POPULARITY
As more small businesses move sales, payments, and customer relationships online, they unlock new opportunities, but they also become easier targets for cyber-criminals and other threat actors.In this episode of Local to global: The power of small business, host JJ Ramberg sits down with Shamina Singh, Founder & President of the Mastercard Center for Inclusive Growth, and Brian Cute, Interim CEO and Director of Capacity & Resilience at the Global Cyber Alliance, to explore what Southeast Asia's fast-growing digital economy reveals about the cybersecurity challenges facing micro, small and medium-sized businesses everywhere.Together, they unpack what cyber-risk looks like on the ground, from phishing, ransomware, and malware to low-tech scams like QR-code sticker switching. They also examine why the damage rarely stays local; when a small supplier gets hit, disruptions can cascade through regional networks and even global supply chains.The good news is that their collaboration in Southeast Asia is also surfacing solutions that the rest of the world can borrow. Singh and Cute share what works, including public-private partnerships that deliver practical toolkits, localized training, and basic cyber hygiene that businesses can adopt, especially as AI-driven fraud and deepfakes make scams harder to spot.Local to global: The power of small business is a podcast series from GZERO Media's Blue Circle Studios and Mastercard, exploring why small businesses are poised to play an even bigger role in the future of the global economy. Host: JJ RambergGuests: Shamina Singh, Brian Cute Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
As more small businesses move sales, payments, and customer relationships online, they unlock new opportunities, but they also become easier targets for cyber-criminals and other threat actors.In this episode of Local to global: The power of small business, host JJ Ramberg sits down with Shamina Singh, Founder & President of the Mastercard Center for Inclusive Growth, and Brian Cute, Interim CEO and Director of Capacity & Resilience at the Global Cyber Alliance, to explore what Southeast Asia's fast-growing digital economy reveals about the cybersecurity challenges facing micro, small and medium-sized businesses everywhere.Together, they unpack what cyber-risk looks like on the ground, from phishing, ransomware, and malware to low-tech scams like QR-code sticker switching. They also examine why the damage rarely stays local; when a small supplier gets hit, disruptions can cascade through regional networks and even global supply chains.The good news is that their collaboration in Southeast Asia is also surfacing solutions that the rest of the world can borrow. Singh and Cute share what works, including public-private partnerships that deliver practical toolkits, localized training, and basic cyber hygiene that businesses can adopt, especially as AI-driven fraud and deepfakes make scams harder to spot.Local to global: The power of small business is a podcast series from GZERO Media's Blue Circle Studios and Mastercard, exploring why small businesses are poised to play an even bigger role in the future of the global economy. Host: JJ RambergGuests: Shamina Singh, Brian Cute Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Quantum security has gone from being a theoretical idea filed away for some unknown future date to an urgent requirement driven by quantum computing advances and government and industry guidance. The thought of nation-state adversaries with a quantum computer that can conduct harvest-now-decrypt later attacks and forge digital signatures makes the threat more real than ever to executives, who have started to ask security leaders, “Are we quantum safe?” With Q-day estimates now within 10 years and moving ever closer — and with NIST deprecating existing asymmetric algorithm support in 2030 (and disallowing it entirely by 2035), as well as the increasing nation-state threat — what should security leaders be doing now? Sandy Carielli, VP, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss why technology leaders must work together to prepare for Q-Day. Addressing quantum security requirements is not just a job for the security team. Security, infrastructure, development, emerging tech, risk, and procurement have roles to play in executing a holistic quantum security strategy. Sandy will cover their report, which security leaders should use, to gain executive buy-in and build and execute a quantum security migration plan with stakeholders across the organization. Segment Resources: https://www.forrester.com/report/technology-leaders-must-work-together-to-prepare-for-q-day/RES191420 https://www.forrester.com/blogs/create-a-cross-functional-q-day-team-or-suffer-a-hard-days-night/ In the leadership and communications segment, The Cybersecurity Reckoning: How CISOs Are Preparing for an Era of AI-Driven Threats and Quantum Disruption, Should I stay or should I go?, Are Legacy Metrics Derailing Your Transformation?, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-434
Quantum security has gone from being a theoretical idea filed away for some unknown future date to an urgent requirement driven by quantum computing advances and government and industry guidance. The thought of nation-state adversaries with a quantum computer that can conduct harvest-now-decrypt later attacks and forge digital signatures makes the threat more real than ever to executives, who have started to ask security leaders, "Are we quantum safe?" With Q-day estimates now within 10 years and moving ever closer — and with NIST deprecating existing asymmetric algorithm support in 2030 (and disallowing it entirely by 2035), as well as the increasing nation-state threat — what should security leaders be doing now? Sandy Carielli, VP, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss why technology leaders must work together to prepare for Q-Day. Addressing quantum security requirements is not just a job for the security team. Security, infrastructure, development, emerging tech, risk, and procurement have roles to play in executing a holistic quantum security strategy. Sandy will cover their report, which security leaders should use, to gain executive buy-in and build and execute a quantum security migration plan with stakeholders across the organization. Segment Resources: https://www.forrester.com/report/technology-leaders-must-work-together-to-prepare-for-q-day/RES191420 https://www.forrester.com/blogs/create-a-cross-functional-q-day-team-or-suffer-a-hard-days-night/ In the leadership and communications segment, The Cybersecurity Reckoning: How CISOs Are Preparing for an Era of AI-Driven Threats and Quantum Disruption, Should I stay or should I go?, Are Legacy Metrics Derailing Your Transformation?, and more! Show Notes: https://securityweekly.com/bsw-434
Quantum security has gone from being a theoretical idea filed away for some unknown future date to an urgent requirement driven by quantum computing advances and government and industry guidance. The thought of nation-state adversaries with a quantum computer that can conduct harvest-now-decrypt later attacks and forge digital signatures makes the threat more real than ever to executives, who have started to ask security leaders, "Are we quantum safe?" With Q-day estimates now within 10 years and moving ever closer — and with NIST deprecating existing asymmetric algorithm support in 2030 (and disallowing it entirely by 2035), as well as the increasing nation-state threat — what should security leaders be doing now? Sandy Carielli, VP, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss why technology leaders must work together to prepare for Q-Day. Addressing quantum security requirements is not just a job for the security team. Security, infrastructure, development, emerging tech, risk, and procurement have roles to play in executing a holistic quantum security strategy. Sandy will cover their report, which security leaders should use, to gain executive buy-in and build and execute a quantum security migration plan with stakeholders across the organization. Segment Resources: https://www.forrester.com/report/technology-leaders-must-work-together-to-prepare-for-q-day/RES191420 https://www.forrester.com/blogs/create-a-cross-functional-q-day-team-or-suffer-a-hard-days-night/ In the leadership and communications segment, The Cybersecurity Reckoning: How CISOs Are Preparing for an Era of AI-Driven Threats and Quantum Disruption, Should I stay or should I go?, Are Legacy Metrics Derailing Your Transformation?, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-434
Quantum security has gone from being a theoretical idea filed away for some unknown future date to an urgent requirement driven by quantum computing advances and government and industry guidance. The thought of nation-state adversaries with a quantum computer that can conduct harvest-now-decrypt later attacks and forge digital signatures makes the threat more real than ever to executives, who have started to ask security leaders, "Are we quantum safe?" With Q-day estimates now within 10 years and moving ever closer — and with NIST deprecating existing asymmetric algorithm support in 2030 (and disallowing it entirely by 2035), as well as the increasing nation-state threat — what should security leaders be doing now? Sandy Carielli, VP, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss why technology leaders must work together to prepare for Q-Day. Addressing quantum security requirements is not just a job for the security team. Security, infrastructure, development, emerging tech, risk, and procurement have roles to play in executing a holistic quantum security strategy. Sandy will cover their report, which security leaders should use, to gain executive buy-in and build and execute a quantum security migration plan with stakeholders across the organization. Segment Resources: https://www.forrester.com/report/technology-leaders-must-work-together-to-prepare-for-q-day/RES191420 https://www.forrester.com/blogs/create-a-cross-functional-q-day-team-or-suffer-a-hard-days-night/ In the leadership and communications segment, The Cybersecurity Reckoning: How CISOs Are Preparing for an Era of AI-Driven Threats and Quantum Disruption, Should I stay or should I go?, Are Legacy Metrics Derailing Your Transformation?, and more! Show Notes: https://securityweekly.com/bsw-434
Show NotesMost organizations treat cybersecurity as a technology problem. They invest in layers of defense, run phishing tests, and deploy identity and access management tools. Yet headlines about breaches keep coming. Dr. Keri Pearlson, Senior Lecturer and Principal Research Scientist at the MIT Sloan School of Management, argues that the real opportunity lies not in more technology but in changing how people across the organization think about and value cybersecurity.In this episode of the Human-Centered Cybersecurity Series, co-hosted by Julie Haney, Computer Scientist and Lead of the Human-Centered Cybersecurity Program at the National Institute of Standards and Technology (NIST), Dr. Keri Pearlson introduces her framework for cybersecurity culture built around values, attitudes, and beliefs. Rather than simply training employees on what to do, the focus shifts to shaping why they do it. When people genuinely believe cybersecurity matters, they take action without waiting for mandates or programs to tell them how.Dr. Pearlson shares vivid examples from her research: a CISO who hired a marketing professional to run the cybersecurity culture program, a CEO who opens every all-hands meeting with a five-minute cybersecurity story, and organizations that use creative rewards like chocolate chip cookies and digital badges to reinforce positive behaviors. She also outlines a five-stage maturity model for cybersecurity culture, from ad hoc efforts all the way to a dynamic culture that self-regulates as new threats like AI-driven vulnerabilities emerge.The conversation also tackles the relationship between organizational culture and cybersecurity culture, the role of group-level accountability, and why consequences matter just as much as rewards. Dr. Pearlson makes the case that cybersecurity should move from being viewed as an infrastructure play to a strategic advantage, one that can attract customers, reduce costs, and build competitive differentiation.For any leader looking to move the needle on security culture, this episode offers a research-backed roadmap and practical steps that anyone can take starting tomorrow.HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/Guest(s)Dr. Keri Pearlson, Senior Lecturer and Principal Research Scientist at MIT Sloan School of Management | On LinkedIn: https://www.linkedin.com/in/kpearlson/Julie Haney (Co-Host), Computer Scientist and Lead, Human-Centered Cybersecurity Program at National Institute of Standards and Technology (NIST) | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ResourcesLearn more about Dr. Keri Pearlson's research: https://mitsloan.mit.edu/faculty/directory/keri-pearlsonLearn more about the NIST Human-Centered Cybersecurity Program: https://csrc.nist.gov/projects/human-centered-cybersecurityCybersecurity at MIT Sloan (CAMS): https://cams.mit.edu/The Future of Cybersecurity Newsletter | https://www.linkedin.com/newsletters/7108625890296614912/More Redefining CyberSecurity Podcast episodes | https://www.seanmartin.com/redefining-cybersecurity-podcastRedefining CyberSecurity Podcast on YouTube | https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqKeywordsdr. keri pearlson, julie haney, mit sloan, nist, sean martin, cybersecurity culture, security culture, values attitudes beliefs, cyber resilience, human-centered cybersecurity, security awareness, phishing, cybersecurity maturity model, security behavior, cybersecurity strategy, redefining cybersecurity, cybersecurity podcast, redefining cybersecurity podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Show NotesMost organizations treat cybersecurity as a technology problem. They invest in layers of defense, run phishing tests, and deploy identity and access management tools. Yet headlines about breaches keep coming. Dr. Keri Pearlson, Senior Lecturer and Principal Research Scientist at the MIT Sloan School of Management, argues that the real opportunity lies not in more technology but in changing how people across the organization think about and value cybersecurity.In this episode of the Human-Centered Cybersecurity Series, co-hosted by Julie Haney, Computer Scientist and Lead of the Human-Centered Cybersecurity Program at the National Institute of Standards and Technology (NIST), Dr. Keri Pearlson introduces her framework for cybersecurity culture built around values, attitudes, and beliefs. Rather than simply training employees on what to do, the focus shifts to shaping why they do it. When people genuinely believe cybersecurity matters, they take action without waiting for mandates or programs to tell them how.Dr. Pearlson shares vivid examples from her research: a CISO who hired a marketing professional to run the cybersecurity culture program, a CEO who opens every all-hands meeting with a five-minute cybersecurity story, and organizations that use creative rewards like chocolate chip cookies and digital badges to reinforce positive behaviors. She also outlines a five-stage maturity model for cybersecurity culture, from ad hoc efforts all the way to a dynamic culture that self-regulates as new threats like AI-driven vulnerabilities emerge.The conversation also tackles the relationship between organizational culture and cybersecurity culture, the role of group-level accountability, and why consequences matter just as much as rewards. Dr. Pearlson makes the case that cybersecurity should move from being viewed as an infrastructure play to a strategic advantage, one that can attract customers, reduce costs, and build competitive differentiation.For any leader looking to move the needle on security culture, this episode offers a research-backed roadmap and practical steps that anyone can take starting tomorrow.HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/Guest(s)Dr. Keri Pearlson, Senior Lecturer and Principal Research Scientist at MIT Sloan School of Management | On LinkedIn: https://www.linkedin.com/in/kpearlson/Julie Haney (Co-Host), Computer Scientist and Lead, Human-Centered Cybersecurity Program at National Institute of Standards and Technology (NIST) | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ResourcesLearn more about Dr. Keri Pearlson's research: https://mitsloan.mit.edu/faculty/directory/keri-pearlsonLearn more about the NIST Human-Centered Cybersecurity Program: https://csrc.nist.gov/projects/human-centered-cybersecurityCybersecurity at MIT Sloan (CAMS): https://cams.mit.edu/The Future of Cybersecurity Newsletter | https://www.linkedin.com/newsletters/7108625890296614912/More Redefining CyberSecurity Podcast episodes | https://www.seanmartin.com/redefining-cybersecurity-podcastRedefining CyberSecurity Podcast on YouTube | https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqKeywordsdr. keri pearlson, julie haney, mit sloan, nist, sean martin, cybersecurity culture, security culture, values attitudes beliefs, cyber resilience, human-centered cybersecurity, security awareness, phishing, cybersecurity maturity model, security behavior, cybersecurity strategy, redefining cybersecurity, cybersecurity podcast, redefining cybersecurity podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Cyber readiness is rocketing up the agenda for boards in 2026. We explore cyber readiness including new regulatory developments, trends in cyber threats, and practical defences against attacks. In this episode of our UK Governance & Compliance mini-series, we explore cyber readiness as one of the top risk-related priorities for boards in 2026. We look at the sobering costs of large disruptions —noting the cause is often small-scale security lapses. We explore the changing cyber landscape including the UK’s expanding Cyber Resilience Bill and the shift to operational disruption as the primary threat. Plus, we provide practical guidance for boards. Podcast host Will Chalk is joined by John Macpherson, an Ashurst risk advisory partner in Sydney. Also joining the conversation are London colleagues Rhiannon Webster, a partner in Ashurst’s digital economy transactions practice, who heads up the UK cyber response and data protection team, and Matt Worsfold, a partner in Ashurst’s risk advisory team. To listen to this and subscribe to future episodes in our governance mini-series, search for “Ashurst Legal Outlook” on Apple Podcasts, Spotify or your favourite podcast player. You can also find out more about the full range of Ashurst podcasts at ashurst.com/podcasts. To receive updates and alerts on the issues raised in this podcast mini-series, subscribe to Ashurst’s regular Governance and Compliance Updates. Read more about the recent AGC Conference here. And read our latest update here about Narrative and Financial Reporting, and Economic Crime and Corporate Transparency. The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to. Listeners should take legal advice before applying it to specific issues or transactions.See omnystudio.com/listener for privacy information.
In this week's episode of the Security Sprint, Dave and Andy covered the following topics:Opening:Check out the new SUN format and Subscribe to GRIP! Gate 15's Resilience and Intelligence PortalBig News! The Tribal-ISAC Appoints First Executive Director to Advance Cybersecurity for Tribal Governments and Enterprises – Tribal-ISAC | 27 Jan 2026: Keys & Locks – The Overlooked Security Risk – Fact Sheet — WaterISAC | 28 Jan 2026 Main Topics:Insider Threats: Assembling A Multi-Disciplinary Insider Threat Management Team — CISA | 27 Jan 2026 (Analysis/Commentary) CISA's new infographic guides organizations in forming insider threat teams that bring together HR, legal, IT, security, and leadership under a “Plan, Organize, Execute, Maintain” framework. Savannah Best Buy employee says hacker group blackmailed him into theft ring scheme Study: Future workers would sell patient data Former Google Engineer Found Guilty of Economic Espionage and Theft of Confidential AI Technology Former TD Bank Employee Pleads Guilty to Accepting Bribes and Laundering $55 Million From Colombia Two Recent Guilty Pleas Highlight Financial Crime Risks Posed by Bank Insiders The Evolution of Insider Threat Ransomware Threat Outlook 2025-2027 — Canadian Centre for Cyber Security | 28 Jan 2026 The Cyber Centre assesses that ransomware against Canadian organizations is increasing and rapidly evolving, with actors almost certainly opportunistic and financially motivated, and essentially all organizations and individuals at risk of being targeted at some point. Ransomware: How to Prevent and Recover (ITSAP.00.099) — Canadian Centre for Cyber Security Ransomware Playbook (ITSM.00.099) — Canadian Centre for Cyber Security Threat Spotlight: Ransomware and Cyber Extortion in Q4 2025 NCC Group Monthly Threat Pulse – Review of December 2025 The Convergence of Infostealers and Ransomware: From Credential Harvesting to Rapid Extortion ChainsFBI Operation Winter SHIELD: 10 Cybersecurity Actions for Critical Infrastructure & FBI Launches ‘Winter SHIELD' Cyber Campaign — FBI & Infosecurity Magazine, 29 Jan 2026. NSA Releases Phase One and Phase Two of the Zero Trust Implementation Guidelines How to prepare and plan your organisation's response to a severe cyber threat: a guide for CNI Cyber security considerations for drone use (ITSAP.00.143) Cyber security advisory AV26-058: OpenSSL Security Advisory Cyber Incident Reporting Guidelines: Key Information & Sharing Requirements — Canadian Centre for Cyber Security, 2026DOD: JIATF 401 Publishes New Guidance for Physical Protection of Critical Infrastructure (U.S. Department of Defense, Jan 2026) Spotting malicious email messages (ITSAP.00.100) — Canadian Centre for Cyber Security | Jan 2026 Quick Hits:2025 Threat Report: Exploitation Grows Across IT, IoT, and OT — Forescout Vedere Labs | 29 Jan 2026 Man arrested after spraying substance on Rep. Ilhan Omar Ilhan Omar Attack: Suspect Identified as Anthony Kazmierczak Amid Rising Political Violence Calls to Impeach DHS Secretary Noem Grow After Minneapolis Shootings and Omar Attack ‘No Kings' march event in Twin Cities & ‘No Kings' protest march set for March 28 USCP Threat Assessment Cases for 2025 – Source: U.S. Capitol Police, 27 Jan 2026.
Join Gonçalo Gil, CEO and Co-founder of ROOTKey, for an inside look at the high-stakes world of cybersecurity. As a former world-ranked ethical hacker, Gonçalo has transitioned from the offensive frontlines to building the next generation of cyber resilience. In this episode, we explore how AI has leveled up the capabilities of cybercriminals—allowing them to automate attacks with unprecedented speed and sophistication—and why traditional defense is no longer enough. Learn how ROOTKey is leveraging blockchain and zero-trust frameworks to ensure that even when an attack occurs, data remains immutable, verifiable, and quickly recoverable.
