CISO Podcast

CISO Podcast
Cloud Security
about 12 hours ago

Cloud Threat Deep Dive: Learning Resilience from Real-World Breaches

Explore the latest cloud security landscape by analyzing recent real-world breach cases from the CSA Top Threats Deep Dive. We dive into the technical details, business impacts, and contributing factors like misconfigurations, inadequate identity management, and supply chain weaknesses. Gain crucial

Breaches
Resilience
Security Strategies
Cloud Vulnerabilities
Proactive Defense
Read More
CISO Podcast
Supply Chain Security
1 day ago

The Weakest Link: Navigating the Perilous Digital Supply Chain

In today's interconnected world, supply chains are increasingly vulnerable to sophisticated cyberattacks. This episode explores the primary threats impacting these vital networks, from exploiting trust relationships with third-party vendors to the dangers of malware and compromised software. We'll d

Cybersecurity
Third-Party Risk
Vendor Management
Risk Mitigation
Digital Supply Chain
Read More
CISO Podcast
Compliance
3 days ago

Bridging the Gap: Translating Cyber Risk for the Boardroom

Welcome to "Bridging the Gap: Translating Cyber Risk for the Boardroom." In today's complex digital landscape, Chief Information Security Officers (CISOs) face the crucial challenge of communicating intricate technical risks in a way that resonates with executive leaders and board members. This podc

Cyber Risk
Boardroom Communication
Cybersecurity Strategy
Executive Engagement
Risk Management
Read More
CISO Podcast
Leadership in Cybersecurity
4 days ago

The Resilient CISO: Navigating Stress and Sustaining Security Leadership

The role of the Chief Information Security Officer (CISO) is more critical and demanding than ever, placing leaders in a persistent high-stress environment. This podcast delves into the unique pressures faced by CISOs and cybersecurity professionals, including the immense responsibility and potentia

CISO
Stress Management
Cybersecurity Leadership
Resilience
Team Support
Read More
CISO Podcast
Critical Infrastructure Security
5 days ago

Converging Worlds: Securing IoT, OT, and Critical Infrastructure

The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vuln

IoT Security
Operational Technology
Cybersecurity
Risk Management
Critical Infrastructure
Read More
CISO Podcast
Network Security
5 days ago

Zero Trust for Critical Infrastructure: Securing the OT/ICS Backbone

Delve into the essential and intricate application of Zero Trust (ZT) principles within Operational Technology (OT) and Industrial Control Systems (ICS) environments. This episode explores the unique challenges of securing critical infrastructure, where safety, reliability, and availability are prim

Zero Trust
Operational Technology
Industrial Control Systems
Cybersecurity
Critical Infrastructure
Read More
CISO Podcast
Compliance
6 days ago

Cyber Resilience Through Bundling: The Regulatory Challenge

Explore the emerging practice of bundling cyber insurance with security products and services, a strategy aimed at enhancing cyber resilience by incentivizing policyholders to adopt proactive security measures from the outset. This episode delves into the potential benefits, such as encouraging bett

Cyber Resilience
Regulatory Challenges
Compliance
Cybersecurity Bundles
Security Frameworks
Read More
CISO Podcast
Threat Intelligence
7 days ago

Beyond the URL: Decoding Domain Intelligence Threats in 2024

In the ever-evolving digital landscape, security teams face the immense challenge of evaluating over a hundred million newly observed domains registered each year. This episode dives into how analytical methods are providing crucial insights into domain intelligence threats. We explore techniques li

Domain Threats
Cybersecurity
Threat Intelligence
Malicious Domains
2024 Cyber Threats
Read More
CISO Podcast
Privacy
8 days ago

US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork

Explore the complex and rapidly evolving landscape of US state data privacy laws, drawing on insights from recent legislative developments across states like California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Tennessee, and Texa

privacy laws
consumer rights
compliance
state regulations
data protection
Read More
CISO Podcast
Cybersecurity
9 days ago

Beyond Encryption: Ransomware's New Game & Top Exploits of 2024

Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major

ransomware
data theft
exploits
cybersecurity threats
security measures
Read More
CISO Podcast
Cyber Threats
10 days ago

The Accelerating Threat Landscape: Inside Modern Cybercrime

Delve into the complex and rapidly transforming world of cyber threats. This episode examines notorious ransomware groups like Black Basta, LockBit, BlackCat/ALPHV, Phobos/8Base, Medusa, and Clop, exploring their Ransomware-as-a-Service (RaaS) models and distinctive tactics, techniques, and procedur

cybercrime
threat landscape
security measures
risk mitigation
cybersecurity education
Read More
CISO Podcast
Cybersecurity
11 days ago

Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge

In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the gr

Cyber Breaches
AI Security
Financial Impact
Data Protection
Vulnerabilities
Read More
CISO Podcast
Threat Intelligence
11 days ago

The Accelerating Adversary: Inside the 2025 Threat Landscape

Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the

cybersecurity
threat landscape
AI attacks
advanced persistent threats
proactive defense
Read More
CISO Podcast
Cyber Threat Intelligence
13 days ago

2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape

This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain co

cyber attacks
threat landscape
cybersecurity strategies
threat intelligence
predictive security
Read More
CISO Podcast
Vulnerability Management
13 days ago

Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI

In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significan

AI Security
Vulnerability Assessment
Continuous Monitoring
Risk Management
Cyber Threats
Read More
CISO Podcast
Workforce Development
14 days ago

Building Cyber Warriors: The Evolving Cyber Professional

In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confident

Cybersecurity Training
Skill Gap
Professional Development
Workforce Demand
Cyber Threats
Read More
CISO Podcast
Cybersecurity Economics
15 days ago

The Iceberg Impact: Unpacking the Hidden Costs of Cyber Attacks

Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational

Cyber Attacks
Hidden Costs
Reputation Management
Business Continuity
Cybersecurity Investment
Read More
CISO Podcast
Cybersecurity Frameworks
16 days ago

The MAESTRO Framework: Layering Up Against MAS Security Threats

Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP

MAESTRO Framework
cyber threats
security strategy
malware
ransomware
Read More
CISO Podcast
Threat Hunting
17 days ago

Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting

In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ult

Behavioral Analysis
Cybersecurity Strategy
Threat Detection
Anomaly Detection
Proactive Security
Read More
CISO Podcast
AI Security
18 days ago

Beyond the Prompt: Navigating the Threats to AI Agents

AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and data

AI agents
adversarial attacks
data poisoning
cybersecurity
machine learning
Read More
CISO Podcast
Geopolitical Space Security
20 days ago

Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)

Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming

geopolitics
space exploration
international cooperation
militarization
satellite security
Read More
CISO Podcast
Compliance
20 days ago

The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)

This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), o

Cybersecurity Budgeting
CIS IG1
Cyber Hygiene
Risk Management
Security Practices
Read More
CISO Podcast
Cyber Threats
22 days ago

GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape

Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, t

zero-days
cybersecurity
espionage
enterprise security
vulnerabilities
Read More
CISO Podcast
Third-Party Risk Management
23 days ago

Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor

Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which

Data Breach
Cybersecurity
Human Factor
Vendor Management
Risk Assessment
Read More
CISO Podcast
Cybersecurity
24 days ago

