Podcasts about cyber risk

  • 504PODCASTS
  • 1,237EPISODES
  • 31mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 18, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cyber risk

Show all podcasts related to cyber risk

Latest podcast episodes about cyber risk

The Good Question Podcast
Leading Cyber Risk From the Top: Scott Alldridge On Strengthening Organizational Resilience In A Digital-First World

The Good Question Podcast

Play Episode Listen Later Mar 18, 2026 34:30


As digital transformation accelerates, today's leaders are navigating an increasingly complex risk landscape shaped by rising cyber threats, evolving regulations, and constant technological change. In this Episode, we sit down with Scott Alldridge—CEO of IP Services, President of the IT Process Institute, and author of the widely recognized VisibleOps series to help organizations bridge the gap between technical complexity and business strategy, enabling leaders to make smarter, risk-aware decisions. In this episode, we explore: The evolving role of boards in cybersecurity leadership Key gaps in traditional risk management strategies What true cybersecurity maturity looks like today Practical ways to build a culture rooted in accountability and resilience Scott's latest book, VisibleOps Cybersecurity, has earned Amazon Best Seller status and continues to shape how executives and cybersecurity professionals approach modern risk. Connect with Scott and learn more through his official website. Episode also available on Apple Podcasts: https://apple.co/38oMlMr  Keep up with Scott Alldridge socials here: Facebook: https://www.facebook.com/scott.alldridge.24/ X: https://x.com/scottalldridge  Instagram: https://www.instagram.com/scottalldridge1/  Youtube: https://www.youtube.com/@scottalldridge 

Layer 8 Podcast
Episode 138: Layer 8 Keynote Speaker Christina Lekati

Layer 8 Podcast

Play Episode Listen Later Mar 16, 2026 40:29


The Layer 8 Conference is excited to announce the first of its keynote speakers for 2026, Christina Lekati!Christina is a social engineering specialist who works with Cyber Risk, GmbH in Munich, Germany. She got her undergraduate degree in Psychology and has a Masters in International Business Studies. She has been a part of the OSINT Curious team and has taught her classes at Black Hat in Las Vegas but will also be offering her two-day social engineering class at the Layer 8 Conference this year. Come join us at the Layer 8 Conference, meet Christina and all of our other incredible speakers in Boston, MA on June 5-6.

Mexico Business Now
“Leading With Visibility: How Execs Can Take Control of Cyber Risk” by Carolina Ruiz, CEO, Brier & Thorn (AA2008)

Mexico Business Now

Play Episode Listen Later Mar 12, 2026 6:31


The following article of the Cybersecurity industry is: “Leading With Visibility: How Execs Can Take Control of Cyber Risk” by Carolina Ruiz, CEO, Brier & Thorn.

The Audit
Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About

The Audit

Play Episode Listen Later Mar 9, 2026 36:35 Transcription Available


What if the device keeping you alive was also a cybersecurity vulnerability? That's not a hypothetical — it's Victor Barge's reality. In this episode of The Audit, IT Audit Labs' Global Delivery Director Victor Barge shares the story of his sudden cardiac event and the life-saving defibrillator now implanted in his chest and the eye-opening security questions that followed. Co-hosts Joshua Schmidt, Eric Brown, and Nick Mellum connect Victor's story to the real-world cyber risks organizations ignore every single day. What you'll learn in this episode: How modern pacemakers and defibrillators transmit biometric data 24/7 — and what happens if that data is compromised Why the 2017 Abbott pacemaker recall of 500,000 devices is a warning the industry hasn't fully heeded The parallel between reactive healthcare and reactive cybersecurity — and why waiting costs you more Why billion-dollar organizations are still storing passwords in spreadsheets in 2026 What continuous monitoring in IT security can learn from real-time cardiac telemetry Whether you're a CISO, IT auditor, or just someone wearing a smartwatch, this episode will make you rethink what "sensitive data" really means. 

Trust Issues
EP 26 - The tyranny of the now: identity at machine speed

Trust Issues

Play Episode Listen Later Mar 6, 2026 45:33


Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.Listeners will hear insight on: • Identity at machine speed and the rise of autonomous access • Why attackers still win more than 51 percent of the time • How ransomware continues to succeed despite industry progress • Why SMBs face “mission impossible” expectations • The true cost of vendor sprawl and operational overload • What effective security leadership looks like in the current threat environmentIf you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.

AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
[PULSE] Friday Security Briefing: GPT-5.4's "High Capability" Cyber Risk (March 06th 2026 Daily News Rundown)

AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store

Play Episode Listen Later Mar 6, 2026 1:31


Full Audio at https://podcasts.apple.com/us/podcast/full-rundown-gpt-5-4s-computer-use-anthropics-safety/id1684415169?i=1000753470621This episode is made possible by our sponsors:

The Money Maze Podcast
195: From Battlefield to Boardroom: Assessing the Cyber War Frontlines - Jen Easterly on the New Era of Cyber Risk

