve shares how letting go of control can keep you safer, and how curiosity and listening help you communicate in ways people understand. He candidly shares that CEOs who don't understand empathy are a risk. And finally, Steve offers ways to balance a culture of experimentation and empowerment with effective risk management. To access the episode transcript, please scroll down below.Key Takeaways:When assessing risk, people are your greatest risk, but they are also your greatest asset and your greatest opportunity for solutions. It is not the machine or the algorithm that will solve your risk problem; it is your people. You risk losing your best people if you're not willing to adapt to what needs to be done for the best of your organization, employees, clients, and other stakeholders. "You increase awareness by explaining why people need to be aware, why they should care, and you may have to make it personal." — Steve DurbinFrom Our Partner:SparkEffect partners with organizations to unlock the full potential of their greatest asset: their people. Through their tailored assessments and expert coaching at every level, SparkEffect helps organizations manage change, sustain growth, and chart a path to a brighter future.Go to sparkeffect.com/edge now and download your complimentary Professional and Organizational Alignment Review today.About Steve Durbin: CEO, Information Security ForumSteve Durbin is Chief Executive, Information Security Forum (ISF). His main areas of focus include strategy, information technology, cyber security and the emerging security threat landscape across both the corporate and personal environments.He is a frequent speaker and commentator on technology and security issues, and, since 2016, the host of the ISF Podcast.Formerly at Ernst & Young, Steve has been involved with IPOs, mergers and acquisitions of fast-growth companies across Europe and the USA. Having previously been senior vice president at Gartner, he has advised a number of NASDAQ and NYSE listed global technology companies.Steve has served as a Digital 50 advisory committee member in the United States, and he has been ranked as one of the top 10 individuals shaping ow organizations and leaders approach information security careers. He has also been featured on the top 20 most influential list of leaders whose companies have a vision that shapes the conceptual landscape of their respective industries.Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing, Forbes Business Council Member and a lecturer at Henley Business School, where he speaks on the role of the Board in Cybersecurity.Connect with Steve:Information Security Forum: securityforum.org X: x.com/securityforum LinkedIn: linkedin.com/in/stevedurbin YouTube: youtube.com/channel/UCyTu0HsWQd_ucrt0Zo0042A Connect with Maria:Get Maria's books on empathy: Red-Slice.com/booksLearn more about Maria's work: Red-Slice.comHire Maria to speak: Red-Slice.com/Speaker-Maria-RossTake the LinkedIn Learning Course! Leading with EmpathyLinkedIn: Maria RossInstagram: @redslicemariaFacebook: Red SliceThreads: @redslicemariaWe would love to get your thoughts on the show! Please click https://bit.ly/edge-feedback to take this 5-minute survey, thanks!
What does "secure by default" really mean—and is it enough? In this episode of CyberArk's Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company's AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss security audits and how they can help organizations across the globe stay cyber safe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Unit 42 (Palo Alto Networks) just showed they can use AI to conduct a complete ransomware attack in 25 minutes, a 100x speed increase. What does this mean for defenders? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.
Even cyber pros have technical issues sometimes – our camera caught a bug, but the audio is clean and packed with security insights! July 28, 2025: Aaron Heath, CISO and Cybersecurity Counsel at the Medical University of South Carolina, and Brian Zegers, Information Security Officer at Lee Health, discuss a variety of security topics. The conversation takes a turn when both leaders address their growing concerns about AI's rapid evolution from helpful tools to autonomous agents with privileged network access. How do you prepare for ransomware recovery when your backup strategies have blind spots? And what happens when AI agents start operating independently within healthcare networks? As these security leaders balance innovation with protection, they ask: Are we moving too fast with AI automation, and how do we secure technologies that are changing faster than our security frameworks can keep pace? Key Points: 03:08 Brian's Ransomware Recovery Initiative 08:41 The Role of AI in Cybersecurity 13:47 Talent Recruitment Strategies 17:48 Career Journeys in Cybersecurity 21:32 Fun and Personal Insights X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer