Podcasts about cisos

  • 575PODCASTS
  • 4,267EPISODES
  • 24mAVG DURATION
  • 2DAILY NEW EPISODES
  • Jul 30, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cisos

Show all podcasts related to cisos

Latest podcast episodes about cisos

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 30, 2025. St. Paul, Minnesota IT Systems Are Shut Down. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 30, 2025 1:20


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

ITSPmagazine | Technology. Cybersecurity. Society
Supply Chain Transparency Isn't Just Technical—It's a Business Imperative | A LevelBlue Brand Story with Theresa Lanowitz

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 36:18


As digital infrastructure becomes increasingly interwoven with third-party code, APIs, and AI-generated components, organizations are realizing they can't ignore the origins—or the risks—of their software. Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Sean Martin and Marco Ciappelli to unpack why software supply chain visibility has become a top concern not just for CISOs, but for CEOs as well.Drawing from LevelBlue's Data and AI Accelerator Report, part of their annual Futures Report series, Theresa highlights a striking correlation: 80% of organizations with low software supply chain visibility experienced a breach in the past year, while only 6% with high visibility did. That data underscores the critical role visibility plays in reducing business risk and maintaining operational resilience.More than a technical concern, software supply chain risk is now a boardroom topic. According to the report, CEOs have the highest awareness of this risk—even more than CIOs and CISOs—because of the direct impact on brand reputation, stock value, and partner trust. As Theresa puts it, software has become the “last mile” of digital business, and that makes it everyone's problem.The conversation explores why now is the time to act. Government regulations are increasing, adversarial attacks are intensifying, and organizations are finally beginning to connect software vulnerabilities with business outcomes. Theresa outlines four critical actions: leverage CEO awareness, understand and prioritize vulnerabilities, invest in modern security technologies, and demand transparency from third-party providers.Importantly, cybersecurity culture is emerging as a key differentiator. Companies that embed security KPIs across all business units—and align security with business priorities—are not only more secure, they're also more agile. As software creation moves faster and more modular, the organizations that prioritize visibility and responsibility throughout the supply chain will be best positioned to adapt, grow, and protect their operations.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber]On LinkedIn | https://www.linkedin.com/in/theresalanowitz/ResourcesTo learn more, download the complete findings of the LevelBlue Threat Trends Report here: https://itspm.ag/levelbyqdpTo download the 2025 LevelBlue Data Accelerator: Software Supply Chain and Cybersecurity report, visit: https://itspm.ag/lbdaf6iLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 29, 2025. Cyberattack Strikes Russia's Largest Airline. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 29, 2025 1:20


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

CXOInsights by CXOCIETY
PodChats for FutureCISO: Developing a Resilient Cybersecurity Roadmap

CXOInsights by CXOCIETY

Play Episode Listen Later Jul 29, 2025 18:33


In 2025, Asia's cybersecurity landscape is shaped by rapid digitalisation, AI adoption, and evolving regulatory frameworks. Regional authorities, such as Singapore's MAS and South Korea's National AI Committee, are intensifying enforcement and introducing robust regulations for data privacy, AI governance, and cyber risk management. Businesses face mounting threats from ransomware, advanced persistent threats, and supply chain vulnerabilities, driving demand for Cybersecurity-as-a-Service and managed SOCs. Industry reports highlight a widening gap in cyber resilience and stress the need for urgent action to address cyber inequity and enhance recovery capabilities.1.       How will evolving AI, cloud security, and data privacy regulations across Asia-Pacific affect CISO's multi-cloud governance and compliance frameworks?2.       What strategies can CISOs/organisations adopt to defend against increasingly sophisticated ransomware, supply chain attacks, and network-based intrusions?3.       How do CISOs/CIOs secure hybrid and multi-cloud environments effectively, leveraging generative AI tools to automate identity and access management while reducing manual overhead?4.       Some say quantum computing is still years away. That said, people are talking about post-quantum cryptography today. Can you share any best practice for implementing quantum-resistant encryption and network security protocols to mitigate emerging quantum computing threats?5.       How can CISOs ensure robust security and compliance for AI-powered cloud applications and edge computing infrastructure under diverse data sovereignty laws? How should the CISO work with the CIO and the risk/compliance officers of the organization?6.       Recapping what we've covered so far: our topic is Developing a Resilient Cybersecurity Roadmap. Can you offer some recommendations for CISOs and CIOs in developing their resilient cybersecurity roadmap?

The Security Podcasts
How Should CISOs Prepare for AI Threats, Cyberattacks or Emergencies?

The Security Podcasts

Play Episode Listen Later Jul 28, 2025 11:31


Aimee Cardwell, CISO in Residence for Transcend, shares how CISOs should prepare for AI threats, cyberattacks and emergencies.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 28, 2025. Women's Dating App Tea Suffers Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 28, 2025 1:17


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Resilient Cyber
Resilient Cyber w/ Daniel Bardenstein - AI Supply Chain Security Risks

Resilient Cyber

Play Episode Listen Later Jul 26, 2025 43:59


In this episode, I sit down with Daniel Bardenstein, CTO & Co-Founder of Manifest Cyber.We discussed the AI supply chain security, including open source risks, AIBOMs, best practices for CISOs, and regulatory approaches in the U.S. and EU.We dove into:What is the same and different between the risks AI introduces across the enterprise compared to open source software, and where and how the two converge.The rise of an “AIBOM” and why it is becoming a critical part of enterprise risk management in the AI EraThe work Daniel and others are doing as part of a Tiger Team defining “SBOM-for-AI-Use Cases”.Why is it so difficult for organizations to gain visibility into their AI models' internals, especially training data, model provenance, and pipeline dependencies?Where CISOs and security teams can get started when it comes to understanding where and how AI is being used and avoiding some mistakes.Gaps among the current waves of AI security startups and how they contrast with the approach Manifest is taking when managing AI supply chain risks.Real-world insights and examples of how organizations operationalize SBOM for risk reduction.Key differences between the U.S. and EU regarding regulatory approaches to AI and supply chain security risks.

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 26-27, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 26, 2025 1:09


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

ITSPmagazine | Technology. Cybersecurity. Society
Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2025 21:47


Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 25, 2025. $17M Lost in NYC ATM Fraud, Viral On TikTok. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 25, 2025 1:20


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The New CISO
How to Score a Security Role — Without Collecting Certifications

The New CISO

Play Episode Listen Later Jul 24, 2025 51:56


In this episode of The New CISO, host Steve Moore speaks with Marius Poskus, Chief Information Security Officer at Glow Financial Services and creator of the Cyber Diaries podcast. Marius shares his journey from physical security into cybersecurity leadership—and how he did it without relying on traditional certifications.Marius reflects on how self-directed learning, mentorship, and a strong personal brand helped him pivot careers and thrive in the FinTech space. He explains why the security industry needs to stop glorifying certifications, how to break in through SOC roles, and what truly makes a candidate stand out in interviews. From coaching new talent to advising startups on go-to-market strategies, Marius emphasizes that attitude and aptitude matter far more than credentials.Key Topics Covered:Why Marius walked away from a career in physical security—and how that experience shaped his cyber pathThe critical difference between certification collecting and real-world skill developmentWhy most entry-level cybersecurity roles are in SOCs—and how to leverage thatHow sharing your learning journey online builds credibility and unlocks job opportunitiesThe two A's that matter most when hiring: attitude and aptitudeCommon mistakes startups make when targeting CISOs and building security toolsThe growing risks of “AI-washing” and what real AI innovation should look likeWhy mentorship only works when mentees are willing to put in the workHow to shift from security awareness “stick” tactics to culture-based collaborationWhat it means to build a personal brand that outlasts your job titleMarius' story proves that cybersecurity success doesn't come from certificates—it comes from curiosity, consistency, and community. Whether you're just starting your career or leading a security team, this episode will inspire you to focus on what really moves the needle.Marius Poskus Podcast - Cyber Diaries Podcast

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 24, 2025. 400+ Orgs Hit In Microsoft Security Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 24, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Telecom Reseller
Rethinking Cybersecurity Training: Anagram Security Brings Behavior-Based Learning to the Forefront, Podcast

Telecom Reseller

Play Episode Listen Later Jul 24, 2025


"If you ask 100 CISOs whether their current training actually changes behavior, 95 to 98 will say, ‘not really.'” — Harley Sugarman, Founder & CEO, Anagram Security Harley Sugarman In this eye-opening episode of Technology Reseller News, publisher Doug Green speaks with Harley Sugarman, CEO of Anagram Security, about why traditional cybersecurity training is no longer enough—and how AI-powered threats are accelerating the need for change. Sugarman argues that legacy training—often mandated once a year and dominated by slide decks—has failed to engage employees or meaningfully improve their behavior. "Death by PowerPoint,” as he puts it, simply doesn't work anymore. With phishing and social engineering attacks now powered by advanced AI, companies must shift from checkbox compliance to behavior-driven learning. Anagram Security is pioneering a new model that draws inspiration from platforms like Duolingo and TikTok, focusing on habit formation and real-world relevance. Their approach incorporates short, two-to-three-minute "puzzle"-based modules that promote critical thinking, adapting lessons for different roles—from developers to sales teams to hotel clerks. The platform also emphasizes customization, allowing enterprises to tailor content to specific job functions and threats. Anagram's user engagement metrics are telling: In enterprise pilots, over 90% of users preferred Anagram's approach over traditional methods. More importantly, the company ties its training outcomes to measurable behavior improvements, such as reductions in phishing clicks and password-related vulnerabilities. Sugarman also critiques industry jargon like "human risk management" and "vishing," emphasizing that front-line employees don't need buzzwords—they need training that fits their real jobs and schedules. He insists that people are not the weakest link, but rather the last line of defense—and should be treated as partners, not problems. Anagram has already attracted major brand-name clients by delivering a security awareness model that's modern, scalable, and actually works. With AI lowering the barrier for attackers, Sugarman believes the urgency has never been greater: “This is the thing most companies will realize they have to get better at—the most, and the fastest.” Learn more at www.anagramsecurity.com and connect with Harley Sugarman on LinkedIn.

Paul's Security Weekly
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405

Paul's Security Weekly

Play Episode Listen Later Jul 23, 2025 63:11


How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks and how best to address them. And it's not technical risks, it's business risks measured by legal or financial impact. Khaja will help guide new and existing CISOs on how to: Work across the business to build consensus Identify and quantify risks in financial and legal terms Design security from the start Be effective as a security leader In the leadership and communications section, Is the C-Suite Right for You?, What Fortune 100s are getting wrong about cybersecurity hiring, Why Communication Is Exhausting in Chaotic Workplaces, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-405

ITSPmagazine | Technology. Cybersecurity. Society
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 23, 2025 20:07


As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That's where Dropzone comes in—offering an AI-powered security analyst that doesn't just detect threats, but investigates, correlates, and takes action.During a recent pre-event chat with ITSPmagazine's Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don't have to be.The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.With conversations at Black Hat expected to revolve around the reality of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.Whether you're building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn't selling buzzwords. They're delivering results. Visit them at Startup City, booth #6427, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time. Note: This story contains promotional content. Learn more.Guests:Edward Wu, Founder/CEO at Dropzone AI On LinkedIn: https://www.linkedin.com/in/edwardxwu/DROPZONE AI: https://itspm.ag/dropzoneai-641Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesVisit the DROPZONE Website to learn more: https://itspm.ag/dropzoneai-641Learn more and catch more stories from Dropzone on ITSPmagazine: https://www.itspmagazine.com/directory/dropzoneaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 23, 2025. Zero Day Vuln Hits U.S. Nuclear Agency. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 23, 2025 1:10


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Business Security Weekly (Audio)
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405

Business Security Weekly (Audio)

Play Episode Listen Later Jul 23, 2025 63:11


How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks and how best to address them. And it's not technical risks, it's business risks measured by legal or financial impact. Khaja will help guide new and existing CISOs on how to: Work across the business to build consensus Identify and quantify risks in financial and legal terms Design security from the start Be effective as a security leader In the leadership and communications section, Is the C-Suite Right for You?, What Fortune 100s are getting wrong about cybersecurity hiring, Why Communication Is Exhausting in Chaotic Workplaces, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-405

Business Security Weekly (Video)
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405

Business Security Weekly (Video)

Play Episode Listen Later Jul 23, 2025 63:11


How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks and how best to address them. And it's not technical risks, it's business risks measured by legal or financial impact. Khaja will help guide new and existing CISOs on how to: Work across the business to build consensus Identify and quantify risks in financial and legal terms Design security from the start Be effective as a security leader In the leadership and communications section, Is the C-Suite Right for You?, What Fortune 100s are getting wrong about cybersecurity hiring, Why Communication Is Exhausting in Chaotic Workplaces, and more! Show Notes: https://securityweekly.com/bsw-405

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pre-Event Kick-Off Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 22, 2025 26:51


As Black Hat USA 2025 approaches, General Manager Steve Wylie joins Sean Martin and Marco Ciappelli for the annual pre-conference conversation to highlight what's new—and what's next—for one of cybersecurity's most iconic events. This year's themes and expansions signal a strong return to growth, technical depth, and strategic investment.AI Everywhere—from Training to the Show FloorArtificial intelligence emerges as the dominant force across the agenda. From the main stage to the training rooms, Black Hat is packed with AI-related content designed to meet the rising demand for education and clarity. New this year is a comprehensive lineup of instructor-led AI courses and expanded AI tool showcases in the Arsenal and Arsenal Labs programs. As Wylie notes, three of the four Spotlight competition finalists—FireTail, Keep Aware, and Twine Security—are AI-driven solutions, underscoring the technology's influence on innovation.Investor Energy and Startup MomentumCybersecurity investment is back. That momentum is reflected in the expanded Innovators and Investors Summit and the largest-ever Startup Zone on the show floor, now hosting more than 80 companies. This year's program builds on last year's debut and aims to connect entrepreneurs, investors, and CISOs in a more targeted and collaborative setting.Expanding the Audience: New Summits and KeynotesTo better serve cybersecurity leaders across sectors, Black Hat has introduced new summits tailored to financial services and supply chain security. These gatherings offer strategic-level insights for professionals who don't typically engage in technical briefings. Meanwhile, the keynote lineup includes prominent voices from both public and private sectors—such as Miko Hyppönen, Nicole Perlroth, and Chris Inglis—offering grounded perspectives in a time of uncertainty.Interactive Additions and Community GrowthAttendees can expect hands-on experiences like a new drone hacking zone and an expanded hardware lab area. A Career Development Zone also debuts this year, offering sessions designed to help attendees build or pivot their cybersecurity careers.___________Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech and General Manager at Black Hat | On LinkedIn: https://www.linkedin.com/in/swylie650/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Simply Solving Cyber
Cybersecurity for Entrepreneurs

Simply Solving Cyber

Play Episode Listen Later Jul 22, 2025 38:36 Transcription Available


Ever wonder how to protect sensitive data when you don't have an IT department? In this revealing conversation, two pharmaceutical industry veterans who recently launched their own consulting businesses share the cybersecurity challenges they never anticipated after leaving corporate America.Katie Hewitt, founder of BioVenture Advisors, and Laura Viaches, president of Endeavor Pharma Solutions, spent over 20 years each at Eli Lilly before venturing out on their own. Their transition from having robust corporate security infrastructure to becoming their own CISOs overnight offers powerful lessons for entrepreneurs handling confidential information. From Katie's experience juggling client demands before even setting up a domain name to Laura's methodical "stealth mode" approach to building secure systems, their contrasting journeys highlight different paths to the same goal: protecting client trust.The conversation reveals startling gaps in the healthcare consulting ecosystem, where clients with valuable intellectual property rarely audit the security practices of their advisors. "I'm more surprised that's not a question they're asking," notes Katie, highlighting how even sophisticated biotech companies often overlook security verification until regulatory requirements or funding rounds force the issue.Cybersecurity experts Aaron, Todd, and Cody offer practical advice for entrepreneurs navigating these challenges without enterprise budgets. Their recommendations focus on process-first approaches – identifying critical assets, working in client environments whenever possible, and implementing basic controls like multi-factor authentication before investing in complex solutions. The group explores how AI tools create new security considerations, particularly around meeting documentation and data retention.Whether you're launching a new venture or helping clients through their growth journey, this discussion delivers actionable insights about balancing security with entrepreneurial agility. The most valuable takeaway? "If you're a small business entrepreneur, you are the CIO and you are the CISO," Katie reminds us – taking this responsibility seriously from day one can transform security from a burden into a competitive advantage.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 22, 2025. CoinDCX Confirms Breach, $44M Stolen. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 22, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 21, 2025. Massive Data Breach Revealed By Texas Agency. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 21, 2025 1:35


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Next Level CISO. Security Provider Acquisitions. Greg Crowley, CISO, eSentire.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 18, 2025 17:01


Greg Crowley is the CISO at eSentire. In this episode, he joins host Charlie Osborne to discuss security provider acquisitions and what CISOs should consider in these situations. Next Level CISO is a Cybercrime Magazine podcast brought to you by eSentire, the Authority in Managed Detection and Response. eSentire's mission is to hunt, investigate and stop cyber threats before they become business disrupting events. To learn more about our sponsor, visit https://esentire.com

The FIT4PRIVACY Podcast - For those who care about privacy
How is the CISO Role Changing with Aman Tara and Punit Bhatia in the FIT4PRIVACY Podcast E143 S06

The FIT4PRIVACY Podcast - For those who care about privacy

Play Episode Listen Later Jul 17, 2025 20:11


The CISO role is no longer just about protecting IT assets — it's about navigating AI risks, complex regulations, and building digital trust across the enterprise. In an era where digital trust is more important than ever, how do CISOs stay ahead of evolving threats? What impact does AI have on cybersecurity and privacy compliance? And how can organizations empower every employee to contribute to ongoing digital safety? Join cybersecurity expert and former military major Aman Tara in conversation with Punit Bhatia as they explore the evolving responsibilities of CISOs in today's digital landscape. Aman shares why CISOs must think like hackers to stay ahead, how to manage emerging AI threats, and ways to ensure compliance with global data privacy laws. If you want to understand the future of cybersecurity leadership and how to foster trust in an AI-driven era, this episode is a must-watch! KEY CONVERSION 00:01:44 What is Digital Trust for Aman Tara 00:02:44 What role does the CISO play in creating Digital Trust? 00:04:59 How to manage overlap in a CISO role with privacy function 00:06:17 Do you have regular meetings with privacy counterparts? 00:08:19 Impact of AI and emerging technologies on the role of CISO 00:09:58 How Should a CISO respond when using unsafe tools and create risk in organization? 00:12:00 What can everyone do to ensure ongoing digital trust and safety? 00:15:17 Amman's Book and Personal Journey  ABOUT GUEST Aman Tara is an ex-military Major and a qualified attorney. He holds an associate diploma in Software Engineering, a bachelor's degree in Life Sciences and Economics, a degree in Law, and his MBA from Iowa, USA. He is a Certified Information System Auditor, Certified Data Privacy Solutions Engineer, Certified Fraud Examiner, Certified Amazon Web Services Cloud Practitioner and a Scrum Master. He has also done a Cybersecurity course at Massachusetts Institute of Technology (MIT).  After serving in the military for a decade in various combat and staff roles, he moved to the corporate world in 2011. He has worked on IT audits, IT security and Cybersecurity assessments, Third Party Risk Management projects for various Fortune 500 companies across the USA and South Asia. Presently, he is the Executive Director for one of the world's largest banks, working in their Cybersecurity department and Board of Directors of three Non-Profit Organizations based outside of the USA.  He has been featured in articles overseas and invited as speaker for various US based and international seminars. He conducts workshops for corporates on stress management, hosts a live radio show every week in Texas, USA, and has also authored a book ‘Just Did It'.  ABOUT HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach professionals.  Punit is the author of books “Be Ready for GDPR' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts.  As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe.  RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://www.linkedin.com/in/aman-tara-cisa-cdpse-cfe-b6095483/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy   

Cyber 9/11 with Dr. Eric Cole
Building Cybersecurity from the Ground Up: A Conversation with Chuck Brooks

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jul 17, 2025 34:51


In this powerful episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity thought leader Chuck Brooks—one of the industry's original influencers—to uncover how the past, present, and future of cybersecurity are being shaped by leadership, emerging technology, and real-world experience. From working with President Reagan to helping stand up the Department of Homeland Security, Chuck shares stories that reveal the critical role CISOs play in national security, business resilience, and global collaboration. Together, Dr. Cole and Chuck Brooks dive into the importance of soft skills for cybersecurity executives, why cyber is no longer a cost center but a business enabler, and how today's leaders must understand risk, policy, and communication as much as technology. They also explore the evolving role of zero trust, disruptive technologies like AI and quantum, and how professionals can brand themselves to stand out in a crowded field. Whether you're a seasoned CISO or a cybersecurity manager looking to grow, this episode will expand your thinking—and inspire your next move.  

Security Visionaries
Security Visionaries LIVE at Infosec Europe: CISO / CEO Crucial Conversations

Security Visionaries

Play Episode Listen Later Jul 15, 2025 34:15


Join host Emily Wearmouth for the very special episode of Security Visionaries recorded live at Infosecurity Europe. She's joined by Holly Foxcroft, Ian Golding, and Rich Davis to discuss the crucial conversations CISOs need to have with their CEOs this year. The episode dives into four key areas: cost, risk, innovation, and AI, offering insights and exploring the differing perspectives between tech leaders and CEOs.

The Way of The Wolf
238: How to Build a Personal Brand That Opens Doors

The Way of The Wolf

Play Episode Listen Later Jul 15, 2025 6:04


In this episode, Sean shares insights from his recent keynote and workshop in Toronto, where he spoke to CISOs about intentionally building a personal brand. He talks about why blasting out content isn't enough if you don't have real results behind it, how to find out what people really think of you, and the steps to shape your reputation into what you want it to be. If you've ever wondered how to open more doors in your career and life, start here. Key points: • Focus on results before building your brand • Seek real feedback to get your baseline • Learn from mentors and close your gaps • Know what you want to be known for — and work towards it intentionally Ready to become the problem-solver everyone turns to? Start building your brand the right way.

The Virtual CISO Moment
S7E37 - A Conversation with Nick Eicken

The Virtual CISO Moment

Play Episode Listen Later Jul 15, 2025 27:39


Nick Eicken is the founder of CyberAuthority and a seasoned Virtual Chief Information Security Officer (vCISO) with deep roots in both military and civilian cybersecurity leadership. A U.S. Army veteran who built top-secret communication networks as a signal officer, Nick transitioned to the private sector where he's guided organizations across nonprofit, manufacturing, government, and consulting spaces. His firm, CyberAuthority, focuses on helping small and midsized businesses build defensible, scalable security programs through ethical, vendor-neutral vCISO services.In this episode, Nick shares his journey from military service to launching his own cybersecurity practice. He and Greg Schaffer explore the value of standardizing the vCISO model, building trust with clients by understanding their business "why," and how to make cybersecurity frameworks like the NIST CSF approachable for SMBs. Nick also discusses the critical distinction between internal CISOs and third-party vCISOs, the importance of ethical independence from MSPs, and the need for transparency. The conversation wraps with insights on stress management, homebrewing, family life in Northern California, and upcoming CyberAuthority initiatives—including cybersecurity offerings for retirees entering one of the most vulnerable phases of their digital lives.

Inside the ICE House
Episode 477: Sysdig CEO Bill Welch on Cloud Defense & the Next-Gen of Cyber Security

Inside the ICE House

Play Episode Listen Later Jul 14, 2025 28:51


Cloud security is undergoing a major transformation as threats become more complex and automated. Generative AI is helping teams cut through noise, automate tasks, and respond to risks faster. Sysdig, led by CEO Bill Welch, is at the forefront of this shift—empowering security teams with real-time insights and accelerating global growth. He goes Inside the ICE House to discuss company growth and the tools the his team is equipping CISOs with to fight growing threats.

KuppingerCole Analysts
Analyst Chat #260: Servant Leadership for CISOs - Better Security & Business Outcomes

KuppingerCole Analysts

Play Episode Listen Later Jul 14, 2025 44:22


In this must-listen episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Jonathan Care to explore a groundbreaking shift in cybersecurity leadership. Discover how CISOs are transforming from traditional gatekeepers, the infamous "Dr. No", into strategic business enablers through the principles of Servant Leadership. We dive deep into: Why the CISO role is evolving beyond technology and policy The pitfalls of autocratic security leadership and rising burnout How empowering teams builds trust, reduces shadow IT, and accelerates projects Real-world examples from global organizations proving this approach works Practical first steps for CISOs to start leading through influence, not fear Key Takeaway: Security isn’t just about tech, it’s about people and culture. Servant leadership helps build stronger security and stronger businesses.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 12-13, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 12, 2025 1:08


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 11, 2025. Activision Pulled Game, Players Exploited. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 11, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

What It Means
Fear In B2B Buying, Future Of Experiences, Cisco Live Recap

What It Means

Play Episode Listen Later Jul 10, 2025 23:02


In this episode of What It Means, we dig into fear as a motivator in the B2B buying process, the human-centric future of digital experiences, and what CISOs need to know coming out of Cisco Live.

The FIT4PRIVACY Podcast - For those who care about privacy
How Does the CISO Define Digital Trust and Collaborate with Privacy Functions

The FIT4PRIVACY Podcast - For those who care about privacy

Play Episode Listen Later Jul 10, 2025 6:46


In today's digital world, trust is everything. But what does digital trust really mean? And how do security leaders like CISOs help build it while working with privacy teams?In this insightful trailer episode of the FIT4PRIVACY Podcast, cybersecurity expert Aman Tara joins host Punit Bhatia to break down the evolving role of the Chief Information Security Officer. You'll learn how CISOs protect company data, follow privacy laws, and work closely with privacy teams to keep personal information safe and hear how regular meetings and teamwork between security and privacy experts help stop threats before they happen—especially with new technologies like artificial intelligence changing the game. If you want to understand how companies keep your data safe and build trust in a digital world, this episode is for you! This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you will enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from the industry influencers who share their ideas. The episodes are released as audio every Wednesday and video every Thursday.  If you subscribe to our podcast, you will be notified about new episodes. If you have not done so, write a review and share it with someone who will benefit.  RESOURCES Websites www.fit4privacy.com, www.punitbhatia.com, https://www.linkedin.com/in/aman-tara-cisa-cdpse-cfe-b6095483/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy   

Cyber 9/11 with Dr. Eric Cole
Mastering the CISO Journey with Guest Christophe Foulon

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jul 10, 2025 24:51


In this episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity expert and fellow podcaster Christophe Foulon to dive deep into the evolving role of the Chief Information Security Officer. From breaking into cybersecurity to leading organizations through strategic risk decisions, Christophe shares real-world insights on how to transition from technical roles to executive leadership. They explore the challenges of balancing hands-on work with high-level strategy, how to communicate with business leaders without getting lost in technical jargon, and how to manage burnout while building organizational resilience. Christophe also tackles major topics like AI, zero trust, cyberwarfare, and BYOD policies, offering practical advice for today's and tomorrow's CISOs. If you're aiming to elevate your cybersecurity career or want to understand how top leaders think, this episode is packed with guidance, clarity, and perspective.  

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 10, 2025. $43M+ Stolen From GMX Crypto Platform. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 10, 2025 1:19


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 9, 2025. Flutter Entertainment Flags Data Breaches. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 9, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

@BEERISAC: CPS/ICS Security Podcast Playlist
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 9, 2025 24:25


Podcast: Industrial Cybersecurity InsiderEpisode: Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant FloorPub date: 2025-07-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.Chapters:00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration00:01:49 - Unpacking the Challenges of IT/OT Convergence00:02:28 - Why IT and OT Teams Often Struggle to Align00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity00:07:33 - The Role of CIOs and CISOs in Driving Change00:08:44 - Navigating the Complexities of Diverse Plant Environments00:10:23 - Partnering with Vendors to Enhance Security Outcomes00:11:16 - Key Questions to Evaluate System Integrators Effectively00:16:35 - Using Tabletop Exercises to Align IT and OT Teams00:22:20 - Closing Thoughts: Bridging the Divide for Unified CybersecurityLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 8, 2025. Cyberattack Disrupts Russian Drones. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 8, 2025 1:24


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

@BEERISAC: CPS/ICS Security Podcast Playlist
How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot Vulnerability

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 8, 2025 17:55


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot VulnerabilityPub date: 2025-07-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk.  From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI's efficiencies.  Whether you're in a large enterprise or a lean team with limited resources, you'll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let's jump in and explore how to protect it all as AI advances. Key Moments :  01:20 AI's Rising Role in Media 03:22 Guidelines for Using AI Safely 07:06 "AI Integration and Automation Strategies" 10:03 Automating Windows Management Tasks 14:29 Exploring AI for Personal Tasks Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 7, 2025. Ransomware Hits Ingram Micro, IT Distributor. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 7, 2025 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The CyberWire
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]

The CyberWire

Play Episode Listen Later Jul 4, 2025 38:00


While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year's “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won't change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale. Resources: Kubikle: A comedy webseries about cybercriminals. Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024 Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

The New CISO
Ask the Right Questions: How Building Trust Brings Value

The New CISO

Play Episode Listen Later Jul 3, 2025 50:59


In this episode of The New CISO, host Steve Moore speaks with Aleksandar Radosavljevic, Global CISO at Global Fashion Group, about building trust, measuring resilience, and the evolving role of the security leader.Aleksandar shares how his unexpected pivot from electrical engineering to cybersecurity sparked a passion for protecting systems and solving problems. With over two decades of experience across pharma, manufacturing, and tech, he offers insights into how security leaders can establish trust, drive business value, and focus on what really matters.The conversation covers the art of starting strong in a new CISO role, navigating interviews with curiosity and care, and avoiding common traps like overcomplicating metrics or chasing the latest tools without mastering the basics.Key Topics Covered:Why pharma's mission-driven work made a lasting impact on AleksandarCareer advice for cybersecurity newcomers: follow learning, not just industryHow CISOs can build early trust by listening and understanding the businessRed flags and green lights during the CISO interview processWhy being challenged in an interview signals a healthy security cultureThe problem with vanity metrics—and what to track insteadAleksandar's favorite KPIs: time to detect, respond, and contain incidentsThe role of situational awareness in building cyber resilienceHow simplifying language helps CISOs align with executive teamsWhy mandate and mindset matter more than reporting linesAleksandar's story is a reminder that cybersecurity leadership is about more than tools and tactics—it's about trust, transparency, and transforming security from a blocker into a true business enabler.

Cyber 9/11 with Dr. Eric Cole
How a Hacker Became Twitter's First CISO | Michael Coates on Cybersecurity's Future

Cyber 9/11 with Dr. Eric Cole

Play Episode Listen Later Jul 3, 2025 33:04


In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter's first Chief Information Security Officer (CISO), and later founding his own data security company. They discuss how core cybersecurity principles remain constant despite evolving technologies and threats, emphasizing the importance of mastering fundamentals while adapting to new contexts like cloud and AI.   Michael offers practical advice for aspiring CISOs, highlighting the value of diverse security experience, business acumen—such as understanding finance and sales—and the ability to balance risk with business needs. He stresses the importance of building strong teams, effective communication with executives, and partnering closely with legal to manage liability. The conversation also touches on optimal reporting structures for CISOs and reframing security as a business enabler rather than a roadblock. Ultimately, Michael advocates for transparent risk communication and thoughtful preparation as keys to successful security leadership.

Cybercrime Magazine Podcast
US-Russia Cyber Relations. What CISOs Should Know. Phil Muncaster, Technology Journalist.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 30, 2025 14:21


Phil Muncaster is a technology journalist and copywriter with over 20 years of experience. He contributes daily news to Infosecurity Magazine and feature articles to other IT titles across the industry. In this episode, Muncaster joins host Heather Engel to discuss US-Russia cybersecurity relations, the possibly of a detente, and what CISOs across the industry should know. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Telecom Reseller
Aviatrix and Wiz: Closing the Loop on Cloud Security, Podcast

Telecom Reseller

Play Episode Listen Later Jun 30, 2025


Podcast with Chris McHenry, VP at Aviatrix, and Doug Green, Publisher of Technology Reseller News “Wiz detects. We react and enforce.” — Chris McHenry, Aviatrix In this timely conversation, Doug Green of Technology Reseller News sits down with Chris McHenry, Vice President at Aviatrix, to explore the company's groundbreaking partnership with Wiz—and how the two are working together to solve one of the most urgent problems in enterprise IT: cloud security. Aviatrix is focused on reinventing network security for the cloud era, helping enterprises regain the controls they've lost in the transition from traditional data centers to cloud-native architectures. “CISOs consistently tell us their cloud environments feel less secure than their data centers,” McHenry notes. That's where Aviatrix steps in—by delivering Zero Trust security at the network layer, with cloud-native tools that provide perimeter protection, lateral movement control, and runtime enforcement. The conversation zeroes in on the company's recent integration with Wiz, the cloud-native application protection platform (CNAPP) that recently made headlines with its massive $30 billion acquisition by Google. According to McHenry, the partnership is more than strategic—it's foundational. “They detect attacks, we stop them,” he says, describing a “closed-loop” response system where Wiz identifies high-risk incidents and Aviatrix's Cloud Native Security Fabric automatically reacts in real time, quarantining threats and blocking malicious activity. As AI rapidly redefines the modern enterprise, McHenry explains how Aviatrix is evolving to meet the dual challenge: using AI to both secure cloud environments and enhance the performance of security operations. From custom AI-powered risk analysis to integrations with Microsoft Copilot for Security, the company is pushing innovation at both ends of the spectrum. And for the reseller community, there's even more upside. Aviatrix is proudly channel-first. “We sell almost entirely through the channel,” says McHenry, inviting partners—especially those already working with Wiz—to expand their practices with Aviatrix's complementary offerings. “This is a big opportunity to help your customers modernize cloud security without lifting and shifting legacy firewalls.” The stakes are rising, and this partnership is gaining attention for good reason. “Google's acquisition of Wiz validates just how critical cloud security is,” says McHenry. “And our integration gives organizations an immediate path to both detect and respond to threats—at scale.” This podcast is the first of a two-part series. Stay tuned for part two, where Aviatrix CEO Doug Merritt will dive deeper into the strategic vision shaping the next decade of secure cloud infrastructure. Learn more at: www.aviatrix.com  

Cybercrime Magazine Podcast
Cybercrime Wire For Jun 28-29, 2025. Weekend Update. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 28, 2025 1:03


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jun. 27, 2025. Cyberattack Hits Hawaiian Airlines Systems. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 27, 2025 1:23


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Hacker Valley Studio
Purple Teaming Is the New Job Security with Maril Vernon

Hacker Valley Studio

Play Episode Listen Later Jun 26, 2025 43:26


Cybersecurity isn't just red or blue anymore... it's purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we're still failing the fundamentals. Together, Ron and Maril dig into what purple teaming really is (and isn't), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding Mind Over Cyber, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.   Impactful Moments 00:00 - Introduction 01:01 - Maril's role at NetSPI 03:00 - Why purple skills are future-proof 05:19 - Salary truths in purple teaming 08:30 - Know your value, negotiate wisely 13:07 - How defenders enable law enforcement 16:22 - The real meaning of purple teaming 18:39 - Common misconceptions debunked 24:45 - People are always the soft spot 26:01 - The two security stack must-haves 29:00 - Mom made it to incident response 30:48 - Maril's mentorship philosophy 34:09 - Why you need to post anyway 36:35 - What Mind Over Cyber is really about 40:00 - CISOs are burning out silently 41:31 - Closing thoughts Links: Connect with our guest, Maril Vernon: https://www.linkedin.com/in/marilvernon   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Paul's Security Weekly
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401

Paul's Security Weekly

Play Episode Listen Later Jun 25, 2025 65:24


In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401