In this enlightening episode, hosts Frank La Vigne and Candace Gillhoolley are joined by Benita Zazueta, a leader in quantum-safe initiatives at IBM and a doctoral candidate exploring the intersection of quantum risk and supply chain resilience.Together, the team tackles the looming threat posed by fault tolerant quantum computers—those machines capable of cracking today's encryption and altering the balance of cybersecurity. Benita Zazueta breaks down complex concepts like “harvest now, decrypt later,” and explains how business leaders, not just researchers and engineers, must prepare for a quantum future. The conversation covers practical strategies for organizations to assess vulnerabilities, foster quantum talent, and transform their security posture without causing panic.Whether you're a seasoned technologist, a curious executive, or just starting your quantum journey, this episode delivers actionable insights, fascinating anecdotes, and critical leadership lessons from the front lines of quantum innovation. Tune in and discover how to build resilience, not just protection, in the age of quantum breakthroughs!LinksIBM Quantum – https://www.ibm.com/quantumIBM Quantum Safe – https://www.ibm.com/quantum/quantum-safeQiskit – https://qiskit.orgTime Stamps00:00 Quantum Threats and Business Decisions05:34 "Harvest Now, Decrypt Later"09:53 "Impending Data Decryption Risks"12:34 Cyber Resilience Against Future Threats14:48 Preparing for Quantum Encryption Shift17:59 Quantum-Safe Supply Chain Security22:42 Quantum Computing Misconceptions Debunked26:48 "Internet-Dependent Smart Bed Issues"27:58 "Driving Innovation Through Core Values"31:23 "Explore Free Quantum Learning Resources"36:42 "Application Risk Assessment Process"39:51 "Securing Supply Chain Software"41:47 "Quantum Computing's Impact and Race"48:02 "Ethical Hacking in Perspective"52:10 "Aerospace Engineer's Flight Story"55:49 "Quantum Podcasts: Breaking the Mold"
How do you protect critical infrastructure that millions of people rely on every day? In this episode, Olga Forné, Global CISO at Abertis - who is a nominee for the CIONET Awards 2026 in the Cybersecurity category - sits down with Daniel Eycken to discuss her journey transforming cybersecurity from a fragmented, reactive function into a "nervous system" for global business resilience. Don't miss the panel where Olga and other CIONET Awards 2026 nominees will share more about their cybersecurity journeys
Andy Grotto, William J. Perry International Security Fellow and the founder and co-director of the Program on Geopolitics, Technology, and Governance at Stanford University's Center for International Security and Cooperation (CISAC), and Jim Dempsey, a senior policy adviser to that program and a Lecturer at the UC Berkeley Law School, join Lawfare's Justin Sherman to discuss their recent study on the U.S. military's domestic operational technology (OT) cybersecurity vulnerabilities, domestic installations' dependencies on critical infrastructure both “inside the fence” and “outside the fence,” and how U.S. adversaries could exploit the flaws. They also discuss the myth of the air gap; the Pentagon's Energy Resilience Program; the role that standards, regulations, and procurement could play in strengthening the cybersecurity of OT systems on which the military depends; and what the threat landscape will look like in the coming years.Resources:James X. Dempsey and Andrew J. Grotto, “Ensuring the Cyber Resilience of Critical Infrastructure Serving Domestic Military Installations: Questions for Senior Leadership,” The Cyber Defense Review 10, no. 2 (2025): 115-138Jim Dempsey and Andrew J. Grotto, “The Pentagon's Operational Technology Problem,” Lawfare, December 15, 2025To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
The Pure Report welcomes two key members of Pure's Technical specialist team, Principal Technologist Joey Clark and Field Solution Architect Drew Kessel (who covers Cyber Resilience). Our conversation begins with a look at their backgrounds, including their surprising common start in healthcare IT, and the value of professional development, like Pure's EBC speaker training. We quickly pivot to the successes Pure is seeing in the areas of file, object, and unstructured data, driven by innovative products like FlashBlade and FlashArray. The core of our discussion centers on why Pure is successfully tackling the toughest challenges in unstructured data, noting the significant shift to object storage for backup, which provides benefits like immutability via object lock. Joey and Drew highlight how Pure's unique approach—focusing on simplicity and eliminating "tech debt"—is resonating with customers and leading to major business breakthroughs. This success is made stronger by strategic partnerships with data protection leaders like Rubrik, Commvault, and Veeam, creating a connected ecosystem that delivers layered resilience against modern threats. Finally, we explores the powerful narrative of the Enterprise Data Cloud (EDC), with Fusion acting as the intelligent control plane. We discuss how Fusion is the vehicle for EDC, helping customers mitigate risk and human error through automation. This includes using presets to enforce protection policies (like SafeMode snapshots and replication) and delivering audit and compliance alerts when security settings are changed. Drew shares a powerful, real-life customer success story of an 8-hour recovery from a cyber event using Pure snapshots, emphasizing that cyber resilience is a unified team sport that requires both infrastructure and security teams to collaborate. To learn more, visit https://www.purestorage.com/products/storage-as-code/pure-fusion.html Check out the new Pure Storage digital customer community to join the conversation with peers and Pure experts: https://purecommunity.purestorage.com/ 00:00 Intro and Welcome 09:02 File and Object Momentum 16:45 SLA-Backed Cyber Recovery 20:20 Fusion Presets and Cyber 27:33 Cyber and Enterprise Data Cloud 34:06 Bridging Cyber IT to Security Teams and CISOs 38:11 Pure Tech Summit Events 42:11 Hot Takes Segment
Recorded live at the Cloud Connections event in Delray Beach, Doug Green, Publisher of Technology Reseller News, spoke with Darin Gull of C3 Complete about the growing importance of compliance, cyber resilience, and partner-centric security services in today's cloud and UCaaS ecosystem. Gull describes C3 Complete as an “anything IT” company with a clear mission: to complete a partner's portfolio without ever competing with it. Working exclusively through channel partners, C3 Complete focuses on filling gaps—particularly in security and compliance—while preserving partner ownership of the customer relationship. “We're here to complete, but never compete,” Gull explains, emphasizing the company's commitment to protecting partner equity. A central theme of the conversation is compliance, which Gull frames less as a punitive obligation and more as an education and awareness challenge. C3 Complete leads with what it calls cyber resilience—helping organizations understand what they are required to do, why it matters, and how to consistently track and maintain compliance over time. “Most compliance failures aren't bad actors trying to break rules,” Gull notes. “It's usually a lack of awareness.” C3 Complete's approach begins with deep listening and discovery. By understanding a client's operational realities and pain points, the company's subject-matter experts—guided by its security leadership—identify shortfalls, improve efficiency, and develop clear, actionable roadmaps to move customers from their current state to their desired level of compliance and security maturity. Gull also reflects on the relevance of the Cloud Communications Alliance community, noting that many of the challenges facing today's UCaaS and cloud providers—particularly around security, governance, and AI—mirror those seen in earlier phases of the industry, albeit at greater scale and complexity. As AI adoption accelerates, he sees compliance and governance as unresolved but critical questions that service providers must address proactively. Looking ahead to 2026, C3 Complete plans to expand its partner ecosystem, deepen its security offerings, and continue delivering what Gull calls “white-glove service without the insane price.” For MSPs and service providers lacking a full security stack, C3 Complete positions itself as a trusted extension of their business—stepping in when needed, then stepping back to ensure partners retain the customer relationship. More information about C3 Complete is available at https://c3-complete.com/.
Join Brendan Hall and Michael White, Alliant Cyber, and Scott Erickson, APT Healthcare, as they explore how Alliant's PortCo Protect program supports private equity organizations in advancing cybersecurity maturity across their portfolio companies. The discussion highlights how portfolio-wide risk assessments, sponsor transparency and ongoing remediation guidance help drive alignment, justify investment and strengthen security posture. Scott also shares firsthand insights on modernizing IT infrastructure, improving defenses against threats like ransomware and the value of collaborative partnership in elevating enterprise risk management.