The Money Maze Podcast

Play Episode Listen Later Mar 5, 2026 64:40


We have had some extremely distinguished guests over the last 6 years, but we haven't secured one who combines, a Rhodes Scholar, US Army Colonel, Counter terrorism expert, leading the US's cyber intelligence defence agency, and a lecturer at Oxford and beyond, whilst also having worked at Morgan Stanley, and now CEO at RSAC. Jen plots a journey from Oxford to Westpoint, from Colonel of the US's first Cyber Battalion to the Whitehouse, working under Condoleezza Rice and then chosen by President Biden to create CISA, The US's first cyber defense agency.In a whirlwind, world-wide tour, Jen plots the risks, defines the adversaries, reflects on intelligence, cooperation, and the real and present cyber risks to industries.She offers advice to boards, the existential risks for businesses who think this is just a “technology issue” and leaves us with a stark observation. If the cost of annual cybercrimes were aggregated into one number, it would be equivalent in GDP terms to being the third largest economy in the world! The Money Maze Podcast is kindly sponsored by Schroders, IFM Investors, World Gold Council and LSEG.Sign up to our Newsletter | Follow us on LinkedIn | Watch on YouTube 

Security Breach
Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks

Security Breach

Play Episode Listen Later Mar 5, 2026 36:38


Send a textAlthough discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can't be ignored. And they absolutely have to be discussed. One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They're embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. Thankfully, there are also guys like our guest for today's episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:The evolving hacktivist community and what recent events could mean for industrial cybersecurity.How manufacturers can prepare and respond to an inevitable uptick in attacks.How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.The motives and operational strategies of state-sponsored Iranian hacker groups.The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.The simple solutions that can have far-reaching and extremely positive impacts on your defenses.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Commercial Real Estate Podcast
Beyond Locks and Cameras: Cyber Risk in CRE with Lachlan MacQuarrie, Industry Fellow at Intelligent Buildings LLC.

Commercial Real Estate Podcast

Play Episode Listen Later Feb 25, 2026 24:34


Welcome to the CRE podcast. 100% Canadian, 100% commercial real estate. What if the global geopolitical churn is actually creating opportunities to realign your portfolio? In this episode of the Commercial Real Estate Podcast, powered by First National, hosts Aaron Cameron and Adam Powadiuk are joined by Lachlan MacQuarrie, Industry Fellow at Intelligent Building LLC,... The post Beyond Locks and Cameras: Cyber Risk in CRE with Lachlan MacQuarrie, Industry Fellow at Intelligent Buildings LLC. appeared first on Commercial Real Estate Podcast.

The Maritime Risk Podcast
Episode 48 - Cyber Security at Sea - Mini Series - Episode 1: Quiet Drift – The Invisible Cyber Risk at Sea

The Maritime Risk Podcast

Play Episode Listen Later Feb 25, 2026 30:25


Modern ships rarely fail in dramatic fashion. Instead, they drift. In this first episode of a special five-part Maritime Risk Podcast miniseries, Captain Thomas Brown is joined by Andrew Sallay, Co-Founder and CEO of Cequra, to explore how vessels can gradually accumulate hidden cyber and operational fragility without any single alarm bell sounding. From vendor remote access and GNSS interference to “workarounds” becoming standard practice, this episode reframes maritime cyber risk beyond Hollywood-style attacks. Instead, it examines the quiet erosion of resilience that occurs when digitization, connectivity, and operational pressure intersect. This conversation sets the foundation for the series, exploring: How ships drift into heightened risk environments Why experienced crews can unintentionally mask deeper fragility The danger of false redundancy and hidden system coupling How AI and geopolitical tensions are reshaping the maritime threat landscape This is Episode 1 of a planned five-part series with Andrew Sallay of Cequra, with further episodes rolling out over the coming months as we explore GNSS interference, operational stress events, AI-enabled risk, and practical resilience strategies for shipowners and operators.

Yachting Channel
Cyber Risk in Yachting: Protecting Superyachts from Digital Threats | The Crew Car

Yachting Channel

Play Episode Listen Later Feb 23, 2026 58:25


Cyber risk in yachting is no longer theoretical. Superyachts are increasingly exposed to digital threats, ransomware, email spoofing, onboard system vulnerabilities and targeted cyber attacks. Yet many vessels remain underprepared.In this episode of The Crew Car, Captain James Battey, Founder of Yacht Workers Council, sits down with Matthew Roberts of Anchorpoint to examine what cyber security really means inside the superyacht industry.As vessels become more connected through bridge systems, satellite communications, AV and IT infrastructure, crew devices and shore side management platforms, the operational attack surface expands. This conversation explores how cyber risk affects superyachts, crew, captains, owners and yacht management companies.Topics covered include: The most common cyber security vulnerabilities onboard superyachts Email spoofing and supplier payment fraud in yachting Human error as the primary cyber risk factor Why firewalls alone do not protect a yacht Password management failures across the industry Cyber insurance expectations and regulatory pressure Supply chain cyber risk in maritime operations How captains and management companies can improve digital resilience Cyber security is now an operational responsibility. As the superyacht sector evolves technologically, digital risk management must evolve alongside it.Learn more about Yacht Workers Council: https://www.yachtworkerscouncil.comPrefer to read? Head to Yachting News on the website. https://www.yachtinginternationalradio.com/yachting-newsPrefer to listen elsewhere? Search Yachting Channel on your favourite podcast platform.Featuring: Captain James Battey, Founder, Yacht Workers Council Matthew Roberts, Anchorpoint

Federal Drive with Tom Temin
The White House has scrapped the one‑size‑fits‑all SBOM mandate and told agency leaders to own their cyber risk, now flexibility meets accountability

Federal Drive with Tom Temin

Play Episode Listen Later Feb 20, 2026 11:34


OMB's new memo rescinds the Biden‑era requirements and shifts software and hardware security to an agency‑driven, risk‑based model. SBOMs and attestations move from “must” to “may.” That means CIOs and CISOs can tailor what they ask for from vendors, but they'll also carry the burden of proving those choices keep mission systems safe. We'll dig into what this change unlocks and where it could create blind spots with Jean‑Paul Bergeaux, Federal CTO at GuidePoint Security.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Trust Issues
EP25 - Identity is the attack vector w/ Udi Mokady

Trust Issues

Play Episode Listen Later Feb 18, 2026 55:07


CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition's close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.Udi discusses what the combined companies' scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk's long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.Note: This episode was recorded in January, prior to the acquisition's close.

No Password Required
No Password Required Podcast Episode 69 - Sue Serna

No Password Required

Play Episode Listen Later Feb 16, 2026 44:39


Sue Serna - Social Media Security and Governance Leader and Lover of All BeaglesNo Password Required Season 7: Episode 2 - Sue SernaSue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/ Chapters: 00:00 Introduction and First Impressions   02:45 The Evolving Role of Social Media in Corporations   04:58 Transitioning from Journalism to Social Media  11:11 Building Social Media from Scratch   13:00 Becoming a CEO and Founder   16:28 The Importance of Networking   16:54 Bridging the Gap Between Social Media and Cybersecurity  20:51 Real-World Social Media Security Incidents  28:35 Navigating Internal Conflicts in Social Media  30:32 The Lifestyle Polygraph Begins   31:17 Nerd Things That Expose Sue: Space and Harry Potter!  35:16 Sue's Love For Beagles  37:50 Wreckless Intern or Overconfident Executive?  40:42 Hogwarts and Magical Beagles 

Inside My Canoehead
Cyber Risk, Cash Crunch, Cancel Culture: The 3 Systems That Protect Your Side Hustle or Startup

Inside My Canoehead

Play Episode Listen Later Feb 11, 2026 31:43


Send a textIn today's unpredictable economy, plagued by cyber threats, supply chain disruptions, political shocks, reputational attacks, and regulatory surprises, most entrepreneurs operate without a real safety net. The result? One bad event can wipe out years of hard work.In this episode of Mastering Risk, Dr. Jeff Donaldson (PhD in Disaster & Emergency Management) reveals the three essential, mostly free systems every founder-led business (especially those under $1M in revenue) needs to implement immediately to mitigate downside risk and thrive amid chaos.You'll learn:Financial System: How to calculate your true runway, set up smart budgeting, map overhead + marketing spend, and secure a low-dependency line of credit so you can survive 3–6 months of zero revenue without panic.Data Security Program: The simple 3-2-1 backup rule (3 copies, 2 media types, 1 off-site/air-gapped), how to identify truly critical data, and why practicing recovery is more valuable than any expensive software.Content Production System: Build a repeatable, aggressive-patience machine to tell the world you exist, define your avatar, choose platforms where they live, leverage AI for scale (without replacing your voice), block time daily, and test for 6 months before pivoting.These aren't theoretical consultant decks, they're battle-tested, low-to-no-cost actions Dr. D uses in his own five-figure businesses and teaches to founder-led companies just like yours.Whether you're just starting, running a side hustle, or scaling a six-figure operation, these three systems create resilience against cyber, operational, strategic, and reputational threats. Visit Preparedness Labs: https://preparednesslabs.ca Subscribe + turn on notifications for weekly risk-mastery episodesDISCLOSURE Information shared here is for educational purposes only.  Individuals and business owners should evaluate their own business strategies, and identify any potential risks.  The information shared here is not a guarantee of success. Your results may vary.Copyright © 2026.Support the showhttps://preparednesslabs.ca/

Cyber Risk Management Podcast
EP 203: Cyber Risk Quantification

Cyber Risk Management Podcast

Play Episode Listen Later Feb 10, 2026 48:31


Can cyber risk actually be measured in dollars? How do you know if your risk data vendor is any good? And is cyber insurance really worth the investment? Let's find out with our guest Scott Stransky, who leads the Cyber Risk Intelligence Center at Marsh and was named 2023 Cyber Risk Industry Person of the Year. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.  LinkedIn profile -- https://www.linkedin.com/in/scott-stransky-92659095/ Top 12 Report -- https://www.marsh.com/en/services/cyber-risk/insights/cybersecurity-signals.html                          Marsh Cyber Risk Intelligence Center -- https://www.corporate.marsh.com/solutions/cyber-resilience/cyber-risk-intelligence-center.html  

partner marsh ciso cyber risk quantification l gates jake bernstein kip boyle cyber risk opportunities
The Gate 15 Podcast Channel
Weekly Security Sprint EP 145. Nihilistic behavior and how tech tools are changing physical and cyber risk

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 10, 2026 20:22


In this week's episode of the Security Sprint, Dave and Andy covered the following topics:Open:• TribalHub 6th Annual Cybersecurity Summit, 17–20 Feb 2026, Jacksonville, Florida• Congress reauthorizes private-public cybersecurity framework & Cybersecurity Information Sharing Act of 2015 Reauthorized Through September 2026• AMWA testifies at Senate EPW Committee hearing on cybersecurity Main Topics:Terrorism & Extremismo Killers without a cause: The rise in nihilistic violent extremism — The Washington Post, 08 Feb 2026 o Terrorists' Use of Emerging Technologies Poses Evolving Threat to International Peace, Stability, Acting UN Counter-Terrorism Chief Warns Security Council United Nations / Security Council, 04 Feb 2026 OpenClaw: The Helpful AI That Could Quietly Become Your Biggest Insider Threat – Jamf Threat Labs, 09 Feb 2026. Jamf profiles OpenClaw as an autonomous agent framework that can run on macOS and other platforms, chain actions across tools, maintain long term memory and act on high level goals by reading and writing files, calling APIs and interacting with messaging and email systems. The research warns that over privileged agents like this effectively become new insider layers once attackers capture tokens, gain access to control interfaces or introduce malicious skills, enabling data exfiltration, lateral movement and command execution that look like legitimate automation. The rise of Moltbook suggests viral AI prompts may be the next big security threat; We don't need self-replicating AI models to have problems, just self-replicating prompts.• From magic to malware: How OpenClaw's agent skills become an attack surface • Exposed Moltbook database reveals millions of API keys • The rise of Moltbook suggests viral AI prompts may be the next big security threat • OpenClaw & Moltbook: AI agents meet real-world attack campaigns • Malicious MoltBot skills used to push password-stealing malware • Moltbook reveals AI security readiness • Moltbook exposes user data via API • OpenClaw: Handing AI the keys to your digital life Quick Hits:• Active Tornado Season Expected in the US • CISA Directs Federal Agencies to Update Edge Devices – GovInfoSecurity, 05 Feb 2026 & read more from CISA: Binding Operational Directive 26-02: Mitigating Risk From End-of-Support Edge Devices – CISA, 05 Feb 2026. • A Technical and Ethical Post-Mortem of the Feb 2026 Harvard University ShinyHunters Data Breach • Hackers publish personal information stolen during Harvard, UPenn data breaches • Two Ivy League universities had donor information breaches. Will donors be notified?• Harassment & scare tactics: why victims should never pay ShinyHunters • Please Don't Feed the Scattered Lapsus$ & ShinyHunters • Mass data exfiltration campaigns lose their edge in Q4 2025 • Executive Targeting Reaches Record Levels as Threats Expand Beyond CEOs • Notepad++ supply-chain attack: what we know • Summary of SmarterTools Breach and SmarterMail CVEs • Infostealers without borders: macOS, Python stealers, and platform abuse

@BEERISAC: CPS/ICS Security Podcast Playlist
Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 9, 2026 45:59


Podcast: ICS Cyber Talks PodcastEpisode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO viewPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

RSA Conference
Cyber at the Top: Risk Quantification: Turning Cyber Risk into Business Language

RSA Conference

Play Episode Listen Later Feb 5, 2026 29:43


Bridging the gap between cybersecurity and business priorities starts with a common language that explains risk in terms business leaders can relate to. In this episode, Mathias Buecherl, Group CISO at Heidelberg Materials, joins Dr. Hugh Thompson to explore how data-driven measurement is reshaping how organizations communicate, prioritize, and invest in security. They discuss why standardized metrics matter, how to translate cyber threats into financial and business terms, and what it takes to gain executive buy-in. From overcoming resistance to applying financial rigor to building maturity over time, this conversation offers a roadmap for making cyber risk measurable and meaningful.

Security Breach
Security Breach: Strengthening Your Weakest Links

Security Breach

Play Episode Listen Later Feb 5, 2026 32:58


Send us a textWhen we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it's tough to avoid what I'd call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.And just as there are benefits to discussing these individual aspects, it's equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.Perhaps no one has helped tie all of these different players together better than our guest for this episode. Vinod D'Souza leads the manufacturing and industry vertical for Google Cloud's Office of the CISO. Watch/listen as we discuss:Emerging vulnerabilities and response plans.Segmentation challenges in the era of constant technological expansion.New-age approaches to patching.The connected fibers of artificial intelligence and the human factors of cybersecurity.Addressing IT and OT silos.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.

The Virtual CISO Moment
S8E5 - Order to Chaos: Cyber Risk and AI Governance with Scott Foote

The Virtual CISO Moment

Play Episode Listen Later Feb 3, 2026 33:19


In this episode of The Virtual CISO Moment, Greg Schaffer talks with cybersecurity veteran Scott Foote about what hasn't changed in cyber risk over the last 35 years—and why AI is amplifying those same mistakes at unprecedented speed. They discuss shadow AI, insecure defaults, “vibe coding,” privacy risks, and the growing need for practical AI governance. Drawing on decades of experience across industry and government, Scott shares why fundamentals still matter, how organizations can bring order to AI chaos, and what leaders need to understand before adopting AI at scale.A thoughtful, wide-ranging episode for CISOs, vCISOs, board advisors, and executives trying to understand where cyber risk ends and AI governance begins—and why fundamentals still matter more than ever.

The Cybertraps Podcast
INCH360 2025: Cyber Risk as a Business Imperative

The Cybertraps Podcast

Play Episode Listen Later Jan 22, 2026 43:06 Transcription Available


B2B Better
How to Talk Cyber Risk So People Actually Listen | Jeffrey Wheatman, Cybersecurity Strategist at Black Kite

B2B Better

Play Episode Listen Later Jan 21, 2026 21:13


What happens when cyber risk leaders stop speaking in acronyms and start telling stories? In this episode, host Jason Bradwell sits down with Jeffrey Wheatman, SVP of Cyber Risk Strategy at Black Kite and longtime cybersecurity evangelist, to talk about how to lead with problems, not products. From decades advising CISOs at Gartner to launching the panel show Third Party, Jeff shares what he's learned about building trust, breaking down "terminal uniqueness," and why vendors need to collaborate on educating the market instead of competing. If you care about cutting through noise in a saturated market, this conversation is packed with insights you can actually use. Jason and Jeff dive into why so many cybersecurity vendors fall into the trap of "terminal uniqueness" believing they're so different that they can't learn from anyone else. Jeff explains why this mindset kills effective marketing and how leading with the problem, not your product features, is the only way to break through. They explore why CISOs won't talk to sales teams (hint: it's not personal, it's about trust) and why the cybersecurity industry desperately needs more collaboration. Jeff makes a compelling case that we're at war with ransomware networks, yet vendors refuse to talk to each other about how to educate buyers. The conversation shifts to buyer awareness stages and where most marketing completely misses the mark. Jeff shares his framework for thinking about audiences beyond just problem-aware buyers, and why "hallway therapy" at conferences builds more trust than any keynote ever will. Jason asks Jeff how he'd spend $100K to build an audience (not a campaign), and Jeff's answer revolves around creating spaces for real conversation, which is exactly what led him to launch Third Party, a panel show tackling cybersecurity topics with both strategic and tactical depth. They wrap with Jeff's shoutouts to creators doing cyber content right and key takeaways for B2B marketers trying to build trust in technical markets. Whether you're a security vendor struggling to differentiate, a CISO trying to communicate risk to the board, or a B2B marketer in any technical space, Jeff's insights on problem-first storytelling and building genuine community will transform how you think about reaching your audience. This isn't about more content, it's about better conversations. Subscribe to catch every episode. Leave a review to help others discover the show. Share with security professionals or B2B marketers trying to break through technical noise. Follow B2B Better on LinkedIn for weekly insights. 00:00 - Introduction: Cutting through cyber noise 01:30 - Jeff's journey from Gartner to Black Kite 04:00 - Terminal uniqueness: the "we're different" trap 07:00 - Lead with problems, not product features 09:30 - Why CISOs avoid sales conversations 13:00 - We're at war: Why vendors need to collaborate 17:30 - Buyer awareness stages marketers miss 20:00 - Why competitors won't talk (and should) 24:00 - Hallway therapy beats keynotes 27:00 - The $100K audience-building question 30:00 - Launching Third Party panel show 35:00 - Strategic + tactical content together 38:00 - Cybersecurity creators doing it right 42:00 - Key takeaways for B2B marketers Connect with Jason Bradwell on LinkedIn Connect with Jeffrey Wheatman on LinkedIn Visit Black Kite podcast/resource hub Visit InfoSec World's official site Explore B2B Better website and the Pipe Dream podcast

No Password Required
No Password Required Podcast Episode 68 — Rob Hughes

No Password Required

Play Episode Listen Later Jan 20, 2026 44:51


Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7:  Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster

The Virtual CISO Moment
S8E3 - Cyber Risk, Business Reality, and Leadership with Tatiana Argueta

The Virtual CISO Moment

Play Episode Listen Later Jan 20, 2026 31:55


How do you explain security risk to executives who don't speak “security”? What really changes when you move between regulated industries like healthcare and energy? And why are communication skills just as critical as technical ones in cybersecurity?In this episode, Greg Schaffer speaks with Tatiana Argueta, Senior Security Engineer, about:*Operating security programs in regulated environments*Translating cyber risk into business impact*Why understanding your business is a core security skill*How Toastmasters helped shape her security leadership style*Emerging risks: AI, geopolitics, and misinformationThis is a practical, grounded conversation for CISOs, vCISOs, and security practitioners navigating real-world risk.#Cybersecurity #InformationSecurity #CISO #vCISO #RiskManagement #SecurityLeadership #GRC

The Gate 15 Podcast Channel
The Gate 15 Interview EP 66: Chris Camacho: Cyber Risk, Building Communities, Nirvana, and Peruvian Chicken

The Gate 15 Podcast Channel

Play Episode Listen Later Jan 19, 2026 39:24


In this episode of The Gate 15 Interview, Andy Jabbour speaks with Chris Camacho. Chris is Abstract Security's Co-Founder and Chief Operating Officer (COO). In this role, Chris is responsible for the go-to-market strategy, company vision, growth, collaboration, and client engagement. He is a leader, innovator and community builder. Before co-founding Abstract Security, Chris served as both Chief Strategy Officer and Chief Revenue Officer at Flashpoint and was responsible for helping grow the company to an acquisition by Audax PE and supporting three acquisitions to Flashpoint's portfolio, which helped the company be an industry market leader in the information security market. Before his time at vendors like Abstract Security and Flashpoint, Chris was the Senior Vice President of Information Security at Bank of America, where he oversaw the Threat Management Program. An entrepreneur, Chris also served as CEO for NinjaJobs, a career-matching community for elite cybersecurity talent. As he continues to build trust and relationships throughout the cybersecurity community, he's now building C2 Corner, a space for security leaders to share stories, connect through experience, and build what's next together. Chris on LinkedIn.In the podcast Chris and Andy discuss:Chris's background and the road from financial services to becoming a vendor.Chris shares some threat perspective from deepfakes to the complexities of geopolitics and polarization.Chris talks about managing ever-increasing amounts of data and how Abstract Security is helping organizations to reduce risk.We discuss the idea of AI SOCs helping to enhance security operations.The importance of community building: from trust groups and ISACs to C2 Corner to in-person meet-ups!Chris shares some career advice, andWe play 3 Questions! and talk Chris's favorite meats, reading books (and writing books?), and the glory of the 90s.Selected links:Abstract Security. “Security teams should stop adversaries—not manage security data. Abstract's streaming-first platform simplifies the entire security data pipeline, from ingestion to detection to storage. By eliminating noise and delays, we help your team move faster, stay focused, and outpace attackers in real time.”Introducing C2 Corner: By Practitioners, For the IndustryApplied Security Data Strategy: A Leader's Guide: a practical toolkit designed to help organizations of all sizes

AM Best Radio Podcast
Allianz's Wedin: D&O Claims Pressure Grows as Geopolitics, Cyberrisk, Insolvencies Intensify

AM Best Radio Podcast

Play Episode Listen Later Jan 14, 2026 10:17 Transcription Available


Eric Wedin, head of North America financial lines, Allianz Commercial, discusses findings from the company's latest D&O Insurance Insight Report, examining how geopolitical instability, cyber incidents, and other global factors are reshaping directors and officers liability exposures heading into 2026.

ITSPmagazine | Technology. Cybersecurity. Society
From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 13, 2026 6:37


In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ai Experience [in english]
IA and Cybersecurity: The Age of Permanent Breach

Ai Experience [in english]

Play Episode Listen Later Jan 11, 2026 45:03


Is AI making hackers and scammers faster than you can react?In this episode of AI Experience, Julien Redelsperger welcomes Craig Taylor, a Certified Information Systems Security Professional (CISSP) and a cybersecurity veteran with more than 30 years of experience. You'll hear how AI is lowering the barrier to cybercrime, enabling large-scale, highly personalized phishing, accelerating ransomware attacks, and making voice and video deepfakes credible enough to fool employees, executives, and even families. The conversation also explores why attackers now move faster than defenders, how agentic AI changes the anatomy of a breach, and why accumulated data has become a liability rather than an asset. A grounded discussion to help you understand what AI truly simplifies for hackers and scammers, what can no longer be fully secured, and which safeguards still make a real difference today.Hosted on Ausha. See ausha.co/privacy-policy for more information.

Moody’s Talks – The Big Picture
Outlooks 2026: How New Digital Systems Will Transform Credit Markets

Moody’s Talks – The Big Picture

Play Episode Listen Later Jan 8, 2026 21:44


New and emerging digital technologies are connecting previously siloed areas of finance. The convergence of traditional finance with digital assets, the rapid evolution of blockchain and AI, and the growing influence of cyber risks across sectors will create both challenges and opportunities.  In this episode, we speak with Moody's experts to understand the risks, innovations, and financing needs shaping global financial markets. Learn more at https://www.moodys.com/outlooks  Host: William Foster, Senior Vice President, Sovereign Risk, Moody's Ratings  Guests: Fabian Astic, Managing Director, Global Head of Digital Economy, Moody's Ratings; Lesley Ritter, Senior Vice President, Cyber Credit Risk, Moody's Ratings Related Research: Cyber Risk – Global -- 2026 Outlook - Cyber threats will intensify as AI tools proliferate 8 Jan 2026Digital Economy – Global – 2026 Outlook - Digital finance links diverse market segments, raising efficiency, risks 05 Jan 2026Digital Transformation – Global – Digitalization reshapes private credit, emerging markets, transition finance 01 Dec 2025Cyber Risk – Global - Weak artificial intelligence governance practices pose growing risk of data breaches 01 Oct 2025 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Grow Your Credit Union
The Five Dollar Fake CEO

Grow Your Credit Union

Play Episode Listen Later Jan 6, 2026 32:33


Read the shownotes and full transcript on our site: growyourcreditunion.com Deepfake technology has become so accessible that threat actors need only 10 to 30 seconds of audio and a $5 monthly subscription to convincingly impersonate executives, bypass authentication, and trick employees into catastrophic decisions. Credit unions face record ransomware attacks while most lack AI governance policies to address emerging threats. In this episode of Grow Your Credit Union, host Joshua Barclay welcomes sponsored guest Brian Hinze, President & CEO at NCU-ISAO, along with co-host Oto Ricardo, Director of Information Security and Cyber Risk at Advia Credit Union, to explore: Why ransomware attacks hit record levels despite preparedness efforts How credit unions approach AI governance policies What deepfake threats mean for credit union security How NCU-ISAO supports credit unions through community and collaboration   A huge thanks to our sponsor, NCU-ISAO Cybersecurity threats are evolving faster than ever, and credit unions are increasingly in the crosshairs. NCU-ISAO is the only organization fully dedicated to protecting credit unions through real-time threat intelligence, actionable alerts, expert-led analysis, and a community of security-minded professionals. Strengthen your defenses with collaboration. Learn more at NCUISAO.org/GYCU.

@BEERISAC: CPS/ICS Security Podcast Playlist
Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 26, 2025 53:02


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get RightPub date: 2025-12-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way. In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments. Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn't as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation. You'll learn: Why legacy systems aren't going away anytime soon The hidden risks of chasing AI without strong foundations How to balance security, usability, and business value Why process and governance matter more than tools How IT leaders can communicate cyber and AI value in business terms Where AI creates opportunity - and where it creates new attack paths Whether you're leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership. Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All. Key Moments:  00:00 "Legacy Tech in Modern Firms" 06:22 "Technology, Change, and Customer Focus" 09:51 "Challenges in Articulating Cybersecurity Value" 12:27 "Tech Solutions Must Drive Value" 15:43 Sell Ideas Beyond the Code 19:03 "Ransomware Risks in Acquisitions" 24:02 Government, Services, and Compliance Debate 25:35 Balancing AI, Cybersecurity, and Regulation 30:33 BlackBerry's Downfall: Ignored Innovation 32:06 "Evolution and Misuse of AI" 34:45 "Opportunity to Lead Change" 37:52 "AI Without Guidance Backfires" 41:07 "AI: Smart but Context-Lacking" 46:45 "AI Empowering Business Transformation" 50:30 "Effortless Tech-Fueled Imitation" About the guest :  Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value. How to connect Neil: https://www.linkedin.com/in/neildmorris/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

No Password Required
No Password Required Podcast Episode 67 — Gina Yacone

No Password Required

Play Episode Listen Later Dec 21, 2025 40:17


Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55  The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections

Legal 123s with ByrdAdatto
Does My Practice Need Cybersecurity Insurance? with Kaitlin Upchurch

Legal 123s with ByrdAdatto

Play Episode Listen Later Dec 17, 2025 29:53


Cybersecurity is essential for every practice that relies on technology. In this episode, guest Kaitlin Upchurch, Senior Vice President and Cyber & Tech Practice Leader at Lockton, addresses the cybersecurity questions practices are—and are not—thinking about. She explains why cybersecurity risks are often misunderstood, what makes health care a prime target, and why insurance alone is not enough. Tune in to understand your cyber exposure, the biggest threats facing practices today, and the first steps to strengthen your protection beyond buying a policy.  Chapters00:00 Intro00:47 Banter04:25 Guest background10:20 Tell us about Lockton.13:40 Do medical practices need cybersecurity?18:40 What are cybersecurity misconceptions?20:48 What are some cybersecurity threats?25:00 How can medical practices avoid cybersecurity issues?26:37 Access+27:16 Legal Takeaways28:45 OutroWatch full episodes of our podcast on our YouTube channel: https://www.youtube.com/@byrdadatto  Stay connected for the latest business and health care legal updates:WebsiteFacebookInstagramLinkedIn

Cybersecurity Where You Are
Episode 166: Foundations of Actuarial Science in Cyber Risk

Cybersecurity Where You Are

Play Episode Listen Later Dec 17, 2025 40:46


In Episode 166 of Cybersecurity Where You Are, Sean Atkinson sits down with Tyler Moore, Ph.D., Chair of Cyber Studies at the University of Tulsa, and Daniel Woods, Lecturer at the University of Edinburgh. Together, they review the foundations of actuarial science in cyber risk.Here are some highlights from our episode:00:48. Introductions to Tyler and Daniel01:22. How actuarial science fits into a traditional approach of risk modeling02:20. Why cyber risk has historically been difficult to quantify04:01. How data sources available to insurers and individual organizations have evolved07:21. Adaptability as a key principle to model risk for an evolving cyber threat landscape08:58. Loss distribution modeling for different types of cyber threats11:38. Similarities and differences between how actuaries and frameworks view risks13:10. Quantifying severity, frequency, and resilience to different cyber risks14:31. How insurers differ from underwriters in their view of risk17:43. Ransomware as a case study where actuarial modeling improved risk management22:30. The value of translating cyber risk to business risk for CISOs like Sean26:20. Why data on which security controls matter most remains elusive32:33. The biggest misconceptions of using actuarial models in cybersecurity36:09. How cyber actuarial science can help to determine what works in cybersecurityResourcesEpisode 121: The Economics of Cybersecurity Decision-MakingEpisode 105: Context in Cyber Risk QuantificationEpisode 77: Data's Value to Decision-Making in CybersecurityHow Risk Quantification Tests Your Reasonable Cyber DefenseEpisode 113: Cyber Risk Prioritization as Ransomware DefenseEpisode 65: Making Cyber Risk Analysis Practical with QRAFAIR: A Framework for Revolutionizing Your Risk AnalysisIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Trust Issues
EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

Trust Issues

Play Episode Listen Later Dec 16, 2025 43:50


In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.

DailyCyber The Truth About Cyber Security with Brandon Krieger
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Dec 14, 2025 53:48


Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world's first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.But with innovation comes new questions: does adding connectivity make a safe less secure?Do people still need safes in a world that uses less cash?And how do you build trust in a product designed to protect what matters most?This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk. 