The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape

Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the su

EU Cybersecurity
Cyber Threats
AI in Security
Data Privacy
Regulations
Read More
CISO Podcast
Incident Response
25 days ago

Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management

Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management a

NIST
Cyber Risk Management
Incident Response
Cybersecurity Framework
Compliance
Read More
CISO Podcast
Cyber Resilience
26 days ago

Beyond the Blueprint: Learning Cyber Resilience Together

Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosy

collaboration
cybersecurity
learning
resilience
threat management
Read More
CISO Podcast
Privacy
27 days ago

EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World

Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 St

GDPR
Data Protection
EDPB
Digital Privacy
EU Regulations
Read More
CISO Podcast
Cybercrime
27 days ago

The 2024 IC3 Report: Unpacking Record Cybercrime Losses

Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for

cybercrime
ransomware
phishing
cybersecurity awareness
IC3 Report
Read More
CISO Podcast
IoT Security
29 days ago

The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats

Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on r

AI
IoT
cybersecurity
threats
innovation
Read More
CISO Podcast
Threat Landscape
30 days ago

2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning

The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engin

Ransomware
AI Threats
Cybersecurity Regulations
Cybercrime
2025 Trends
Read More
CISO Podcast
Privacy
about 1 month ago

Navigating Privacy Risks with the NIST Privacy Framework 1.1

This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enab

NIST
Privacy Framework
Risk Management
Compliance
Data Protection
Read More
CISO Podcast
Offensive Security
about 1 month ago

Beyond the Firewall: The Offensive Cybersecurity Edge

Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses

Offensive Cybersecurity
Red Teaming
Vulnerability Assessment
Ethical Hacking
Cyber Threats
Read More
CISO Podcast
Compliance
about 1 month ago

AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm

Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child se

Artificial Intelligence
Ethics
Legal Accountability
Risk Management
Regulation
Read More
CISO Podcast
Cryptography
about 1 month ago

Quantum Leap Security: Navigating the Post-Quantum Cryptography Era

We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by qu

Post-Quantum Cryptography
Quantum Computing
Cybersecurity
Data Protection
Encryption Standards
Read More
CISO Podcast
Privacy
about 1 month ago

The AI and Influence Front - (dis/mis)Information

Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analys

AI
Disinformation
Misinformation
Information Integrity
Technology
Read More
CISO Podcast
Network Security
about 1 month ago

Smart City Cyber Shield

This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded atta

smart cities
cybersecurity
IoT
urban infrastructure
data protection
Read More
CISO Podcast
Cybersecurity
about 1 month ago

AI vs. the Expanding Attack Surface: Proactive Defense Strategies

Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibil

AI
Cyber Threats
Proactive Defense
Attack Surface
Threat Detection
Read More
CISO Podcast
Privacy
about 1 month ago

Deep Dive into Deepfakes: Unmasking the AI Illusion

Welcome to Deep Dive, where we tackle complex topics head-on. In this episode, we delve into the fascinating and increasingly concerning world of deepfakes: AI-generated audio and visual content designed to deceive. We'll explore the technology behind deepfakes, from face-swapping to voice cloning t

deepfakes
misinformation
AI technology
detection methods
cybersecurity
Read More
CISO Podcast
Privacy
about 1 month ago

Scam Savvy: Navigating the Digital Deception

In a world increasingly shaped by digital interactions and artificial intelligence, online scams are becoming more sophisticated and pervasive. Scam Savvy delves into the tactics employed by fraudsters, from exploiting emotions in charity and romance scams to leveraging AI for deepfakes and personal

online scams
cybersecurity awareness
personal information safety
fraud prevention
digital deception
Read More
CISO Podcast
Compliance
about 1 month ago

Coordinated Cyber Defense: Inside Vulnerability Disclosure Programs (VDP)

This podcast dives into the critical world of vulnerability disclosure programs (VDPs), exploring how organizations and security researchers work together to identify and address security weaknesses. We'll examine the core principles that underpin effective VDPs, including establishing clear reporti

Vulnerability Disclosure
Cybersecurity
White-hat Hackers
Risk Management
Security Flaws
Read More
CISO Podcast
Privacy
about 1 month ago

State Privacy Unpacked

Navigating the complex landscape of U.S. state data privacy laws can be challenging. Join us as we break down the key aspects of these regulations, including consumer rights, business obligations, data breach notification requirements, and enforcement trends. We'll explore the nuances of laws like t

privacy laws
data protection
compliance
state regulations
consumer rights
Read More
CISO Podcast
Cybersecurity
about 1 month ago

Crypto Payments: Secure or Exposed?

Explore the exciting future of cryptocurrency payments through the lens of cybersecurity and privacy. We delve into the potential benefits and significant risks, offering insights into best practices and the crucial role of regulation in this evolving landscape. www.myprivacy.blog/navigating-the-cry

cryptocurrency
security risks
encryption
hacking
fraud
Read More
CISO Podcast
Privacy
about 1 month ago

Secure Digital Retail: Navigating Privacy and Compliance

This podcast delves into the critical aspects of data privacy laws like GDPR and the Connecticut Data Privacy Law, alongside the essential Payment Card Industry Data Security Standard (PCI DSS) compliance for e-commerce success. We explore how retailers can craft clear privacy policies, manage user

Data Protection
Compliance
Digital Retail
GDPR
Cybersecurity
Read More
CISO Podcast
Cyber Threats
about 1 month ago

AI's Cyber Shadow: Unpacking the Emerging Threat

Dive deep into the rapidly evolving landscape of AI-powered cyberattacks with insights from cutting-edge research, including the framework for evaluating AI cyber capabilities developed by Google DeepMind. Explore how AI is shifting the balance between offense and defense in cybersecurity, potential

Artificial Intelligence
Cybersecurity
Cyber Threats
Phishing
Risk Management
Read More
CISO Podcast
Network Security
about 1 month ago

Never Trust, Always Verify: Exploring Zero Trust Architecture

Delve into the principles and practical applications of Zero Trust Architecture (ZTA), a modern cybersecurity paradigm that moves away from traditional perimeter-based security by embracing the core tenet of "never trust, always verify". Learn about the key components, tenets, and benefits of ZTA, a

Zero Trust
Cybersecurity
Access Control
Identity Management
Continuous Monitoring
Read More
CISO Podcast
Cybersecurity
about 2 months ago

Decoding Digital Finance: Navigating Cyber Threats with Innovative Solutions

Explore the critical cybersecurity challenges facing the financial services industry today, from the increased risk of data breaches and sophisticated cyber attacks to emerging threats like quantum computing and client-side vulnerabilities. Drawing insights from the cutting-edge solutions featured i

Digital Finance
Cyber Threats
Innovative Solutions
AI
Blockchain
Read More
CISO Podcast
Compliance
about 2 months ago

HIPAA Security Hub: Protecting Your Digital Health Information

Navigating the complex world of healthcare cybersecurity. Join us as we delve into the HIPAA Security Rule, its purpose in safeguarding electronic Protected Health Information (ePHI), and the latest updates addressing evolving threats like AI and quantum computing. We'll break down compliance requir

HIPAA
health information security
digital health
data protection
risk assessment
Read More
CISO Podcast
Security Operations
about 2 months ago

SOC Insights: Navigating the Cyber Security Operations Center

Join us for SOC Insights, the podcast dedicated to demystifying the world of the Security Operations Center. We delve into the core functions of a SOC including collection, detection, triage, investigation, and incident response. Explore essential SOC tools like SIEMs, Threat Intelligence Platforms,

SOC
cybersecurity
threat detection
incident response
monitoring
Read More
CISO Podcast
Digital Forensics
about 2 months ago

Digital Forensics Evolved: Navigating New Tech Threats

Explore the dynamic landscape of digital forensics in the face of rapidly evolving technologies. We delve into the impact of trends like IoT, 5G networks, AI-driven attacks, advanced file systems (APFS, NTFS), cloud integration, and sophisticated anti-forensic techniques across Mac OS, network infra

Cybercrime
Digital Evidence
Encryption
Forensic Analysis
Emerging Technologies
Read More
CISO Podcast
AI Security
about 2 months ago

AI Unlocked: The Prompt Hacking Threat Landscape

Delve into the critical security vulnerabilities of Artificial Intelligence, exploring the dangerous world of prompt injection, leaking, and jailbreaking as highlighted in SANS' Critical AI Security Controls and real-world adversarial misuse of generative AI like Gemini by government-backed actors.

prompt hacking
AI vulnerabilities
cybersecurity
ethical AI
threat landscape
Read More
CISO Podcast
Cybersecurity Strategy
about 2 months ago

AI in Cyber and Strategy: Threats, Defenses, and Geopolitical Shifts

This podcast explores the multifaceted impact of artificial intelligence on the landscape of cybersecurity and military strategy. We delve into how AI is being leveraged for advanced cyber defense, including identifying vulnerabilities and accelerating incident response. while also examining the eme

AI
Cyber Threats
Geopolitical Security
Defense Strategies
Cyber Warfare
Read More
CISO Podcast
AI Security
about 2 months ago

Navigating the AI Frontier: Risk Management for GPAI and Foundation Models

Join us as we delve into the critical realm of risk management for General-Purpose AI (GPAI) and foundation models. Drawing insights from the UC Berkeley Center for Long-Term Cybersecurity's profile, we explore the unique risks associated with these increasingly multi-purpose AI systems, from their

AI Governance
Risk Management
Foundation Models
Ethical AI
Security Vulnerabilities
Read More
CISO Podcast
Compliance
about 2 months ago

SOC 2 for SaaS: Building Trust and Compliance

Navigate the world of SOC 2 compliance specifically for SaaS companies. We break down the Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy) explain the difference between Type I and Type II audits, and offer best practices for achieving and maintain

SOC 2
SaaS
data security
compliance
trust
Read More
CISO Podcast
Collaboration Tools
about 2 months ago

The Cybernetic Teammate: AI's Revolution in Teamwork

Explore how artificial intelligence is transforming the core of organizational collaboration. We delve into the groundbreaking research from "The Cybernetic Teammate" study, revealing how AI-powered tools are impacting team performance, breaking down expertise silos, and even influencing social enga

AI
Teamwork
Productivity
Automation
Collaboration
Read More
CISO Podcast
Cybersecurity
about 2 months ago

Global Threats Unveiled: Decoding the 2025 Intelligence Assessment

This podcast dives deep into the 2025 Annual Threat Assessment by the U.S. Intelligence Community, analyzing the most serious threats to U.S. national security posed by major state actors like China and Russia, non-state transnational criminals and terrorists such as ISIS, and the growing trend of a

Cyber Warfare
Intelligence Assessment
Global Threats
Biological Security
Geopolitical Tensions
Read More
CISO Podcast
Network Security
about 2 months ago

Caught in the Trap: Honeypot Cyber Attack Insights

This podcast dives into the shocking findings of a live honeypot experiment that recorded over 570,000 cyber attacks in just seven days. We explore the attack trends, including brute-force attempts, stolen credentials, automated bots, and known vulnerabilities, offering valuable insights for SOC ana

honeypots
cyber threats
defensive strategies
cybersecurity intelligence
attacker behavior
Read More
CISO Podcast
AI and Emerging Technologies
about 2 months ago

Germany AI Trends 2025: Navigating the Global Race

Delve into the critical artificial intelligence trends shaping 2025, as highlighted in the statworx AI Trends Report. This podcast explores the rapid advancements in AI, the ongoing global competition for AI supremacy, the impact of European regulations like the AI Act, and the potential bursting of

AI
Germany
Innovation
Data Privacy
Ethical AI
Read More
CISO Podcast
Compliance
about 2 months ago

Global AI Crossroads (India & Africa): Innovation, Regulation, and Trust

Explore the dynamic world of artificial intelligence through a global lens, examining key trends identified in India and Africa. We delve into the balance between AI innovation and regulatory frameworks. Discover how AI is being applied for public sector transformation in India, addressing accessibi

AI Regulation
Innovation
Trust
India
Africa
Read More
CISO Podcast
Cybercrime
about 2 months ago

INCD Cybercrime Unpacked: 2024's Evolution and 2025 Predictions

Delve into the key cybercrime trends observed in 2024 by Israel National Crime Directorate (INCD), from the pervasive use of infostealers and the rise of encryption-less ransomware to the emerging threats involving AI and decentralized technologies. We analyze how cybercriminals are adapting their t

cyber threats
ransomware
cybersecurity strategies
emerging technologies
cyber resilience
Read More
CISO Podcast
Cybercrime
about 2 months ago

Europe Under Threat: Inside the Evolving World of Organised Crime

This podcast delves into the findings of the European Union Serious and Organised Crime Threat Assessment (EU-SOCTA) 2025, exploring the changing DNA of serious and organised crime in Europe as it becomes increasingly nurtured online and accelerated by AI and other new technologies. We examine the d

organized crime
cybercrime
EU security
law enforcement
technology
Read More
CISO Podcast
Threat Detection
2 months ago

Red Canary: Detecting the 2025 Threats

This podcast delves into the findings of Red Canary's 2025 Threat Detection Report, dissecting the major cybersecurity trends observed in 2024. We explore the surge in ransomware, increasingly sophisticated initial access techniques like "paste and run," the dramatic rise of identity attacks targeti

Cybersecurity
Threat Intelligence
Advanced Persistent Threats
Incident Response
Red Canary
Read More
CISO Podcast
Data Security
2 months ago

Unpacking Data Security Risk: Navigating the Gaps and Misalignment

Are you struggling to understand and manage your organization's data security risks? Based on the latest insights, we delve into the key challenges hindering effective data protection, including gaps in risk understanding, the critical misalignment between management and staff on security strategies

data protection
risk management
compliance
cybersecurity strategy
vulnerability assessment
Read More
CISO Podcast
Access Management
2 months ago

Secrets Unsprawled: Navigating the Hidden Risks of Exposed Credentials

Dive into the alarming world of secrets sprawl, exploring the growing number of exposed API keys, passwords, and other sensitive credentials across development environments, collaboration tools, and cloud platforms. Based on the latest data analysis from GitGuardian's "The State of Secrets Sprawl 20

exposed credentials
cybersecurity
authentication
data breaches
access control
Read More
CISO Podcast
Compliance
2 months ago

Decoding CMMC: Navigating Levels 1, 2, and 3

This podcast breaks down the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) framework. We delve into the fundamental differences between Level 1's basic safeguarding requirements, Level 2's alignment with NIST SP 800-171 Rev 2, and Level 3's enhanced se

CMMC
Cybersecurity
Defense Contractors
Compliance Standards
DoD
Read More
CISO Podcast
Privacy
2 months ago

Smart City Under Siege: Navigating Privacy and Cyber Threats

This podcast delves into the growing privacy vulnerabilities and cybersecurity risks inherent in the deeply interconnected systems of modern smart cities. We explore the challenges of data protection, the expanding attack surface created by IoT devices, and the governance and regulatory gaps that ca

smart cities
cybersecurity
privacy threats
data protection
urban infrastructure
Read More
CISO Podcast
National Security
2 months ago

Lithuania's 2025 Security Under Threat

This podcast delves into the findings of Lithuania's "National Threat Assessment 2025," dissecting the primary external state actors posing the most significant risks to its national security. We examine the multifaceted threats emanating from an increasingly aggressive Russia, Belarus with its grow

Lithuania
Cybersecurity
Geopolitics
Defense Strategy
International Relations
Read More
CISO Podcast
Cybersecurity
2 months ago

Converged Infrastructure: Bridging the Cyber-Physical Security Gap

In an era where cyber and physical threats increasingly intersect, critical infrastructure faces unprecedented risks. This podcast delves into the crucial need for security convergence, exploring how organizations can break down security silos between IT, physical security, and operational technolog

Converged Infrastructure
Cyber-Physical Security
Integrated Security
Organizational Strategy
Cyber Threats
Read More
CISO Podcast
Network Security
2 months ago

Check Point Edge Wars: 2024's Battle for Network Perimeters

In this episode, we delve into the alarming rise of edge device exploitation in 2024 from the Check Point Threat Intel report, where cybercriminals and nation-states alike targeted routers, firewalls, and VPN appliances to gain initial access, establish ORBs for covert operations, and leverage a sur

network perimeter
cyber threats
threat detection
AI in security
multi-layered defense
Read More
CISO Podcast
Cybersecurity
2 months ago

Autonomy Under Attack: Decoding CAV Cybersecurity

Navigate the complex landscape of Connected Autonomous Vehicle (CAV) cybersecurity. We delve into the critical vulnerabilities in intra- and inter-vehicle communication, explore potential attack motivations ranging from operational disruption to data theft and physical control, and discuss the signi

CAV
Cyber Threats
Autonomous Vehicles
Security Measures
Data Protection
Read More
CISO Podcast
Incident Response
2 months ago

Cyber Incident Response Maturity: Assessing Your Readiness

This podcast delves into the crucial aspects of cyber security incident response maturity. We explore how organizations can assess and improve their capabilities using tools like the detailed assessment based on 15 steps. We discuss key concepts such as criticality assessments, threat analysis, and

cyber incident response
security breaches
risk management
preparedness
best practices
Read More
CISO Podcast
Compliance
2 months ago

Navigating NIST CSF 2.0: Your Guide to Cybersecurity Resilience

Join us as we explore the NIST Cybersecurity Framework (CSF) 2.0, the essential guide for organizations looking to manage and reduce cybersecurity risks. We delve into the six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover, examining the key changes and updates from previous

NIST CSF
Cybersecurity Resilience
Risk Management
Framework Implementation
Incident Response
Read More
CISO Podcast
Cloud Security
2 months ago

AI-Powered Cybersecurity: Simplifying Policies and Automating Tasks with CISO Marketplace

Discover how CISO Marketplace's latest innovations, GeneratePolicy.com and CyberAgent.Exchange, are transforming cybersecurity for startups and SMBs. Learn how AI-driven policy generation simplifies compliance and documentation, and how AI-powered agents automate critical security roles, enhancing e

AI
Cybersecurity
Automation
Security Policies
CISO Marketplace
Read More
CISO Podcast
Compliance
2 months ago

AI Risks & Regulations: Navigating the New Landscape

This podcast delves into the complex world of Artificial Intelligence, exploring the cybersecurity risks associated with its adoption and the evolving regulatory landscape, particularly focusing on the EU AI Act. We break down the key aspects of the AI Act, including definitions of AI systems and ge

AI Risks
Regulations
Privacy
Security
Ethical Considerations
Read More
CISO Podcast
Cybersecurity
2 months ago

Cyber Frontier: Navigating Threats and AI in the Digital Age

This podcast explores the evolving cybersecurity landscape, drawing insights from the Microsoft Digital Defense Report 2024 and the ENISA Threat Landscape. We delve into the tactics of nation-state actors and cybercriminals, the growing impact of AI on both attacks and defenses, and strategies for b

Cyber Threats
Artificial Intelligence
Security Measures
Risk Assessment
Digital Defense
Read More
CISO Podcast
Network Security
2 months ago

AI Red Team: The Cyber Frontier

Explore the cutting-edge intersection of artificial intelligence and red team operations in cybersecurity. We delve into how AI is revolutionizing traditional cyber offense and defense methodologies, enhancing adaptability, fostering innovation, and pushing the boundaries of cyber operations in an e

AI
Red Team
Cyber Threats
Threat Detection
Machine Learning
Read More
CISO Podcast
Cyber Threat Intelligence
3 months ago

Arctic Wolf 2025: Navigating the Cyber Threat Landscape

Based on the Arctic Wolf 2025 Threat Report, this podcast explores the key cybersecurity threats that organizations will face in the coming year. We delve into the prevalence of ransomware and data extortion, the ongoing challenges of business email compromise, and the persistent risks posed by intr

cyber threats
threat intelligence
cybersecurity strategy
real-time monitoring
risk management
Read More
CISO Podcast
Cyber Threat Intelligence
3 months ago

2024 Cyber Underworld: Recorded Future Unpacking Malicious Infrastructure

This episode dives into the key findings of Recorded Future's 2024 Malicious Infrastructure Report, revealing the dominant malware families like LummaC2 and AsyncRAT, the continued reign of Cobalt Strike, and the evolving tactics of threat actors, including the abuse of legitimate internet services

cybercriminals
threat intelligence
cybersecurity
malicious infrastructure
2024 trends
Read More
CISO Podcast
Malware Security
3 months ago

ThreatDown's 2025 Malware State: Autonomous AI and the Rise of Dark Horse Ransomware

Delve into the key findings of ThreatDown's 2025 State of Malware report, exploring the anticipated impact of agentic AI on cybercrime and the evolving ransomware landscape, including the emergence of smaller, more agile "dark horse" groups. We'll discuss how cybercriminals are leveraging AI to scal

ransomware
autonomous AI
malware trends
cybersecurity
threat landscape
Read More
CISO Podcast
Network Security
3 months ago

Greynoise Legacy Exploits & Zero-Days: Mass Internet Attacks in 2024

Dive into the key findings of the Greynoise 2025 Mass Internet Exploitation Report. We dissect how attackers are reviving old vulnerabilities, the impact of home router exploits, and the speed at which new vulnerabilities are weaponized. Discover actionable defense strategies for staying ahead of ma

legacy exploits
zero-day vulnerabilities
cybersecurity
mass internet attacks
software updates
Read More
CISO Podcast
Industrial Control Systems Security
3 months ago

OT/ICS Cybersecurity: Defending Against Evolving Threats

A deep dive into the latest trends, threat actors, and defense strategies in Operational Technology and Industrial Control Systems cybersecurity. We discuss how geopolitical tensions, ransomware, and hacktivist activities are shaping the threat landscape, and provide actionable insights to improve y

cybersecurity
operational technology
industrial control systems
threat defense
critical infrastructure
Read More
CISO Podcast
Cyber Threat Intelligence
3 months ago

Enterprising Adversaries: Staying Ahead of Evolving Cyber Threats

Explore the evolving landscape of cyber threats with insights from the CrowdStrike 2025 Global Threat Report. We delve into the tactics, techniques, and procedures of modern adversaries, from social engineering and AI-driven attacks to cloud exploitation and vulnerability exploits. Learn how to proa

Cybersecurity
Threat Intelligence
Ransomware
APTs
Supply Chain Security
Read More
CISO Podcast
Cyber Threat Intelligence
3 months ago

CERT-EU Unveiling the 2024 Cyber Threat Landscape: Key Trends and Targeted Sectors

This episode dissects the cyber threat landscape of 2024, drawing insights from a comprehensive analysis of malicious activities targeting Union entities and their vicinity. We explore the major trends, including the rise of cyber espionage and prepositioning the exploitation of zero-day vulnerabili

ransomware
supply chain security
state-sponsored attacks
cybersecurity trends
CERT-EU
Read More
CISO Podcast
Ransomware
3 months ago

Black Basta: Inside the Ransomware Gang

Explore the inner workings of the Black Basta ransomware group through leaked chat logs and technical analysis. Discover their tactics, techniques, and procedures (TTPs), from initial access and lateral movement to data exfiltration and encryption. Learn how the group exploited vulnerabilities, mana

Ransomware
Cybercrime
Threat Actor
Cybersecurity
Black Basta
Read More
CISO Podcast
Compliance
3 months ago

Navigating Vietnam's Data Law: Key Compliance for Businesses

This podcast episode explores Vietnam's new Law on Data, effective July 1, 2025, and its implications for businesses. We'll break down the law's key aspects, including scope of application, digital data definitions, data ownership rights, regulations on cross-border data transfers (especially for "i

Vietnam
data law
personal data protection
business compliance
cybersecurity
Read More
CISO Podcast
Compliance
3 months ago

PDPA Data Breaches: Navigating Malaysia's Compliance Landscape

Understand the critical data breach notification requirements under Malaysia's Personal Data Protection Act (PDPA) 2010. Learn how to identify "significant harm" and when you must notify the Personal Data Protection Commissioner and affected data subjects. Stay informed about potential penalties for

PDPA
Data Breaches
Malaysia
Compliance
Data Protection
Read More
CISO Podcast
Cyber Threat Intelligence
3 months ago

AI Threat Disruption: Staying Ahead of Malicious Actors

This podcast explores how AI companies are uniquely positioned to disrupt malicious uses of AI models. We delve into real-world case studies, such as surveillance operations, deceptive employment schemes, and influence campaigns, to understand how these threats are identified and neutralized. Join u

AI Security
Cyber Threats
Cyber Defense
Machine Learning
Advanced Persistent Threats
Read More
CISO Podcast
Military Technology
3 months ago

The Algorithmic Battlefield: AI, Ethics, and the New Arms Race

Venture into the murky world where Silicon Valley's ethical lines blur as AI giants like Google and OpenAI chase lucrative military contracts. Explore how once-sacred principles are being abandoned in favor of algorithms that now dictate life-and-death decisions on the battlefield. Uncover the impli

AI
Ethics
Autonomous Weapons
Military Technology
Global Arms Race
Read More
CISO Podcast
Cyber Espionage
3 months ago

Encrypted Frontlines: Cyber Espionage, Messaging App Vulnerabilities, and Global Security

This episode examines the rising threats to encrypted communications and the geopolitical implications of cyber espionage. We analyze how Russian threat actors exploit vulnerabilities in messaging apps like Signal and how platforms like Telegram have become hubs for cybercrime. Also examined is the

Cybersecurity
Encryption
Messaging Apps
Vulnerabilities
Global Security
Read More
CISO Podcast
Privacy
3 months ago

Privacy Matters: Navigating the Social Media Maze in 2025

From understanding end-to-end encryption (E2EE) on WhatsApp to mastering privacy settings on Snapchat and managing ad preferences on X (Twitter), MyPrivacy.blog equips you with the knowledge to navigate the social media landscape with confidence. Learn about the nuances of private versus public acco

privacy concerns
social media
data protection
user education
transparency
Read More
CISO Podcast
AI Security
3 months ago

AI Unveiled: DeepSeek R1 Red Team & the Future of LLM Security

Explore the cybersecurity and privacy challenges posed by Large Language Models (LLMs) through the lens of DeepSeek R1 red teaming. Dive into the vulnerabilities uncovered in DeepSeek R1, from harmful content generation to insecure code and biased outputs. Learn about practical strategies and framew

LLM security
AI vulnerability
adversarial attacks
DeepSeek R1
cybersecurity
Read More
CISO Podcast
Cybersecurity
3 months ago

Geopolitical Tech Storm: Navigating Cybersecurity, AI, and Global Power

The intersection of technology and geopolitics is creating unprecedented challenges in cybersecurity and AI governance. Global powers are competing in AI and semiconductor technologies, leading to rising tensions and potential risks. Experts at the Munich Security Conference 2025 emphasized the urge

Cyber Warfare
Artificial Intelligence
Geopolitics
National Security
Ethical Technology
Read More
CISO Podcast
Cybersecurity
3 months ago

Cybersecurity in Africa: Threats, Trends, and Tech

This podcast explores the diverse cybersecurity challenges facing the African continent, from state-sponsored attacks to cybercriminal networks. It examines the development and implementation of legal and regulatory frameworks, as well as regional cooperation efforts to combat cyber threats. The pod

Africa
Cyber Threats
Digital Transformation
Cyber Resilience
Technology Innovations
Read More
CISO Podcast
Cybercrime Awareness
3 months ago

Decoding Cybercrime: Platforms, Psychology, and Precautions

Cybercrime is a growing threat affecting all sectors, fueling a shadow economy with projected costs reaching $10.5 trillion by 2025. This episode explores the cybercrime ecosystem, from dark web platforms and cybercriminal psychology to specific attack techniques like social engineering and ransomwa

Cybersecurity
Cybercrime
Psychology
Precautions
Awareness
Read More
CISO Podcast
Digital Transformation
3 months ago

Decoding Digital Spain 2025: Strategies for a Connected Future

Decoding Digital Spain 2025" explores Spain's ambitious plan for digital transformation, focusing on key initiatives in connectivity, 5G, cybersecurity, and AI. The podcast examines how Spain aims to bridge digital divides, enhance public services, and boost its economy through strategic investments

Digital Strategy
Connectivity
Innovation
Infrastructure
Spain 2025
Read More
CISO Podcast
Cyber Espionage
3 months ago

China's Cyber Campaigns: Salt & Volt Typhoon and Beyond

Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure. Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures. Learn about recommen

China
Cybersecurity
Cyber Campaigns
State-sponsored Hacking
International Security
Read More
CISO Podcast
Cyber Warfare
3 months ago

State-Sponsored Cybercrime: When Nations Turn to Hackers

Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states colla

state-sponsored
cybercrime
national security
espionage
cyber warfare
Read More
CISO Podcast
Privacy
3 months ago

Navigating Singapore's PDPA: Protecting Personal Data in the Digital Age

The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access

PDPA
data protection
personal data
compliance
Singapore
Read More
CISO Podcast
Cybersecurity Strategy
3 months ago

Securing Canada's Digital Future: The National Cyber Security Strategy 2025

Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats. This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors. Discover h

Canada
Cyber Resilience
Critical Infrastructure
Public Awareness
National Strategy
Read More
CISO Podcast
Malware Analysis
3 months ago

Phobos Ransomware: A Deep Dive into Tactics, Techniques, and Mitigation

The Phobos ransomware, operating under a Ransomware-as-a-Service (RaaS) model since 2019, targets various sectors, demanding millions in ransom. This episode explores Phobos's tactics, such as exploiting vulnerable RDP ports, phishing campaigns, and open-source tools like Smokeloader, to infiltrate

Ransomware
Cybersecurity
Phobos
Threat Mitigation
Backup Recovery
Read More
CISO Podcast
Governance
3 months ago

AI Smart Cities: Promises, Perils, and the Power of Governance

Dive into the transformative world of AI in urban environments, exploring both the exciting potential and the significant risks. From UN reports and cybersecurity concerns to real-world case studies, we uncover how AI is reshaping our cities. Join us as we discuss key questions about ethics, governa

AI
Smart Cities
Data Privacy
Governance
Urban Technology
Read More
CISO Podcast
Compliance
3 months ago

Decoding DORA: Navigating Digital Resilience in Finance

The Digital Operational Resilience Act (DORA) is a European regulation designed to ensure the financial sector can withstand, respond to, and recover from ICT-related disruptions. This episode breaks down the key pillars of DORA, including ICT risk management, incident reporting, digital resilience

DORA
digital resilience
financial institutions
cybersecurity
operational risk management
Read More
CISO Podcast
Compliance
3 months ago

CISO's 20/20 Vision: Key Performance Indicators for Cybersecurity Success

Are you ready to get a 360° view of your organization’s cybersecurity posture? In this episode, we dive into the 20 Key Performance Indicators (KPIs) that CISOs use to measure and enhance their security programs. Learn how to track risk reduction, incident detection, patch compliance, and more to ma

KPIs
Cybersecurity
CISO
Performance Metrics
Risk Management
Read More
CISO Podcast
Compliance
3 months ago

Decoding NIS2: What It Means for Your Organization

The NIS2 Directive is here, and it's changing the cybersecurity landscape for EU businesses. This episode breaks down the complex requirements of NIS2, explaining who it affects and what steps organizations must take to comply. We'll explore key changes, risk management measures, incident reporting,

NIS2
cybersecurity
EU regulations
incident reporting
risk management
Read More
CISO Podcast
Compliance
3 months ago

Auditing AI: Navigating Risks and Regulations

As AI becomes more prevalent, understanding its risks and ensuring compliance are critical. This episode explores the crucial role of internal audit in guiding organizations toward responsible AI implementation. We delve into key areas like risk assessment, data governance, and transparency, offerin

AI Auditing
Risk Management
Regulatory Frameworks
Transparency
Ethics
Read More
CISO Podcast
Compliance
3 months ago

Decoding AI Risks: A Deep Dive into the MIT AI Risk Repository

Explore the complex landscape of artificial intelligence risks with the MIT AI Risk Repository. This podcast delves into the repository's comprehensive database, causal and domain taxonomies, and methodologies for identifying and classifying AI threats. Join experts as they discuss how policymakers,

AI risks
ethical AI
security vulnerabilities
risk management
MIT AI Risk Repository
Read More
CISO Podcast
Compliance
3 months ago

Tractor Tech Tug-of-War: Farmers, Manufacturers, and the Right to Repair

This episode explores the growing conflict between farmers and agricultural equipment manufacturers over the right to repair their own machinery. We delve into how intellectual property laws and proprietary software limit farmers' access to repair tools and information, often creating a manufacturer

Right to Repair
Agriculture Technology
Intellectual Property
Consumer Rights
Sustainability
Read More
CISO Podcast
Industrial Security
4 months ago

Cybersecurity Risks in Modern Machinery: From Construction Sites to Farm Fields and Beyond

This episode explores the growing cybersecurity risks associated with the increasing connectivity of modern equipment across industries. We examine how the integration of IoT devices and digital technologies in construction, agriculture, and transportation introduces vulnerabilities that can be expl

cybersecurity
IoT security
industrial automation
risk management
operational safety
Read More
CISO Podcast
AI Ethics and Regulation
4 months ago

DeepSeek: AI Innovation vs. Global Scrutiny

This episode delves into the rapid rise of the Chinese AI startup DeepSeek, exploring its cutting-edge technology that rivals major competitors and its recent challenges including a cyberattack and mounting global scrutiny. We'll examine the concerns surrounding data privacy, censorship, and regulat

AI
Innovation
Regulation
DeepSeek
Ethics
Read More
CISO Podcast
Vulnerability Management
4 months ago

Zero Day to Breach: The 2024 Vulnerability Explosion

The cybersecurity landscape in 2024 saw a dramatic 20% surge in exploited vulnerabilities, with attackers increasingly targeting network edge devices and cloud infrastructure. This episode dives into the key statistics, trends, and major incidents, highlighting the critical need for proactive securi

zero-day vulnerabilities
cybersecurity
incident response
threat detection
risk management
Read More
CISO Podcast
AI Security
4 months ago

AI Security Deep Dive: Threats, Controls, and Red Teaming

This podcast explores the critical landscape of AI security, drawing on insights from leading experts and resources. We delve into the unique challenges and risks associated with AI systems, including both machine learning and heuristic models. We will discuss the various types of threats, such as t

AI threats
red teaming
cybersecurity controls
threat modeling
machine learning security
Read More
CISO Podcast
Cybersecurity Threats
4 months ago

The Rise of AI-Powered Cyberattacks and the Imperative of Cyber Resilience

This episode explores the escalating cybersecurity landscape, with a particular focus on how generative AI is enabling more sophisticated and personalized cyberattacks. We delve into the ways AI is being used by cybercriminals to refine social engineering tactics, create more convincing phishing att

AI
Cyber Resilience
Cybersecurity
Threat Intelligence
Incident Response
Read More
CISO Podcast
Compliance
5 months ago

GDPR Gets Personal: Fines, Class Actions, and Data Transfer Rules

This episode examines recent trends in GDPR enforcement, including the shift towards personal liability for management, the rise of class action lawsuits, and the importance of compliant data transfer mechanisms. We'll discuss how the EU court's recent award of damages for illegal data transfers wit

GDPR
Data Privacy
Fines
Class Actions
Data Transfers
Read More
CISO Podcast
Privacy
6 months ago

META Versus You: Data, Deepfakes & Dangerous Algorithms

Ever get the feeling you're being watched online? Like every click, every like, every share is feeding some invisible monster? Well, you're not wrong. This podcast explores the dark side of Meta, the company formerly known as Facebook, and how its vast empire impacts your privacy, security, and even