On this episode analyzes current cybersecurity challenges, highlighting that artificial intelligence (AI) is both an opportunity for productivity and a risk if its adoption is uncontrolled. Experts from Ferrovial and Zscaler discuss growing threats, such as mass extortion campaigns and the bribery of employees to act as "insiders," facilitating access for attackers. To combat this, the Zero Trust (zero trust) model is proposed to limit privileges, alongside the use of AI itself to detect behavioral anomalies. Juan Cobo highlights that the CISO's role is fundamental for cultural transformation and risk management in critical infrastructures, which are increasingly affected by current geopolitics. For his part, Pablo Vera underlines the importance of protecting industrial environments (OT and IoT) through device isolation. The future of the sector focuses on cyber resilience, the industrialization of incident recovery processes, and compliance with international regulations. Finally, it is noted that AI enables the creation of more perfect and harder-to-detect phishing attacks in Spanish. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
In this episode, Joy Oh, Chief Information and Digital Transformation Officer at Christ Hospital Health Network, shares how strong governance, disciplined AI pilots, and close operational partnerships are accelerating digital transformation while managing risk.
In this episode, Rob Aragao sits down with Theresa Lanowitz for a deep dive into the evolving meaning of cyber resilience and why it has become a true business imperative. Moving beyond traditional cybersecurity, the conversation explores how organizations must unite leadership, technology, and operations to withstand and recover from today's most disruptive cyber events.Theresa shares insights on the defining attacks of 2025, including the rise of AI-driven social engineering, software supply chain compromises, and credential-based intrusions from new-generation threat groups. The discussion also looks ahead to 2026, examining emerging risks around data misuse, non-human identities, insider threats, and the long-term impact of breached data.Together, Rob and Theresa unpack why cyber resilience must be owned at the board and C-suite level, how software supply chain complexity has become a critical weakness, and what organizations can do to better govern, protect, and use their most sensitive data. This episode offers a strategic perspective for leaders looking to align cyber resilience with business outcomes in an increasingly connected and unpredictable digital world.As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Cyber Insights 2026: Information Sharing (SecurityWeek, 16 Jan 2026)• ICYMI: Homeland Republicans underscore importance of strong public-private sector partnerships to deter cyber threats — House Homeland Security Committee (Majority) | Jan 17, 2026 Main Topics:Pro-Russia hacktivist activity continues to target UK organisations & NCSC warns of hacktivist groups disrupting UK online services (UK National Cyber Security Centre, Jan 2026). The NCSC reports sustained, low-sophistication but high-volume hacktivist campaigns—primarily DDoS and website defacements—linked to pro-Russia narratives and opportunistic targeting of UK public- and private-sector organizations. While technically unsophisticated, the activity is persistent, media-aware, and designed to generate disruption, reputational harm, and psychological impact rather than deep network compromise. The NCSC emphasizes preparedness measures including DDoS resilience, clear incident communications, and executive awareness that “noise” activity can still impose real operational cost. • Russia-linked APT28 targets energy and defense groups tied to NATO • UAT-8837 targets critical infrastructure sectors in North America • A Day Without ICS: The real impact of ICS/OT security threats Ransomware• Worldwide ransomware roundup: 2025 end-of-year report • Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target• 2025 Shattered Records: Key takeaways from the GRIT 2026 Ransomware & Cyber Threat Report• DeadLock Ransomware: Smart Contracts for Malicious Purposes Domestic Operations: Joint Interagency Task Force-Counter Cartel (JIATF-CC) established & US Northern Command establishes JTF-GOLD Quick Hits:• (TLP:CLEAR) Assessing Terrorism Trends on the Horizon in 2026 — WaterISAC — Jan 15, 2026 • UK NCSC: Designing safer links: secure connectivity for operational technology• NCSC UK: Secure connectivity principles for OT (collection) • FBI: Secure Connectivity Principles for Operational Technology (OT) (PDF)• ACSC (Australia): New publication for small businesses managing cyber risks from AI • Artificial intelligence for small business: Managing cyber security risks• Developing your IT recovery plan (Canadian Centre for Cyber Security, Jan 2026)• Improving cyber security resilience through emergency preparedness planning (Canadian Centre for Cyber Security, Jan 2026)• Developing your incident response plan (Canadian Centre for Cyber Security, Jan 2026)• Developing your business continuity plan (Canadian Centre for Cyber Security, Jan 2026)
Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7: Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point. The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster
Podcast: Exploited: The Cyber Truth Episode: Beyond Defense: Building Cyber Resilience in Autonomous and Connected MobilityPub date: 2026-01-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAutonomous and connected vehicles are reshaping transportation, but increased software complexity and connectivity introduce serious security and safety challenges that can't be solved with traditional perimeter defenses. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Hemanth Tadepalli, Senior Cybersecurity & Compliance SME at May Mobility, for a practical discussion on what cyber resilience looks like inside real-world autonomous vehicle programs. Hemanth draws on his experience securing mobility systems at May Mobility, as well as prior work with Mandiant, Google, and AlixPartners, to explain how automotive organizations are adapting to software-defined vehicle architectures, regulatory pressure, and expanding attack surfaces. Joe shares his perspective on why mobility companies increasingly resemble software companies and what that means for engineering, governance, and operational security. Together, they explore: How connected and autonomous vehicle architectures expand the attack surfaceWhat cyber resilience means in day-to-day engineering and fleet operationsHow governance, threat intelligence, and software validation reduce riskRegulatory pressures shaping automotive security decisionsHow teams balance detection, response, and safety in autonomous systems Whether you're building autonomous platforms, managing connected fleets, or securing safety-critical software, this episode offers a grounded look at what it takes to keep modern mobility systems trustworthy and safe.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Send us a textDenis Villeneuve, Cybersecurity and Resiliency Practice Lead at Kyndryl, talked about improving organizational cybersecurity and resilience. A Kyndryl readiness report revealed a significant gap between executive concern over cyber threats and their lack of preparedness to handle them. He stressed the necessity of a holistic approach to cyber resilience, addressing human errors and external risks, and prioritizing security investments in core, revenue-driving applications.Regarding the Canadian landscape, Denis expressed optimism about the country's standing but highlighted the need for greater compliance with emerging global regulations (like Bill C-8). He also covered the impact of AI on cybersecurity, necessitating system modernization and improved workforce skills to counter AI-driven threats.
Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55 The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections
S3E13: What's Trending NOW is the rising threat of cyber attacks in healthcare, and why resilient, recovery-ready infrastructure is as critical as having skilled clinicians or effective workflows. On this episode Shahid Shah is joined by Scott Taylor, Director of Cyber Resilience and Field Solutions Architect for Pure Storage, a company that stores, manages, and protects the world's data. Scott shares insights on the inevitability of breaches and why speed of recovery matters more than perfect prevention. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
In the third episode of our ‘Cyber Security De-mystified Podcast Series', Steve Ramsden, President Information Security at Intertek meets with guest speaker Irfan Hemani -Deputy Director for UK Cyber Security & Resilience Policy at Department for Science, Innovation and Technology – DSIT to talk about UK Govt initiatives aiming to strengthen cyber resilience and what this means for UK organisations.Speakers:Steven Ramsden: President of Information Security at IntertekIrfan Hemani : Deputy Director for UK Cyber Security & Resilience Policy, DSITFollow us on- Intertek's Assurance In Action || Twitter || LinkedIn.
Think your cloud backups will save you from a ransomware attack? Think again. In this episode, Matt Castriotta (Field CTO at Rubrik) explains why the traditional "I have backups" mindset is dangerous. He distinguishes between Disaster Recovery (business continuity for operational errors) and Cyber Resilience (recovering from a malicious attack where data and identity are untrusted) .Matt speaks about the "dirty secrets" of cloud-native recovery, explaining why S3 versioning and replication are not valid cyber recovery strategies . The conversation shifts to the critical, often overlooked aspect of Identity Recovery. If your Active Directory or Entra ID is compromised, it's "ground zero” and you can't access anything. Matt argues that identity must be treated as the new perimeter and backed up just like any other critical data source .We also explore the impact of AI agents on data integrity, how do you "rewind" an AI agent that hallucinated and corrupted your data? Plus, practical advice on DORA compliance, multi-cloud resiliency, and the "people and process" side of surviving a breach.Guest Socials - Matt's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions:(00:00) Introduction(02:20) Who is Matt Castriotta?(03:20) Defining Cyber Resilience: The Ability to Say "No" to Ransomware(05:00) Why "I Have Backups" is Not Enough(06:45) The Difference Between Disaster Recovery and Cyber Recovery(10:20) Cloud Native Risks: Versioning and Replication Are Not Backups(12:50) DORA Compliance: Multi-Cloud Resiliency & Egress Costs(15:10) The "Shared Responsibility Model" Trap in Cloud(17:45) Identity is the New Perimeter: Why You Must Back It Up(22:30) Identity Recovery: Can You Restore Your Active Directory in Minutes?(25:40) AI and Data: The New "Oil" and "Crown Jewels"(27:20) Rubrik Agent Cloud: Rewinding AI Agent Actions(29:40) Top 3 Priorities for a 2026 Resiliency Program(33:10) Fun Questions: Guitar, Family, and Italian Food
In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.
In today's evolving digital environment, many leaders are facing unprecedented levels of complexity. Cyber threats are escalating, regulatory demands are tightening, and organizations are expected to maintain resilience while embracing innovation. Few people understand this landscape more deeply than Scott Alldridge, CEO of IP Services, President of the IT Process Institute, and author of the globally acclaimed VisibleOps series. With more than three decades of experience guiding technical and non-technical teams alike, Scott has built a reputation for transforming complicated cybersecurity concepts into clear, actionable strategies. His people-process-technology framework has helped organizations strengthen governance, reduce risk, and build cyber-mature cultures capable of thriving in high-stakes environments. In this episode, we discuss: How boards can elevate their cybersecurity oversight. Why organizations fail at cyber risk management, and how to fix it. Common misconceptions surrounding cybersecurity maturity. Scott's strategies for fostering ethical leadership and a security-first culture. Scott's most recent book, VisibleOps Cybersecurity, is an Amazon Best Seller and continues to influence executives, boards, and cybersecurity professionals around the world. Join us in this conversation as he breaks down the mindset and practices leaders need to stay ahead of current and future threats… You can connect with Scott and his work on his website!
Ekco, one of Europe's leading security-first managed service providers, has announced the results of new research which reveals that one-in-five (22%) consumers in Ireland are purchasing fewer items online because they fear cyberattacks. For the same reason, 19% say they have started to pay in-person, in cash, when they can. The research, commissioned by Ekco and carried out by Censuswide, surveyed 1,000 adults in the Republic of Ireland, exploring their attitudes to online spending as the volume of cyberattacks and scams continues to rise. It comes at a time when major fashion retailers are considering a return to the high street after declining footfall, exacerbated by the pandemic, drove both shoppers and retailers online. The research suggests that cyber fears could drive more to physical stores this festive season. Despite year-on-year growth in online spending, just 30% of those surveyed believe they know how to check if a retailer's website is safe or not. In fact, in the last 12 months, more than one-in-10 (14%) have entered their payment details on a fraudulent website, thinking it was legitimate, while 26% have found themselves on a fake website which was attempting to mirror a real one. Ekco's research suggests that the constant desire for convenience could be making consumers less focused on security. When offered, 31% opt to store payment details on websites to save time during the check-out process, and the same percentage have payment details stored on multiple websites. However, many consumers are unforgiving when retailers suffer a cyberattack. In the last 12 months, a quarter (25%) of consumers have avoided purchasing from, or using the services of, a retailer because it suffered a cyberattack. Two-thirds (66%) say they would stop shopping with a retailer permanently if their data was stolen in a breach, even if no money was taken. Conor Scolard, Director of Cyber Resilience at Ekco, said: "Our research shows that while consumers want a hassle-free shopping experience - with conveniences such as having their payment details stored - they are also concerned about the security of their information. It is vital that retailers have the robust infrastructure in place that enables them to assure customers that their data is safe, regardless of how they choose to pay: in-person in cash, or online (with or without stored card details). "As we have entered the busiest time of the year for shopping, retailers need to ensure that their systems can both stay onlineand protect customers' data from cyberattacks. Our research highlights that a cyberattack will not only have a negative impact on operations, but it can also cause lasting damage to a business's reputation. In addition, shoppers evidently lack confidence in identifying safe websites from compromised or fraudulent ones, which will undoubtedly lead to hesitation. The retail sector must consider this and its own role in providing convenience and confidence." See more stories here.
Cyber resilience is no longer optional—it's mission-critical for every modern organization. As CFO of Commvault, Jennifer DiRico is helping shape the future of how companies protect, rebuild, and grow after cyber threats. In this episode, Jennifer opens up about her journey from working in her family's car wash to leading finance at one of the world's top data security and AI firms. She reflects on the decade-long ride at Toast that led to its IPO, the mentors who shaped her as a leader, and how she's driving durable growth at Commvault through innovation and trust. Jennifer also shares how she sees AI empowering—not replacing—finance professionals, and why understanding the “why” behind the numbers is the real hallmark of great financial leadership.
Healthcare leaders can't afford to build their incident response plans in the middle of a crisis. Discover how disciplined, ongoing practice leveraging tabletop drills and vendor partnerships can help build true cyber confidence and a culture of security.
Podcast: Cyber Risk Management Podcast (LS 35 · TOP 3% what is this?)Episode: EP 197: Operational Cyber ResiliencePub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. "Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes: https://cr-map.com/podcast/161 https://cr-map.com/podcast/162/The podcast and artwork embedded on this page are from Kip Boyle, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this episode of Untapped Philanthropy, we sit down with Chris Aurelio, Director of Security and Compliance at Fluxx, to explore how cybersecurity has become a cornerstone of trust in the philanthropic sector. Together, we unpack the latest threat trends, the role of AI in both risk and defense, and how mission-driven organizations can protect their data—and their impact—in an increasingly digital world. This conversation reframes cybersecurity not as a technical burden, but as a fundamental act of stewardship and resilience.To learn more about Fluxx, visit: fluxx.ioTo learn more about Neon One, visit: neonone.comEpisodes of Untapped Philanthropy are edited, mixed, and mastered by Rocket Skates Recording.
What happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. "Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes: https://cr-map.com/podcast/161 https://cr-map.com/podcast/162/
This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv.With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He's helped organizations redefine what it means to build security cultures that actually work.In this episode, Nathan explains why communication (not technology) s a CISO's most important skill, how to create a culture that values security without slowing innovation, and why empathy may be the most underrated tool in cybersecurity.This is an insightful look at the people-first mindset behind stronger, more resilient security programs.Guest Bio Nathan Wenzler is a field chief information security officer at Optiv, where he advises clients on how to strengthen and optimize every aspect of their cybersecurity program. With nearly 30 years of experience, he has built and led security initiatives for government agencies, nonprofits and Fortune 1000 companies.Wenzler has served as a CISO, executive management consultant and senior analyst, holding leadership roles at Tenable, Moss Adams, AsTech and Thycotic. He also spent more than a decade in public sector IT and security roles with Monterey County, California, and supported state and federal agencies.He is known for helping security leaders better communicate the measurable value and benefit of a mature, effective cybersecurity program to executives, technical stakeholders and nontechnical business partners. His approach emphasizes not only technical excellence but also the human and organizational factors that drive long-term security success.Wenzler has spoken at more than 400 events worldwide, educating security leaders and professionals on how to excel in their role as an organization's risk expert. He has also served on advisory boards, including the Tombolo Institute at Bellevue College, and is a former member of the Forbes Technology Council. His areas of expertise include vulnerability and exposure management, privileged access management and identity governance, cyber risk management, incident response, and executive-level communications and program managementGuest Quote “If you can win the people over in your organization, you can make those big changes for better identity governance.”Time stamps 01:22 Meet Nathan Wenzler: Veteran CISO and Security Strategist 02:16 Redefining Identity in a World of Infinite Accounts 05:15 How Culture Can Make or Break Your Security Program 13:34 Winning Over the Business: Aligning Security and Culture 24:45 From “Department of No” to Trusted Partner: Fixing Cyber Communication 40:25 The Human Side of Incident Response 46:23 Leading with Empathy: Nathan's Advice for Security LeadersSponsorThe HIP Podcast is brought to you by Semperis, the leader in identity-driven cyber resilience for the hybrid enterprise. Trusted by the world's leading businesses, Semperis protects critical Active Directory environments from cyberattacks, ensuring rapid recovery and business continuity when every second counts. Visit semperis.com to learn more.LinksConnect with Nathan on LinkedInLearn more about OptivConnect with Sean on LinkedInDon't miss future episodesLearn more about Semperis
On this episode host Tom Testa invites Lesley Berkeyheiser a Senior Director of Accreditation Strategy and Development at DirectTrust to discuss cyber resilience in healthcare during Cybersecurity Awareness Month. Lesley shares insights on trust and cybersecurity along with valuable resources for health systems to use in their cyber strategies. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC. Main Topics:Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time. Hackers are attacking Britain's drinking water suppliers(TLP:CLEAR) Threat Analysis for the Water and Wastewater Sector, October 2025 – Executive SummaryThreat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here. 2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.Quick Hits:• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica• ‘Tremendous unprecedented devastation' in Jamaica from Hurricane Melissa, UN coordinator says• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says
When attackers are smart enough to hit your backups, recovery becomes your best defense. Rubrik's Chief Product Officer, Anneka Gupta, joins host Corey Quinn to break down what true cyber resilience looks like in today's multi-cloud world. From AI-driven recovery to surviving ransomware with your data (and reputation) intact, this episode covers what it really takes to bounce back when everything goes sideways.Show Highlights(00:00) Introduction to Ransomware and Backups(00:25) Welcome to Screaming in the Cloud(00:32) Introducing Rubrik and Annika Gupta(01:26) What Does Rubrik Do?(02:18) Evolution of Backup and Recovery(03:37) Challenges in Cyber Recovery(05:33) Rubrik's Approach to Cyber Resilience(08:44) Importance of Cyber Recovery Simulations(09:40) Security vs. Operational Recovery(11:28) Assume Breach: A New Security Paradigm(14:29) Multi-Cloud Complexities and Security(27:45) Hybrid Cloud and Cyber Resilience(29:25) AI in Cyber Resilience(33:09) Conclusion and Contact InformationAbout Anneka GuptaAnneka Gupta is a senior executive leader with a proven track record of scaling successful B2B SaaS businesses from the ground up. She's led across product, tech, go-to-market, and operations, always with a customer-first mindset. Known for turning complex challenges into big wins, Anneka brings energy, innovation, and real-world results to every team she leads.She's been recognized as one of San Francisco Business Times' Most Influential Women in Business and 40 Under 40, as well as a Rising Star by AdExchanger and Marketing EDGE. Oh, and AdAge once named her one of the Top 10 Digital Marketing Innovators.Linksrubrik.com/sitchttps://www.linkedin.com/in/annekagupta/Sponsor: Rubrik
Drawing from his extensive government and private sector experience, Jeff Greene, former Assistant Executive Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), former Chief of Cyber Response and Policy on the National Security Council, Distinguished Fellow at the Aspen Institute and Founder of Salty Coffee Consulting, explored how public-private partnerships strengthen critical infrastructure protection, highlighted emerging threat actors, discussed the latest cybercrime tactics and shared practical strategies businesses can implement to enhance their cyber resilience. Check out the conversation to gain actionable insights from a seasoned expert who has helped shape national cybersecurity policy and learn how to better protect your organization in an increasingly complex digital environment.Watch the original Wednesdays with Woodward® webinar: https://institute.travelers.com/webinar-series/symposia-series/global-cyber-resilience. ---Visit the Travelers Institute® website: http://travelersinstitute.org/.Join the Travelers Institute® email list: https://travl.rs/488XJZM.Subscribe to the Travelers Institute® Podcast newsletter on LinkedIn: https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7328774828839100417.Connect with Travelers Institute® President Joan Woodward on LinkedIn: https://www.linkedin.com/in/joan-kois-woodward/.
Peggy Smedley and Kory Daniels, chief security and trust officer, LevelBlue, talk about cyber resilience in manufacturing and findings from a new report. He says resilience is very simply a bend, but do not break mentality for the organization. They also discuss: · The biggest wakeup call from a recent report. · What threat actors are embracing. · If this needs to start top, down—and how to best ensure resilience. https://levelblue.com
S2E15: Digital Empathy, Cyber Resilience, and the New Health IT Paradigm: CHIME's Vision Host: Frank Cutitta Guest: Calli Dretke, EVP, Chief Digital & Marketing Officer, CHIME To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
Join Howard Miller and Grace Michael, Alliant Cyber, as they discuss practical strategies organizations can use to reduce downtime, minimize costs and strengthen resilience before and after a cyber incident. They examine how effective incident response planning, tabletop exercises and business impact analysis (BIA) collectively enhance recovery and guide smarter insurance and risk transfer decisions.
Welcome to episode 3 of our special launch series of the Pure Report podcast. In this episode, we dive deep into the critical topic of cyber resilience with Scott Taylor, Director of the Cyber Resilience Field Solutions Architects Team at Pure Storage. We discuss why traditional, siloed security approaches are failing in the face of escalating cyber threats. From there, we explore the real-world impact of cyberattacks, from significant financial costs and reputational damage to the often-overlooked human toll on IT and security teams. Watch and listen as Scott unpacks Pure Storage's innovative approach to cyber resilience, built on principles of Built-in Security, Connected Threat Detection, and Dynamic Response and Recovery. Discover how Pure's "as-a-service" offerings are changing the game, providing optionality and flexibility to react to rapidly changing environments. We delve into our recent launch announcements, including deep integrations with CrowdStrike and Superna, transforming storage from a passive target into an active defender. Plus, get insights into Pure's new Real-Time Malware Scanning directly at the storage layer and the expanded Veeam partnership for simplified backup and recovery delivered as service. This episode is a must-listen for IT and security professionals looking to move from a reactive to a proactive security posture. Scott shares his "hot takes" on overlooked aspects of cyber recovery, essential cultural shifts for IT organizations, and how AI is influencing the ongoing battle between attackers and defenders. Learn how to secure your data, minimize downtime, and build a truly cyber resilient enterprise in the era of the Enterprise Data Cloud.
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
1015: "No one cares about AI if the Wi-Fi doesn't work." As CIO of the U.S. Department of State, Dr. Kelly Fletcher leads a global team delivering secure, resilient, and modern technology across 190 countries. In this episode of Technovation with Peter High, Dr. Kelly Fletcher, Chief Information Officer of the U.S. Department of State, shares how she leads technology strategy for 100,000 users across 190 countries. Kelly discusses her dual mandate of operational excellence and cybersecurity, including the department's rapid response to the 2023 Microsoft hack. She also explains how AI is reducing “toil” for diplomats, the rollout of StateChat and DocuChat, and the transformative potential of low-earth orbit satellite communications for global connectivity. With past leadership roles at the Department of Defense and the Navy, Kelly reflects on cultural differences across agencies, her philosophy on experimentation, and the future of cloud and cross-government collaboration.
Japan's ispace and ElevationSpace plan to pursue a private mission that will return a lunar sample to Earth. NASA has awarded Katalyst Space Technologies a $30 million contract to raise a spacecraft's orbit. Redwire has been awarded a contract from Axiom Space to develop and deliver roll-out solar array (ROSA) wings for Axiom Station's Payload Power Thermal Module, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Joseph (Dan) Trujillo, the United States Air Force Research Laboratory's (AFRL's) Space Vehicle Directorate's Space Cyber Resiliency Technical Lead. You can connect with Dan on LinkedIn, and find out more about the AFRL Space Cyber Summit here. Selected Reading ispace and ElevationSpace Sign Agreement to Undertake Japan's First Private Lunar Sample Return Mission NASA Awards Company to Attempt Swift Spacecraft Orbit Boost Redwire Awarded Contract to Provide Roll-Out Solar Arrays for Axiom Space's First Space Station Module Zeno Power and Orano Unlock Americium-241 Supply Through Strategic Agreement to Fuel Space Nuclear Batteries Planet to Open New Satellite Manufacturing Facility in Berlin Isar Aerospace and R-Space Sign Launch Agreement Advance Space Domain Awareness Space Force Renames ‘Front Door' to Reflect Broader Impact on Industry Collaboration Kuiper mission updates: Kuiper constellation grows to more than 100 satellites Space Dynamics Lab Shares Open-Source Software to Detect Potentially Dangerous Meteors Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn't enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.Key topics include:How to sense early warning signs of supply chain attacksThe role of AI and automation in both risk and defenseBest practices for mapping and securing your digital ecosystemWhy resilience—not just prevention—must be at the core of your security strategyWhether you're a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what's next.Subscribe to Security Matters for expert insights on identity security, cyber resilience and the evolving threat landscape.
AI-driven transformation is underway as over half of tech and media firms plan major organizational restructures to integrate artificial intelligence, despite the high failure rate of early pilot programs. Salesforce expects AI to handle 50% of service calls by 2027, while Business Insider is quietly using AI to draft articles. Fiverr's "AI-first" restructuring has led to a 30% workforce reduction, sparking backlash. The rapid shift reveals both opportunity and risk, especially as poor implementation and loss of customer trust threaten to undermine the promised benefits.Meanwhile, Microsoft is under fire from Consumer Reports for ending support for Windows 10 on October 14th, leaving hundreds of millions of devices potentially vulnerable. Many cannot upgrade to Windows 11 due to hardware limitations, and Microsoft's proposed $30/year fee for extended updates has drawn criticism. Managed service providers (MSPs) now face an uphill battle to communicate this change, mitigate client dissatisfaction, and navigate rushed hardware refreshes.Cyber resilience and AI are converging across the IT stack. N-able, Syncro, and LogicMonitor are rolling out AI-driven features such as anomaly detection, M365/Entra ID backups, and cross-cloud observability. Microsoft Research's open-source MCP Interviewer tool could open new service opportunities for validating AI infrastructure. The trend signals a shift from AI as novelty to AI as operational backbone — but with much of it still experimental, caution is advised.Finally, big questions loom: Is poor leadership being misdiagnosed as a failure of remote work? Can Oracle's $317B backlog — heavily reliant on OpenAI — actually deliver value? And if generative AI increases global GDP by trillions, who truly benefits — vendors or end users? At the grassroots level, students turning to AI for homework raises concerns about eroding critical thinking and long-term workforce preparedness. Four things to know today 00:00 Over Half of Tech Firms Plan Major Restructures to Embrace AI, Despite High Failure Rates05:28 Consumer Reports Urges Microsoft to Extend Windows 10 Support Beyond October 14 Deadline07:03 From Backup Anomaly Detection to MCP Reliability: AI and Cyber Resilience Are Converging in the IT Stack09:48 From Oracle's AI Gamble to Students Skipping Homework: Who Really Captures the Value of Technology? This is the Business of Tech. Supported by: https://timezest.com/mspradio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Webinar: https://bit.ly/msprmail All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Send us a textIn this refreshingly candid episode of the Joey Pinz Discipline Conversations podcast, Joey dives deep with Nadav Shenker, CEO of Vircom, a leading provider of email security solutions.