Latest Breaches Podcast Episodes
Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173
CISO Stories Podcast (Audio) - May 07, 2024 14:00 - 25 minutes ★★★★★ - 8 ratingsSecurity is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs...
Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172
CISO Stories Podcast (Audio) - April 30, 2024 14:00 - 28 minutes ★★★★★ - 8 ratingsThe terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. J...
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
CISO Stories Podcast (Audio) - April 23, 2024 14:00 - 28 minutes ★★★★★ - 8 ratingsFor manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This techn...
The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170
CISO Stories Podcast (Audio) - April 16, 2024 14:00 - 30 minutes ★★★★★ - 8 ratingsManufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and...
Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169
CISO Stories Podcast (Audio) - April 09, 2024 14:00 - 31 minutes ★★★★★ - 8 ratingsThe cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations f...
Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168
CISO Stories Podcast (Audio) - April 02, 2024 14:00 - 32 minutes ★★★★★ - 8 ratingsOperational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challen...
Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167
CISO Stories Podcast (Audio) - March 26, 2024 14:00 - 23 minutes ★★★★★ - 8 ratingsThird-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of st...
52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166
CISO Stories Podcast (Audio) - March 19, 2024 04:00 - 30 minutes ★★★★★ - 8 ratingsSchneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value cha...
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
CISO Stories Podcast (Audio) - March 12, 2024 14:00 - 30 minutes ★★★★★ - 8 ratingsBreaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approa...
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
CISO Stories Podcast (Audio) - March 05, 2024 15:00 - 24 minutes ★★★★★ - 8 ratingsWith CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential ...
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
CISO Stories Podcast (Audio) - February 27, 2024 15:00 - 26 minutes ★★★★★ - 8 ratingsGenerative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias i...
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
CISO Stories Podcast (Audio) - February 20, 2024 15:00 - 32 minutes ★★★★★ - 8 ratingsResponsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald,...
The Business Side of AI - Edward Contreras - CSP #161
CISO Stories Podcast (Audio) - February 13, 2024 15:00 - 23 minutes ★★★★★ - 8 ratingsArtificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversa...
Generative AI and Corporate Security – Getting it Right - Bill Franks - CSP #160
CISO Stories Podcast (Audio) - February 06, 2024 15:00 - 32 minutes ★★★★★ - 8 ratingsGenerative AI has hit the world by storm, but unfortunately is widely misunderstood. While it brings great promise for companies, it also has risks. As employees and corporate applications begin making use of generative AI, it is important to ensure that proper safety and security mechanisms are...
Better CISO Health in the New Year: From Burnout to Balance - Steve Shelton - CSP #159
CISO Stories Podcast (Audio) - January 30, 2024 15:00 - 29 minutes ★★★★★ - 8 ratingsHeidrick and Struggles released a global CISO survey last year, stating 53% of CISOs were most concerned about significant stress and 60% were concerned about burnout. In Steve’s 20 years of software sales, significant stress and burnout have been longstanding issues that have yet to be effect...
Cloud Security Staffing in a Hybrid World – It Can Be Done! - Larry Lidz - CSP #158
CISO Stories Podcast (Audio) - January 23, 2024 15:00 - 30 minutes ★★★★★ - 8 ratingsOver the course of two years, and during the pandemic, we established a new security team and grew that team from five cloud security people to over eighty. What was our talent strategy to enable that rapid growth, how did we find the right talent in a tight market, and what did we learn from th...
You want the CISO Title & Pay? Responsibility Comes Also! - Malcolm Harkins - CSP #157
CISO Stories Podcast (Audio) - January 16, 2024 10:00 - 35 minutes ★★★★★ - 8 ratingsIntegrity & Materiality. Get them wrong, you jeopardize your organization, its shareholders, possibly customers, as well as yourself. Join us as we discuss CISO role and accountability, Geopolitics, SEC Regulation and materiality, AI Impact, and seismic changes occurring in the past 5 Years as a...
Reimagining Risk in the Emerging Cloud: A GRC Perspective - Solomon Ugah - CSP #156
CISO Stories Podcast (Audio) - January 09, 2024 15:00 - 28 minutes ★★★★★ - 8 ratingsMore and more services and products are being cloud-delivered. This leads to a concentration of risk in the hands of a few industry players and a few jurisdictions. It means risk needs to be addressed and thought about differently. Join us as we discuss managing cloud risk from a Governance, Ris...
Why Don’t We Care About Identity Security? - Don Baham - CSP #155
CISO Stories Podcast (Audio) - January 02, 2024 00:00 - 27 minutes ★★★★★ - 8 ratingsIdentity & Access Management - Why do organizations still insist that provisioning/deprovisioning is an IT function? Effective IAM requires collaboration across the business units and responsibilities for multiple departments. Join us as we discuss IAM and some of the challenges organizations ar...
High Consequences Cyber: Make or Break the CISO’s Reputation - Andy Jaquith - CSP #154
CISO Stories Podcast (Audio) - December 26, 2023 15:00 - 29 minutes ★★★★★ - 8 ratings“High Consequences Cyber” are high-risk, high-stakes cyber projects that can make or break a company or make or break the CISO’s reputation. These include issues such as, how do you architect your networks if you are a multinational with exposure to high-risk countries? What are key choices you ...
Four Pieces of Transitional Advice: Incoming CISOs - Sean Zadig - CSP #153
CISO Stories Podcast (Audio) - December 19, 2023 15:00 - 32 minutes ★★★★★ - 8 ratingsThere’s been a boom of sudden CISOs for regulatory and practical reasons — forcing technical security leaders to transition. And the transition isn't easy. Join us, as Sean shares the lessons he has learned as he moved into the CISO role from technologist. As CISO Stories also focuses on Identit...
Is there really an Information Security Jobs Crisis? - Ben Rothke - CSP #152
CISO Stories Podcast (Audio) - December 12, 2023 15:00 - 27 minutes ★★★★★ - 8 ratingsAre there really millions of open information security jobs available? Or is much of the numbers hyped up? Join us as we discuss these numbers , boot camps, regional differences, and where these job openings come from. Visit https://securityweekly.com/csp for all the latest episodes! Follow ...
Prioritizing Identity and Getting the Fundamentals Right - Bezawit Sumner - CSP #151
CISO Stories Podcast (Audio) - December 05, 2023 00:00 - 29 minutes ★★★★★ - 8 ratingsPrioritizing identity and getting the fundamentals right. We are managing more identities than ever – people-people, machine-to-machine, and people-machines. What actions should CISOs be ensuring are being done within the environment to prioritize identities? Join us as we discuss where Bezwit h...
5 clues your phone is tapped
Kim Komando Daily Tech Update - November 28, 2023 19:00 - 3 minutes ★★★ - 7 ratingsFeel like someone's watching you? Here are a few helpful hints to find out if your suspicions are spot on.
Do You Really Want to Be a CISO? - Spencer Mott - CSP #150
CISO Stories Podcast (Audio) - November 28, 2023 15:00 - 27 minutes ★★★★★ - 8 ratingsReaching the level of CISO in a large corporation requires time and determined application as well as aptitude and very specific professional and personal attributes. It's the role against which many security professionals set their career sights without really knowing what they'll be getting th...
YouTube creators use death for profit
Kim Komando Daily Tech Update - November 28, 2023 10:00 - 2 minutes ★★★ - 7 ratingsThere's a new viral trend impacting grieving families. I tell you what YouTube is — or isn't — doing about it.
Apple Watch saves another life
Kim Komando Daily Tech Update - November 27, 2023 19:00 - 2 minutes ★★★ - 7 ratingsHave you set up all your Apple Watch health features yet? After hearing this story, you will.
AI hallucinations
Kim Komando Daily Tech Update - November 27, 2023 10:00 - 2 minutes ★★★ - 7 ratingsWhat happens when AI gets the facts wrong? Here's the scoop.
EVs - why customers don’t like what they see
Kim Komando Daily Tech Update - November 26, 2023 19:00 - 2 minutes ★★★ - 7 ratingsFeel the pressure to buy an electric vehicle? Here's why buyers aren't thrilled with them.
Put your key fob in "sleep mode"
Kim Komando Daily Tech Update - November 26, 2023 19:00 - 2 minutes ★★★ - 7 ratingsWhere's the first place your keys go when you get home? If your answer is near the front door, it's time to switch it up.
Related Breaches Topics
- Cybersecurity 3
- Cyber security 3
- Tech 2
- Privacy 2
- Security 2
- Informationsecurity 2
- Data breaches 2
- Phishing 2
- Ciso 2
- Cyber 2
- Gdpr 2