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode 136 - Inside CTEM: The New Standard for Cyber Risk

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later Dec 12, 2025 32:22


On this episode, Silent Sector breaks down what cybersecurity really looks like beyond the buzzwords. We dive into CTEM and why continuous exposure management beats the outdated once-a-year pen test. You'll hear how adversarial simulation, social engineering, and threat modeling work together to reveal real-world risk—not just compliance checkboxes. If you've ever felt overloaded by industry acronyms or wondered how organizations can actually stay ahead of evolving threats, this conversation brings clarity, strategy, and straight-talk insights from the front lines of cyber defense.Pick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!

Defense in Depth
How Much Cyber Risk Should a CISO Own?

Defense in Depth

Play Episode Listen Later Dec 11, 2025 32:45


All links and images can be found on CISO Series. Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Erika Dean, former CSO, Robinhood. In this episode: Delegation requires accountability The reality of daily decision-making The gap between theory and practice Beyond the advisory role Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO

AM Best Radio Podcast
TransUnion's Foy: Customer Demands, Cyberrisk, Digital Engagement Drive 2026 Insurance Trends

AM Best Radio Podcast

Play Episode Listen Later Dec 2, 2025 14:01 Transcription Available


Patrick Foy, senior director, strategic planning, TransUnion's insurance business, discusses how evolving customer expectations and digital demands are reshaping commercial insurance heading into 2026.

Insuring Cyber Podcast - Insurance Journal TV
How CISA Data Is Shaping Smarter Cyber Risk Decisions

Insuring Cyber Podcast - Insurance Journal TV

Play Episode Listen Later Nov 26, 2025 1:57


CISA's threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek … Read More » The post How CISA Data Is Shaping Smarter Cyber Risk Decisions appeared first on Insurance Journal TV.

Beyond the B
5 Cyber Risks for B Corps, and How You Can Fix Them (w/ Steve Sharer & Garrett Miller)

Beyond the B

Play Episode Listen Later Nov 25, 2025 65:11


From politically motivated attacks to basic configuration errors, purpose-driven orgs are now on the front lines of cyber risk. In this episode, Steve Sharer and Garrett Miller walk through five areas where B Corps are more vulnerable than they realize — and the practical steps that strengthen each one. They explain why these gaps matter and how to close them with straightforward practices that don't overwhelm small teams.View the show notes: https://go.lifteconomy.com/blog/5-cyber-risks-for-b-corps-and-how-you-can-fix-them-w/-steve-sharer-garrett-millerUnlock your free B Corp Values Assessment—plus tips and insights to help your business grow. https://go.lifteconomy.com/b-corp-newsletter

Adventures of Alice & Bob
Ep. 92 – Births, Badges, and Breaches // Chris Neuwirth

Adventures of Alice & Bob

Play Episode Listen Later Nov 21, 2025 63:19


In this episode, James Maude sits down with Chris Neuwirth, VP of Cyber Risk at Networks Group, whose path into cybersecurity might be the most unconventional you'll ever hear—from delivering babies as a teenage EMT to penetration testing critical infrastructure today. Chris's journey includes serving as an LAPD officer at Venice Beach, responding to 9/11 at the Pentagon, managing IT during Hurricane Sandy, and running operations as assistant commissioner at New Jersey's Department of Health during COVID-19. Along the way, he's been hacking everything he could get his hands on—from war driving through Manhattan in the early 2000s to conducting sophisticated penetration tests at hospitals and airports today. Chris discusses the importance of organizations being prepared and shares the uncomfortable truth: sometimes the easiest way past your defenses is just showing up and plugging in.

North Fulton Business Radio
Quantifying Small Business Cyber Risk with CYBERISKIQ

North Fulton Business Radio

Play Episode Listen Later Nov 20, 2025


CYBERISKIQ from the CARE-Report: Quantifying Small Business Cyber Risk with Ralph Pasquariello and Craig Sekowski (North Fulton Business Radio, Episode 914) On this episode of North Fulton Business Radio, host John Ray welcomes cyber risk specialists Ralph Pasquariello and Craig Sekowski of the CARE-Report. Ralph and Craig explain why small and mid-sized businesses are far […]

Business RadioX ® Network
Quantifying Small Business Cyber Risk with CYBERISKIQ

Business RadioX ® Network

Play Episode Listen Later Nov 20, 2025


CYBERISKIQ from the CARE-Report: Quantifying Small Business Cyber Risk with Ralph Pasquariello and Craig Sekowski (North Fulton Business Radio, Episode 914) On this episode of North Fulton Business Radio, host John Ray welcomes cyber risk specialists Ralph Pasquariello and Craig Sekowski of the CARE-Report. Ralph and Craig explain why small and mid-sized businesses are far […]

Insuring Cyber Podcast - Insurance Journal TV
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt

Insuring Cyber Podcast - Insurance Journal TV

Play Episode Listen Later Nov 19, 2025 17:00


Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.

ITSPmagazine | Technology. Cybersecurity. Society
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

Packet Pushers - Full Podcast Feed
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You're (Probably) Doing It Wrong

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 28, 2025 36:15


To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »

Heavy Strategy
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You're (Probably) Doing It Wrong

Heavy Strategy

Play Episode Listen Later Oct 28, 2025 36:15


To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »