Podcasts about cyber resilience

  • 296PODCASTS
  • 655EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 21, 2025LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about cyber resilience

Latest podcast episodes about cyber resilience

No Password Required
No Password Required Podcast Episode 67 — Gina Yacone

No Password Required

Play Episode Listen Later Dec 21, 2025 40:17


Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55  The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More
Trending NOW: Scott Taylor, Director of Cyber Resilience for Pure Storage

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Play Episode Listen Later Dec 20, 2025 25:42


S3E13: What's Trending NOW is the rising threat of cyber attacks in healthcare, and why resilient, recovery-ready infrastructure is as critical as having skilled clinicians or effective workflows. On this episode Shahid Shah is joined by Scott Taylor, Director of Cyber Resilience and Field Solutions Architect for Pure Storage, a company that stores, manages, and protects the world's data. Scott shares insights on the inevitability of breaches and why speed of recovery matters more than perfect prevention. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

Assurance in Action
Cybersecurity Demystified: UK Govt initiatives to strengthen cyber resilience in the UK

Assurance in Action

Play Episode Listen Later Dec 18, 2025 24:35 Transcription Available


In the third episode of our ‘Cyber Security De-mystified Podcast Series', Steve Ramsden, President Information Security at Intertek meets with guest speaker Irfan Hemani -Deputy Director for UK Cyber Security & Resilience Policy at Department for Science, Innovation and Technology –  DSIT to talk about UK Govt initiatives aiming to strengthen cyber resilience and what this means for UK organisations.Speakers:Steven Ramsden:  President of Information Security at IntertekIrfan Hemani : Deputy Director for UK Cyber Security & Resilience Policy,  DSITFollow us on- Intertek's Assurance In Action || Twitter || LinkedIn.

Cloud Security Podcast
Why Backups Aren't Enough & Identity Recovery is Key against Ransomware

Cloud Security Podcast

Play Episode Listen Later Dec 16, 2025 37:01


Think your cloud backups will save you from a ransomware attack? Think again. In this episode, Matt Castriotta (Field CTO at Rubrik) explains why the traditional "I have backups" mindset is dangerous. He distinguishes between Disaster Recovery (business continuity for operational errors) and Cyber Resilience (recovering from a malicious attack where data and identity are untrusted) .Matt speaks about the "dirty secrets" of cloud-native recovery, explaining why S3 versioning and replication are not valid cyber recovery strategies . The conversation shifts to the critical, often overlooked aspect of Identity Recovery. If your Active Directory or Entra ID is compromised, it's "ground zero” and you can't access anything. Matt argues that identity must be treated as the new perimeter and backed up just like any other critical data source .We also explore the impact of AI agents on data integrity, how do you "rewind" an AI agent that hallucinated and corrupted your data? Plus, practical advice on DORA compliance, multi-cloud resiliency, and the "people and process" side of surviving a breach.Guest Socials - ⁠Matt's LinkedinPodcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Security Podcast⁠Questions:(00:00) Introduction(02:20) Who is Matt Castriotta?(03:20) Defining Cyber Resilience: The Ability to Say "No" to Ransomware(05:00) Why "I Have Backups" is Not Enough(06:45) The Difference Between Disaster Recovery and Cyber Recovery(10:20) Cloud Native Risks: Versioning and Replication Are Not Backups(12:50) DORA Compliance: Multi-Cloud Resiliency & Egress Costs(15:10) The "Shared Responsibility Model" Trap in Cloud(17:45) Identity is the New Perimeter: Why You Must Back It Up(22:30) Identity Recovery: Can You Restore Your Active Directory in Minutes?(25:40) AI and Data: The New "Oil" and "Crown Jewels"(27:20) Rubrik Agent Cloud: Rewinding AI Agent Actions(29:40) Top 3 Priorities for a 2026 Resiliency Program(33:10) Fun Questions: Guitar, Family, and Italian Food

Trust Issues
EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

Trust Issues

Play Episode Listen Later Dec 16, 2025 43:50


In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.

Finding Genius Podcast
Cyber Resilience At The Board Level: Scott Alldridge On Navigating Today's Digital Risk Landscape

Finding Genius Podcast

Play Episode Listen Later Dec 14, 2025 34:40


In today's evolving digital environment, many leaders are facing unprecedented levels of complexity. Cyber threats are escalating, regulatory demands are tightening, and organizations are expected to maintain resilience while embracing innovation. Few people understand this landscape more deeply than Scott Alldridge, CEO of IP Services, President of the IT Process Institute, and author of the globally acclaimed VisibleOps series. With more than three decades of experience guiding technical and non-technical teams alike, Scott has built a reputation for transforming complicated cybersecurity concepts into clear, actionable strategies. His people-process-technology framework has helped organizations strengthen governance, reduce risk, and build cyber-mature cultures capable of thriving in high-stakes environments.  In this episode, we discuss: How boards can elevate their cybersecurity oversight. Why organizations fail at cyber risk management, and how to fix it. Common misconceptions surrounding cybersecurity maturity. Scott's strategies for fostering ethical leadership and a security-first culture. Scott's most recent book, VisibleOps Cybersecurity, is an Amazon Best Seller and continues to influence executives, boards, and cybersecurity professionals around the world. Join us in this conversation as he breaks down the mindset and practices leaders need to stay ahead of current and future threats… You can connect with Scott and his work on his website! 

IT Talks
268 Mattermost for Cyber Resilience

IT Talks

Play Episode Listen Later Dec 12, 2025 28:07


Guest: Maths Arvesjö Language: Swedish Duration: 28:06 min   In this episode of IT Talks, Maths, Enterprise Account Executive at Mattermost, talks about secure communication when it really matters. How can organizations keep communicating even if cloud services go down? How do you protect sensitive data while handling cyber attacks? Mattermost offers a strategic solution built for organizations with high demands on security, incident management, and infrastructure control – a platform that keeps communication running, even when the world gets uncertain.

Irish Tech News Audio Articles
Ekco research finds one-in-five consumers in Ireland cut back online purchases due to cyber threats

Irish Tech News Audio Articles

Play Episode Listen Later Dec 11, 2025 3:07


Ekco, one of Europe's leading security-first managed service providers, has announced the results of new research which reveals that one-in-five (22%) consumers in Ireland are purchasing fewer items online because they fear cyberattacks. For the same reason, 19% say they have started to pay in-person, in cash, when they can. The research, commissioned by Ekco and carried out by Censuswide, surveyed 1,000 adults in the Republic of Ireland, exploring their attitudes to online spending as the volume of cyberattacks and scams continues to rise. It comes at a time when major fashion retailers are considering a return to the high street after declining footfall, exacerbated by the pandemic, drove both shoppers and retailers online. The research suggests that cyber fears could drive more to physical stores this festive season. Despite year-on-year growth in online spending, just 30% of those surveyed believe they know how to check if a retailer's website is safe or not. In fact, in the last 12 months, more than one-in-10 (14%) have entered their payment details on a fraudulent website, thinking it was legitimate, while 26% have found themselves on a fake website which was attempting to mirror a real one. Ekco's research suggests that the constant desire for convenience could be making consumers less focused on security. When offered, 31% opt to store payment details on websites to save time during the check-out process, and the same percentage have payment details stored on multiple websites. However, many consumers are unforgiving when retailers suffer a cyberattack. In the last 12 months, a quarter (25%) of consumers have avoided purchasing from, or using the services of, a retailer because it suffered a cyberattack. Two-thirds (66%) say they would stop shopping with a retailer permanently if their data was stolen in a breach, even if no money was taken. Conor Scolard, Director of Cyber Resilience at Ekco, said: "Our research shows that while consumers want a hassle-free shopping experience - with conveniences such as having their payment details stored - they are also concerned about the security of their information. It is vital that retailers have the robust infrastructure in place that enables them to assure customers that their data is safe, regardless of how they choose to pay: in-person in cash, or online (with or without stored card details). "As we have entered the busiest time of the year for shopping, retailers need to ensure that their systems can both stay onlineand protect customers' data from cyberattacks. Our research highlights that a cyberattack will not only have a negative impact on operations, but it can also cause lasting damage to a business's reputation. In addition, shoppers evidently lack confidence in identifying safe websites from compromised or fraudulent ones, which will undoubtedly lead to hesitation. The retail sector must consider this and its own role in providing convenience and confidence." See more stories here.

Caffeinated Risk
Cyber Resilience, a National Solution with Herbert Fensury

Caffeinated Risk

Play Episode Listen Later Dec 4, 2025 30:01


Cyber crime is now a daily fact of life and a significant concern in both the private and public sectors but our response capabilities do not seem to be keeping up.  This episode dives deep into one organization that is combatting this problem with a combination of academic research, industry expertise and hands-on training with the founder and CEO, Herbert Fensury. While cyber security is a global problem, economics and politics dictate different solution requirements. The Canadian Cyber Assessment, Training and Experimentation (CATE) Centre is both cutting edge and focused on Canadian cyber resilience at both a regional and national level. 

Secrets of Rockstar CFOs
Building Cyber Resilience from the Ground Up with Jennifer DiRico of Commvault

Secrets of Rockstar CFOs

Play Episode Listen Later Dec 3, 2025 33:55


Cyber resilience is no longer optional—it's mission-critical for every modern organization. As CFO of Commvault, Jennifer DiRico is helping shape the future of how companies protect, rebuild, and grow after cyber threats. In this episode, Jennifer opens up about her journey from working in her family's car wash to leading finance at one of the world's top data security and AI firms. She reflects on the decade-long ride at Toast that led to its IPO, the mentors who shaped her as a leader, and how she's driving durable growth at Commvault through innovation and trust. Jennifer also shares how she sees AI empowering—not replacing—finance professionals, and why understanding the “why” behind the numbers is the real hallmark of great financial leadership.

HIMSSCast
Hyland presents: Cyber resilience starts with CIOs

HIMSSCast

Play Episode Listen Later Dec 3, 2025 23:37


Healthcare leaders can't afford to build their incident response plans in the middle of a crisis. Discover how disciplined, ongoing practice leveraging tabletop drills and vendor partnerships can help build true cyber confidence and a culture of security. 

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 197: Operational Cyber Resilience

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 27, 2025 43:18


Podcast: Cyber Risk Management Podcast (LS 35 · TOP 3% what is this?)Episode: EP 197: Operational Cyber ResiliencePub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.   "Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes:   https://cr-map.com/podcast/161 https://cr-map.com/podcast/162/The podcast and artwork embedded on this page are from Kip Boyle, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Untapped Philanthropy
Trust, Tech, and Threats: Building Cyber Resilience in Philanthropy with Chris Aurelio

Untapped Philanthropy

Play Episode Listen Later Nov 20, 2025 30:21


In this episode of Untapped Philanthropy, we sit down with Chris Aurelio, Director of Security and Compliance at Fluxx, to explore how cybersecurity has become a cornerstone of trust in the philanthropic sector. Together, we unpack the latest threat trends, the role of AI in both risk and defense, and how mission-driven organizations can protect their data—and their impact—in an increasingly digital world. This conversation reframes cybersecurity not as a technical burden, but as a fundamental act of stewardship and resilience.To learn more about Fluxx, visit: fluxx.ioTo learn more about Neon One, visit: neonone.comEpisodes of Untapped Philanthropy are edited, mixed, and mastered by Rocket Skates Recording.

Cyber Risk Management Podcast
EP 197: Operational Cyber Resilience

Cyber Risk Management Podcast

Play Episode Listen Later Nov 18, 2025 43:18


What happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.   "Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes:   https://cr-map.com/podcast/161 https://cr-map.com/podcast/162/

Hybrid Identity Protection Podcast
Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv

Hybrid Identity Protection Podcast

Play Episode Listen Later Nov 18, 2025 50:34


This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv.With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He's helped organizations redefine what it means to build security cultures that actually work.In this episode, Nathan explains why communication (not technology) s a CISO's most important skill, how to create a culture that values security without slowing innovation, and why empathy may be the most underrated tool in cybersecurity.This is an insightful look at the people-first mindset behind stronger, more resilient security programs.Guest Bio Nathan Wenzler is a field chief information security officer at Optiv, where he advises clients on how to strengthen and optimize every aspect of their cybersecurity program. With nearly 30 years of experience, he has built and led security initiatives for government agencies, nonprofits and Fortune 1000 companies.Wenzler has served as a CISO, executive management consultant and senior analyst, holding leadership roles at Tenable, Moss Adams, AsTech and Thycotic. He also spent more than a decade in public sector IT and security roles with Monterey County, California, and supported state and federal agencies.He is known for helping security leaders better communicate the measurable value and benefit of a mature, effective cybersecurity program to executives, technical stakeholders and nontechnical business partners. His approach emphasizes not only technical excellence but also the human and organizational factors that drive long-term security success.Wenzler has spoken at more than 400 events worldwide, educating security leaders and professionals on how to excel in their role as an organization's risk expert. He has also served on advisory boards, including the Tombolo Institute at Bellevue College, and is a former member of the Forbes Technology Council. His areas of expertise include vulnerability and exposure management, privileged access management and identity governance, cyber risk management, incident response, and executive-level communications and program managementGuest Quote  “If you can win the people over in your organization, you can make those big changes for better identity governance.”Time stamps 01:22 Meet Nathan Wenzler: Veteran CISO and Security Strategist 02:16 Redefining Identity in a World of Infinite Accounts 05:15 How Culture Can Make or Break Your Security Program 13:34 Winning Over the Business: Aligning Security and Culture 24:45 From “Department of No” to Trusted Partner: Fixing Cyber Communication 40:25 The Human Side of Incident Response 46:23 Leading with Empathy: Nathan's Advice for Security LeadersSponsorThe HIP Podcast is brought to you by Semperis, the leader in identity-driven cyber resilience for the hybrid enterprise. Trusted by the world's leading businesses, Semperis protects critical Active Directory environments from cyberattacks, ensuring rapid recovery and business continuity when every second counts. Visit semperis.com to learn more.LinksConnect with Nathan on LinkedInLearn more about OptivConnect with Sean on LinkedInDon't miss future episodesLearn more about Semperis

KuppingerCole Analysts
Mastering Cyber Resilience with ThreatLocker: How to Stay Secure During the Holidays

KuppingerCole Analysts

Play Episode Listen Later Nov 12, 2025 10:36


The holiday season might be the most wonderful time of the year—but it’s also prime time for cybercriminals. In this Videocast episode, Warwick Ashford talks with Danny Jenkins, CEO and co-founder of ThreatLocker, about why attacks spike between November and December and what companies can do to stay protected. They unpack: ✅ Why cyberattacks surge during holidays✅ How to close your organization’s biggest security gaps✅ The importance of automated responses and real-time monitoring✅ Why good backups (and tested restores!) still matter✅ How a “cyber health check” can save your business from disaster

KuppingerCole Analysts Videos
Mastering Cyber Resilience with ThreatLocker: How to Stay Secure During the Holidays

KuppingerCole Analysts Videos

Play Episode Listen Later Nov 12, 2025 10:36


The holiday season might be the most wonderful time of the year—but it’s also prime time for cybercriminals. In this Videocast episode, Warwick Ashford talks with Danny Jenkins, CEO and co-founder of ThreatLocker, about why attacks spike between November and December and what companies can do to stay protected. They unpack: ✅ Why cyberattacks surge during holidays✅ How to close your organization’s biggest security gaps✅ The importance of automated responses and real-time monitoring✅ Why good backups (and tested restores!) still matter✅ How a “cyber health check” can save your business from disaster

UBC News World
Agents Stack Leads Asia's ESG & Cyber Resilience Revolution

UBC News World

Play Episode Listen Later Nov 9, 2025 5:48


Unlock Operational Efficiency with Security and Sustainability by-Design. Partner with Agents Stack to integrate financial viability from the ground up. Let's transform your data into decisive impact, smarter and faster. Synergy Global Enterprise LLC City: singapore Address: 111 North Bridge Road #21-01 Website: https://pixelproduction.com/

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More
Talking the Walk: Cyber Resilience in Healthcare with Lesley Berkeyheiser

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Play Episode Listen Later Nov 8, 2025 28:06


On this episode host Tom Testa invites Lesley Berkeyheiser a Senior Director of Accreditation Strategy and Development at DirectTrust to discuss cyber resilience in healthcare during Cybersecurity Awareness Month. Lesley shares insights on trust and cybersecurity along with valuable resources for health systems to use in their cyber strategies. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

Podcasts – TechSpective
From Alert Fatigue to Cyber Resilience: Rethinking the Future of the SOC with AI

Podcasts – TechSpective

Play Episode Listen Later Nov 7, 2025 52:02


Cybersecurity has a long memory—and an even longer list of recurring frustrations. Chief among them: alert fatigue. For as long as security teams have existed, they've been drowning in notifications, dashboards, and blinking red lights. Each new platform promises to […] The post From Alert Fatigue to Cyber Resilience: Rethinking the Future of the SOC with AI appeared first on TechSpective.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 134. Cyber Resilience, Critical Infrastructure attacks, Alphabet soup, and offboarding concerns

The Gate 15 Podcast Channel

Play Episode Listen Later Nov 4, 2025 20:07


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC. Main Topics:Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time. Hackers are attacking Britain's drinking water suppliers(TLP:CLEAR) Threat Analysis for the Water and Wastewater Sector, October 2025 – Executive SummaryThreat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here. 2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.Quick Hits:• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica• ‘Tremendous unprecedented devastation' in Jamaica from Hurricane Melissa, UN coordinator says• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says

EM360 Podcast
Beyond the Hyperscalers: Building Cyber Resilience on Independent Infrastructure

EM360 Podcast

Play Episode Listen Later Nov 3, 2025 23:05


“Cyber resilience isn't just about protection, it's about preparation.”Every business in this day and age lives in the cloud. Our operations, data, and collaboration tools are powered by servers located invisibly around the world. But here's the question we often overlook: what happens when the cloud falters?In this episode of Tech Transformed, Trisha Pillay sits down with Jan Ursi, Vice President of Global Channels at Keepit, to uncover the real meaning of cyber resilience in a cloud-first world. Are you putting all your trust in hyperscale cloud providers? Think again. Trisha and Jan explore why relying solely on giants like Microsoft or Amazon can put your data at risk and how independent infrastructure gives organisations control, faster recovery, and true digital sovereignty.Takeaways:The importance of cyber resilience in a cloud-first worldHow independent cloud infrastructure protects your SaaS applicationsCommon shared responsibility misconceptions that can cost organisations dataStrategies for quick recovery from ransomware and cyberattacksWhy digital sovereignty ensures control and complianceChapters:00:00 – Introduction to Cyber Resilience and Cloud Strategy05:00 – The Importance of Independent Infrastructure10:00 – Shared Responsibility and Misconceptions15:00 – Digital Sovereignty and Compliance20:00 – Practical Tips for CISOs and CIOs22:00 – ConclusionAbout Jan Ursi:Jan Ursi leads Keepit's global partnerships, helping organisations embrace the AI-powered cyber resilience era. Keepit is the world's only independent cloud dedicated to SaaS data protection, security, and recovery. Jan has previously built and scaled businesses at Rubrik, UiPath, Nutanix, Infoblox, and Juniper, shaping the future of enterprise cloud, hyper-automation, and data protection.Follow EM360Tech for more insights:Website: www.em360tech.comX: @EM360TechLinkedIn: EM360TechYouTube: EM360Tech

Screaming in the Cloud
Cyber Resilience Beyond Prevention with Anneka Gupta

Screaming in the Cloud

Play Episode Listen Later Oct 30, 2025 33:45


When attackers are smart enough to hit your backups, recovery becomes your best defense. Rubrik's Chief Product Officer, Anneka Gupta, joins host Corey Quinn to break down what true cyber resilience looks like in today's multi-cloud world. From AI-driven recovery to surviving ransomware with your data (and reputation) intact, this episode covers what it really takes to bounce back when everything goes sideways.Show Highlights(00:00) Introduction to Ransomware and Backups(00:25) Welcome to Screaming in the Cloud(00:32) Introducing Rubrik and Annika Gupta(01:26) What Does Rubrik Do?(02:18) Evolution of Backup and Recovery(03:37) Challenges in Cyber Recovery(05:33) Rubrik's Approach to Cyber Resilience(08:44) Importance of Cyber Recovery Simulations(09:40) Security vs. Operational Recovery(11:28) Assume Breach: A New Security Paradigm(14:29) Multi-Cloud Complexities and Security(27:45) Hybrid Cloud and Cyber Resilience(29:25) AI in Cyber Resilience(33:09) Conclusion and Contact InformationAbout Anneka GuptaAnneka Gupta is a senior executive leader with a proven track record of scaling successful B2B SaaS businesses from the ground up. She's led across product, tech, go-to-market, and operations, always with a customer-first mindset. Known for turning complex challenges into big wins, Anneka brings energy, innovation, and real-world results to every team she leads.She's been recognized as one of San Francisco Business Times' Most Influential Women in Business and 40 Under 40, as well as a Rising Star by AdExchanger and Marketing EDGE. Oh, and AdAge once named her one of the Top 10 Digital Marketing Innovators.Linksrubrik.com/sitchttps://www.linkedin.com/in/annekagupta/Sponsor: Rubrik 

Travelers Institute Risk & Resilience
Global Cyber Resilience: Lessons from Former White House and CISA Leader Jeff Greene

Travelers Institute Risk & Resilience

Play Episode Listen Later Oct 30, 2025 59:51


Drawing from his extensive government and private sector experience, Jeff Greene, former Assistant Executive Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), former Chief of Cyber Response and Policy on the National Security Council, Distinguished Fellow at the Aspen Institute and Founder of Salty Coffee Consulting, explored how public-private partnerships strengthen critical infrastructure protection, highlighted emerging threat actors, discussed the latest cybercrime tactics and shared practical strategies businesses can implement to enhance their cyber resilience. Check out the conversation to gain actionable insights from a seasoned expert who has helped shape national cybersecurity policy and learn how to better protect your organization in an increasingly complex digital environment.Watch the original Wednesdays with Woodward® webinar: https://institute.travelers.com/webinar-series/symposia-series/global-cyber-resilience.  ---Visit the Travelers Institute® website: http://travelersinstitute.org/.Join the Travelers Institute® email list: https://travl.rs/488XJZM.Subscribe to the Travelers Institute® Podcast newsletter on LinkedIn: https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7328774828839100417.Connect with Travelers Institute® President Joan Woodward on LinkedIn: https://www.linkedin.com/in/joan-kois-woodward/.

Peggy Smedley Show
Cyber Resilience in Manufacturing

Peggy Smedley Show

Play Episode Listen Later Oct 29, 2025 30:31


Peggy Smedley and Kory Daniels, chief security and trust officer, LevelBlue, talk about cyber resilience in manufacturing and findings from a new report. He says resilience is very simply a bend, but do not break mentality for the organization. They also discuss: · The biggest wakeup call from a recent report. · What threat actors are embracing. · If this needs to start top, down—and how to best ensure resilience. https://levelblue.com

KuppingerCole Analysts
Cyber Resilience

KuppingerCole Analysts

Play Episode Listen Later Oct 28, 2025 8:45


Unlock invaluable insights into cyber resilience by exploring real-world examples of organizations rebounding from cyber incidents. Gain strategies to safeguard operations, enhance data resilience, and leverage clean rooms and cloud solutions for recovery. Learn how to transform cyber threats into opportunities for improvement and fortify your organization's digital landscape with adaptive resilience strategies. Read the original blog post here: https://www.kuppingercole.com/blog/small/cyber-resilience

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More
Health Stealth Radio: Calli Dretke, EVP, Chief Digital & Marketing Officer

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Play Episode Listen Later Oct 24, 2025 27:34


S2E15: Digital Empathy, Cyber Resilience, and the New Health IT Paradigm: CHIME's Vision Host: Frank Cutitta Guest: Calli Dretke, EVP, Chief Digital & Marketing Officer, CHIME To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

Alliant Specialty Podcasts
Building Cyber Resilience: From Incident Response to Business Impact Analysis

Alliant Specialty Podcasts

Play Episode Listen Later Oct 23, 2025 15:25


Join Howard Miller and Grace Michael, Alliant Cyber, as they discuss practical strategies organizations can use to reduce downtime, minimize costs and strengthen resilience before and after a cyber incident. They examine how effective incident response planning, tabletop exercises and business impact analysis (BIA) collectively enhance recovery and guide smarter insurance and risk transfer decisions.

Health Innovation Matters
Fortifying Healthcare Cyber Resilience with Russell Teague

Health Innovation Matters

Play Episode Listen Later Oct 17, 2025 25:38


Michael chats with Russell Teague, Chief Information Security Officer (CISO) at Fortified Health Security. Together, they discuss how the role of CISO is evolving amid today's cyber threat landscape and regulatory environment, areas in which healthcare needs to improve cyber resilience, why experience is so important in the clinical environment when selecting a vendor or SOC service partner, how CISOs can mitigate massive cyber disruptions and risks, and much more. To learn more about Fortified Health Security, visit FortifiedHealthSecurity.com.

Irish Tech News Audio Articles
Building Cyber Resilience in the AI era: 5 ways Irish organisations can stay ahead

Irish Tech News Audio Articles

Play Episode Listen Later Oct 17, 2025 8:09


Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape across Ireland. While it's unlocking new efficiencies and accelerating innovation, it's also giving cybercriminals new evasive tools to launch faster and more sophisticated attacks. Across Ireland, organisations are navigating a new era of cyber risk defined by speed, sophistication, and AI. As Dell Technologies continues to work closely with Irish businesses to modernise their digital infrastructure, it's clear that cybersecurity must evolve in tandem, as a strategic enabler of trust and resilience. Threat actors are using AI to enhance ransomware, zero-day vulnerabilities, Distributed Denial of Service (DDoS) all making advanced spear-phishing much harder to identify, outpacing conventional security measures. According to the latest Dell Technologies Innovation Catalyst Study, 84% of Irish organisations view security as a key part of their business strategy, yet many continue to struggle with balancing innovation and security. Almost all respondents (96%) admitted that integrating security into wider business strategies is proving difficult. These figures highlight that organisations must rethink their cybersecurity strategies to adopt proactive, intelligent, and resilient approaches that keep pace with the evolving threat environment. Here are five ways to stay resilient against cyber threats: 1. Adopt zero trust for AI Security As threat actors use AI to scout, steal credentials and adapt attack techniques, traditional perimeter-based defences fall short. That's why more Irish organisations are adopting a Zero Trust model built on the principle of "never trust, always verify" ensuring that every user, device, and application is continuously authenticated, regardless of location. The benefits are clear; the latest Innovation Catalyst Study revealed a 100% increase in confidence levels among Irish organisations that have adopted zero trust principles, underscoring its growing value as a security framework. By implementing zero trust principles, organisations can help reduce risk by continuously verifying every access request and implementing strict authentication processes. Using role-based access controls (RBAC) and network segmentation, organisations can minimise the risk of an attack and reduce the impact radius if an attack occurs. Zero trust is more than a security philosophy. It's a unified and adaptive strategy for identity and access management. Through a zero trust approach, organisations not only reduce their attack surface, but also strengthen their ability to detect, respond to and contain threats. 2. Reduce the attack surface In an environment where AI-powered threat actors are constantly probing for weaknesses, reducing the attack surface is a critical line of defence. Every exposed endpoint, unsecured API, or overlooked supply chain vulnerability represents an opportunity for adversaries to infiltrate systems, deploy malware and exfiltrate sensitive data. To mitigate these risks, Irish organisations should begin with assessing and understanding their attack surface and related vulnerabilities. From there, they should have a layered defence strategy focused on securing entry points and minimising exposure. This includes strengthening authentication, encrypting data, regularly testing for vulnerabilities and actively monitoring endpoints. Keeping systems patched and devices hardened further limits risks. By reducing the attack surface, organisations make themselves a harder target, thereby decreasing the likelihood of an attack. 3. Continuously detect and respond to threats AI-powered attacks are capable of mimicking legitimate behaviour and evading traditional security tools, and organisations need to combine advanced threat detection with rapid response capabilities. Leveraging AI and machine learning, organisations can monitor operational data, detect anomalies, and trigger automated responses in real time. This AI-powered threat...

The Pure Report
H2 Launch Series: Cyber Resilience Innovations

The Pure Report

Play Episode Listen Later Oct 10, 2025 40:01


Welcome to episode 3 of our special launch series of the Pure Report podcast. In this episode, we dive deep into the critical topic of cyber resilience with Scott Taylor, Director of the Cyber Resilience Field Solutions Architects Team at Pure Storage. We discuss why traditional, siloed security approaches are failing in the face of escalating cyber threats. From there, we explore the real-world impact of cyberattacks, from significant financial costs and reputational damage to the often-overlooked human toll on IT and security teams. Watch and listen as Scott unpacks Pure Storage's innovative approach to cyber resilience, built on principles of Built-in Security, Connected Threat Detection, and Dynamic Response and Recovery. Discover how Pure's "as-a-service" offerings are changing the game, providing optionality and flexibility to react to rapidly changing environments. We delve into our recent launch announcements, including deep integrations with CrowdStrike and Superna, transforming storage from a passive target into an active defender. Plus, get insights into Pure's new Real-Time Malware Scanning directly at the storage layer and the expanded Veeam partnership for simplified backup and recovery delivered as service. This episode is a must-listen for IT and security professionals looking to move from a reactive to a proactive security posture. Scott shares his "hot takes" on overlooked aspects of cyber recovery, essential cultural shifts for IT organizations, and how AI is influencing the ongoing battle between attackers and defenders. Learn how to secure your data, minimize downtime, and build a truly cyber resilient enterprise in the era of the Enterprise Data Cloud.

Hybrid Identity Protection Podcast
The Human Side of Cyber Resilience with Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity

Hybrid Identity Protection Podcast

Play Episode Listen Later Oct 7, 2025 32:51


This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity.A founding member of Cohesity's Security Center of Excellence and the Cyber Event Response Team, Jonathon has more than 20 years of experience in security operations, forensics, and business continuity, with past leadership roles at EMC, Dell, and Verizon. He's guided Fortune 500 and Global 1000 organizations through high-stakes incident response and recovery.In this episode, Jonathon explains why trust is the first casualty in a cyberattack, how to distinguish between mission critical operations and mission critical response, and why resilience depends as much on people and process as on technology. He shares candid lessons from the field on avoiding endless “what if” scenarios, preparing for the human toll of prolonged incidents, and building flexibility into every plan.This is a practical look at cyber resilience and the critical skills every leader needs to have before the next 2 a.m. incident call. Guest Bio Jonathon Mayor is Principal Security Consultant for the Americas at Cohesity, where he has helped many Fortune 500 and Global 1000 organizations strengthen cyber resilience through threat intelligence, incident response, and recovery strategy. A founding member of Cohesity's Security Center of Excellence and the Cyber Event Response Team (CERT), his current focus is proactively collaborating with security partners and customers to strengthen security posture and readiness by drawing from the experiences and lessons learned through CERT.With more than 20 years in security operations, forensics, and business continuity, Jonathon has held leadership roles at EMC, Dell, and Verizon, where he oversaw global NOC operations and major incident mitigation.Guest Quote " The thing that's most important that's lost first and hardest to regain is trust. Everything else is secondary. If the very tools that I'm relying on to respond have been compromised, and therefore I can't trust them, where does my plan go from there?”Time stamps 01:10 Meet Jonathan Mayor 03:37 Rethinking What's Mission Critical 12:25 Avoiding Endless What If's 15:50 Paranoia Has a Budget: Prioritizing Risks 21:27 The Human Element in Cyber Defense 25:01 Importance of Mindset Flexibility 27:11 Post-Incident AdviceSponsor The HIP Podcast is brought to you by Semperis, the leader in identity-driven cyber resilience for the hybrid enterprise. Trusted by the world's leading businesses, Semperis protects critical Active Directory environments from cyberattacks, ensuring rapid recovery and business continuity when every second counts. Visit semperis.com to learn more.LinksConnect with Jonathon on LinkedInLearn more about CohesityConnect with Sean on LinkedInDon't miss future episodesLearn more about Semperis

Investors Coffee Shop
Investing In Cyber Security

Investors Coffee Shop

Play Episode Listen Later Oct 4, 2025 55:31


Send us a textIn this episode of Investors Coffee Shop, Brian Harte sits down with Joe Soeka, a cybersecurity and digital forensics expert with over a decade of hands-on experience in identifying and analyzing cyber threats. Joe has worked extensively in digital forensics and incident response, holding advanced certifications that allow him to tackle complex technical challenges head-on.Joe shares insights on:The most pressing cyber threats facing individuals and businesses todayHow digital forensics uncovers the truth hidden within systems and dataPractical steps anyone can take to strengthen their personal and organizational cybersecurity postureListeners will also walk away with tools and resources to stay ahead of evolving threats. One highlighted resource is Have I Been Pwned, a free service where you can check if your email or phone number has been part of a data breach.Whether you're an investor, entrepreneur, or just someone who wants to better understand how to protect your digital identity, this episode is packed with valuable knowledge.Support the show

Irish Tech News Audio Articles
MTU puts Ireland's ports to the test in Cybersecurity Smart Maritime Challenge

Irish Tech News Audio Articles

Play Episode Listen Later Sep 30, 2025 3:40


Munster Technological University (MTU) hosted the Cybersecurity Smart Maritime Challenge 2025 in collaboration with Cyber Innovate, the Irish Naval Service and the National Maritime College of Ireland (NMCI) on Friday, 26th September. The event took place in the Cybersecurity Prototyping Lab in MTU's Bishopstown Campus in Cork, showcasing how Ireland's ports and harbours can be defended against evolving cyber threats. For centuries, Cork has been a safe harbour from storms, rough seas and pirates. In 2025, the definition of a safe harbour has expanded to include protection from digital attacks. This shift was brought into sharp focus during a live cybersecurity simulation, conducted using MTU's state-of-the-art Cyber Range infrastructure. The simulation, designed by Airbus, mirrored a real-world cyberattack on a maritime port. In the exercise, a hacker group paralysed a port's IT systems and disabled a ship at its entrance, effectively blocking all traffic. Four teams took part, featuring staff from the Irish Naval Service and the NMCI, alongside MTU researchers and students from Cyber Innovate. They were tasked with identifying the points of attack, regaining control of the vessel, and supporting Europol in apprehending the hacker group's leader. Irish ports are vital hubs for shipping and trade, making cybersecurity expertise essential to safeguarding national infrastructure. The challenge provided participants with practical, hands-on experience to develop skills that are directly relevant to addressing the growing cyber threats facing the maritime sector. "This collaboration between the Irish Navy, NMCI, maritime experts and cybersecurity specialists is essential to safeguarding Ireland's national security. This challenge highlights both the scale of the threat and the strength of the talent we are building in Ireland. Preparing for cybersecurity shock events before they happen is the only way to ensure our ports and maritime infrastructure remain resilient in an increasingly uncertain global landscape," said Dr Hazel Murray, Chair of Cybersecurity at Munster Technological University MTU is recognised as a leader in cybersecurity education, training, research and innovation. The university runs multiple programmes and initiatives, including Cyber Innovate, Cyber Skills, Cyber Explore, Cyber Resilience, Cyber Safety and Cyber Futures. Cork's reputation as Ireland's cybersecurity hub is strengthened by MTU's graduates, which has helped attract many national and international companies to the region. MTU also hosts the Cyber Range, a cutting-edge platform unique in Ireland. This allows simulated cyberattacks on virtual organisations in a safe environment. "At MTU, we are dedicated to advancing cybersecurity through cutting-edge education and research," said Dr George O'Mahony of MTU. "This state-of-the-art facility provides invaluable training for students, researchers and industry professionals, allowing them to build critical skills without risking real-world damage or outages." The Cybersecurity Smart Maritime Challenge underlined the critical importance of protecting Ireland's maritime sector from cyberattacks, particularly as the offshore renewable energy industry becomes a cornerstone of Ireland's energy future and a key enabler of EU climate change targets. To learn more about the Cyber Innovate news and events, visit www.cyberinnovate.ie.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Inside the U.S. Department of State’s AI and Cyber Resilience Transformation

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Sep 29, 2025 44:32


1015: "No one cares about AI if the Wi-Fi doesn't work." As CIO of the U.S. Department of State, Dr. Kelly Fletcher leads a global team delivering secure, resilient, and modern technology across 190 countries. In this episode of Technovation with Peter High, Dr. Kelly Fletcher, Chief Information Officer of the U.S. Department of State, shares how she leads technology strategy for 100,000 users across 190 countries. Kelly discusses her dual mandate of operational excellence and cybersecurity, including the department's rapid response to the 2023 Microsoft hack. She also explains how AI is reducing “toil” for diplomats, the rollout of StateChat and DocuChat, and the transformative potential of low-earth orbit satellite communications for global connectivity. With past leadership roles at the Department of Defense and the Navy, Kelly reflects on cultural differences across agencies, her philosophy on experimentation, and the future of cloud and cross-government collaboration.

T-Minus Space Daily
Space cyber resilience, lunar ambitions, and orbital servicing.

T-Minus Space Daily

Play Episode Listen Later Sep 25, 2025 27:31


Japan's ispace and ElevationSpace plan to pursue a private mission that will return a lunar sample to Earth. NASA has awarded Katalyst Space Technologies a $30 million contract to raise a spacecraft's orbit. Redwire has been awarded a contract from Axiom Space to develop and deliver roll-out solar array (ROSA) wings for Axiom Station's Payload Power Thermal Module, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Joseph (Dan) Trujillo, the United States Air Force Research Laboratory's (AFRL's) Space Vehicle Directorate's Space Cyber Resiliency Technical Lead.  You can connect with Dan on LinkedIn, and find out more about the AFRL Space Cyber Summit here. Selected Reading ispace and ElevationSpace Sign Agreement to Undertake Japan's First Private Lunar Sample Return Mission NASA Awards Company to Attempt Swift Spacecraft Orbit Boost Redwire Awarded Contract to Provide Roll-Out Solar Arrays for Axiom Space's First Space Station Module Zeno Power and Orano Unlock Americium-241 Supply Through Strategic Agreement to Fuel Space Nuclear Batteries Planet to Open New Satellite Manufacturing Facility in Berlin Isar Aerospace and R-Space Sign Launch Agreement Advance Space Domain Awareness Space Force Renames ‘Front Door' to Reflect Broader Impact on Industry Collaboration Kuiper mission updates: Kuiper constellation grows to more than 100 satellites Space Dynamics Lab Shares Open-Source Software to Detect Potentially Dangerous Meteors Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Trust Issues
EP 16 - Sensing the signals: The hidden risks in digital supply chains

Trust Issues

Play Episode Listen Later Sep 25, 2025 48:38


Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn't enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.Key topics include:How to sense early warning signs of supply chain attacksThe role of AI and automation in both risk and defenseBest practices for mapping and securing your digital ecosystemWhy resilience—not just prevention—must be at the core of your security strategyWhether you're a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what's next.Subscribe to Security Matters for expert insights on identity security, cyber resilience and the evolving threat landscape.

Public Sector Podcast
Cyber-resilience, fostering skills development and supporting diversity - Stephen Woods - Episode 151

Public Sector Podcast

Play Episode Listen Later Sep 21, 2025 22:59


In this episode, Stephen Woods from the WA Department of Justice explores why cyber resilience is essential for protecting sensitive public data and services. He breaks resilience into four stages—anticipate, withstand, recover, and adapt—emphasising that cyberattacks are inevitable, but preparation and testing make the difference. From regional connectivity challenges to incident simulations like the Corporate Compromise Game, Stephen shows how planning, collaboration, and transparency strengthen response. He also highlights diversity as a superpower—with varied perspectives, cultural insights, and neurodiverse talent improving detection, decision-making, and innovation. His core message: resilience isn't just about technology, it's about people, culture, and trust. Stephen Woods, Chief Information Security Officer, Department of Justice WA   For more great insights head to www.PublicSectorNetwork.co 

Business of Tech
AI Reshaping Tech: Corporate Overhauls, Cyber Resilience, and the Battle Over Software Support

Business of Tech

Play Episode Listen Later Sep 19, 2025 16:28


AI-driven transformation is underway as over half of tech and media firms plan major organizational restructures to integrate artificial intelligence, despite the high failure rate of early pilot programs. Salesforce expects AI to handle 50% of service calls by 2027, while Business Insider is quietly using AI to draft articles. Fiverr's "AI-first" restructuring has led to a 30% workforce reduction, sparking backlash. The rapid shift reveals both opportunity and risk, especially as poor implementation and loss of customer trust threaten to undermine the promised benefits.Meanwhile, Microsoft is under fire from Consumer Reports for ending support for Windows 10 on October 14th, leaving hundreds of millions of devices potentially vulnerable. Many cannot upgrade to Windows 11 due to hardware limitations, and Microsoft's proposed $30/year fee for extended updates has drawn criticism. Managed service providers (MSPs) now face an uphill battle to communicate this change, mitigate client dissatisfaction, and navigate rushed hardware refreshes.Cyber resilience and AI are converging across the IT stack. N-able, Syncro, and LogicMonitor are rolling out AI-driven features such as anomaly detection, M365/Entra ID backups, and cross-cloud observability. Microsoft Research's open-source MCP Interviewer tool could open new service opportunities for validating AI infrastructure. The trend signals a shift from AI as novelty to AI as operational backbone — but with much of it still experimental, caution is advised.Finally, big questions loom: Is poor leadership being misdiagnosed as a failure of remote work? Can Oracle's $317B backlog — heavily reliant on OpenAI — actually deliver value? And if generative AI increases global GDP by trillions, who truly benefits — vendors or end users? At the grassroots level, students turning to AI for homework raises concerns about eroding critical thinking and long-term workforce preparedness. Four things to know today 00:00 Over Half of Tech Firms Plan Major Restructures to Embrace AI, Despite High Failure Rates05:28 Consumer Reports Urges Microsoft to Extend Windows 10 Support Beyond October 14 Deadline07:03 From Backup Anomaly Detection to MCP Reliability: AI and Cyber Resilience Are Converging in the IT Stack09:48 From Oracle's AI Gamble to Students Skipping Homework: Who Really Captures the Value of Technology? This is the Business of Tech.    Supported by: https://timezest.com/mspradio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Webinar:   https://bit.ly/msprmail All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Dark Rhino Security Podcast
S17 E10 (VIDEO) The Psychology Behind Cyber Resilience

Dark Rhino Security Podcast

Play Episode Listen Later Sep 18, 2025 53:24


#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It's all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There's no way AI can unlearn what you taught them40:00 There's no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​

Dark Rhino Security Podcast
S17 E10 The Psychology Behind Cyber Resilience

Dark Rhino Security Podcast

Play Episode Listen Later Sep 17, 2025 53:24


#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It's all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There's no way AI can unlearn what you taught them40:00 There's no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​

Reimagining Cyber
Storytelling, Culture and Cyber Resilience - Ep 165

Reimagining Cyber

Play Episode Listen Later Sep 3, 2025 31:31


Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersecurity to resilience.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

Digital Government podcast
Training digital safety through cyber resilience in Montenegro

Digital Government podcast

Play Episode Listen Later Sep 3, 2025 35:30


Montenegro's digital journey has been one of deliberate reconstruction and collaboration. In 2022, a major cyberattack exposed critical gaps in the country's digital infrastructure. The experience sent shockwaves through Montenegro's public administration and made it abundantly clear that preparedness on paper does not equal resilience in reality.  Instead of responding with short-term fixes, public institutions focused on long-term change. They initiated a wide-ranging transformation, strengthening cyber capabilities, forming new partnerships, and prioritising resilience not as an end goal, but as an everyday practice.  In this podcast episode, we take a privileged look at what that transformation felt like from the inside with Dušan Polović, Director General for Infrastructure, Information Security, Digitalisation and e-Services at the Ministry of Public Administration of Montenegro, and Milan Sekuloski, Senior Cybersecurity Expert at the e-Governance Academy.  Tune in! 

Joey Pinz Discipline Conversations
#719 ChannelCon-Nadav Shenker: From SCUBA to Secure Email: A CEO's Refreshing Take on Cyber

Joey Pinz Discipline Conversations

Play Episode Listen Later Aug 27, 2025 39:37 Transcription Available


Send us a textIn this refreshingly candid episode of the Joey Pinz Discipline Conversations podcast, Joey dives deep with Nadav Shenker, CEO of Vircom, a leading provider of email security solutions.

ITSPmagazine | Technology. Cybersecurity. Society
Legal, Technical, and Human: A New Model for Cyber Resilience | A CyXcel Brand Origin Story with Bryan Marlatt

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 26, 2025 20:49


What happens when a cybersecurity incident requires legal precision, operational coordination, and business empathy—all at once? That's the core question addressed in this origin story with Bryan Marlatt, Chief Regional Officer for North America at CyXcel.Bryan brings over 30 years of experience in IT and cybersecurity, with a history as a CISO, consultant, and advisor. He now helps lead an organization that sits at the intersection of law, cyber, and geopolitics—an uncommon combination that reflects the complexity of modern risk. CyXcel was founded to address this reality head-on, integrating legal counsel, cybersecurity expertise, and operational insight into a single, business-first consulting model.Rather than treat cybersecurity as a checklist or a technical hurdle, Bryan frames it as a service that should start with the business itself: its goals, values, partnerships, and operating environment. That's why their engagements often begin with conversations with sales, finance, or operations—not just the CIO or CISO. It's about understanding what needs to be protected and why, before prescribing how.CyXcel supports clients before, during, and after incidents—ranging from tailored tabletop exercises to legal coordination during breach response and post-incident recovery planning. Their work spans critical sectors like healthcare, utilities, finance, manufacturing, and agriculture—where technology, law, and regulation often converge under pressure.Importantly, Bryan emphasizes the need for tailored guidance, not generic frameworks. He notes that many companies don't realize how incomplete their protections are until it's too late. In one example, he recounts a hospital system that chose to “pay the fine” rather than invest in cybersecurity—a decision that risks reputational and operational harm far beyond the regulatory penalty.From privacy laws and third-party contract reviews to incident forensics and geopolitical risk analysis, this episode reveals how cybersecurity consulting is evolving to meet a broader—and more human—set of business needs.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.Guest: Bryan Marlatt, Chief Regional Officer (North America) at CyXcel | On LinkedIn: https://www.linkedin.com/in/marlattb/ResourcesLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cyber Risk Management Podcast
EP 191: How to Make FBI Your Best Ally

Cyber Risk Management Podcast

Play Episode Listen Later Aug 26, 2025 31:35


How would you add law enforcement as a valuable resource to your cybersecurity program? And why would you want to? Let's find out with our guest Supervisory Special Agent Douglas Domin of the Federal Bureau of Investigation. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.   “Cyber Resilience in the Age of AI: Threats, Responses & Human Stories” at MIT April 2025 -- https://youtu.be/6Jlg4tZV3TU   FBI field office directory -- https://www.fbi.gov/contact-us/field-offices   CISA/FBI/NSA Joint Advisories -- https://www.cisa.gov/news-events/cybersecurity-advisories

Cyber Security Weekly Podcast
Episode 468 - Delivering Next-Gen Cyber Resilience for the APJ Region

Cyber Security Weekly Podcast

Play Episode Listen Later Aug 25, 2025 6:47


We speak with Andreas Hartl, Senior Vice President for the Asia-Pacific and Japan (APJ) region at Zscaler. Andreas is responsible for driving the company's growth and strategic initiatives across the region.Prior to joining Zscaler, Andreas held senior leadership positions at several leading technology companies, including Aveva, IBM & Microsoft, where he played a pivotal role in expanding market presence and achieving significant revenue growth. His extensive background in sales, business development, and strategic planning has equipped him with a deep understanding of the APJ market and its unique opportunities.Andreas is known for his ability to build and lead high-performing teams, fostering a culture of innovation and customer-centricity. His strategic vision and execution have been instrumental in driving Zscaler's success in the region, helping organizations securely transform their digital infrastructure.He holds a Bachelor's in Applied Sciences, Electrical Engineering & Information Technology from Technical University of Munich as well as a Master's from University of Applied Sciences Munich. With a strong commitment to excellence and a forward-thinking mindset, Andreas Hartl continues to shape the future of secure digital transformation in the APJ region.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler

Becker’s Healthcare Podcast
Building Cyber Resilience in Healthcare: Key Strategies with Tommy West of CereCore

Becker’s Healthcare Podcast

Play Episode Listen Later Aug 6, 2025 15:52


In this episode, Tommy West, Enterprise Fellow Security Architecture at CereCore shares actionable insights for healthcare organizations to strengthen their cybersecurity posture through cultural alignment, risk-based frameworks, and fundamentals like strong authentication and device visibility.This episode is sponsored by CereCore.

ITSPmagazine | Technology. Cybersecurity. Society
Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time | On Location Podcast With Sean Martin & Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 17, 2025 23:25


Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"A Post–Infosecurity Europe 2025 Conversation with Ken MunroGuestsKen Munro Security writer & speakerhttps://www.linkedin.com/in/ken-munro-17899b1/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.⸻There's something special about catching up with someone who's not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON's Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn't your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn't just theory — it's something you can touch. Something that moves. Something that can break — and be fixed — before it breaks us.We talked about the infamous “Otto the Autopilot” from Airplane, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.One of the biggest takeaways? It's time to stop fearing the hacker mindset and start embracing it. Curiosity isn't a threat — it's a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.There's a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.⸻Keywords: cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The Tech Blog Writer Podcast
3315: The New Age of Cyber Resilience with Cohesity

The Tech Blog Writer Podcast

Play Episode Listen Later Jun 16, 2025 30:55


How can organizations protect their most valuable asset, data, while harnessing its true potential through AI-driven insights? These are the questions I set out to answer on the recent IT Press Tour in Silicon Valley. In my latest conversation at the Santa Clara offices of Cohesity, I sat down with Sanjay Poonen, President and CEO, to discuss how this company has positioned itself at the heart of the AI era with a modern data cloud built for speed, security, and intelligence. From my early days interviewing Cohesity's technical minds to now hearing directly from Sanjay about the company's transformation, it is clear that Cohesity's mission to shield, manage, and unlock data value is gaining momentum like never before. This episode takes you deep into the company's evolution. We explore how Cohesity started by reinventing traditional backup and recovery, then scaled through bold leadership, culminating in its significant acquisition of the NetBackup business from Veritas. Sanjay walks me through how this move instantly propelled Cohesity to market leadership in data security and cyber resilience, serving over 13,000 organizations worldwide across various sectors, including healthcare, finance, government, and retail. We also examine how Cohesity is using AI not only to help clients recover from cyber threats but to mine vast troves of live and backup data for powerful, real-time business insights. Sanjay explains the partnership with NVIDIA and how Cohesity's patented retrieval augmented generation capabilities are setting new benchmarks for generative AI applications within backup environments. For businesses grappling with data sovereignty and the increasing return to on-premises solutions, Sanjay shares how Cohesity's innovations balance local compliance requirements while leveraging cloud agility. What resonated most with me was Sanjay's candid perspective on leadership during rapid growth and mergers, from uniting thousands of employees under a shared culture to maintaining a relentless customer-first mindset. If you have ever wondered how a company can become a real force in both AI and cybersecurity, this conversation is filled with insights, real-world examples, and a clear vision for how Cohesity plans to shape the next generation of data management. Are you ready to rethink how your organization secures and activates its data in an AI-driven future? Tune in and discover what lies ahead on this data-powered journey. Listener Notes Here is a link to the 5-minute video that Sanjay referenced in our conversation.  https://www.youtube.com/watch?v=xrKdyaWpIG4