META
Deepfakes
Algorithms
User Data
Privacy Concerns
Read More
CISO Podcast
Vulnerability Management
6 months ago

Zero-Day Exploits on the Rise: A Deep Dive into the NSA's Top Vulnerabilities of 2023

Join us as we explore the latest cybersecurity advisory from the NSA and its international partners, revealing the most exploited vulnerabilities of 2023. We break down complex technical jargon into understandable concepts, highlighting real-world examples like the Microsoft Outlook vulnerability th

zero-day exploits
NSA vulnerabilities
cybersecurity threats
patch management
national security
Read More
CISO Podcast
AI Security
6 months ago

OWASP Top 10 for LLMs: Unveiling the Hidden Dangers of AI

Large Language Models (LLMs) are revolutionizing the world, powering everything from chatbots to content creation. But as with any new technology, there are security risks lurking beneath the surface. Join us as we explore the OWASP Top 10 for LLMs, a guide that exposes the most critical vulnerabili

OWASP
Large Language Models
AI Vulnerabilities
Security Best Practices
Cybersecurity
Read More
CISO Podcast
Cyber Threats
6 months ago

Ransomware Insights: From Simple Extortion to Global Threat

This episode breaks down the evolution of ransomware over the past two years (December 2022 to November 2024), using a trove of cyber insights reports. Listeners will gain a clear understanding of how ransomware has transformed from basic encryption schemes to sophisticated attacks involving data ex

Ransomware
Cybersecurity
Data Protection
Threat Intelligence
Incident Response
Read More
CISO Podcast
Privacy
7 months ago

Safe Internet By Default: Spain's Approach to Protecting Children Online

This episode examines Spain's proactive approach to online child safety. We explore the Spanish Data Protection Agency's (AEPD) innovative framework for age verification and its emphasis on safeguarding children's rights in the digital age. COPAA, KOSA, TDPSA

Child Safety
Online Protection
Digital Literacy
Technology Policy
Cybersecurity
Read More
CISO Podcast
Cybersecurity Policy
7 months ago

Cybersecurity Crossroads: Charting the Course for the Next Administration

This episode explores the complex challenges and opportunities facing the U.S. in the realm of cybersecurity. Experts weigh in on a new report outlining a roadmap for the incoming administration, emphasizing the need for a comprehensive national strategy, public-private partnerships, and a robust cy

cybersecurity
administration
threat landscape
public-private partnership
national security
Read More
CISO Podcast
Cyber Espionage
7 months ago

North Korea's Secret Weapon: IT Workers Infiltrating the US

This podcast explores the alarming trend of North Korean IT workers infiltrating US companies, using their positions to generate revenue, evade sanctions, and potentially engage in cyber espionage. Discover the tactics they employ and how businesses can protect themselves.

North Korea
Cybersecurity
Espionage
IT infiltration
National Security
Read More
CISO Podcast
Compliance
7 months ago

EU AI Act: Decoding the Future of AI

Explore the EU's groundbreaking law regulating artificial intelligence. We break down the risk-based system, banned practices, and global impact. Join us as we decode the AI Act and its implications for the future of technology.

AI Regulation
EU AI Act
Cybersecurity
Ethical AI
Risk Management
Read More
CISO Podcast
Supply Chain Security
7 months ago

SolarWinds Hack: Fallout and Lessons Learned

This podcast examines the SolarWinds cyber breach, a sophisticated supply chain attack that sent shockwaves through the cybersecurity landscape. It explores the attack's mechanics, how malicious code embedded in SolarWinds' Orion software updates compromised thousands of organizations, including pro

SolarWinds
Cybersecurity
Supply Chain Attack
Incident Response
Software Vulnerability
Read More
CISO Podcast
Network Security
7 months ago

Cybersecurity 2024: New Threats, Faster Attacks

Experts break down the latest cybersecurity reports, revealing how threat actors are evolving their tactics and accelerating their attacks. Learn what's changing, who's being targeted, and what you can do to protect yourself and your organization. www.breached.company

cybersecurity
threat detection
incident response
fast attacks
2024 trends
Read More
CISO Podcast
AI Ethics and Governance
7 months ago

The State of AI: A Global Perspective

Join us as we explore the evolving landscape of AI governance, comparing the US, EU, and Chinese approaches, and discussing the implications for society.

artificial intelligence
global competition
ethical standards
regulatory challenges
technology trends
Read More
CISO Podcast
Privacy
7 months ago

Digital Panopticon: Unraveling the Fine Print of Your Online Life

Join us as we explore the hidden world of Terms of Service and End User License Agreements. We'll examine how companies and governments collect and use your data, the implications for your privacy and freedoms, and what you can do to protect yourself in the digital age.

data privacy
online surveillance
user consent
digital rights
privacy policies
Read More
CISO Podcast
Compliance
7 months ago

Scammer Calendar: A Year-Round Guide

Learn how scammers plan attacks around holidays and your habits! This episode breaks down common seasonal scams, how to spot them, and how to protect yourself. Plus, we explore the world of scam baiting! visit: www.ScamWatchHQ.com

scams
cybersecurity
awareness
fraud prevention
consumer protection
Read More
CISO Podcast
Privacy
7 months ago

Brazil's LGPD: A Deep Dive into Data Protection

This episode explores Brazil's General Data Protection Law (LGPD), examining its impact on businesses worldwide, key principles, and enforcement.

LGPD
Data Protection
Compliance
Personal Data
Brazil
Read More
CISO Podcast
Compliance
7 months ago

Breach Finances: The Price of Data Privacy

Every week, another company is slapped with a hefty fine for violating data privacy. This podcast explores the financial fallout of data breaches and ransomware attacks, discussing high-profile cases and the evolving regulatory landscape. Are companies taking data security seriously or just writing

data breach
financial impact
data privacy
cybersecurity
regulatory fines
Read More
CISO Podcast
Cybersecurity
7 months ago

Digital Wild West: Greed, Chaos, and the Cyber Arms Race

From water bills held hostage to artists losing their savings, this week's cyberattacks expose our digital vulnerabilities. We unpack the motives, the players, and the tech shaping this digital battleground. Plus, what you can do to protect yourself.

Cybercrime
Cyber Warfare
Threat Intelligence
Vulnerability Management
Security Collaboration
Read More
CISO Podcast
Privacy
7 months ago

Data Privacy: Crossing Borders in the Digital Age

Ever order takeout online? You're thinking about food, not data, right? But somewhere a company is processing your order, your address, and even your payment information, possibly sending it across borders. This podcast is your crash course on data privacy laws and cross-border data transfers. Learn

data privacy
compliance
international regulations
cybersecurity
digital governance
Read More
CISO Podcast
Privacy
7 months ago

Texas Cyber: My Data, My Rules

Ever get the feeling like someone's listening in on your digital life? Well, Texas has heard you! In this episode, we break down the Texas Data Privacy and Security Act (TDPSA), a game-changing law designed to give Texans more control over their personal data.

Data Privacy
Legislation
Cybersecurity
Personal Data
Texas
Read More
CISO Podcast
Compliance
7 months ago

CISO's on Trial: Cybersecurity's Legal Battlefield

Explore landmark legal cases like USA v. Sullivan and SEC v. SolarWinds and learn about the evolving responsibilities of CISOs and the impact of cyber security on financial stability.

CISO
Cybersecurity
Legal Risk
Data Protection
Compliance
Read More
CISO Podcast
Compliance
7 months ago

The CISO's Playbook

Learn what it takes to be a Chief Information Security Officer in this deep dive into building a security culture.

CISO
Cybersecurity Strategy
Risk Management
Security Awareness
Business Alignment
Read More
CISO Podcast
Compliance
8 months ago

Cybersecurity Law 101

This podcast provides a comprehensive overview of the essential cybersecurity laws that shape how we interact with data in the digital age. Listeners will gain a clear understanding of the key regulations, including GDPR, CCPA, HIPAA, and PCI DSS, and how these laws work in concert to protect person

Cybersecurity law
GDPR
CCPA
data protection
compliance regulations
Read More
CISO Podcast
Compliance
8 months ago

PCI Compliance: Not Just a Checkbox

Tired of the annual PCI scramble? This episode explores how to make PCI DSS part of your everyday security posture. We'll discuss practical tips, new technologies, and the evolving threat landscape, emphasizing that security is a journey, not a destination!

PCI Compliance
Cybersecurity
Payment Security
Risk Management
Data Protection
Read More
CISO Podcast
Compliance
8 months ago

Navigating the Cybersecurity Wilderness: Your Guide to Choosing the Right Framework

Feeling lost in a sea of acronyms like NIST, ISO 27001, and CIS? This podcast is your guide to understanding and choosing the right cybersecurity framework for your organization. We break down the jargon, explore the strengths of each framework, and help you ask the right questions to find the perfe

cybersecurity frameworks
risk management
NIST
ISO/IEC
CIS
Read More
CISO Podcast
Compliance
8 months ago

Cyber Insurance: Navigating the Digital Threat Landscape

In a world driven by data, are you truly protected? Join us as we explore the complexities of cyber insurance, empowering businesses and individuals to make informed decisions in the face of evolving digital threats.

cyber insurance
risk management
data breach
cyber threats
financial protection
Read More
CISO Podcast
Cybersecurity Threats
8 months ago

August & September 2024: Cyber Chaos

Schools, hospitals, airports, and even a global energy giant weren't safe from cyberattacks this summer. Listen as we unpack the major events, new ransomware players, and the alarming trend of attacks on essential services.

ransomware
data breaches
cybersecurity
incident response
critical infrastructure
Read More
CISO Podcast
Cybersecurity Governance
8 months ago

Suffolk County Cyberattack: A Preventable Disaster

Millions in recovery costs. Chaos for residents. The Suffolk County cyberattack was a major wake-up call. Join us as we unpack the recent report revealing the perfect storm of missed warnings, systemic failures, and poor decisions that left Suffolk County vulnerable to attack.

Cyberattack
Vulnerability
Incident Response
Local Government
Cyber Hygiene
Read More
CISO Podcast
Cybercrime
8 months ago

Black Cat: The Rise and Fall of a Ransomware Empire

Black Cat, also known as ALPHV, was one of the most prolific and feared ransomware groups in the world. This episode examines Black Cat's rise to prominence, their use of the ransomware-as-a-service model, and the events that led to their dramatic downfall. Learn how they exploited a critical vulner

ransomware
Black Cat
Ransomware-as-a-Service
law enforcement
cybersecurity
Read More
CISO Podcast
Ransomware Security
8 months ago

LockBit: Inside the World's Most Prolific Ransomware

LockBit ransomware has dominated headlines for its ruthless attacks and lucrative business model. This podcast goes beyond the headlines, exploring LockBit's evolution, its notorious triple extortion tactics, and the impact on victims worldwide. Listen as experts analyze real attack breakdowns and o

LockBit
ransomware
cybersecurity
threat landscape
cybercrime
Read More
CISO Podcast
Cybercrime
8 months ago

Inside Evil Corp: The Story of a Ransomware Giant

Join us as we trace Evil Corp’s evolution from their early days developing banking trojans like Dridex and BitPaymer to their more recent adoption of ransomware-as-a-service models like LockBit. We'll investigate the key players behind the operation, including the elusive mastermind Maksim Yakubets

Ransomware
Cybercrime
Malware
Law Enforcement
Cybersecurity
Read More
CISO Podcast
Network Security
8 months ago

Cybersecurity SOS: Insights from the Front Lines with CISOs

Join us as we unpack the alarming findings from Proofpoint's Voice of the CISO report. This episode explores the anxieties keeping CISOs awake at night, from the looming threat of major cyberattacks to the struggle with burnout in the face of mounting pressure.

Cybersecurity
CISO
Threat Landscape
Ransomware
Security Culture
Read More
CISO Podcast
Compliance
8 months ago

Decoding AI Laws: From Algorithms to Ethics

Join us as we explore the complex world of AI regulations. We'll break down the latest laws and guidelines from around the world, discuss their impact on businesses and individuals, and examine the ethical considerations shaping the future of AI. Get ready to understand the rules governing the AI re

AI Regulation
Ethics
Transparency
Accountability
Bias
Read More
CISO Podcast
Privacy
8 months ago

Deepfakes 101: How to Spot AI-Generated Fake Videos

Join us as we unravel the complex world of deepfakes. We'll expose the technology behind these AI-generated illusions, explore their potential for harm and deception, and equip you with the knowledge to spot these digital deceptions. From imposter scams and disinformation campaigns to the liar's div

Deepfakes
Misinformation
AI
Video Analysis
Cybersecurity
Read More
CISO Podcast
AI Ethics and Governance
8 months ago

Navigating the Potential Pitfalls of AI: Confabulation and Misuse

This episode explores the risks of "confabulation" in AI, where systems generate outputs that appear credible but are actually fabricated. The hosts discuss a NIST report highlighting this issue and emphasizing the importance of proactive measures to mitigate the potential for AI misuse.

AI Misuse
Confabulation
Ethical AI
Regulation
AI Development
Read More
CISO Podcast
Privacy
8 months ago

Navigating the Patchwork: Your Guide to State Privacy Laws

Confused by the growing number of state privacy laws? Join us as we break down these complex regulations, empowering you to protect your data and navigate the evolving world of digital privacy. We will discuss how states like Connecticut, Florida, Texas, Maine, Montana, and Oregon are tackling these

privacy laws
data protection
compliance
legal requirements
consumer rights
Read More
CISO Podcast
Compliance
8 months ago

GDPR Deep Dive: Taking Control of Your Data in a Changing World

In this CISO Insights episode, we unpack the GDPR and its impact on you and your business. Learn the key principles of data privacy, how companies are adapting, and get practical tips on managing data inventory, consent, and breach responses. Whether you're a business owner or tech enthusiast, disco

GDPR
Data Protection
Privacy
User Rights
Compliance Strategies
Read More
CISO Podcast
Compliance
8 months ago

HIPAA and HITECH: Navigating the Digital World of Healthcare Data

In this episode, we explore HIPAA and HITECH, their impact on healthcare data privacy, and how these regulations affect everyone. We'll discuss HIPAA's evolution and how HITECH strengthened it with stricter standards for electronic health records, business associates, and breach notifications. Learn

HIPAA
HITECH
healthcare data
ePHI
cybersecurity
Read More