Podcasts about cisos

  • 611PODCASTS
  • 4,917EPISODES
  • 24mAVG DURATION
  • 2DAILY NEW EPISODES
  • Jan 29, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cisos

Show all podcasts related to cisos

Latest podcast episodes about cisos

Telecom Reseller
Aviatrix Advances Zero Trust for Cloud-Native and AI Workloads with Release 8.2, Podcast

Telecom Reseller

Play Episode Listen Later Jan 29, 2026


Chris McHenry, Chief Product Officer at Aviatrix, joined Doug Green, Publisher of Technology Reseller News, to discuss the launch of Aviatrix 8.2 and how the company is redefining zero trust security for modern cloud-native environments. McHenry explained that as critical business data and AI workloads increasingly reside in public clouds such as AWS, Azure, and Google Cloud, traditional perimeter-based security models are no longer sufficient. Aviatrix has spent the last decade building its Cloud Native Security Fabric, a platform designed specifically for cloud operational models rather than retrofitted on-premises approaches. With release 8.2, Aviatrix significantly expands its “zero trust for workloads” capabilities, focusing on Kubernetes, serverless environments, and AI-driven applications. A central theme of the conversation was the evolution of zero trust from a networking concept into a workload-centric security strategy. McHenry noted that recent supply-chain attacks have shown how quickly cloud-native environments can be compromised if basic network controls are missing. Aviatrix 8.2 introduces deeper Kubernetes awareness, policy-as-code integration, and initial native support for securing AWS Lambda, allowing organizations to apply micro-segmentation and least-privilege access directly to modern workloads. McHenry emphasized that cloud security must also evolve operationally. Security teams can no longer rely on slow, ticket-based firewall processes while developers deploy infrastructure at machine speed. Aviatrix 8.2 supports a DevSecOps-friendly model that enables developers to manage zero trust policies within guardrails defined by security teams. As McHenry put it, “If your workloads get more modern but your controls don't, security gets worse without you touching anything.” The discussion concluded with guidance for CIOs and CISOs preparing for the next wave of cloud and AI-driven threats: assess whether existing network security tools truly understand cloud-native workloads, modernize security operations alongside development practices, and prioritize platforms that unify cloud, network, and security teams. More information on Aviatrix 8.2 and the Cloud Native Security Fabric is available at https://aviatrix.ai/.

Paul's Security Weekly
Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432

Paul's Security Weekly

Play Episode Listen Later Jan 28, 2026 63:39


The top social engineering attacks involve manipulating human psychology to gain access to sensitive information or systems. The most prevalent methods include various forms of phishing, pretexting, and baiting, which are often used as initial entry points for more complex attacks like business email compromise (BEC) and ransomware deployment. How do you control what users click on? Even with integrated email solutions, like Microsoft 365, you can't control what they click on. They see a convincing email, are in a rush, or are simply distracted. Next thing you know, they enter their credentials, approve the MFA prompt—and just like that, the cybercriminals get in with full access to users' accounts. Is there anyway to stop this? Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss how ThreatLocker Cloud Control leverages built-in intelligence to assess whether a connection from a protected device originates from a trusted network. By only allowing users from IP addresses and networks deemed trusted by ThreatLocker to get in—phishing and token theft attacks are rendered useless. So, no matter how successful cybercriminals are with their phishing attacks and token thefts—all their efforts are useless now. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In the leadership and communications segment, Finance and security leaders are at odds over cyber priorities, and it's harming enterprises, The Importance of Strong Leadership in IT and Cybersecurity Teams, How CIOs [and CISOs] can retain talent as pay growth slows, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-432

Cybersecurity Where You Are
Episode 172: Helping CISOs as a CIS Controls Ambassador

Cybersecurity Where You Are

Play Episode Listen Later Jan 28, 2026 34:27


In episode 172 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Chirag Arora, Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP. Together, they discuss how Chirag draws upon his experience as a CISO and his community work as a CIS Critical Security Controls® (CIS Controls®) Ambassador to help other CISOs with their cybersecurity programs.Here are some highlights from our episode:00:51. Introduction to Chirag and the early years of his work as a CIS Controls Ambassador06:03. The value of measurement and psychology when discussing assessments with CISOs09:00. Chirag's work on a CISO certification and vision for aligning it to the CIS Controls12:31. How open sharing of wisdom between CISOs makes the world more secure20:57. The importance of storytelling for CISOs, CIS Controls Ambassadors, and other leaders24:29. Chirag's use of law school to take his understanding of reasonableness up a level28:13. Regular opportunities for CIS Controls Ambassadors to discuss universal issues31:08. The heightened importance of nonprofit organizations bringing people togetherResourcesCIS Critical Security Controls®Episode 160: Championing SME Security with the CIS ControlsEpisode 168: Institutionalizing Good Cybersecurity IdeasReasonable Cybersecurity GuideSimplify Security Management with CIS SecureSuite PlatformCISO Certification by GlobalCISO Leadership Foundation™If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 28, 2026. Ex-Game Studio CEO Allegedly Locked Site. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 28, 2026 1:39


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Paul's Security Weekly TV
Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432

Paul's Security Weekly TV

Play Episode Listen Later Jan 28, 2026 63:39


The top social engineering attacks involve manipulating human psychology to gain access to sensitive information or systems. The most prevalent methods include various forms of phishing, pretexting, and baiting, which are often used as initial entry points for more complex attacks like business email compromise (BEC) and ransomware deployment. How do you control what users click on? Even with integrated email solutions, like Microsoft 365, you can't control what they click on. They see a convincing email, are in a rush, or are simply distracted. Next thing you know, they enter their credentials, approve the MFA prompt—and just like that, the cybercriminals get in with full access to users' accounts. Is there anyway to stop this? Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss how ThreatLocker Cloud Control leverages built-in intelligence to assess whether a connection from a protected device originates from a trusted network. By only allowing users from IP addresses and networks deemed trusted by ThreatLocker to get in—phishing and token theft attacks are rendered useless. So, no matter how successful cybercriminals are with their phishing attacks and token thefts—all their efforts are useless now. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In the leadership and communications segment, Finance and security leaders are at odds over cyber priorities, and it's harming enterprises, The Importance of Strong Leadership in IT and Cybersecurity Teams, How CIOs [and CISOs] can retain talent as pay growth slows, and more! Show Notes: https://securityweekly.com/bsw-432

Business Security Weekly (Audio)
Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432

Business Security Weekly (Audio)

Play Episode Listen Later Jan 28, 2026 63:39


The top social engineering attacks involve manipulating human psychology to gain access to sensitive information or systems. The most prevalent methods include various forms of phishing, pretexting, and baiting, which are often used as initial entry points for more complex attacks like business email compromise (BEC) and ransomware deployment. How do you control what users click on? Even with integrated email solutions, like Microsoft 365, you can't control what they click on. They see a convincing email, are in a rush, or are simply distracted. Next thing you know, they enter their credentials, approve the MFA prompt—and just like that, the cybercriminals get in with full access to users' accounts. Is there anyway to stop this? Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss how ThreatLocker Cloud Control leverages built-in intelligence to assess whether a connection from a protected device originates from a trusted network. By only allowing users from IP addresses and networks deemed trusted by ThreatLocker to get in—phishing and token theft attacks are rendered useless. So, no matter how successful cybercriminals are with their phishing attacks and token thefts—all their efforts are useless now. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In the leadership and communications segment, Finance and security leaders are at odds over cyber priorities, and it's harming enterprises, The Importance of Strong Leadership in IT and Cybersecurity Teams, How CIOs [and CISOs] can retain talent as pay growth slows, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-432

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 27, 2026. Schools In Scotland Phished And Taken Offline. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 27, 2026 1:26


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 24-25, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 24, 2026 1:05


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 23, 2026. Crims Threaten To Leak Apple Product Details. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 23, 2026 1:32


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber 9/11 with Dr. Eric Cole
Why Executive Trust Makes or Breaks a CISO | Guest: Zachary Lewis

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jan 22, 2026 35:17


Ransomware isn't a technical problem—it's a leadership test. In this episode of Life of a CISO, Dr. Eric Cole welcomes back bestselling author and cybersecurity leader Zachary Lewis to break down the real-world realities of responding to a ransomware attack. Drawing from firsthand experience, they discuss why executive relationships, preparation, and credibility matter more than tools, how CISOs survive high-pressure incidents, and what separates leaders who thrive after a breach from those who don't. If you're a CISO, security leader, or aspiring executive, this episode offers practical insight into what ransomware response really looks like when everything is on the line.  

