POPULARITY
"It's prime time for runtime!"In this episode of the mnemonic security podcast, we're joined by Sergej Epp, Global CISO & Member of the Executive Team of Sysdig, to discuss threats at machine speed and runtime security.Sergej explains how runtime security enables organisations to understand what is really happening inside containers and serverless workloads, and why, without it, they are effectively blind to critical activity within their cloud-native environments. He shares recent examples of supply chain incidents that highlight these risks, including the GitHub Actions compromise, NPM attacks, and the two waves of Shai-Hulud.Robby and Sergej also discuss the most common ways that attackers get access to clusters and containers, and how organisations can stay ahead of attacks using real-time telemetry.Send a text
Guest: Alex Shulman-Peleg, Global CISO at Kraken Topics: You mentioned that centralized security can't work anymore. Can you elaborate on the key changes—driven by cloud, SaaS, and AI—that have made this traditional model unsustainable for a modern organization? Why do some persist at centralized, top down approach to security, despite that? What do you mean by "Freedom, Responsibility and distributed security"? Can you explain the difference between "centralized security" and what you define as "security with distributed ownership"? Is this the same "federated"? In our conversation you mentioned "cloud and AI- native", what do you mean by this (especially "AI-native") and how is this changing your approach to security? You introduce the concept of "Security as quality" suggesting that a security-unaware developer is essentially a bad software developer. How do you shift the culture and internal metrics to make security an inherent quality standard, rather than a separate, compliance-driven checklist? You likened the central security team's new role to a "911 emergency service." Beyond incident response, what stays central no matter what, and how does the central team successfully influence the security posture of the entire organization without being directly responsible for the day-to-day work. Resources: Video version EP129 How CISO Cloud Dreams and Realities Collide EP258 Why Your Security Strategy Needs an Immune System, Not a Fortress with Royal Hansen EP212 Securing the Cloud at Scale: Modern Bank CISO on Metrics, Challenges, and SecOps
A CMO Confidential Interview with James Shira, Principal, Global and US CIO and Global CISO at PwC. James details how @PwC is running an "AI marketplace" within the company which features a number of models, his focus on scale, security, and user experience, and the case for approaching AI with a "humility" mindset. Key topics include: how the CISO (Chief Information Security Officer) balances rapid enablement and security needs; why CMO's should have a working knowledge of the technology roadmap; and tips for aligning with your CIO. Tune in to hear how to "go rogue" if you must and a story about socks. Sponsored by Scrunch AI: learn more here → https://www.scrunchai.com/cmoGlobal CIO & CISO James Shira joins Mike to decode what your CIO wishes you knew—AI adoption, security trade-offs, model “marketplaces,” and how CMOs should really partner with IT. Concrete guidance on prioritization, tech stack decisions, legacy constraints, and when “going rogue” is justified. Practical, senior-level playbook for winning with AI without lighting money—or trust—on fire. **Chapters**00:00 – Welcome & setup: “What your CIO wants to tell you, but won't” 01:15 – The AI era: pace, complexity, stakeholder pressure 03:24 – Humility first: why being late to AI isn't OK 04:09 – Designing for scale, security, and real user adoption at PwC 06:00 – Building a model “marketplace” (40+ models) & minimum bars 07:27 – Guardrails: encryption, data governance, and safe experimentation 09:32 – Adoption reality: super-users, skeptics, and moving the middle 11:00 – What “leading” looks like: C-suite prioritization & high-value use cases 13:00 – CISO shift: from gatekeeper to enabler; managing Kobayashi-Maru choices 16:59 – How marketers help: anticipate CIO/CISO problems, simplify choices 19:00 – MarTech the smart way: align to architecture, reduce sprawl, bring options 22:00 – No IT dance partner? Work with COO/CFO; standardize and choose fit over “sexy” 24:33 – Legacy estates: outsource vs. “AI-ify” retained work; show ROI math 26:29 – When to go rogue—and how not to get fired doing it 31:00 – Free advice to agencies: do the work, bring substance, not spam 32:00 – Closing & funniest story (Zurich board-meeting socks) CMO Confidential,Mike Linton,James Shira,PwC,CIO,CISO,AI,GenAI,AI adoption,AI governance,cybersecurity,enterprise IT,MarTech,marketing technology,tech stack,cloud strategy,data governance,model marketplace,digital transformation,change management,prioritization,COO,CFO,CapEx,legacy modernization,outsourcing,automation,meeting summaries,audit,experimentation,go rogue,executive leadership,marketing strategy,enterprise software,boardroom,CMO tipsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
How do you protect critical infrastructure that millions of people rely on every day? In this episode, Olga Forné, Global CISO at Abertis - who is a nominee for the CIONET Awards 2026 in the Cybersecurity category - sits down with Daniel Eycken to discuss her journey transforming cybersecurity from a fragmented, reactive function into a "nervous system" for global business resilience. Don't miss the panel where Olga and other CIONET Awards 2026 nominees will share more about their cybersecurity journeys
All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is Johann Balaguer, Global CISO, Hard Rock Hotels and Casinos. In this episode: Understanding the why Own your digital self Invest beyond tenure Prepare for dependencies Thanks to Louis Zhichao Zhang, AIA Australia for contributing this week's "What's Worse?!" scenario. Huge thanks to our sponsor, Guardsquare Guardsquare delivers mobile app security without compromise, providing advanced protections for both Android and iOS apps. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication. Learn more about how to protect your app at Guardsquare.com.
This discussion features Juan Cobo, the Global CISO of Ferrovial, and Pablo Vera from Zscaler as they examine the evolving landscape of corporate cybersecurity. They emphasize that risk management must be proactive, particularly as multinational companies face complex geopolitical threats and the rise of insider vulnerabilities caused by employee errors. A significant portion of the conversation focuses on Artificial Intelligence, identifying it as both a sophisticated tool for attackers and a vital defense mechanism for identifying behavioral anomalies. The experts advocate for a Zero Trust architecture to minimize attack surfaces and stress the necessity of industrializing recovery processes to ensure business resilience. Ultimately, they conclude that integrating security into the initial stages of digital transformation is essential for maintaining operational continuity in an increasingly volatile global environment. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Teresa Zielinski, Vice President and Global CISO at GE Vernova, to discuss social engineering and how it is evolving in light of artificial intelligence advancements. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com
Ariel Weintraub is the Global CISO at Aon. In this episode, she joins Brendan Galla, Chief Product Officer at Exiger, and host Scott Schober, to discuss the widespread impact of generative AI, its role in the software development lifecycle, and more. Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers through its software and tech-enabled solutions. To learn more about our sponsor, visit https://exiger.com.
Send us a textJoin us for an exciting episode of Digitaliseringspådden, starting with Mike Baker, Global CISO at DXC Technology and winner of the 2025 CapitalCISO ORBIE Awards Super Global Winner— a top honor recognizing leaders driving cybersecurity excellence in organizations with over $8.5 billion in revenue. With 23 years of experience in cyber leadership, risk management, and ethical hacking, Mike shares insights on how AI is used by hackers and as a defense tool. Mike Baker explains how a CISO in 2025 acts as a business enabler, driving innovation while setting guardrails for secure operations.Espen Olsen, Managing Director of DXC Norway, joins Mike, with a background in the Norwegian Air Force. He discusses Norway's specific risks as a NATO member, like drone threats impacting business and transport, and shares a story of a company ignoring security weaknesses due to high costs, highlighting the dangers of inaction in a world of advanced, state-backed cybercriminals.Hosted by Jens Christian Bang, this episode blends global expertise with a local lens, offering practical cybersecurity advice for both small and large businesses. Discover how to stay ahead of AI-driven attacks and learn how DXC helps organizations strengthen their cyber resilience. Whether you're a tech leader or just want to stay safe online, this episode, spotlighting Mike Baker's award-winning insights, is a must-listen for anyone navigating the intersection of AI and cybersecurity.Listen to the episode on Spotify (with video), Apple Podcasts, YouTube Podcasts, or wherever you enjoy your podcasts. Also, in celebration of Cybersecurity Awareness Month, we are also excited to share DXC's latest Cyber Trust ReportDigitaliseringspådden lages av Already On og CW.no. Besøk oss på digitaliseringspodden.alreadyon.com. Du finner Digitaliseringspådden på alle plattformer – lytt via Spotify, Apple Podcasts eller YouTube Podcasts.
David Carvalho, Founder, CEO, and Chief Scientist of Naoris Protocol. He is one of the most seasoned voices at the intersection of cybersecurity and blockchain. He is the founder of Naoris Protocol, the world's first decentralized security solution powered by a post-quantum blockchain and distributed AI, backed by Tim Draper and the Former Chief of Intelligence of NATO.With over 20 years of experience as a Global Chief Information Security Officer and ethical hacker, David has operated at both technical and C-suite levels in multi-billion-dollar organizations across Europe and the UK, including as CISO of London City Airport and Global CISO of OCS Group. He has advised nation-states and critical infrastructure under NATO on cyber-warfare, cyber-terrorism, and cyber-espionage.A blockchain pioneer since 2013, David has also contributed to innovations in PoS/PoW mining and next-gen cybersecurity. His work emphasizes risk mitigation, ethical wealth creation, and value-driven advancements in crypto, automation, and distributed AI.In this conversation, we discuss:- 2028 is when all financial institutions need to be post-quantum resilient - How can we quantum-proof our assets? - Highest risk sectors = healthcare, national security, electrical grids, telecom - The SEC's Post-Quantum Financial Infrastructure Framework - What percentage of your portfolio should be in quantum-safe investments? - Post-quantum crypto - The future of quantum computing - Next steps for Naoris - Naoris' growth - Decentralized cybersecurity mesh NaorisX: @NaorisProtocolWebsite: naorisprotocol.comLinkedIn: Naoris ProtocolDavid CarvalhoX: @katanationcyberLinkedIn: David Joao Vieira Carvalho---------------------------------------------------------------------------------This episode is brought to you by PrimeXBT.PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50
In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.
Sakshi Porwal is the Global CISO and Vice President at Compunnel. In this episode, she joins host Amanda Glassner to discuss how AI is impacting the CISO role and the treat landscape, the biggest opportunities and challenges for enterprises, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss incident response planning. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss security audits and how they can help organizations across the globe stay cyber safe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss threat intelligence. • For more on cybersecurity, visit us at https://cybersecurityventures.com
In this episode of The New CISO, host Steve Moore speaks with Aleksandar Radosavljevic, Global CISO at Global Fashion Group, about building trust, measuring resilience, and the evolving role of the security leader.Aleksandar shares how his unexpected pivot from electrical engineering to cybersecurity sparked a passion for protecting systems and solving problems. With over two decades of experience across pharma, manufacturing, and tech, he offers insights into how security leaders can establish trust, drive business value, and focus on what really matters.The conversation covers the art of starting strong in a new CISO role, navigating interviews with curiosity and care, and avoiding common traps like overcomplicating metrics or chasing the latest tools without mastering the basics.Key Topics Covered:Why pharma's mission-driven work made a lasting impact on AleksandarCareer advice for cybersecurity newcomers: follow learning, not just industryHow CISOs can build early trust by listening and understanding the businessRed flags and green lights during the CISO interview processWhy being challenged in an interview signals a healthy security cultureThe problem with vanity metrics—and what to track insteadAleksandar's favorite KPIs: time to detect, respond, and contain incidentsThe role of situational awareness in building cyber resilienceHow simplifying language helps CISOs align with executive teamsWhy mandate and mindset matter more than reporting linesAleksandar's story is a reminder that cybersecurity leadership is about more than tools and tactics—it's about trust, transparency, and transforming security from a blocker into a true business enabler.
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss application whitelisting. • For more on cybersecurity, visit us at https://cybersecurityventures.com
David Carvalho is the founder of Naoris Protocol. With more than 20 years of experience as an ethical hacker, he was an advisor to Nation States and Critical Infrastructures under NATO on cyber-war, cyber-espionage, and cyber-terrorism, and has been an advisor to multi-billion-dollar global enterprises like Nokia-Siemens, AT&T, and EA Games. (Interestingly enough, David created the first Distributed AI and Blockchain-based CyberSecurity Mesh solution and was also the former youngest Global CISO in the EU).In this conversation, we discuss:- Why cybersecurity needs a new foundation (not more tools)- The threat of Q-Day: why quantum risk is closer than we think- How to secure Web2 & Web3 without hard forks or protocol fragmentation- Quantum's Threat to Crypto- Building trust at the Sub-Zero Layer: securing the layer below all layers - Why Web3 inherited all of Web2's worst security flaws — and how to fix it - Transforming IoT, AI and cloud into trusted, self-defending systems - Why legacy cybersecurity is a dead end — and how incentives fix it - Designing the world's first Post-Quantum DePIN infrastructure- Becoming “security” in the blockchain trilemma Naoris ProtocolWebsite: naorisdr.comX: @NaorisProtocolDiscord: discord.gg/naorisprotocolDavid CarvalhoX: @katanationcyberLinkedIn: David Joao Vieira Carvalho--------------------------------------------------------------------------------- This episode is brought to you by PrimeXBT. PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50This promotion is available for a month after activation. Click the link below:PrimeXBT x CRYPTONEWS50
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Derek Hanson, VP Solutions Architecture and Alliances, Yubicohttps://www.linkedin.com/in/derekthansonJay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic Insurancehttps://www.linkedin.com/in/jayvindaLee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss data encryption and how the process can help organizations across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss protective DNS and how it can aid businesses in the fight against ransomware. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Jim Richberg, Head of Cyber Policy and Global Field CISO at Fortinet rejoins the show for a timely discussion on the fast-evolving landscape of artificial intelligence and we unpack AI's unprecedented energy demands, its implications on national infrastructure, and the critical cybersecurity considerations government agencies must navigate in this new era. Jim also shares his "Three Rules for Government Technology Transformation," and we explore why education and clear procurement strategies are vital to responsible AI rollout in public sector programs.
In this episode of the ShorelineHudson Maritime Risk Podcast, we explore how the maritime sector is confronting the growing challenge of cyber risk with data-driven clarity. Our guests include Rob Vasquez, CEO of Beacon Technologies, Rick Siebenaler, CEO of the Maritime Cybersecurity Institute and academic sponsor of this fully funded research initiative, and Sean Jensen, ShorelineHudson's cyber expert and program facilitator. Together, they discuss the Maritime Cybersecurity Institute's vessel cyber risk analysis program powered by CYFAX+ and how it is transforming the way shipowners, operators, and regulators visualize, assess, and act on vessel-level cyber threat intelligence. If you're ready to understand what it truly means to "see the threat," this is a conversation you won't want to miss. Speakers: Rob Vazquez – Beacon Technologies Rob Vazquez is the CEO of Beacon Technology Group and a pioneer in cybersecurity innovation with over 30 years of experience across global IT and data protection. He has led enterprise-scale deployments for multinational firms and is the inventor behind a patent-pending AI-based threat processing system. Rob's work at Beacon focuses on developing accessible cybersecurity solutions, including the CYFAX+ platform, which supports advanced threat visibility and regulatory compliance. Rick Siebenaler - Maritime Cybersecurity Institute Rick Siebenaler is the CEO of the Maritime Cybersecurity Institute, a nonprofit dedicated to advancing cyber resilience in the commercial maritime sector. With a distinguished background at the NSA, CyberGuard, EY, and Deloitte—holding titles such as Chief Scientist and Global CISO, Rick brings strategic depth to maritime cybersecurity. His leadership is driving the sector toward a more mature, integrated approach to cyber risk management. Sean Jensen - ShorelineHudson Sean Jensen is a cyber threat specialist at ShorelineHudson with a master's in Homeland Security and expertise in maritime risk assessment. He leads the development and deployment of the AVRA platform, delivering intelligence-driven cyber and physical vulnerability assessments for global port and vessel operations. Certified as a Facility Security Officer and Business Continuity Professional, Sean supports compliance and resilience strategies across the maritime domain.
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss the value of email filtering for organizations across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss how organizations can protect their remote access areas. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Rinki Sethi is a top global CISO, board member, and cybersecurity expert. In this episode, she joins host Amanda Glassner from the RSA Conference 2025 to discuss women in cybersecurity, how attendance at the event this year panned out, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss reasons why it is beneficial for organizations to limit employee access and permissions. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/thomlangford/Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartnershttps://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppehttps://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=chDeryck Mitchelson, Global CISO, Check Point Software Technologieshttps://www.linkedin.com/in/deryckmitchelson
In this episode, we sit with security leader and venture investor Sergej Epp to discuss the Cloud-native Security Landscape. Sergej currently serves as the Global CISO and Executive at Cloud Security leader Sysdig and is a Venture Partner at Picus Capital. We will dive into some insights from Sysdig's recent "2025 Cloud-native Security and Usage Report."Big shout out to our episode sponsor, Yubico!Passwords aren't enough. Cyber threats are evolving, and attackers bypass weak authentication every day. YubiKeys provides phishing-resistant security for individuals and businesses—fast, frictionless, and passwordless.Upgrade your security:https://yubico.comSergj and I dove into a lot of great topics related to Cloud-native Security, including:Some of the key trends in the latest Sysdig 2025 Cloud-native Security Report and trends that have stayed consistent YoY. Sergj points out that while attackers have stayed consistent, organizations have and continue to make improvements to their securitySergj elaborated on his current role as Sysdig's internal CISO and his prior role as a field CISO and the differences between the two roles in terms of how you interact with your organization, customers, and the community.We unpacked the need for automated Incident Response, touching on how modern cloud-native attacks can happen in as little as 10 minutes and how organizations can and do struggle without sufficient visibility and the ability to automate their incident response.The report points out that machine identities, or Non-Human Identities (NHI), are 7.5 times riskier than human identities and that there are 40,000 times more of them to manage. This is a massive problem and gap for the industry, and Sergj and I walked through why this is a challenge and its potential risks.Vulnerability prioritization continues to be crucial, with the latest Sysdig report showing that just 6% of vulnerabilities are “in-use”, or reachable. Still, container bloat has ballooned, quintupling in the last year alone. This presents real problems as organizations continue to expand their attack surface with expanded open-source usage but struggle to determine what vulnerabilities truly present risks and need to be addressed.We covered the challenges with compliance, as organizations wrestle with multiple disparate compliance frameworks, and how compliance can drive better security but also can have inverse impacts when written poorly or not keeping pace with technologies and threats.We rounded out the conversation with discussing AI/ML packages and the fact they have grown by 500% when it comes to usage, but organizations have decreased public exposure of AI/ML workloads by 38% since the year prior, showing some improvements are being made to safeguarding AI workloads from risks as well.
Greg Crowley is the CISO at eSentire. In this episode, he joins host Heather Engel and Dwayne Smith, Sr. VP Information Security and Global CISO at Vensure Employer Solutions, to discuss M&A integration, including how CISOs can ensure a secure process, tackling inherited vulnerabilities, and more. Next Level CISO is a Cybercrime Magazine podcast brought to you by eSentire, the Authority in Managed Detection and Response. eSentire's mission is to hunt, investigate and stop cyber threats before they become business disrupting events. To learn more about our sponsor, visit https://esentire.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss strong passwords, multi-factor authentication, and how they are essential to protection strategies for organizations across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss regular backups and how they are essential to protection strategies for organizations across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss software updates and how they are essential to protection strategies for organizations across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Who really owns patient data? Can digital identity reshape healthcare security, privacy, and fraud prevention? We sit down with Dan Bowden, Global CISO at Marsh, to tackle these questions. Dan brings a wealth of experience in healthcare cybersecurity, previously serving as CISO at Sentara Healthcare. We dive deep into digital identity, data sovereignty, and the evolving role of AI in protecting patient privacy. Tune in as we discuss: Potential for errors in traditional healthcare ID systems How digital IDs could fight fraud & streamline claims Impact of AI on patient data privacy & security The path to patient data ownership Find Dan's work at: www.marsh.com Subscribe and stay at the forefront of the digital healthcare revolution. Watch the full video on YouTube @TheDigitalHealthcareExperience The Digital Healthcare Experience is a hub to connect healthcare leaders and tech enthusiasts. Powered by Taylor Healthcare, this podcast is your gateway to the latest trends and breakthroughs in digital health. Learn more at taylor.com/digital-healthcare About Us: Taylor Healthcare empowers healthcare organizations to thrive in the digital world. Our technology streamlines critical workflows such as procedural & surgical informed consent with patented mobile signature capture, ransomware downtime mitigation, contactless patient check-in and more. Learn more at taylor.com/healthcare/imedhealth The Digital Healthcare Experience Podcast: Powered by Taylor Healthcare Produced by Naomi Schwimmer Hosted by Chris Civitarese Edited by Eli Banks Music by Nicholas Bach
Adam Keown is the Global CISO at Eastman and a former special agent with the FBI. In this episode, he joins host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, to discuss illegally distributed games, his perspective as a former FBI agent, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Adam Keown is the Global CISO at Eastman. In this episode, he joins host Heather Engel to discuss the evolving ransomware landscape, including some of the latest threats, such as AI-enabled ransomware, and how CISOs across organizations can safeguard their business operations and ensure continuity. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Scott Schober and Adam Keown, Global CISO at Eastman, to discuss the human factor in cybersecurity. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com
Breaking Into Cybersecurity Leadership with Phani Dasari In this episode of Breaking into Cybersecurity, join host Christophe as he interviews Phani Dasari, the Global CISO at Hinduja Global Solutions (HGS). Phani shares his remarkable journey into cybersecurity, from his early days in the United States during the 2008 recession, to his pivotal roles at EMC, RSA, ADP, TikTok, and HGS. He delves into valuable insights on navigating and succeeding in the cybersecurity industry, emphasizing the importance of personal branding, continuous learning, and people management skills. This episode offers actionable advice for aspiring and current cybersecurity professionals on developing a broad skill set, pursuing career advancements, and effectively leading teams in a dynamic and challenging field. Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way. The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders. Check out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUI Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles https://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/ Hacker Inc.: Mindset For Your Career https://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/ _________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/book Christophe Foulon focuses on helping to secure people and processes, using a solid understanding of the technology involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing the use of technology while balancing the implications for people, processes, and information security through a consultative approach. https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://www.cpf-coaching.com - Website: https://www.cyberhubpodcast.com/breakingintocybersecurity - Podcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuri - YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity - Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/ - Twitter: https://twitter.com/BreakintoCyber - Twitch: https://www.twitch.tv/breakingintocybersecurity
This week Nicole interviews Devon Bryan, Global CISO of Carnival Corporation. They talk all things cybersecurity careers, the inspiration to start Cyversity, managing the cybersecurity of floating cities, and redefining ROI. To learn more about Cyversity and their programs, visit their website or LinkedIn page.
Teresa Zielinski, CISSP, is the Global CISO at GE Vernova. In this episode, she joins Oz Alashe, founder and CEO at CybSafe, and host Paul John Spaulding to discuss security awareness training and human risk management, including where large organizations are in the shift, how the risk landscape has evolved, and more. BEHAVE: A Human Risk Podcast is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com
Podcast: PrOTect It All (LS 24 · TOP 10% what is this?)Episode: Navigating Cybersecurity Challenges: AI, Tabletop Exercises, and Operational TechnologyPub date: 2024-11-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow is joined by Clint Bodungen, Director of Cybersecurity Innovation at Morgan Franklin Cyber and founder of Threatgen, alongside Michael Welch, Managing Director at Morgan Franklin Cyber. Together, they delve into the ever-evolving world of cybersecurity in honor of Cybersecurity Awareness Month. Aaron kicks things off by discussing the importance of iterative processes and tabletop exercises in enhancing decision-making and preparedness. The conversation then shifts to the exciting yet complex role of AI in cybersecurity, particularly in operational technology (OT) and critical infrastructure. The experts emphasize the potential of generative AI for data analysis while underscoring the need for human oversight to avoid biases and misinformation. Clint introduces an “engineering informed cyber” approach to better integrate OT and IT in managing cybersecurity risks, while Aaron stresses the importance of collaboration between cybersecurity professionals and engineers. The episode also tackles balancing convenience and security, the intricacies of password management, and the critical role of communication and trust. Listeners will gain valuable insights into AI's role in enhancing security operations, the consequences of system failures, and the debate between compliance and true security. This episode offers expert opinions, real-world examples, and practical advice for navigating today's cybersecurity challenges. Join us for a comprehensive discussion on protecting our digital world. Key Moments: 04:20 Generative AI aids efficient GRC and cybersecurity management. 08:40 AI lacks context for verifying asset information. 11:38 Generative AI creating and automating malware tools. 15:58 Building data centers using decommissioned power plants. 17:14 Regulation growing in infrastructure for compliance security. 22:09 Compliance is binary; partial compliance isn't sufficient. 24:33 Prioritize "engineering informed cyber" for OT resilience. 28:14 Collaboration between IT and OT is essential. 33:54 Frustration with excessive video game security measures. 34:49 Cybersecurity fails due to over-engineering complexity. 40:49 Make security easy with password managers, authenticators. 42:31 AI improves tabletop exercises for comprehensive insights. 45:31 Generative AI augments human capabilities and creativity. 48:08 Automated injects streamline engagement and business continuity. 53:46 Executives misunderstand risk, leading to false security. 54:29 Strong IT security, but vulnerable weak points. About the Guests : Clint Bodungen: Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 30 years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the founder of ThreatGEN and Director of Cybersecurity Innovation at Morgan Franklin Consulting. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training; he created ThreatGEN® Red vs. Blue, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolutionize IR tabletop exercises. As AI technology continues evolving, so does his pursuit of helping revolutionize the cybersecurity industry using gamification generative AI. Connect Clint at - https://www.linkedin.com/in/clintb/ Michael Welch : Michael Welch has over twenty-five years of expertise in Governance, Risk Management, Compliance and Cybersecurity. In his role as Sector Lead, Michael will focus on the importance of cybersecurity in Utilities and Industrial Manufacturing. Michael understands that robust cybersecurity measures are not just a regulatory requirement but are pivotal in safeguarding the resilience of organizations, safety of its people, and overall economic stability. Michael has worked for organizations such as NextEra and Duke Energy as well as engineering firm Burns & McDonnell. In addition, he was the Global CISO for the food manufacturing firm OSI Industries.Some of the certifications he has obtained through his career are Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA), Global Industrial Cyber Security Professional (GICSP), Certified Data Privacy Solutions Engineer (CDPSE) and CMMC - Registered Practitioner Advanced (RPA). Connect Michael Welch at : https://www.linkedin.com/in/michael-welch-93375a4/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.coThe podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The Haunted House of API'sToday, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API's, sponsored by our friends at Traceable AI. In this series, we are building awareness around API's, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.Phantom Threats: The Ghosts Haunting Your API SecurityToday's episode is titled Phantom Threats: The Ghosts Haunting Your API Security, with Adam Arellano. API security threats often go unnoticed, hiding like ghosts in your infrastructure. Bots, sophisticated fraud attempts, account takeovers and attackers disguising themselves within legit traffic… these all pose risk to your organization, and can bypass traditional security measures, wreaking havoc without detection – until it's too late. Adam is a tech advisor, Global CISO at Traceable, and will guide listeners through the world of phantom threats haunting API security.What are "phantom threats" in the context of API security, and how do they go undetected?Can you explain how advanced botnets and fraud attempts exploit APIs while blending into legitimate traffic?Do you have a real-world example of a phantom threat that caused significant damage to an organization?What makes detecting these phantom threats so challenging, and why do traditional security measures often fail?What are the best strategies or technologies organizations can adopt to detect and eliminate these hidden threats before they cause harm?SponsorsTraceableLinkshttps://www.traceable.ai/https://www.linkedin.com/in/adamrossarellano/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Everyone, from top leadership to the frontline, has a role in safeguarding against cyber threats. In this episode, Peter Naumovski, the Global CISO and VP of IT Risk Management at AbbVie, and Teresa Tonthat, Vice President and Associate Chief Information Officer at Texas Children's Hospital, emphasize the critical role of maintaining good cyber hygiene. Peter explains how simple measures like enabling multi-factor authentication, effective vulnerability management, and promptly addressing identified risks can prevent many potential breaches. Teresa discusses the persistent cyber threats targeting the healthcare industry and shares insights into Texas Children's robust risk evaluation process and their inspiring mission to expand healthcare access. Throughout this eye-opening conversation, both guests highlight the necessity of cultivating a proactive security culture. Stay tuned for a deep dive into the strategies and mindsets that keep these leaders ahead in cybersecurity! Note: What is discussed by Peter Naumovski are his personal views and not the views of AbbVie. Resources: Connect and follow Teresa Tonthat on LinkedIn. Learn more about Texas Children's Hospital on their LinkedIn and website. Connect and follow Peter Naumovski on LinkedIn. Learn more about AbbVie on their LinkedIn and website. Explore insights, emerging threats, and their potential impact in Deloitte's Annual CyberThreat Trends Report Here.
Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K's Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test. Hard Drive Heaven: How Iconic Music Sessions Are Disappearing. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Fundamentals (AZ-900) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Reference: What is public cloud? (RedHat) Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Remembering 9/11 In today's episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity. Additionally, you can check out our special segment featuring personal remembrances from N2K CyberWire's very own Rick Howard, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights. Special Edition Podcast In today's special edition of Solution Spotlight, we welcome Mary Haigh, Global CISO of BAE Systems, as she sits down with N2K's Simone Petrella. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. Selected Reading Microsoft Fixes Four Actively Exploited Zero-Days (Infosecurity Magazine) Adobe releases september 2024 patches for flaws in multiple products, including critical (Beyond Machines) Chrome 128 Update Resolves High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA (SecurityWeek) Ivanti fixes maximum severity RCE bug in Endpoint Management software (Bleeping Computer) Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library (SecurityWeek) Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials (Federal Trade Commission) Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details (Bitdefender) Inside Iron Mountain: It's Time to Talk About Hard Drives (Mixonline) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach top security leaders. Explore our network sponsorship opportunities and build your brand where industry leaders get their daily news. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this Solution Spotlight, guest Dr. Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cadet Blizzard is part of Russia's elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux's Pluggable Authentication Modules. Google's kCTF team has discloses a critical security vulnerability affecting the Linux kernel's netfilter component. Predator spyware has resurfaced. US health care firm Confidant Health exposes 5.3 terabytes of sensitive health information. Dealing with the National Public Data breach. On our Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, speaks with N2K's Simone Petrella about moving beyond the technical to build an effective cybersecurity team. An AI music streaming scheme strikes a sour note. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Solution Spotlight segment, Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team. Selected Reading Russia's Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team (WIRED) Apache Makes Another Attempt at Patching Exploited RCE in OFBiz (SecurityWeek) SonicWall Access Control Vulnerability Exploited in the Wild (GB Hackers) Linux Pluggable Authentication Modules Abused to Create Backdoors (Cyber Security News) PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access (Cyber Security News) Predator spyware resurfaces with signs of activity, Recorded Future says (CyberScoop) Therapy Sessions Exposed by Mental Health Care Firm's Unsecured Database (WIRED) Frustration Trying to Opt-Out After the National Public Data Breach (Security Boulevard) Musician charged with $10M streaming royalties fraud using AI and bots (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Heather Engel to discuss marketing and sales tactics that vendors should avoid, as highlighted by Adam Keown, Global CISO at Eastman. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com
Adam Keown is Global CISO at Eastman, a Fortune 500 company based in Kingsport, Tennessee. In this episode, he joins host Steve Morgan to discuss some of the largest recent cyberattacks and data breaches. This episode is brought to you by our partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cybersecurity and enterprise software companies. To learn more, visit: https://evolutionequity.com/
Today Nicole Eagan, Chief Strategy and AI Officer and Michael Beck, Global CISO of Darktrace AI Research centre share experience, predictions and guidance on the future of AI and Cybersecurity.Topics Include:A brief history of DarktraceApplying AI to the challenge of cyber securityChanges and evolution of cyber security threatsWhat are the key security challenges business are facing?Generative AI provided a seismic shift with threat actorsBest practices for managing and scaling security teamsGuidance for leaders for baking AI into workflowsResponsible AI best practices for building trustTrends of Generative AI on the security landscapeLeveraging Generative AI to transform the customer experiencePredictions for emerging technology trends over the next 10 yearsRecommendations and parting wisdom for security and AIKeeping a workforce trained and relevant for technology trendsInterview wrap upParticipants:Nicole Eagan – Chief Strategy Officer and AI Officer, DarktraceMichael Beck – Global CISO, DarktracePhil Le-Brun – Director, Enterprise Strategy, Amazon Web Services
Where in the world are Adam and Cristian? In this episode, they're coming to you live from São Paulo, Brazil, where they sat down with a special guest: Fernando Madureira. Fernando is the Global CISO of Cosan, a Brazilian conglomerate of several businesses spanning energy, transportation and logistics, and other sectors that operates around the world. Given Cosan's size and the nature of its business, Fernando has a broad range of threats at top of mind. Operational technology (OT) security is a key concern because adversaries seek access to OT devices and traffic, and it requires a different mindset and technology than a modern IT environment. Social engineering is another, as adversaries attempt to disguise themselves as employees to manipulate customers and partners. Tune in to hear a conversation that explores OT security, modern phishing scams and how the Global CISO of a major company is taking steps to protect it.