Podcasts about cyber risk

  • 496PODCASTS
  • 1,224EPISODES
  • 31mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 18, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cyber risk

Show all podcasts related to cyber risk

Latest podcast episodes about cyber risk

Trust Issues
EP25 - Identity is the attack vector w/ Udi Mokady

Trust Issues

Play Episode Listen Later Feb 18, 2026 55:07


CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition's close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.Udi discusses what the combined companies' scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk's long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.Note: This episode was recorded in January, prior to the acquisition's close.

No Password Required
No Password Required Podcast Episode 69 - Sue Serna

No Password Required

Play Episode Listen Later Feb 16, 2026 44:39


Sue Serna - Social Media Security and Governance Leader and Lover of All BeaglesNo Password Required Season 7: Episode 2 - Sue SernaSue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/ Chapters: 00:00 Introduction and First Impressions   02:45 The Evolving Role of Social Media in Corporations   04:58 Transitioning from Journalism to Social Media  11:11 Building Social Media from Scratch   13:00 Becoming a CEO and Founder   16:28 The Importance of Networking   16:54 Bridging the Gap Between Social Media and Cybersecurity  20:51 Real-World Social Media Security Incidents  28:35 Navigating Internal Conflicts in Social Media  30:32 The Lifestyle Polygraph Begins   31:17 Nerd Things That Expose Sue: Space and Harry Potter!  35:16 Sue's Love For Beagles  37:50 Wreckless Intern or Overconfident Executive?  40:42 Hogwarts and Magical Beagles 

Inside My Canoehead
Cyber Risk, Cash Crunch, Cancel Culture: The 3 Systems That Protect Your Side Hustle or Startup

Inside My Canoehead

Play Episode Listen Later Feb 11, 2026 31:43


Send a textIn today's unpredictable economy, plagued by cyber threats, supply chain disruptions, political shocks, reputational attacks, and regulatory surprises, most entrepreneurs operate without a real safety net. The result? One bad event can wipe out years of hard work.In this episode of Mastering Risk, Dr. Jeff Donaldson (PhD in Disaster & Emergency Management) reveals the three essential, mostly free systems every founder-led business (especially those under $1M in revenue) needs to implement immediately to mitigate downside risk and thrive amid chaos.You'll learn:Financial System: How to calculate your true runway, set up smart budgeting, map overhead + marketing spend, and secure a low-dependency line of credit so you can survive 3–6 months of zero revenue without panic.Data Security Program: The simple 3-2-1 backup rule (3 copies, 2 media types, 1 off-site/air-gapped), how to identify truly critical data, and why practicing recovery is more valuable than any expensive software.Content Production System: Build a repeatable, aggressive-patience machine to tell the world you exist, define your avatar, choose platforms where they live, leverage AI for scale (without replacing your voice), block time daily, and test for 6 months before pivoting.These aren't theoretical consultant decks, they're battle-tested, low-to-no-cost actions Dr. D uses in his own five-figure businesses and teaches to founder-led companies just like yours.Whether you're just starting, running a side hustle, or scaling a six-figure operation, these three systems create resilience against cyber, operational, strategic, and reputational threats. Visit Preparedness Labs: https://preparednesslabs.ca Subscribe + turn on notifications for weekly risk-mastery episodesDISCLOSURE Information shared here is for educational purposes only.  Individuals and business owners should evaluate their own business strategies, and identify any potential risks.  The information shared here is not a guarantee of success. Your results may vary.Copyright © 2026.Support the showhttps://preparednesslabs.ca/

Cyber Risk Management Podcast
EP 203: Cyber Risk Quantification

Cyber Risk Management Podcast

Play Episode Listen Later Feb 10, 2026 48:31


Can cyber risk actually be measured in dollars? How do you know if your risk data vendor is any good? And is cyber insurance really worth the investment? Let's find out with our guest Scott Stransky, who leads the Cyber Risk Intelligence Center at Marsh and was named 2023 Cyber Risk Industry Person of the Year. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.  LinkedIn profile -- https://www.linkedin.com/in/scott-stransky-92659095/ Top 12 Report -- https://www.marsh.com/en/services/cyber-risk/insights/cybersecurity-signals.html                          Marsh Cyber Risk Intelligence Center -- https://www.corporate.marsh.com/solutions/cyber-resilience/cyber-risk-intelligence-center.html  

partner marsh ciso cyber risk quantification l gates jake bernstein kip boyle cyber risk opportunities
The Gate 15 Podcast Channel
Weekly Security Sprint EP 145. Nihilistic behavior and how tech tools are changing physical and cyber risk

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 10, 2026 20:22


In this week's episode of the Security Sprint, Dave and Andy covered the following topics:Open:• TribalHub 6th Annual Cybersecurity Summit, 17–20 Feb 2026, Jacksonville, Florida• Congress reauthorizes private-public cybersecurity framework & Cybersecurity Information Sharing Act of 2015 Reauthorized Through September 2026• AMWA testifies at Senate EPW Committee hearing on cybersecurity Main Topics:Terrorism & Extremismo Killers without a cause: The rise in nihilistic violent extremism — The Washington Post, 08 Feb 2026 o Terrorists' Use of Emerging Technologies Poses Evolving Threat to International Peace, Stability, Acting UN Counter-Terrorism Chief Warns Security Council United Nations / Security Council, 04 Feb 2026 OpenClaw: The Helpful AI That Could Quietly Become Your Biggest Insider Threat – Jamf Threat Labs, 09 Feb 2026. Jamf profiles OpenClaw as an autonomous agent framework that can run on macOS and other platforms, chain actions across tools, maintain long term memory and act on high level goals by reading and writing files, calling APIs and interacting with messaging and email systems. The research warns that over privileged agents like this effectively become new insider layers once attackers capture tokens, gain access to control interfaces or introduce malicious skills, enabling data exfiltration, lateral movement and command execution that look like legitimate automation. The rise of Moltbook suggests viral AI prompts may be the next big security threat; We don't need self-replicating AI models to have problems, just self-replicating prompts.• From magic to malware: How OpenClaw's agent skills become an attack surface • Exposed Moltbook database reveals millions of API keys • The rise of Moltbook suggests viral AI prompts may be the next big security threat • OpenClaw & Moltbook: AI agents meet real-world attack campaigns • Malicious MoltBot skills used to push password-stealing malware • Moltbook reveals AI security readiness • Moltbook exposes user data via API • OpenClaw: Handing AI the keys to your digital life Quick Hits:• Active Tornado Season Expected in the US • CISA Directs Federal Agencies to Update Edge Devices – GovInfoSecurity, 05 Feb 2026 & read more from CISA: Binding Operational Directive 26-02: Mitigating Risk From End-of-Support Edge Devices – CISA, 05 Feb 2026. • A Technical and Ethical Post-Mortem of the Feb 2026 Harvard University ShinyHunters Data Breach • Hackers publish personal information stolen during Harvard, UPenn data breaches • Two Ivy League universities had donor information breaches. Will donors be notified?• Harassment & scare tactics: why victims should never pay ShinyHunters • Please Don't Feed the Scattered Lapsus$ & ShinyHunters • Mass data exfiltration campaigns lose their edge in Q4 2025 • Executive Targeting Reaches Record Levels as Threats Expand Beyond CEOs • Notepad++ supply-chain attack: what we know • Summary of SmarterTools Breach and SmarterMail CVEs • Infostealers without borders: macOS, Python stealers, and platform abuse

@BEERISAC: CPS/ICS Security Podcast Playlist
Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 9, 2026 45:59


Podcast: ICS Cyber Talks PodcastEpisode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO viewPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

RSA Conference
Cyber at the Top: Risk Quantification: Turning Cyber Risk into Business Language

RSA Conference

Play Episode Listen Later Feb 5, 2026 29:43


Bridging the gap between cybersecurity and business priorities starts with a common language that explains risk in terms business leaders can relate to. In this episode, Mathias Buecherl, Group CISO at Heidelberg Materials, joins Dr. Hugh Thompson to explore how data-driven measurement is reshaping how organizations communicate, prioritize, and invest in security. They discuss why standardized metrics matter, how to translate cyber threats into financial and business terms, and what it takes to gain executive buy-in. From overcoming resistance to applying financial rigor to building maturity over time, this conversation offers a roadmap for making cyber risk measurable and meaningful.

Security Breach
Security Breach: Strengthening Your Weakest Links

Security Breach

Play Episode Listen Later Feb 5, 2026 32:58


Send us a textWhen we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it's tough to avoid what I'd call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.And just as there are benefits to discussing these individual aspects, it's equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.Perhaps no one has helped tie all of these different players together better than our guest for this episode. Vinod D'Souza leads the manufacturing and industry vertical for Google Cloud's Office of the CISO. Watch/listen as we discuss:Emerging vulnerabilities and response plans.Segmentation challenges in the era of constant technological expansion.New-age approaches to patching.The connected fibers of artificial intelligence and the human factors of cybersecurity.Addressing IT and OT silos.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.

ICS Cyber Talks Podcast
Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

ICS Cyber Talks Podcast

Play Episode Listen Later Feb 4, 2026 45:59


ניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and more

The Virtual CISO Moment
S8E5 - Order to Chaos: Cyber Risk and AI Governance with Scott Foote

The Virtual CISO Moment

Play Episode Listen Later Feb 3, 2026 33:19


In this episode of The Virtual CISO Moment, Greg Schaffer talks with cybersecurity veteran Scott Foote about what hasn't changed in cyber risk over the last 35 years—and why AI is amplifying those same mistakes at unprecedented speed. They discuss shadow AI, insecure defaults, “vibe coding,” privacy risks, and the growing need for practical AI governance. Drawing on decades of experience across industry and government, Scott shares why fundamentals still matter, how organizations can bring order to AI chaos, and what leaders need to understand before adopting AI at scale.A thoughtful, wide-ranging episode for CISOs, vCISOs, board advisors, and executives trying to understand where cyber risk ends and AI governance begins—and why fundamentals still matter more than ever.

The Cybertraps Podcast
INCH360 2025: Cyber Risk as a Business Imperative

The Cybertraps Podcast

Play Episode Listen Later Jan 22, 2026 43:06 Transcription Available


B2B Better
How to Talk Cyber Risk So People Actually Listen | Jeffrey Wheatman, Cybersecurity Strategist at Black Kite

B2B Better

Play Episode Listen Later Jan 21, 2026 21:13


What happens when cyber risk leaders stop speaking in acronyms and start telling stories? In this episode, host Jason Bradwell sits down with Jeffrey Wheatman, SVP of Cyber Risk Strategy at Black Kite and longtime cybersecurity evangelist, to talk about how to lead with problems, not products. From decades advising CISOs at Gartner to launching the panel show Third Party, Jeff shares what he's learned about building trust, breaking down "terminal uniqueness," and why vendors need to collaborate on educating the market instead of competing. If you care about cutting through noise in a saturated market, this conversation is packed with insights you can actually use. Jason and Jeff dive into why so many cybersecurity vendors fall into the trap of "terminal uniqueness" believing they're so different that they can't learn from anyone else. Jeff explains why this mindset kills effective marketing and how leading with the problem, not your product features, is the only way to break through. They explore why CISOs won't talk to sales teams (hint: it's not personal, it's about trust) and why the cybersecurity industry desperately needs more collaboration. Jeff makes a compelling case that we're at war with ransomware networks, yet vendors refuse to talk to each other about how to educate buyers. The conversation shifts to buyer awareness stages and where most marketing completely misses the mark. Jeff shares his framework for thinking about audiences beyond just problem-aware buyers, and why "hallway therapy" at conferences builds more trust than any keynote ever will. Jason asks Jeff how he'd spend $100K to build an audience (not a campaign), and Jeff's answer revolves around creating spaces for real conversation, which is exactly what led him to launch Third Party, a panel show tackling cybersecurity topics with both strategic and tactical depth. They wrap with Jeff's shoutouts to creators doing cyber content right and key takeaways for B2B marketers trying to build trust in technical markets. Whether you're a security vendor struggling to differentiate, a CISO trying to communicate risk to the board, or a B2B marketer in any technical space, Jeff's insights on problem-first storytelling and building genuine community will transform how you think about reaching your audience. This isn't about more content, it's about better conversations. Subscribe to catch every episode. Leave a review to help others discover the show. Share with security professionals or B2B marketers trying to break through technical noise. Follow B2B Better on LinkedIn for weekly insights. 00:00 - Introduction: Cutting through cyber noise 01:30 - Jeff's journey from Gartner to Black Kite 04:00 - Terminal uniqueness: the "we're different" trap 07:00 - Lead with problems, not product features 09:30 - Why CISOs avoid sales conversations 13:00 - We're at war: Why vendors need to collaborate 17:30 - Buyer awareness stages marketers miss 20:00 - Why competitors won't talk (and should) 24:00 - Hallway therapy beats keynotes 27:00 - The $100K audience-building question 30:00 - Launching Third Party panel show 35:00 - Strategic + tactical content together 38:00 - Cybersecurity creators doing it right 42:00 - Key takeaways for B2B marketers Connect with Jason Bradwell on LinkedIn Connect with Jeffrey Wheatman on LinkedIn Visit Black Kite podcast/resource hub Visit InfoSec World's official site Explore B2B Better website and the Pipe Dream podcast

No Password Required
No Password Required Podcast Episode 68 — Rob Hughes

No Password Required

Play Episode Listen Later Jan 20, 2026 44:51


Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7:  Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster

The Virtual CISO Moment
S8E3 - Cyber Risk, Business Reality, and Leadership with Tatiana Argueta

The Virtual CISO Moment

Play Episode Listen Later Jan 20, 2026 31:55


How do you explain security risk to executives who don't speak “security”? What really changes when you move between regulated industries like healthcare and energy? And why are communication skills just as critical as technical ones in cybersecurity?In this episode, Greg Schaffer speaks with Tatiana Argueta, Senior Security Engineer, about:*Operating security programs in regulated environments*Translating cyber risk into business impact*Why understanding your business is a core security skill*How Toastmasters helped shape her security leadership style*Emerging risks: AI, geopolitics, and misinformationThis is a practical, grounded conversation for CISOs, vCISOs, and security practitioners navigating real-world risk.#Cybersecurity #InformationSecurity #CISO #vCISO #RiskManagement #SecurityLeadership #GRC

The Gate 15 Podcast Channel
The Gate 15 Interview EP 66: Chris Camacho: Cyber Risk, Building Communities, Nirvana, and Peruvian Chicken

The Gate 15 Podcast Channel

Play Episode Listen Later Jan 19, 2026 39:24


In this episode of The Gate 15 Interview, Andy Jabbour speaks with Chris Camacho. Chris is Abstract Security's Co-Founder and Chief Operating Officer (COO). In this role, Chris is responsible for the go-to-market strategy, company vision, growth, collaboration, and client engagement. He is a leader, innovator and community builder. Before co-founding Abstract Security, Chris served as both Chief Strategy Officer and Chief Revenue Officer at Flashpoint and was responsible for helping grow the company to an acquisition by Audax PE and supporting three acquisitions to Flashpoint's portfolio, which helped the company be an industry market leader in the information security market. Before his time at vendors like Abstract Security and Flashpoint, Chris was the Senior Vice President of Information Security at Bank of America, where he oversaw the Threat Management Program. An entrepreneur, Chris also served as CEO for NinjaJobs, a career-matching community for elite cybersecurity talent. As he continues to build trust and relationships throughout the cybersecurity community, he's now building C2 Corner, a space for security leaders to share stories, connect through experience, and build what's next together. Chris on LinkedIn.In the podcast Chris and Andy discuss:Chris's background and the road from financial services to becoming a vendor.Chris shares some threat perspective from deepfakes to the complexities of geopolitics and polarization.Chris talks about managing ever-increasing amounts of data and how Abstract Security is helping organizations to reduce risk.We discuss the idea of AI SOCs helping to enhance security operations.The importance of community building: from trust groups and ISACs to C2 Corner to in-person meet-ups!Chris shares some career advice, andWe play 3 Questions! and talk Chris's favorite meats, reading books (and writing books?), and the glory of the 90s.Selected links:Abstract Security. “Security teams should stop adversaries—not manage security data. Abstract's streaming-first platform simplifies the entire security data pipeline, from ingestion to detection to storage. By eliminating noise and delays, we help your team move faster, stay focused, and outpace attackers in real time.”Introducing C2 Corner: By Practitioners, For the IndustryApplied Security Data Strategy: A Leader's Guide: a practical toolkit designed to help organizations of all sizes

AM Best Radio Podcast
Allianz's Wedin: D&O Claims Pressure Grows as Geopolitics, Cyberrisk, Insolvencies Intensify

AM Best Radio Podcast

Play Episode Listen Later Jan 14, 2026 10:17 Transcription Available


Eric Wedin, head of North America financial lines, Allianz Commercial, discusses findings from the company's latest D&O Insurance Insight Report, examining how geopolitical instability, cyber incidents, and other global factors are reshaping directors and officers liability exposures heading into 2026.

ITSPmagazine | Technology. Cybersecurity. Society
From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 13, 2026 6:37


In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ai Experience [in english]
IA and Cybersecurity: The Age of Permanent Breach

Ai Experience [in english]

Play Episode Listen Later Jan 11, 2026 45:03


Is AI making hackers and scammers faster than you can react?In this episode of AI Experience, Julien Redelsperger welcomes Craig Taylor, a Certified Information Systems Security Professional (CISSP) and a cybersecurity veteran with more than 30 years of experience. You'll hear how AI is lowering the barrier to cybercrime, enabling large-scale, highly personalized phishing, accelerating ransomware attacks, and making voice and video deepfakes credible enough to fool employees, executives, and even families. The conversation also explores why attackers now move faster than defenders, how agentic AI changes the anatomy of a breach, and why accumulated data has become a liability rather than an asset. A grounded discussion to help you understand what AI truly simplifies for hackers and scammers, what can no longer be fully secured, and which safeguards still make a real difference today.Hosted on Ausha. See ausha.co/privacy-policy for more information.

Moody’s Talks – The Big Picture
Outlooks 2026: How New Digital Systems Will Transform Credit Markets

Moody’s Talks – The Big Picture

Play Episode Listen Later Jan 8, 2026 21:44


New and emerging digital technologies are connecting previously siloed areas of finance. The convergence of traditional finance with digital assets, the rapid evolution of blockchain and AI, and the growing influence of cyber risks across sectors will create both challenges and opportunities.  In this episode, we speak with Moody's experts to understand the risks, innovations, and financing needs shaping global financial markets. Learn more at https://www.moodys.com/outlooks  Host: William Foster, Senior Vice President, Sovereign Risk, Moody's Ratings  Guests: Fabian Astic, Managing Director, Global Head of Digital Economy, Moody's Ratings; Lesley Ritter, Senior Vice President, Cyber Credit Risk, Moody's Ratings Related Research: Cyber Risk – Global -- 2026 Outlook - Cyber threats will intensify as AI tools proliferate 8 Jan 2026Digital Economy – Global – 2026 Outlook - Digital finance links diverse market segments, raising efficiency, risks 05 Jan 2026Digital Transformation – Global – Digitalization reshapes private credit, emerging markets, transition finance 01 Dec 2025Cyber Risk – Global - Weak artificial intelligence governance practices pose growing risk of data breaches 01 Oct 2025 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Darn IT Podcast
The Wired Data Breach and Why “Non-Sensitive” Data Puts You at Risk

Darn IT Podcast

Play Episode Listen Later Jan 7, 2026 11:57


In this episode of Darnley's Cyber Café, we slow things down and look at a recent data leak involving Wired to understand what these incidents actually mean for everyday people.Millions of records. No passwords. No credit cards. And yet,  there is real risk.Using a real-world breach as the starting point, this conversation explores how seemingly harmless pieces of information can quietly add up over time, why delayed consequences are often the most dangerous, and what small, deliberate steps can help you stay in control of your digital footprint.This isn't a headline recap. It's a reflection on how data moves, how trust erodes, and why awareness still matters.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

Grow Your Credit Union
The Five Dollar Fake CEO

Grow Your Credit Union

Play Episode Listen Later Jan 6, 2026 32:33


Read the shownotes and full transcript on our site: growyourcreditunion.com Deepfake technology has become so accessible that threat actors need only 10 to 30 seconds of audio and a $5 monthly subscription to convincingly impersonate executives, bypass authentication, and trick employees into catastrophic decisions. Credit unions face record ransomware attacks while most lack AI governance policies to address emerging threats. In this episode of Grow Your Credit Union, host Joshua Barclay welcomes sponsored guest Brian Hinze, President & CEO at NCU-ISAO, along with co-host Oto Ricardo, Director of Information Security and Cyber Risk at Advia Credit Union, to explore: Why ransomware attacks hit record levels despite preparedness efforts How credit unions approach AI governance policies What deepfake threats mean for credit union security How NCU-ISAO supports credit unions through community and collaboration   A huge thanks to our sponsor, NCU-ISAO Cybersecurity threats are evolving faster than ever, and credit unions are increasingly in the crosshairs. NCU-ISAO is the only organization fully dedicated to protecting credit unions through real-time threat intelligence, actionable alerts, expert-led analysis, and a community of security-minded professionals. Strengthen your defenses with collaboration. Learn more at NCUISAO.org/GYCU.

@BEERISAC: CPS/ICS Security Podcast Playlist
Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 26, 2025 53:02


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get RightPub date: 2025-12-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way. In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments. Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn't as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation. You'll learn: Why legacy systems aren't going away anytime soon The hidden risks of chasing AI without strong foundations How to balance security, usability, and business value Why process and governance matter more than tools How IT leaders can communicate cyber and AI value in business terms Where AI creates opportunity - and where it creates new attack paths Whether you're leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership. Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All. Key Moments:  00:00 "Legacy Tech in Modern Firms" 06:22 "Technology, Change, and Customer Focus" 09:51 "Challenges in Articulating Cybersecurity Value" 12:27 "Tech Solutions Must Drive Value" 15:43 Sell Ideas Beyond the Code 19:03 "Ransomware Risks in Acquisitions" 24:02 Government, Services, and Compliance Debate 25:35 Balancing AI, Cybersecurity, and Regulation 30:33 BlackBerry's Downfall: Ignored Innovation 32:06 "Evolution and Misuse of AI" 34:45 "Opportunity to Lead Change" 37:52 "AI Without Guidance Backfires" 41:07 "AI: Smart but Context-Lacking" 46:45 "AI Empowering Business Transformation" 50:30 "Effortless Tech-Fueled Imitation" About the guest :  Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value. How to connect Neil: https://www.linkedin.com/in/neildmorris/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

No Password Required
No Password Required Podcast Episode 67 — Gina Yacone

No Password Required

Play Episode Listen Later Dec 21, 2025 40:17


Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55  The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections

Legal 123s with ByrdAdatto
Does My Practice Need Cybersecurity Insurance? with Kaitlin Upchurch

Legal 123s with ByrdAdatto

Play Episode Listen Later Dec 17, 2025 29:53


Cybersecurity is essential for every practice that relies on technology. In this episode, guest Kaitlin Upchurch, Senior Vice President and Cyber & Tech Practice Leader at Lockton, addresses the cybersecurity questions practices are—and are not—thinking about. She explains why cybersecurity risks are often misunderstood, what makes health care a prime target, and why insurance alone is not enough. Tune in to understand your cyber exposure, the biggest threats facing practices today, and the first steps to strengthen your protection beyond buying a policy.  Chapters00:00 Intro00:47 Banter04:25 Guest background10:20 Tell us about Lockton.13:40 Do medical practices need cybersecurity?18:40 What are cybersecurity misconceptions?20:48 What are some cybersecurity threats?25:00 How can medical practices avoid cybersecurity issues?26:37 Access+27:16 Legal Takeaways28:45 OutroWatch full episodes of our podcast on our YouTube channel: https://www.youtube.com/@byrdadatto  Stay connected for the latest business and health care legal updates:WebsiteFacebookInstagramLinkedIn

Cybersecurity Where You Are
Episode 166: Foundations of Actuarial Science in Cyber Risk

Cybersecurity Where You Are

Play Episode Listen Later Dec 17, 2025 40:46


In Episode 166 of Cybersecurity Where You Are, Sean Atkinson sits down with Tyler Moore, Ph.D., Chair of Cyber Studies at the University of Tulsa, and Daniel Woods, Lecturer at the University of Edinburgh. Together, they review the foundations of actuarial science in cyber risk.Here are some highlights from our episode:00:48. Introductions to Tyler and Daniel01:22. How actuarial science fits into a traditional approach of risk modeling02:20. Why cyber risk has historically been difficult to quantify04:01. How data sources available to insurers and individual organizations have evolved07:21. Adaptability as a key principle to model risk for an evolving cyber threat landscape08:58. Loss distribution modeling for different types of cyber threats11:38. Similarities and differences between how actuaries and frameworks view risks13:10. Quantifying severity, frequency, and resilience to different cyber risks14:31. How insurers differ from underwriters in their view of risk17:43. Ransomware as a case study where actuarial modeling improved risk management22:30. The value of translating cyber risk to business risk for CISOs like Sean26:20. Why data on which security controls matter most remains elusive32:33. The biggest misconceptions of using actuarial models in cybersecurity36:09. How cyber actuarial science can help to determine what works in cybersecurityResourcesEpisode 121: The Economics of Cybersecurity Decision-MakingEpisode 105: Context in Cyber Risk QuantificationEpisode 77: Data's Value to Decision-Making in CybersecurityHow Risk Quantification Tests Your Reasonable Cyber DefenseEpisode 113: Cyber Risk Prioritization as Ransomware DefenseEpisode 65: Making Cyber Risk Analysis Practical with QRAFAIR: A Framework for Revolutionizing Your Risk AnalysisIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Trust Issues
EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

Trust Issues

Play Episode Listen Later Dec 16, 2025 43:50


In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.

DailyCyber The Truth About Cyber Security with Brandon Krieger
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Dec 14, 2025 53:48


Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world's first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.But with innovation comes new questions: does adding connectivity make a safe less secure?Do people still need safes in a world that uses less cash?And how do you build trust in a product designed to protect what matters most?This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk. 

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode 136 - Inside CTEM: The New Standard for Cyber Risk

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later Dec 12, 2025 32:22


On this episode, Silent Sector breaks down what cybersecurity really looks like beyond the buzzwords. We dive into CTEM and why continuous exposure management beats the outdated once-a-year pen test. You'll hear how adversarial simulation, social engineering, and threat modeling work together to reveal real-world risk—not just compliance checkboxes. If you've ever felt overloaded by industry acronyms or wondered how organizations can actually stay ahead of evolving threats, this conversation brings clarity, strategy, and straight-talk insights from the front lines of cyber defense.Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!

Defense in Depth
How Much Cyber Risk Should a CISO Own?

Defense in Depth

Play Episode Listen Later Dec 11, 2025 32:45


All links and images can be found on CISO Series. Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Erika Dean, former CSO, Robinhood. In this episode: Delegation requires accountability The reality of daily decision-making The gap between theory and practice Beyond the advisory role Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO

RSA Conference
Cyber at the Top: Leading a Converged Security Organization: Bridging Physical and Cyber Risk

RSA Conference

Play Episode Listen Later Dec 11, 2025 24:02


As physical and digital threats collide, converged security models that unite physical and cyber protections under one strategy are becoming more essential. John Scimone, Chief Security Officer for Dell Technologies, offers guidance for CISOs looking to bridge physical and cyber security into one cohesive strategy.

AM Best Radio Podcast
TransUnion's Foy: Customer Demands, Cyberrisk, Digital Engagement Drive 2026 Insurance Trends

AM Best Radio Podcast

Play Episode Listen Later Dec 2, 2025 14:01 Transcription Available


Patrick Foy, senior director, strategic planning, TransUnion's insurance business, discusses how evolving customer expectations and digital demands are reshaping commercial insurance heading into 2026.

Insuring Cyber Podcast - Insurance Journal TV
How CISA Data Is Shaping Smarter Cyber Risk Decisions

Insuring Cyber Podcast - Insurance Journal TV

Play Episode Listen Later Nov 26, 2025 1:57


CISA's threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek … Read More » The post How CISA Data Is Shaping Smarter Cyber Risk Decisions appeared first on Insurance Journal TV.

iTunes - Insurance Journal TV
How CISA Data Is Shaping Smarter Cyber Risk Decisions

iTunes - Insurance Journal TV

Play Episode Listen Later Nov 26, 2025 1:57


CISA's threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek … Read More » The post How CISA Data Is Shaping Smarter Cyber Risk Decisions appeared first on Insurance Journal TV.

Podcasts – Insurance Journal TV
How CISA Data Is Shaping Smarter Cyber Risk Decisions

Podcasts – Insurance Journal TV

Play Episode Listen Later Nov 26, 2025 1:57


CISA's threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek … Read More » The post How CISA Data Is Shaping Smarter Cyber Risk Decisions appeared first on Insurance Journal TV.

Beyond the B
5 Cyber Risks for B Corps, and How You Can Fix Them (w/ Steve Sharer & Garrett Miller)

Beyond the B

Play Episode Listen Later Nov 25, 2025 65:11


From politically motivated attacks to basic configuration errors, purpose-driven orgs are now on the front lines of cyber risk. In this episode, Steve Sharer and Garrett Miller walk through five areas where B Corps are more vulnerable than they realize — and the practical steps that strengthen each one. They explain why these gaps matter and how to close them with straightforward practices that don't overwhelm small teams.View the show notes: https://go.lifteconomy.com/blog/5-cyber-risks-for-b-corps-and-how-you-can-fix-them-w/-steve-sharer-garrett-millerUnlock your free B Corp Values Assessment—plus tips and insights to help your business grow. https://go.lifteconomy.com/b-corp-newsletter

Adventures of Alice & Bob
Ep. 92 – Births, Badges, and Breaches // Chris Neuwirth

Adventures of Alice & Bob

Play Episode Listen Later Nov 21, 2025 63:19


In this episode, James Maude sits down with Chris Neuwirth, VP of Cyber Risk at Networks Group, whose path into cybersecurity might be the most unconventional you'll ever hear—from delivering babies as a teenage EMT to penetration testing critical infrastructure today. Chris's journey includes serving as an LAPD officer at Venice Beach, responding to 9/11 at the Pentagon, managing IT during Hurricane Sandy, and running operations as assistant commissioner at New Jersey's Department of Health during COVID-19. Along the way, he's been hacking everything he could get his hands on—from war driving through Manhattan in the early 2000s to conducting sophisticated penetration tests at hospitals and airports today. Chris discusses the importance of organizations being prepared and shares the uncomfortable truth: sometimes the easiest way past your defenses is just showing up and plugging in.

North Fulton Business Radio
Quantifying Small Business Cyber Risk with CYBERISKIQ

North Fulton Business Radio

Play Episode Listen Later Nov 20, 2025


CYBERISKIQ from the CARE-Report: Quantifying Small Business Cyber Risk with Ralph Pasquariello and Craig Sekowski (North Fulton Business Radio, Episode 914) On this episode of North Fulton Business Radio, host John Ray welcomes cyber risk specialists Ralph Pasquariello and Craig Sekowski of the CARE-Report. Ralph and Craig explain why small and mid-sized businesses are far […]

Business RadioX ® Network
Quantifying Small Business Cyber Risk with CYBERISKIQ

Business RadioX ® Network

Play Episode Listen Later Nov 20, 2025


CYBERISKIQ from the CARE-Report: Quantifying Small Business Cyber Risk with Ralph Pasquariello and Craig Sekowski (North Fulton Business Radio, Episode 914) On this episode of North Fulton Business Radio, host John Ray welcomes cyber risk specialists Ralph Pasquariello and Craig Sekowski of the CARE-Report. Ralph and Craig explain why small and mid-sized businesses are far […]

Insuring Cyber Podcast - Insurance Journal TV
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt

Insuring Cyber Podcast - Insurance Journal TV

Play Episode Listen Later Nov 19, 2025 17:00


Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.

iTunes - Insurance Journal TV
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt

iTunes - Insurance Journal TV

Play Episode Listen Later Nov 19, 2025 17:00


Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.

Podcasts – Insurance Journal TV
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt

Podcasts – Insurance Journal TV

Play Episode Listen Later Nov 19, 2025 17:00


Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.

Lloyd's List: The Shipping Podcast
No cyber risk insurance? Fool around and find out

Lloyd's List: The Shipping Podcast

Play Episode Listen Later Nov 3, 2025 28:29


WHAT happens if you don't buy cyber risk insurance? Well, Jaguar Land Rover certainly found out earlier this year. The luxury carmaker was hit by a devastating cyber attack in late August, causing it to shut down its production lines for more than four weeks and costing it £50m a week. It only got things back to normal in early October. It was initially forced to withhold payments from suppliers. That is no small matter, given that the automotive parts supply chain, which famously runs on the just-in-time model, supports 200,000 jobs in the UK. It even had to turn to its bankers to secure a £2bn funding facility, which won't have come cheap. On top of all that, the government saw no choice but to step in with a £1.5bn credit guarantee, simply to avoid the potential economic fallout. Other recent victims of cyber crime include Heathrow Airport and high street retailers Marks & Spencer and the Co-op. Many big players in the maritime industries have also been on the receiving end, from boxship giants Maersk, MSC and CMA CGM to ports giant DP World and top broker Clarksons. A recent report from IBM, which examined data breaches experienced by about 600 organisations worldwide, put the average cost of an incident at $4.4m (or £3.3m). What is clear is that cyber risk is a growing threat, as hackers becoming increasingly more sophisticated. This special joint Insurance Day/Lloyd's List podcast will look at how insurance can at least mitigate the worst impacts for companies in both the maritime and wider business sectors. Joining Insurance Day reporter Queenie Shaikh are: Robert Dorey, chief executive, Astaara William Altman, director, CyberCube Stephen Wares, head of international underwriting, Coalition Subscribe to Lloyd's List: https://www.lloydslistintelligence.com/products/lloyds-list Learn more about Lloyd's List Intelligence: https://www.lloydslistintelligence.com/

ITSPmagazine | Technology. Cybersecurity. Society
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

Investec Focus Radio
NOW Ep 113: The new era of cyber risk

Investec Focus Radio

Play Episode Listen Later Oct 29, 2025 15:42


Deepfakes that fool the eye. Voices that sound real. Attacks that never sleep. As artificial intelligence reshapes both offence and defence, cyber risk has gone mainstream. In this episode of No Ordinary Wednesday, Jeremy Maggs speaks with Investec cybersecurity experts Nomalizo Hlazo and Tash van den Heever about the new era of digital resilience where trust, adaptability and awareness are your strongest defences. Podcast key moments 00:00 - Introduction 01:27 - AI on both sides – Attackers and defenders in the digital arms race 02:52 - 2025: The year cyber risk went mainstream 03:46 - Why digital risk is compounding 05:05 - Building resilience through third-party and supply chain visibility 07:15 - Regulation tightens – Balancing compliance and agility 08:57 - Critical infrastructure under threat 10:32 - Building digital trust in a diverse and connected market 11:48 - The future of cybersecurity: Integrity, speed, and adaptability 13:16 - Quantum computing, AI agents, and hyperconnectivity 13:58 - Cybersecurity as a life skill 14:56 - Closing remarks Read more on www.investec.com/now Hosted by seasoned broadcaster, Jeremy Maggs, the No Ordinary Wednesday podcast unpacks the latest economic, business, and political news in South Africa, with an all-star cast of investment and wealth managers, economists, and financial planners from Investec. Listen in every second Wednesday for an in-depth look at what's moving markets, shaping the economy, and changing the game for your wallet and your business. Investec Focus Radio SA

Packet Pushers - Full Podcast Feed
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You're (Probably) Doing It Wrong

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 28, 2025 36:15


To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »

Heavy Strategy
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You're (Probably) Doing It Wrong

Heavy Strategy

Play Episode Listen Later Oct 28, 2025 36:15


To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »

Actuary Voices
Bobby Jaegers

Actuary Voices

Play Episode Listen Later Oct 23, 2025 24:29


For Cybersecurity Awareness Month, in a new Actuary Voices podcast episode, Committee on Cyber Risk member Bobby Jaegers discusses building a strong U.S. cybersecurity infrastructure and cyber resilience at the personal level.

Cybercrime Magazine Podcast
Talking Cyber. Canadian SMEs Facing Cyber Risk. Heather Engel, Strategic Cyber Partners.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 15, 2025 8:58


Small and medium-sized enterprises in Canada may be dangerously underestimating their exposure to cyber risk, leaving many without adequate defences or insurance coverage, according to a new survey commissioned by the Insurance Bureau of Canada, or the IBC. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn more about today's stories, visit https://cybercrimewire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com.

Cyber Security Headlines
Week in Review: Crowdsourced ransomware campaign, Windows 10 woes, California opts out

Cyber Security Headlines

Play Episode Listen Later Oct 10, 2025 38:50


Link to episode page This week's Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back in control, blocking what doesn't belong and stopping attacks before they spread. Zero Trust security starts here — with ThreatLocker” All links and the video of this episode can be found on CISO Series.com      

Risk Management and Insurance Podcast
Strengthening resilience through effective cyber threat management

Risk Management and Insurance Podcast

Play Episode Listen Later Sep 30, 2025 55:44


Organizations continue to face an increasingly complex cyber threat landscape. Amid ongoing geopolitical and geoeconomic tensions and supply chain disruptions, a robust and comprehensive cyber risk management strategy can help businesses mitigate risks and improve resiliency. In this episode of Risk in Context, Marsh McLennan's Dan Bowden speaks with Marsh's Helen Nuttall and Matt Berninger about the importance of reviewing and reinforcing cyber controls to help minimize cyber exposures and uncertainty and better protecting their people, finances, and operations from cyber threats. You can access a transcript of the episode here. Read Cybersecurity Signals, Connecting Controls and Incident Outcomes and The 2025 OT Security Financial Risk Report. For more insights and insurance and risk management solutions, follow Marsh on LinkedIn and X and visit marsh.com.