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 22, 2026. Ransomware Gang Sitting On Under Armour Data. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 22, 2026 1:29


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

B2B Better
How to Talk Cyber Risk So People Actually Listen | Jeffrey Wheatman, Cybersecurity Strategist at Black Kite

B2B Better

Play Episode Listen Later Jan 21, 2026 21:13


What happens when cyber risk leaders stop speaking in acronyms and start telling stories? In this episode, host Jason Bradwell sits down with Jeffrey Wheatman, SVP of Cyber Risk Strategy at Black Kite and longtime cybersecurity evangelist, to talk about how to lead with problems, not products. From decades advising CISOs at Gartner to launching the panel show Third Party, Jeff shares what he's learned about building trust, breaking down "terminal uniqueness," and why vendors need to collaborate on educating the market instead of competing. If you care about cutting through noise in a saturated market, this conversation is packed with insights you can actually use. Jason and Jeff dive into why so many cybersecurity vendors fall into the trap of "terminal uniqueness" believing they're so different that they can't learn from anyone else. Jeff explains why this mindset kills effective marketing and how leading with the problem, not your product features, is the only way to break through. They explore why CISOs won't talk to sales teams (hint: it's not personal, it's about trust) and why the cybersecurity industry desperately needs more collaboration. Jeff makes a compelling case that we're at war with ransomware networks, yet vendors refuse to talk to each other about how to educate buyers. The conversation shifts to buyer awareness stages and where most marketing completely misses the mark. Jeff shares his framework for thinking about audiences beyond just problem-aware buyers, and why "hallway therapy" at conferences builds more trust than any keynote ever will. Jason asks Jeff how he'd spend $100K to build an audience (not a campaign), and Jeff's answer revolves around creating spaces for real conversation, which is exactly what led him to launch Third Party, a panel show tackling cybersecurity topics with both strategic and tactical depth. They wrap with Jeff's shoutouts to creators doing cyber content right and key takeaways for B2B marketers trying to build trust in technical markets. Whether you're a security vendor struggling to differentiate, a CISO trying to communicate risk to the board, or a B2B marketer in any technical space, Jeff's insights on problem-first storytelling and building genuine community will transform how you think about reaching your audience. This isn't about more content, it's about better conversations. Subscribe to catch every episode. Leave a review to help others discover the show. Share with security professionals or B2B marketers trying to break through technical noise. Follow B2B Better on LinkedIn for weekly insights. 00:00 - Introduction: Cutting through cyber noise 01:30 - Jeff's journey from Gartner to Black Kite 04:00 - Terminal uniqueness: the "we're different" trap 07:00 - Lead with problems, not product features 09:30 - Why CISOs avoid sales conversations 13:00 - We're at war: Why vendors need to collaborate 17:30 - Buyer awareness stages marketers miss 20:00 - Why competitors won't talk (and should) 24:00 - Hallway therapy beats keynotes 27:00 - The $100K audience-building question 30:00 - Launching Third Party panel show 35:00 - Strategic + tactical content together 38:00 - Cybersecurity creators doing it right 42:00 - Key takeaways for B2B marketers Connect with Jason Bradwell on LinkedIn Connect with Jeffrey Wheatman on LinkedIn Visit Black Kite podcast/resource hub Visit InfoSec World's official site Explore B2B Better website and the Pipe Dream podcast

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 21 2026. Illinois DHS Breach Exposes 700K Residents. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 21, 2026 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

CISO-Security Vendor Relationship Podcast
AI Is Very Efficient at Making Us Forget the Value of Humans

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jan 20, 2026 41:07


All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining them is Sara Madden, CISO, Convera. In this episode: Hold developers accountable Credibility through candor Be strategic with AI deployment Resources don't guarantee security Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.

Afternoon Cyber Tea with Ann Johnson
The New Reality of the CISO Role

Afternoon Cyber Tea with Ann Johnson

Play Episode Listen Later Jan 20, 2026 26:39


David Gee, a veteran CISO, CIO, board advisor, and author, joins Ann Johnson, CVP of Cybersecurity, Microsoft, on this week's episode of Afternoon Cyber Tea. Drawing on decades of experience and insights from his books, Gee explores the gap between theory and reality for security leaders, the role of imposter syndrome in professional growth, and why embracing discomfort is essential to effective leadership. The conversation examines how CISOs can balance risk management with business enablement, reset expectations with boards and executives, and build resilient, team-driven security cultures. Gee also shares perspectives on mentorship, long-term sustainability in the role, and how the CISO must evolve from a control-focused operator to a strategic influencer in an era shaped by AI, regulation, and constant change.    Resources:  View David Gee on LinkedIn  View Ann Johnson on LinkedIn     Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast   The BlueHat Podcast    Uncovering Hidden Risks           Discover and follow other Microsoft podcasts at microsoft.com/podcasts      Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.

Blue Security
WEF Security Survey, AI Browsers, NTLMv1

Blue Security

Play Episode Listen Later Jan 20, 2026 36:05


SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the latest AI security concerns facing leaders today. They discuss a World Economic Forum report highlighting the divergence in priorities between CEOs and CISOs, with CEOs focusing on cyber-enabled fraud and AI vulnerabilities, while CISOs are more concerned with ransomware and supply chain resilience. The episode also covers the growing risks of AI-related vulnerabilities, cyber-enabled fraud, and data leaks, as well as the importance of securing AI tools. Additionally, they explore the role of AI browsers and the need for organizations to adopt a unified browser strategy for enhanced security.----------------------------------------------------YouTube Video Link: https://youtu.be/SE-hT1GPjGQ----------------------------------------------------Documentation:https://thecyberexpress.com/ai-security-is-top-cyber-concern/https://www.gartner.com/en/documents/7211030https://lifehacker.com/tech/i-compared-the-biggest-ai-browsershttps://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables----------------------------------------------------Contact Us:Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpodYouTube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠----------------------------------------------------Adam BrewerTwitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewerLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 20, 2026. GrubHub Reports A Breach, Ransom Demand. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 20, 2026 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 17-18, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 17, 2026 1:04


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 16, 2026. Police Servers In Anchorage, Alaska Offline. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 16, 2026 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Easterly helms RSAC, Windows update problems, Police Copilot gaffe

Cyber Security Headlines

Play Episode Listen Later Jan 16, 2026 8:20


Jen Easterly to helm RSAC Windows January update causes login problems UK police blame Copilot for intelligence mistake Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. Find the stories behind the headlines at CISOseries.com.  

Cyber 9/11 with Dr. Eric Cole
What It Really Takes to Succeed as a CISO | Guest: Matthew Webster

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jan 15, 2026 33:06


In this episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity leader Matthew Webster to explore what it really takes to succeed in the modern CISO role. Matthew shares his journey from IT into federal and commercial cybersecurity, the lessons that shaped his leadership approach, and why technical skills alone aren't enough at the executive level. Together, they discuss the importance of communication, influence, and business alignment, how CISOs can navigate compliance and legal challenges, and why building strong relationships with executives and legal teams is critical. This conversation offers practical insights for current and aspiring CISOs on translating cyber risk into business value, earning a seat at the table, and leading with clarity in an increasingly complex security landscape.  

Cybercrime Magazine Podcast
Life Of A Cybersecurity Czar. 5-Year-Plan For CISOs. Dr Eric Cole, Secure Anchor.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 15, 2026 18:37


A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss what CISOs must prepare for as we take on the next 5 years. To learn more about our sponsor, visit https://drericcole.org

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 15, 2026. Cyberattack Plunged Venezuela Into Darkness. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 15, 2026 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
U.S. weighs cyberwarfare options, DeadLock uses smart contracts to hide work, China says stop using US and Israeli cybersecurity software

Cyber Security Headlines

Play Episode Listen Later Jan 15, 2026 7:30


U.S. weighs private companies' cyberwarfare roles China: stop using US and Israeli cybersecurity software DeadLock uses smart contracts to hide work Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.  

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 14, 2026. Ransomware Strikes Big South Korean Company. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 14, 2026 1:28


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
GoBruteforcer targets blockchain projects, Android bug causes volume key issues, Verizon to stop automatic phone unlocks

Cyber Security Headlines

Play Episode Listen Later Jan 14, 2026 7:11


GoBruteforcer targets blockchain projects Android accessibility issue just a bug Verizon to stop automatic phone unlocks Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.  

Easy Prey
Surviving a Ransomware Attack

Easy Prey

Play Episode Listen Later Jan 14, 2026 47:39


A ransomware attack doesn't always announce itself with flashing warnings and locked screens. Sometimes it starts with a quiet system outage, a few unavailable servers, and a sinking realization days later that the threat actors were already inside. This conversation pulls back the curtain on what really happens when an organization believes it's dealing with routine failures only to discover it's facing a full-scale cyber extortion event. My guest today is Zachary Lewis, CIO and CISO for a Midwest university, a 40 Under 40 Business Leader, and a former Nonprofit CISO of the Year. Zachary shares the inside story of a LockBit ransomware attack that unfolded while his team was still building foundational security controls, forcing real-time decisions about recovery, disclosure, negotiations, and whether paying a ransom was even an option. We talk about the shame that keeps many cyber incidents hidden, the emotional weight leaders carry during these moments, and the practical realities that don't show up in tabletop exercises from buying bitcoin to restoring systems when password managers are encrypted. It's an honest, grounded discussion about resilience, preparedness, and why sharing these stories openly may be one of the most important defenses organizations have. Show Notes: [04:05] Zachary Lewis explains why the absence of an immediate ransom note delayed suspicion of an attack. [06:00] The first technical indicators suggest something more serious is unfolding. [07:45] Discovering encrypted hypervisors and realizing recovery won't be straightforward. [09:30] Zachary outlines when data exfiltration became a real concern. [11:05] Receiving the LockBit ransomware note confirms the organization has been compromised. [12:55] The 4:30 a.m. phone call pushes leadership into full crisis mode. [14:40] Zachary reflects on managing fear, responsibility, and decision fatigue mid-incident. [16:20] Executive expectations collide with technical realities during the breach. [18:05] Why "doing most things right" still doesn't guarantee protection. [19:55] Cyber insurance begins shaping early response decisions. [21:35] Bringing in incident response teams and legal counsel under tight timelines. [23:20] Zachary describes working with the FBI and understanding jurisdictional limits. [25:10] What law enforcement can and cannot realistically provide during ransomware events. [26:50] Opening communication channels with the threat actors. [28:35] The psychological pressure behind ransomware negotiations. [30:10] Attacker-imposed timelines force rapid, high-stakes decisions. [31:55] Zachary walks through the practical challenges of acquiring cryptocurrency. [33:40] Why encrypted password managers created unexpected recovery barriers. [35:15] Determining which systems could be restored first—and which could not. [37:00] Lessons learned about backup integrity and offline recovery. [38:45] The importance of clear internal communication during uncertainty. [40:25] Balancing transparency with legal and reputational concerns. [42:10] How staff reactions differed from executive responses. [43:55] Zachary discusses the stigma that keeps many ransomware incidents quiet. [45:40] Why sharing breach stories can strengthen collective defenses. [47:20] MFA gaps and configuration issues exposed by the attack. [49:05] Why tabletop exercises fall short of real-world incidents. [50:50] Long-term security changes made after recovery. [52:30] Zachary offers advice for CISOs facing their first major incident. [54:10] What preparedness really means beyond compliance checklists. [56:00] Why resilience and recovery deserve equal priority. [58:30] Final reflections on leadership, accountability, and learning in public. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Zachary Lewis - The Homesteading CISO Zach Lewis - LinkedIn

CISO-Security Vendor Relationship Podcast
Managing Risk Has Been a Priority Ever Since You Asked About It (LIVE in NYC)

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jan 13, 2026 40:37


All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Matthew Southworth, CSO, Priceline. Joining them is sponsored guest, Saket Modi, CEO, Safe Security. This episode was recorded live at FAIRCON25 in NYC. In this episode: AI won't stay broken Identity before intelligence People decide risk appetite Automate with oversight Huge thanks to our sponsor, Safe Security SAFE is the leader in Cyber Risk Quantification and the first company to deliver 100% autonomous Third-Party Risk Management. Powered by Agentic AI and built on FAIRtm, SAFE empowers CISOs, cybersecurity, and TPRM leaders to continuously quantify, prioritize, and mitigate cyber risks across their entire attack surface – enabling digital growth and organizational resilience. Learn more at testdrive.safe.security/

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 13, 2026. Fintech Betterment Hit By Social Engineering. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 13, 2026 1:23


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Instagram denies breach, Sweden detains spying suspect, n8n attack steals OAuth tokens

Cyber Security Headlines

Play Episode Listen Later Jan 13, 2026 8:33


Instagram denies breach post-data leak Sweden detains consultant suspected of spying n8n supply chain attack steals OAuth tokens Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.  

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 12, 2026. Uni. Of Hawaii Reports Ransomware Attack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 12, 2026 1:19


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
BreachForums database leaked, Instagram breach worries, UK government exempts self

Cyber Security Headlines

Play Episode Listen Later Jan 12, 2026 8:16


BreachForums hacking forum database leaked exposing 324,000 accounts Instagram breach exposes user data, creates password reset panic UK government exempts self from flagship cyber law Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. Find the stories behind the headlines at CISOseries.com.    

Cyber Security Headlines
Department of Know: Brightspeed investigates breach, Prompt injection woes

Cyber Security Headlines

Play Episode Listen Later Jan 12, 2026 25:28


Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Johna Till Johnson, CEO and Founder, Nemertes (check out the Nemertes substack) and Jason Shockey, CISO, Cenlar FSB. Jason will be speaking at MBA Servicing Solution26 in Texas in late February. Details here. Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. All links and the video of this episode can be found on CISO Series.com 

The Audit
AI Architecture: Stop Button Pushing, Start Building

The Audit

Play Episode Listen Later Jan 12, 2026 40:53 Transcription Available


What if the difference between AI mediocrity and breakthrough isn't the tool—it's how you architect your approach? Carter Jensen from The Uncommon Business joins the crew to reveal why most people are stuck "button pushing" while others are unlocking 3X productivity gains. This isn't theory; it's the frontline reality of businesses transforming workflows with the right AI architecture. If you're tired of surface-level AI hype and ready for actionable intelligence on integrating AI into security, compliance, and everyday business operations, this episode delivers. Whether you're Blockbuster or Netflix is up to you.

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 10-11, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 10, 2026 1:07


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 9, 2026. Iran Hacks Itself, Internet Down Nationwide. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 9, 2026 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Microsoft enforces admin MFA, Cisco patches ISE, Illinois breaches self

Cyber Security Headlines

Play Episode Listen Later Jan 9, 2026 7:45


Microsoft to enforce MFA for Microsoft 365 admin center sign-ins Cisco patches ISE security vulnerability after PoC release Illinois state agency breaches itself Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm Find the stories behind the headlines at CISOseries.com.

DisrupTV
Boardroom Wake-Up Call 2026: The Decisions That Will Define Winners, Losers, and Leaders | Ep. 423

DisrupTV

Play Episode Listen Later Jan 9, 2026 62:42


In this episode of DisrupTV, we tackle one of the most urgent leadership challenges of our time: navigating AI-driven cybersecurity threats, geopolitical uncertainty, and converging risk. Hosts Ray Wang and Vala Afshar are joined by: Andre Pienaar, CEO & Founder of C5 Capital Dr. David Bray, Distinguished Chair at the Stimson Center & CEO of LDA Ventures Ken Banta, leadership expert and advisor Together, they explore why AI and cybersecurity budgets must rise together, how human–AI collaboration is reshaping cyber defense, and what leaders must do now to prepare for quantum disruption, AI-enabled attacks, and regulatory fragmentation. The conversation also dives into the human side of leadership—from self-awareness and trust to the evolving role of General Counsel as the conscience of the organization. This is a must-listen for boards, CEOs, CISOs, General Counsel, and leaders navigating risk in the Age of Intelligence.

Defense in Depth
What Makes a Successful CISO?

Defense in Depth

Play Episode Listen Later Jan 8, 2026 25:28


All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode:  Consequence, not controls The credibility gap Defining the undefined Expanding the mandate A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.

ITSPmagazine | Technology. Cybersecurity. Society
Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 8, 2026 5:46


In this Brand Highlight, we talk with Denny LeCompte, CEO and Co-Founder of Portnox, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.Note: This story contains promotional content. Learn more.GuestDenny LeCompte, CEO and Co-Founder of Portnoxhttps://www.linkedin.com/in/dennylecompte/ResourcesLearn more about Portnox: https://www.portnox.com/Are you interested in telling your story?Full Length Brand Story: https://www.studioc60.com/content-creation#fullBrand Spotlight Story: https://www.studioc60.com/content-creation#spotlightBrand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The New CISO
Safety Third: Why Security Shouldn't Be Your Top Priority

The New CISO

Play Episode Listen Later Jan 8, 2026 66:54


In this episode of The New CISO, host Steve Moore speaks with Alex Rice, Founder, CTO, and CISO at HackerOne, about challenging one of cybersecurity's most deeply held beliefs—that security should be the top priority. Drawing from his journey building security programs at Facebook and founding HackerOne, Alex introduces the "safety third" philosophy and explains why accepting that security is never first can actually make you more effective as a leader.Alex shares his unconventional path into cybersecurity, starting as a 14-year-old programmer in rural Florida and eventually leading product security at Facebook during its explosive growth. He reveals how Facebook ran 70+ penetration tests annually with top-tier vendors and still wasn't finding enough vulnerabilities—until they opened the doors to the hacker community and received over 300 valid findings in a single weekend. This experience became the foundation for HackerOne's bug bounty platform.The conversation tackles critical leadership challenges facing modern CISOs, including the toxic tendency toward victim blaming when breaches occur, why security teams struggle with customer-centric design, and how to avoid becoming the team everyone knows only for blocking work and sending phishing tests. Alex argues that security professionals must stop drinking their own Kool-Aid and recognize that usability and business outcomes will always take precedence over security controls.In the episode's second half, Alex addresses AI's role in security operations with refreshing pragmatism. Rather than chasing grandiose AI visions, he advocates for starting with narrow, well-defined tasks where agents can replace security toil—like automated CVSS scoring or vulnerability triage—building trust and expertise before tackling more ambitious projects. He warns against the current trend of AI tools that find more problems when security teams desperately need help fixing the mountain of issues they already know about.Alex also challenges CISOs to stop over-owning problems like asset inventory management that rightfully belong to other executives, emphasizing the importance of cross-functional collaboration over building security-owned solutions that ultimately fail. Throughout the discussion, he champions a philosophy of empathy, customer-centricity, and accepting hard truths about security's actual place in business priorities—a mindset shift that paradoxically makes security leaders far more effective.Key Topics Discussed:Why "safety third" should be every CISO's operating philosophyThe problem with victim blaming in cybersecurity incidentsBuilding customer-centric security programs that enable rather than blockLessons from scaling Facebook's security program with 70 pen tests per yearThe origin story of HackerOne and crowdsourced security testingHow to avoid becoming the security team everyone resentsPractical AI implementation: Starting with toil elimination, not transformationWhy CISOs over-own asset management and other problemsThe importance of process mapping before deploying AI agentsAligning security teams closely with AI and software...

Cyber 9/11 with Dr. Eric Cole
Why Intellectual Property Is the New Cybersecurity Battleground

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jan 8, 2026 31:44


In this episode of Life of a CISO, Dr. Eric Cole explains why intellectual property is becoming the most important cybersecurity priority for organizations as artificial intelligence accelerates innovation and imitation. As AI makes products, services, and content easier to replicate, traditional approaches to data security are no longer enough. Dr. Cole breaks down why trademarks, copyrights, patents, and trade secrets are now the true differentiators in the market and how failing to protect them directly impacts company valuation and competitiveness. Looking toward 2030 and beyond, this episode challenges outdated security models and shows how cybersecurity, AI, cloud, and IT must align around protecting intellectual property as a unified strategy. Dr. Cole shares practical guidance on identifying an organization's most valuable IP, closing gaps between legal policy and technical controls, and using AI defensively to stay ahead of competitors and emerging threats. This episode is essential listening for CISOs, executives, and board leaders focused on long term growth, security, and business value.  

Dark Rhino Security Podcast
S18 E04 Adopting an AI-First Mindset

Dark Rhino Security Podcast

Play Episode Listen Later Jan 8, 2026 50:19


Grant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board  49:05 More about Grant

Dark Rhino Security Podcast
S18 E04 (VIDEO) Adopting an AI First Mindset

Dark Rhino Security Podcast

Play Episode Listen Later Jan 8, 2026 50:19


#SecurityConfidential #DarkRhiinoSecurityGrant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across sales, marketing, and executive management at companies including Dome9, Blue Coat, Neustar, and Altor Networks, and previously led MetaInfo through its acquisition by Neustar. He also hosts the CISO Secrets and Talking Cloud podcasts, where he explores cloud security trends and real-world leadership insights.00:00 intro03:00 Our Guest05:13 Start with a Helpdesk role10:00 Ai taking over roles13:35 AI first mindset35:10 The future of AI tools45:07 CISOs report to the board 49:05 More about Grant----------------------------------------------------------------------To learn more about Grant visit https://www.linkedin.com/in/grantasplund/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 8, 2026. Hacker Breaches 50 Global Companies. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 8, 2026 1:28


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Life Of A Cybersecurity Czar. The CISO Handbook For 2026. Dr Eric Cole, Secure Anchor.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 8, 2026 20:29


A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss what CISOs need to know as we settle into 2026. To learn more about our sponsor, visit https://drericcole.org

Paul's Security Weekly
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429

Paul's Security Weekly

Play Episode Listen Later Jan 7, 2026 63:10


Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecurity Graduate Program at the University of Nevada Las Vegas, joins Business Security Weekly to discuss his new book: The Digital Detective: First Intervention. We examine how technologies like deepfakes, voice cloning, and hyper-personalized scams are being used to target younger audiences, and what parents, educators, communities, and CISOs can do to build awareness, resilience, and smart digital habits. Learn how today's highly organized operations, powered by automation and advanced AI, power the bad actors' tools, techniques, and procedures—making them more effective than ever. Understanding the past helps us prepare for the future—and protect the next generation online, including our employees. Segment Resources: https://www.idigitaldetective.com/blog https://www.idigitaldetective.com/ https://www.unlv.edu/degree/ms-cybersecurity In the leadership and communications segment, Executives say cybersecurity has outgrown the IT department, The Most Dangerous Leadership Mistake Isn't a Wrong Answer. It's a Wrong Question, Building cyber talent through competition, residency, and real-world immersion, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-429

The Tech Blog Writer Podcast
3539: ShelterZoom CEO on Keeping Care Moving When Systems Go Down

The Tech Blog Writer Podcast

Play Episode Listen Later Jan 2, 2026 23:54


What happens to patient care when hospital systems suddenly go dark and clinicians are forced back to pen and paper in the middle of a crisis? In this episode of the Tech Talks Daily Podcast, I speak with Chao Cheng-Shorland, Co-founder and CEO of ShelterZoom, about a problem that many healthcare leaders still underestimate until it is too late. As ransomware attacks, cloud outages, and system failures become more frequent, electronic health record downtime has shifted from a rare incident to a recurring operational risk with real consequences for patient safety, staff wellbeing, and hospital finances. Chao explains why traditional disaster recovery plans fall short in live clinical environments and why returning to paper workflows is no longer viable for modern healthcare teams. We discuss how EHR downtime can stretch from hours into weeks, how reimbursement delays and cash flow pressure compound the damage, and why younger clinicians are often unprepared for manual processes they were never trained to use. The conversation also explores the mindset shift now taking place among CIOs and CISOs, as resilience moves from a compliance checkbox to a survival requirement. At the heart of the discussion is ShelterZoom's SpareTire platform and the thinking behind treating uninterrupted access to clinical data as a baseline rather than a backup. Chao shares how the idea emerged directly from hospital conversations, why an external, always-available system is essential during cyber incidents, and how ShelterZoom's tokenization roots shaped a design focused on security without disruption. We also look at how rising AI adoption is changing the threat landscape and why many healthcare organizations are reordering priorities to secure continuity before rolling out new AI initiatives. As we look toward 2026, this episode offers a grounded view of how healthcare organizations must rethink downtime tolerance, data governance, and operational readiness in a world where digital outages can quickly become clinical emergencies. If downtime is now inevitable rather than hypothetical, what does real resilience look like for hospitals, and are healthcare leaders moving fast enough to protect patients when systems fail? Useful Links Connect with Chao Cheng-Shorland Learn more about ShelterZoom Tech Talks Daily is Sponsored by Denodo

ceo ai moving care cios go down chao ehr cisos shelterzoom chao cheng shorland
The CyberWire
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]

The CyberWire

Play Episode Listen Later Dec 31, 2025 23:45


While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. Dr. Cranor emphasizes the importance of user-centered design, practical research, behavioral insights, and simpler, more transparent systems to help CISOs build security programs that truly work for people.    Resources:   View Lorrie Cranor on LinkedIn             View Ann Johnson on LinkedIn       Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast   The BlueHat Podcast    Uncovering Hidden Risks   Discover and follow other Microsoft podcasts at microsoft.com/podcasts      Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.  Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Season finale: Leading security in a brave new world. [CISOP]

The CyberWire

Play Episode Listen Later Dec 30, 2025 43:59


In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today's CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward. Want more CISO Perspectives? Check out companion ⁠⁠blog post⁠⁠s by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season. Learn more about your ad choices. Visit megaphone.fm/adchoices