Podcasts about cisos

  • 574PODCASTS
  • 4,236EPISODES
  • 24mAVG DURATION
  • 2DAILY NEW EPISODES
  • Jul 15, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cisos

Show all podcasts related to cisos

Latest podcast episodes about cisos

Security Visionaries
Security Visionaries LIVE at Infosec Europe: CISO / CEO Crucial Conversations

Security Visionaries

Play Episode Listen Later Jul 15, 2025 34:15


Join host Emily Wearmouth for the very special episode of Security Visionaries recorded live at Infosecurity Europe. She's joined by Holly Foxcroft, Ian Golding, and Rich Davis to discuss the crucial conversations CISOs need to have with their CEOs this year. The episode dives into four key areas: cost, risk, innovation, and AI, offering insights and exploring the differing perspectives between tech leaders and CEOs.

Inside the ICE House
Episode 477: Sysdig CEO Bill Welch on Cloud Defense & the Next-Gen of Cyber Security

Inside the ICE House

Play Episode Listen Later Jul 14, 2025 28:51


Cloud security is undergoing a major transformation as threats become more complex and automated. Generative AI is helping teams cut through noise, automate tasks, and respond to risks faster. Sysdig, led by CEO Bill Welch, is at the forefront of this shift—empowering security teams with real-time insights and accelerating global growth. He goes Inside the ICE House to discuss company growth and the tools the his team is equipping CISOs with to fight growing threats.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 12-13, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 12, 2025 1:08


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 11, 2025. Activision Pulled Game, Players Exploited. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 11, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

What It Means
Fear In B2B Buying, Future Of Experiences, Cisco Live Recap

What It Means

Play Episode Listen Later Jul 10, 2025 23:02


In this episode of What It Means, we dig into fear as a motivator in the B2B buying process, the human-centric future of digital experiences, and what CISOs need to know coming out of Cisco Live.

The FIT4PRIVACY Podcast - For those who care about privacy
How Does the CISO Define Digital Trust and Collaborate with Privacy Functions

The FIT4PRIVACY Podcast - For those who care about privacy

Play Episode Listen Later Jul 10, 2025 6:46


In today's digital world, trust is everything. But what does digital trust really mean? And how do security leaders like CISOs help build it while working with privacy teams?In this insightful trailer episode of the FIT4PRIVACY Podcast, cybersecurity expert Aman Tara joins host Punit Bhatia to break down the evolving role of the Chief Information Security Officer. You'll learn how CISOs protect company data, follow privacy laws, and work closely with privacy teams to keep personal information safe and hear how regular meetings and teamwork between security and privacy experts help stop threats before they happen—especially with new technologies like artificial intelligence changing the game. If you want to understand how companies keep your data safe and build trust in a digital world, this episode is for you! This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you will enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from the industry influencers who share their ideas. The episodes are released as audio every Wednesday and video every Thursday.  If you subscribe to our podcast, you will be notified about new episodes. If you have not done so, write a review and share it with someone who will benefit.  RESOURCES Websites www.fit4privacy.com, www.punitbhatia.com, https://www.linkedin.com/in/aman-tara-cisa-cdpse-cfe-b6095483/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy   

Cyber 9/11 with Dr. Eric Cole
Mastering the CISO Journey with Guest Christophe Foulon

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jul 10, 2025 24:51


In this episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity expert and fellow podcaster Christophe Foulon to dive deep into the evolving role of the Chief Information Security Officer. From breaking into cybersecurity to leading organizations through strategic risk decisions, Christophe shares real-world insights on how to transition from technical roles to executive leadership. They explore the challenges of balancing hands-on work with high-level strategy, how to communicate with business leaders without getting lost in technical jargon, and how to manage burnout while building organizational resilience. Christophe also tackles major topics like AI, zero trust, cyberwarfare, and BYOD policies, offering practical advice for today's and tomorrow's CISOs. If you're aiming to elevate your cybersecurity career or want to understand how top leaders think, this episode is packed with guidance, clarity, and perspective.  

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 10, 2025. $43M+ Stolen From GMX Crypto Platform. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 10, 2025 1:19


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 9, 2025. Flutter Entertainment Flags Data Breaches. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 9, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

@BEERISAC: CPS/ICS Security Podcast Playlist
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 9, 2025 24:25


Podcast: Industrial Cybersecurity InsiderEpisode: Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant FloorPub date: 2025-07-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Ravit Show
What does recovery actually look like after a cyberattack?

The Ravit Show

Play Episode Listen Later Jul 9, 2025 9:16


I had the chance to experience it firsthand today at RSA Conference — inside the Recovery Range by Commvault.I also sat down with Gareth Russell from Commvault to talk about what's really on the minds of CISOs and enterprise leaders today. We talked about: • What Mission: Recoverable is really solving for • Why recovery is the new front line for security • What customers are most excited about right now • And what excites Gareth personally about where this space is headedIf you're at RSA this week, do yourself a favor: • Stop by Booth 5678 • Try out the Recovery Range • Book time with the Commvault team to hear what's next in cyber recoveryReal conversations, real strategies, and one of the best hands-on experiences at RSA.This interactive simulation — called Mission: Recoverable — isn't just a demo. It's a full-blown test of how ready you are when things go wrong. And I have to say, it's one of the most insightful and realistic exercises I've seen at any security event.Register here to try it yourself — https://www.commvault.com/events/rsa-2025#ai #security #rsa2025 #commvault #theravitshow

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 8, 2025. Cyberattack Disrupts Russian Drones. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 8, 2025 1:24


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

@BEERISAC: CPS/ICS Security Podcast Playlist
How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot Vulnerability

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 8, 2025 17:55


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot VulnerabilityPub date: 2025-07-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk.  From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI's efficiencies.  Whether you're in a large enterprise or a lean team with limited resources, you'll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let's jump in and explore how to protect it all as AI advances. Key Moments :  01:20 AI's Rising Role in Media 03:22 Guidelines for Using AI Safely 07:06 "AI Integration and Automation Strategies" 10:03 Automating Windows Management Tasks 14:29 Exploring AI for Personal Tasks Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 7, 2025. Ransomware Hits Ingram Micro, IT Distributor. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 7, 2025 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The CyberWire
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]

The CyberWire

Play Episode Listen Later Jul 4, 2025 38:00


While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year's “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won't change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale. Resources: Kubikle: A comedy webseries about cybercriminals. Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024 Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

The New CISO
Ask the Right Questions: How Building Trust Brings Value

The New CISO

Play Episode Listen Later Jul 3, 2025 50:59


In this episode of The New CISO, host Steve Moore speaks with Aleksandar Radosavljevic, Global CISO at Global Fashion Group, about building trust, measuring resilience, and the evolving role of the security leader.Aleksandar shares how his unexpected pivot from electrical engineering to cybersecurity sparked a passion for protecting systems and solving problems. With over two decades of experience across pharma, manufacturing, and tech, he offers insights into how security leaders can establish trust, drive business value, and focus on what really matters.The conversation covers the art of starting strong in a new CISO role, navigating interviews with curiosity and care, and avoiding common traps like overcomplicating metrics or chasing the latest tools without mastering the basics.Key Topics Covered:Why pharma's mission-driven work made a lasting impact on AleksandarCareer advice for cybersecurity newcomers: follow learning, not just industryHow CISOs can build early trust by listening and understanding the businessRed flags and green lights during the CISO interview processWhy being challenged in an interview signals a healthy security cultureThe problem with vanity metrics—and what to track insteadAleksandar's favorite KPIs: time to detect, respond, and contain incidentsThe role of situational awareness in building cyber resilienceHow simplifying language helps CISOs align with executive teamsWhy mandate and mindset matter more than reporting linesAleksandar's story is a reminder that cybersecurity leadership is about more than tools and tactics—it's about trust, transparency, and transforming security from a blocker into a true business enabler.

Cyber 9/11 with Dr. Eric Cole
How a Hacker Became Twitter's First CISO | Michael Coates on Cybersecurity's Future

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jul 3, 2025 33:04


In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter's first Chief Information Security Officer (CISO), and later founding his own data security company. They discuss how core cybersecurity principles remain constant despite evolving technologies and threats, emphasizing the importance of mastering fundamentals while adapting to new contexts like cloud and AI.   Michael offers practical advice for aspiring CISOs, highlighting the value of diverse security experience, business acumen—such as understanding finance and sales—and the ability to balance risk with business needs. He stresses the importance of building strong teams, effective communication with executives, and partnering closely with legal to manage liability. The conversation also touches on optimal reporting structures for CISOs and reframing security as a business enabler rather than a roadblock. Ultimately, Michael advocates for transparent risk communication and thoughtful preparation as keys to successful security leadership.

The Other Side Of The Firewall
Dear CISO: Are You Enabling the Business—or Blocking It?

The Other Side Of The Firewall

Play Episode Listen Later Jul 2, 2025 12:16


In this episode of the podcast, the hosts discuss critical cybersecurity questions that CISOs must address, the role of CISOs in business, and the impact of AI on cybersecurity practices. They emphasize the importance of understanding data classifications and the need for proactive threat anticipation. The conversation also highlights an upcoming interview with a BISO, showcasing the diverse paths within the cybersecurity field. Article: 10 tough cybersecurity questions every CISO must answer https://www.csoonline.com/article/4009212/10-tough-cybersecurity-questions-every-ciso-must-answer.html?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExUjBnellqWnoxdG1aOG5LMAEeOmsezAD3A_9uVaGx86gqXQPo0U1ih0ipBaB-tdNvFz4Nsc57YnNOJU7zxk0_aem_JTq8bkdj_NN2K3v6LEu1LA Buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Cybersecurity Conversations 00:58 Key Questions for CISOs 03:28 The Role of Security in Business 07:53 AI's Impact on Cybersecurity 09:39 Upcoming Interview and Closing Thoughts #cybersecurity #ciso #biso

@BEERISAC: CPS/ICS Security Podcast Playlist
How to Harness AI Without Breaking Security or Corporate Policies

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 1, 2025 15:46


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: How to Harness AI Without Breaking Security or Corporate PoliciesPub date: 2025-06-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk.  From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI's efficiencies.  Whether you're in a large enterprise or a lean team with limited resources, you'll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let's jump in and explore how to protect it all as AI advances. Key Moments :  01:20 AI's Rising Role in Media 03:22 Guidelines for Using AI Safely 07:06 "AI Integration and Automation Strategies" 10:03 Automating Windows Management Tasks 14:29 Exploring AI for Personal Tasks Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
US-Russia Cyber Relations. What CISOs Should Know. Phil Muncaster, Technology Journalist.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 30, 2025 14:21


Phil Muncaster is a technology journalist and copywriter with over 20 years of experience. He contributes daily news to Infosecurity Magazine and feature articles to other IT titles across the industry. In this episode, Muncaster joins host Heather Engel to discuss US-Russia cybersecurity relations, the possibly of a detente, and what CISOs across the industry should know. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Telecom Reseller
Aviatrix and Wiz: Closing the Loop on Cloud Security, Podcast

Telecom Reseller

Play Episode Listen Later Jun 30, 2025


Podcast with Chris McHenry, VP at Aviatrix, and Doug Green, Publisher of Technology Reseller News “Wiz detects. We react and enforce.” — Chris McHenry, Aviatrix In this timely conversation, Doug Green of Technology Reseller News sits down with Chris McHenry, Vice President at Aviatrix, to explore the company's groundbreaking partnership with Wiz—and how the two are working together to solve one of the most urgent problems in enterprise IT: cloud security. Aviatrix is focused on reinventing network security for the cloud era, helping enterprises regain the controls they've lost in the transition from traditional data centers to cloud-native architectures. “CISOs consistently tell us their cloud environments feel less secure than their data centers,” McHenry notes. That's where Aviatrix steps in—by delivering Zero Trust security at the network layer, with cloud-native tools that provide perimeter protection, lateral movement control, and runtime enforcement. The conversation zeroes in on the company's recent integration with Wiz, the cloud-native application protection platform (CNAPP) that recently made headlines with its massive $30 billion acquisition by Google. According to McHenry, the partnership is more than strategic—it's foundational. “They detect attacks, we stop them,” he says, describing a “closed-loop” response system where Wiz identifies high-risk incidents and Aviatrix's Cloud Native Security Fabric automatically reacts in real time, quarantining threats and blocking malicious activity. As AI rapidly redefines the modern enterprise, McHenry explains how Aviatrix is evolving to meet the dual challenge: using AI to both secure cloud environments and enhance the performance of security operations. From custom AI-powered risk analysis to integrations with Microsoft Copilot for Security, the company is pushing innovation at both ends of the spectrum. And for the reseller community, there's even more upside. Aviatrix is proudly channel-first. “We sell almost entirely through the channel,” says McHenry, inviting partners—especially those already working with Wiz—to expand their practices with Aviatrix's complementary offerings. “This is a big opportunity to help your customers modernize cloud security without lifting and shifting legacy firewalls.” The stakes are rising, and this partnership is gaining attention for good reason. “Google's acquisition of Wiz validates just how critical cloud security is,” says McHenry. “And our integration gives organizations an immediate path to both detect and respond to threats—at scale.” This podcast is the first of a two-part series. Stay tuned for part two, where Aviatrix CEO Doug Merritt will dive deeper into the strategic vision shaping the next decade of secure cloud infrastructure. Learn more at: www.aviatrix.com  

Cybercrime Magazine Podcast
Cybercrime Wire For Jun 28-29, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 28, 2025 1:03


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 27, 2025. Cyberattack Hits Hawaiian Airlines Systems. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 27, 2025 1:23


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Week in Review: Qilin adds lawyers, Iranian spearphishing campaign, Microsoft Direct Send hack

Cyber Security Headlines

Play Episode Listen Later Jun 27, 2025 25:11


Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bil Harmer, operating partner and CISO, Craft Ventures. Check out Bil's page, KillSwitchAdvisory. Thanks to our show sponsor, ThreatLocker Alert fatigue, false positives, analyst burnout—you know the drill. What if you could stop threats before they run? ThreatLocker gives CISOs what they've been asking for: real control at the execution layer. Only approved apps, scripts, and executables run. Period. Known-good is enforced. Everything else? Denied by default. Ringfencing and storage control keep even trusted tools in their lane—so PowerShell doesn't become a weapon. And yes—it works at scale. Granular policies. Fast rollout. Built for modern infrastructure. You don't need more alerts. You need fewer chances for malware to make a move. ThreatLocker helps you flip the model—from detect-and-respond… to deny-and-verify. Go to ThreatLocker.com/CISO to schedule your free demo and close the last gap in your Zero Trust strategy, before it's exploited. All links and the video of this episode can be found on CISO Series.com  

Hacker Valley Studio
Purple Teaming Is the New Job Security with Maril Vernon

Hacker Valley Studio

Play Episode Listen Later Jun 26, 2025 43:26


Cybersecurity isn't just red or blue anymore... it's purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we're still failing the fundamentals. Together, Ron and Maril dig into what purple teaming really is (and isn't), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding Mind Over Cyber, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.   Impactful Moments 00:00 - Introduction 01:01 - Maril's role at NetSPI 03:00 - Why purple skills are future-proof 05:19 - Salary truths in purple teaming 08:30 - Know your value, negotiate wisely 13:07 - How defenders enable law enforcement 16:22 - The real meaning of purple teaming 18:39 - Common misconceptions debunked 24:45 - People are always the soft spot 26:01 - The two security stack must-haves 29:00 - Mom made it to incident response 30:48 - Maril's mentorship philosophy 34:09 - Why you need to post anyway 36:35 - What Mind Over Cyber is really about 40:00 - CISOs are burning out silently 41:31 - Closing thoughts Links: Connect with our guest, Maril Vernon: https://www.linkedin.com/in/marilvernon   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 25, 2025. Cyberattack Strikes Scotland City Authority. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 26, 2025 1:17


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Paul's Security Weekly
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401

Paul's Security Weekly

Play Episode Listen Later Jun 25, 2025 65:24


In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 25, 2025. Columbia Uni. Hit By Potential Cyberattack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 25, 2025 1:14


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Reimagining Cyber
AI Governance: CISO Risk and Reward - Ep 155

Reimagining Cyber

Play Episode Listen Later Jun 25, 2025 11:53


In this episode of Re-Imagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) revisits the impactful role of AI and AI governance in cybersecurity. Highlighting findings from a recent survey indicating that only 25% of CISOs believe their organizations have strong AI risk frameworks, Rob discusses the significance of AI in enhancing operational efficiency, security measures, and compliance efforts. Key themes include the strategic positioning of security practices, collaboration between security teams and product development, and the automation of threat detection and response. Rob also underscores the importance of trust and transparency in AI applications, along with the competitive advantages of efficient AI deployment. The episode aims to shed light on the early yet promising developments in AI governance and its potential business outcomes.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

Business Security Weekly (Audio)
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401

Business Security Weekly (Audio)

Play Episode Listen Later Jun 25, 2025 65:24


In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401

Business Security Weekly (Video)
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401

Business Security Weekly (Video)

Play Episode Listen Later Jun 25, 2025 65:24


In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401

The Tech Trek
Her Journey: Sales Leader to Cybersecurity CEO

The Tech Trek

Play Episode Listen Later Jun 24, 2025 20:58


In this episode, Amir sits down with Brooke Motta, CEO and co-founder of RAD Security, to unpack her career pivot from sales leadership to becoming a founder in the cybersecurity space. Brooke shares how her go-to-market background shaped her approach to building RAD, the challenge of stepping into technical leadership, how she's managing growth through hiring, and what's ahead for security and AI. Whether you're a technical founder or commercial operator, this one's packed with practical insight.

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 24, 2025. Albania Capital Hit By Iran-Tied Cyberattack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 24, 2025 1:13


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

KuppingerCole Analysts
Analyst Chat #257: Detecting Deception - A CISO's Guide to Modern Threat Detection

KuppingerCole Analysts

Play Episode Listen Later Jun 24, 2025 41:48


In this essential episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes cybersecurity strategist Jonathan Care to explore one of the most pressing challenges CISOs face in 2025: detecting deception in an age of AI-powered attacks. From deepfakes and behavioral manipulation to vendor impersonation and adversarial AI, attackers are no longer relying on simple phishing emails. They're launching highly personalized, deeply technical, and psychologically crafted deceptions. Jonathan presents a structured four-part taxonomy of deception and offers actionable insights for CISOs—from implementing callback verification protocols to deploying behavioral analytics and deception detection technologies. Topics Covered: AI-powered social engineering Digital identity deception & deepfakes Vendor/supply chain impersonation Technical deception & adversarial machine learning Practical steps CISOs can take this week

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 23, 2025. Aflac Breach Rattles Insurance Sector. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 23, 2025 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jun 21-22, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 21, 2025 0:58


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The FIT4PRIVACY Podcast - For those who care about privacy
CISO Role In Age of AI with Nick Shevelyov and Punit Bhatia in the FIT4PRIVACY Podcast E141 S06

The FIT4PRIVACY Podcast - For those who care about privacy

Play Episode Listen Later Jun 19, 2025 30:23


In the AI era, trust is everything and it's under attack. How do you build digital trust when AI is changing the rules and attackers are getting smarter? Discover how today's CISOs are stepping up, adapting to AI risks, and learning from history to protect our digital future. In this episode of the Fit4Privacy Podcast, host Punit Bhatia is joined by Nick Shevelyov, a cybersecurity expert with extensive experience as a CISO and Chief Privacy Officer, and author of Cyber War and Peace. The discussion focuses on the evolving challenges for Chief Information Security Officers (CISOs) in the age of AI, highlighting risks such as deep fakes and hyper-targeted attacks. Nick emphasizes the importance of translating technical risks into business risks for board members and discusses the implications of new AI legislation, particularly California's SB 468.  Tune in to gain insights into managing digital trust, safeguarding personal data, and the strategic initiatives needed to combat emerging cybersecurity threats.  KEY CONVERSION POINT 00:01:50 How would you define the concept of trust 00:05:26 How do you place trust? How are they shifting? What kind of swans? 00:09:06 How are CISO coping with the change of AI era? 00:20:01 Insights in CISO Perspective for US/California direction in law of terms 00:23:06 About “Cyber War…and Peace: Building Digital Trust Today, with History as our Guide” book 00:27:50 How to get in touch with Nick   ABOUT GUEST Nick Shevelyov helps build next-gen tech companies from the ideation stage. His work includes StackRox (Kubernetes security, acquired by Red Hat for $400M), Kodem (software composition analysis, Greylock Series A), Bedrock Security (data-loss prevention, Greylock Series A), and Laminar (shadow data discovery, Insight Ventures Series A).He advises founders and CEOs on product and go-to-market strategy, boosting time-to-value for companies like Pixee.ai, Quokka.io, Boostsecurity.io, and ETZ. He works across all stages, from seed to IPO.Nick consults with Insight Partners (also an LP) and FTV Capital, and serves on advisory boards for ForgePoint Capital, Mayfield Fund, Evolution Equity Partners, NightDragon, YL Ventures, and Glynn Capital.He is on the boards of Cofense | Phishme and the Bay Area CSO Council (BACC), an invite-only group of CISOs from leading Bay Area companies. A former CIO, he is also an honorary member of the Blumberg Technology Council.Nick authored Cyber War…and Peace and brings historical and behavioral insights to tech and risk management. He holds an Executive MBA from USF and certifications from Stanford, Harvard, plus CISSP, CISM, and CIPPE.ABOUT HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach professionals.Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts.As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe.  RESOURCES Websites: www.fit4privacy.com,www.punitbhatia.com,https://www.linkedin.com/in/nicholasshevelyov/, https://vcso.ai/   Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy   

@BEERISAC: CPS/ICS Security Podcast Playlist
When CISOs Inherit the Plant Floor: What Happens Next?

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 19, 2025 28:50


Podcast: Industrial Cybersecurity InsiderEpisode: When CISOs Inherit the Plant Floor: What Happens Next?Pub date: 2025-06-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when the CISO inherits responsibility for the security of the plant floor?Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility.A perpetuating trend exists where cybersecurity leaders are expected to protect factories and industrial assets without the authority, tools, or support to do so effectively.In this conversation, Dino and Craig explain why traditional IT security approaches don't work in these environments, and how things like outdated equipment, disconnected systems, and outside vendors make the challenge even harder. From weak remote access tools to the confusion around who actually manages plant security, this episode shines a light on the hidden risks most companies overlook.Whether you're in IT, operations, or a leadership role, you'll walk away with a better understanding of how to approach cybersecurity in complex industrial settings.You'll also gain insights into the steps you can take to protect your people, your technology, and your bottom line.Chapters:00:00:00 - Kicking Off: Smart Tool Choices Start Here00:01:02 - When CISOs Inherit the Factory Floor00:02:17 - Making Friends with OEMs and Integrators00:04:47 - Why OT Security Is a Whole Different Beast00:08:50 - Cyber Budgets: Where's the Money Really Coming From?00:13:10 - How to Actually Roll Out Security in the Plant00:18:35 - VPNs Aren't Enough: Fixing Remote Access00:24:42 - What OT Incident Response Really Looks Like00:27:17 - Wrapping It Up: Strategy, Buy-In, and What's NextLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 18, 2025. UBS Confirms Data Theft On 130K Employees. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 18, 2025 1:23


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The Other Side Of The Firewall
Turning AI Hype into Intentional Protection

The Other Side Of The Firewall

Play Episode Listen Later Jun 18, 2025 14:01


In this episode, Ryan Williams Sr. and Shannon Tynes discuss the intersection of cybersecurity and artificial intelligence, focusing on how security teams can leverage AI while managing the associated risks. They explore the importance of communicating effectively with C-suite executives about AI's potential benefits and dangers, emphasizing the need for a balanced approach that neither downplays risks nor incites unnecessary fear. The conversation also touches on the evolving role of CISOs and the challenges they face in securing organizations against emerging threats. Article: Gartner: How Security Teams Can Turn Hype Into Opportunity https://www.darkreading.com/application-security/gartner-security-teams-hype-opportunity?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExT0JlSEwzY1VBbUVNeHFEUgEeO-2sfXLqLdOxW0btod6O_6fgjZ9TU4Y7LzaMTYQjnIZp3Mxpxh30gAnwh5Y_aem_GhFgETytg2SpBNr8uvUMJQ Please LISTEN

To The Point - Cybersecurity
Next-Gen Threats: Generative AI, Deepfakes, and Automated Cybersecurity Defense with Petko Stoyanov

To The Point - Cybersecurity

Play Episode Listen Later Jun 17, 2025 35:39


Welcome back to Forcepoint's To the Point Cybersecurity podcast! In this episode, co-host Jonathan Knepher sits down with Petko Stoyanov—cybersecurity expert and former Forcepoint host—for a thought-provoking discussion about the evolving landscape of AI in cybersecurity. Together, they unpack the shifting trends seen at this year's RSA conference, exploring how artificial intelligence is moving from marketing buzzword to mission-critical security feature. Petko dives deep into the real-world impact of generative AI models, the increasing sophistication of both attackers and defenders, and the pressing need for “security by design” in today's fast-moving digital world. They discuss the new questions CISOs and CIOs should be asking about AI—like where models are hosted, what data they process, and how to manage risks in regulated industries. Petko shares eye-opening anecdotes about the potential for AI to accidentally leak sensitive data, the rise of targeted phishing in new languages powered by generative models, and why the CISO role is broader and more challenging than ever. The conversation also touches on the future of automation, the risk of deepfakes and disinformation, and how organizations can stay resilient in an era where the line between attacker and defender is increasingly blurred. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e337

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 17, 2025. Canadian Arrested In U.S. Grandparent Fraud. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 17, 2025 1:09


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 16, 2025. Cyberattack Strikes Washington Post Journalists. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 16, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Today
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity

Cyber Security Today

Play Episode Listen Later Jun 14, 2025 51:57 Transcription Available


In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mouli, CISO at Sheridan College, who shares her journey from engineering to cybersecurity, her global experiences, and how she manages her multifaceted role. Another guest, Mohsen Azari, Director of Cyber Defense in the financial sector, discusses his career path, which includes notable stints in entertainment and consulting. The conversation explores the pressing challenges in cybersecurity such as AI threats, burnout, and vendor tool overload, while emphasizing the importance of people skills and relationship-building within organizations. The episode wraps up with a promise of a follow-up discussion to delve deeper into the impact of AI on cybersecurity. 00:00 Introduction to the Secret CISO Show 00:51 Guest Introductions: Meet Priya Ali 01:59 Priya's Career Journey and Insights 06:44 Mohsen's Background and Career Path 13:12 John's Career and Cybersecurity Evolution 15:58 Current Cybersecurity Challenges 24:04 Adapting to New Roles in Cybersecurity 25:36 Managing People and Preventing Burnout 27:08 Servant Leadership and Team Dynamics 31:16 Strategic Hiring and Team Cohesion 33:42 Handling Stress and Personal Well-being 35:46 The Role of CISOs as Organizational Psychologists 40:54 Influencing Behavior and Building a Security Culture 44:28 Coping with the Barrage of Cybersecurity Tools 51:10 Conclusion and Future Discussions

The FIT4PRIVACY Podcast - For those who care about privacy
How CISOs Can Navigate the Changing Landscape of U.S. and California AI Laws

The FIT4PRIVACY Podcast - For those who care about privacy

Play Episode Listen Later Jun 12, 2025 10:11


In a world racing into the AI era, security, privacy, and trust are under pressure like never before. Chief Security Officers are facing a whole new battlefield, with laws rapidly taking shape — especially in the U.S. and California. Big changes are on the horizon, like California's new SB 468 bill, pushing for stronger protections around high-risk AI systems, while the EU's AI Act moves in a similar direction. So, what does this mean for CISOs today — and how should they prepare? Join us with Nick Shevelyov and Punit Bhatia, a seasoned cybersecurity leader, former Chief Security Officer at Silicon Valley Bank, and the author of Cyber War and Peace. With years of experience defending innovation and building digital trust, Nick shares real stories, powerful lessons from history, and sharp insights into where the future is heading.  This is your sneak peek into the conversation — stay tuned for the full episode. 

Cyber 9/11 with Dr. Eric Cole
From Pen Testing to Purpose: Jane Frankland on Cyber, Burnout, & Reinvention

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jun 12, 2025 35:12


In this special episode of Life of a CISO, I sit down with the brilliant Jane Frankland, MBE—an internationally recognized thought leader in cybersecurity with over 28 years of experience. Jane shares her unexpected journey into the field, starting not from a tech background but from art and design. Her curiosity and drive led her to co-found one of the earliest penetration testing consultancies, long before the term "cybersecurity" became mainstream. Together, we dive into how the industry has evolved, why penetration testing has become commoditized, and why it's no longer enough to offer just technical solutions—true value now comes from insight, strategy, and resilience.   Jane also offers powerful reflections on the burnout many CISOs face today and why so many are leaving traditional roles to launch their own consultancies or step into virtual CISO models. We discuss what it really means to build a business in today's climate, the importance of defining your unique value, and why small businesses are an underrated opportunity in the cyber space. From vendor strategy to shifting away from limiting beliefs, Jane brings a fresh, honest, and empowering perspective that challenges the status quo. Whether you're building your career or launching your own venture, this episode is full of clarity and inspiration for the next step in your cyber journey.  

Paul's Security Weekly
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399

Paul's Security Weekly

Play Episode Listen Later Jun 11, 2025 56:27


This week, it's time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-399

Reimagining Cyber
Leadership Gridlock in Cybersecurity - Ep 153

Reimagining Cyber

Play Episode Listen Later Jun 11, 2025 15:09


In this episode of Reimagining Cyber, we break down the key findings from the 2025 Cybersecurity Staff Compensation Benchmark Report from the Institute for Applied Network Security (IANS).Host Ben sits down with Rob Aragao (Chief Security Strategist, OpenText) to explore why over 50% of cybersecurity professionals just below the CISO level are considering a job change—and it's not just about burnout or pay.From leadership bottlenecks and role creep to uncertainty around organizational change, we dive into what's really driving attrition in cyber teams and what CISOs can do to keep their top talent engaged and growing.

The Segment: A Zero Trust Leadership Podcast
Resilience Over Prevention: Cybersecurity Insights with Dr. Larry Ponemon

The Segment: A Zero Trust Leadership Podcast

Play Episode Listen Later Jun 10, 2025 39:11


In this episode of The Segment, we dive deep into the critical intersection of cybersecurity, resilience, and organizational strategy with the renowned Dr. Larry Ponemon, founder of the Ponemon Institute and a pioneer in privacy and security research. With over 20 years of groundbreaking studies, including the IBM Cost of a Data Breach Report and the Global Cost of Ransomware Study, Dr. Ponemon shares valuable insights into the evolving cyber threat landscape and what businesses can do to stay ahead.We also talk about: The origins and evolution of the Ponemon Institute's research.Why prevention isn't enough, emphasizing containment and resilience in cybersecurity.The rising costs of data breaches and attackers' growing focus on disrupting operational resilience.How organizations can leverage research data to secure leadership buy-in and develop effective strategies.The importance of Zero Trust frameworks in addressing modern security challenges.The role of robust leadership, strategic planning, and redundancy in enhancing resilience.The evolving responsibilities of CISOs and unifying accountability within organizations.Emerging trends like artificial intelligence and global contributions to cybersecurity innovation.Metrics for measuring the effectiveness of security controls.The Global Cost of Ransomware Report: https://www.illumio.com/resource-center/cost-of-ransomware  Listening Notes:[2:30 - 6:00] Advice for Mitigating Ransomware Risks[6:00 - 11:00] Role of Zero Trust in Security[11:00 - 16:00] Accountability in Security Strategies[16:00 - 21:00]  Research Wishlist: Metrics and Trust[21:00 - 25:00] Long-Term Industry ObservationsTune in to learn how to shift from a prevention mindset to one of resilience and adaptability in an ever-changing digital world!

Relating to DevSecOps
Episode 079: CISOver It: When Dashboards Replace Direction

Relating to DevSecOps

Play Episode Listen Later Jun 10, 2025 37:00


Send us a textIn this episode of Relating to DevSecOps, Ken and Mike discuss the challenges faced by CISOs in today's security landscape, particularly the struggle to balance immediate security needs with long-term preventative strategies. They explore the disconnect between security leadership and practitioners, the urgency of addressing security issues, and the importance of understanding the root causes of vulnerabilities. The conversation emphasizes the need for CISOs to engage more deeply with their teams and to focus on effective, context-driven security solutions rather than simply reacting to the latest threats.