Player FM - Internet Radio Done Right
18 subscribers
Checked 3d ago
추가했습니다 nine 년 전
תוכן מסופק על ידי Security Weekly Productions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Security Weekly Productions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות
W
We Have The Receipts
![We Have The Receipts podcast artwork](https://cdn.player.fm/images/37350108/series/3hptiqPGSZRELxyS/32.jpg 32w, https://cdn.player.fm/images/37350108/series/3hptiqPGSZRELxyS/64.jpg 64w, https://cdn.player.fm/images/37350108/series/3hptiqPGSZRELxyS/128.jpg 128w, https://cdn.player.fm/images/37350108/series/3hptiqPGSZRELxyS/256.jpg 256w, https://cdn.player.fm/images/37350108/series/3hptiqPGSZRELxyS/512.jpg 512w)
![We Have The Receipts podcast artwork](/static/images/64pixel.png)
1 Love Is Blind S8: Pods & Sober High Thoughts with Courtney Revolution & Meg 1:06:00
1:06:00
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי1:06:00![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Happy Valentine’s Day! You know what that means: We have a brand new season of Love Is Blind to devour. Courtney Revolution (The Circle) joins host Chris Burns to delight in all of the pod romances and love triangles. Plus, Meg joins the podcast to debrief the Madison-Mason-Meg love triangle. Leave us a voice message at www.speakpipe.com/WeHaveTheReceipts Text us at (929) 487-3621 DM Chris @FatCarrieBradshaw on Instagram Follow We Have The Receipts wherever you listen, so you never miss an episode. Listen to more from Netflix Podcasts.…
Business Security Weekly (Video)
סמן הכל כלא נצפה...
Manage series 1231510
תוכן מסופק על ידי Security Weekly Productions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Security Weekly Productions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
777 פרקים
סמן הכל כלא נצפה...
Manage series 1231510
תוכן מסופק על ידי Security Weekly Productions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Security Weekly Productions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
777 פרקים
Alla avsnitt
×![Artwork](/static/images/128pixel.png)
1 Speak the Same Language, as Cybersecurity is Everyone's Responsibility - BSW #382 54:07
54:07
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי54:07![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Show Notes: https://securityweekly.com/bsw-382…
![Artwork](/static/images/128pixel.png)
1 C-Suite Cybersecurity Responsibilities, Humble Leaders, and Effective Communication - BSW #381 29:28
29:28
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי29:28![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, Cybersecurity Responsibilities Across the C-Suite: A Breakdown for Every Executive, Humble Leaders Inspire Others to Step Up, Effective Communication in the Workplace, and more! Show Notes: https://securityweekly.com/bsw-381
![Artwork](/static/images/128pixel.png)
1 Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381 32:37
32:37
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי32:37![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) provides the framework to ensure that financial entities have robust measures to withstand and recover from disruptions. By addressing vulnerabilities in this highly digitized ecosystem, DORA not only protects financial institutions but also safeguards the stability and well-being of the European society as a whole. Madelein van der Hout, Senior Analyst at Forrester, joins Business Security Weekly to discuss why DORA is important, how prepared financial institutions are, the consequences of failing to comply, and the impact these regulations will have outside of the EU, including fines up to 2% of global annual turnover or €10 million—whichever is higher. Show Notes: https://securityweekly.com/bsw-381…
![Artwork](/static/images/128pixel.png)
1 The CISO Role Elevates, Boosts, Rises, and Evolves - BSW #380 22:44
22:44
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי22:44![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, How CISOs can elevate cybersecurity in boardroom discussions, Nearly half of CISOs now report to CEOs, showing their rising influence, Steve Jobs Shared 1 Crystal Clear Way You'll Spot an Exceptional Leader, and more! Show Notes: https://securityweekly.com/bsw-380…
![Artwork](/static/images/128pixel.png)
1 AI in 2025: The Shifting Regulatory Landscape For Artificial Intelligence - BSW #380 21:55
21:55
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:55![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in responsible AI innovation.” Then a new administration, which: revoked more than 50 prior executive orders, including Executive Order 14110 of October 30, 2023 (Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence). announced a private-sector $500 billion investment in AI infrastructure tasked federal agencies with drafting a new AI action plan within 180 days signed an executive order on developing artificial intelligence ‘free from ideological bias’ The Business Security Weekly crew tries to make sense of it all. Show Notes: https://securityweekly.com/bsw-380…
![Artwork](/static/images/128pixel.png)
1 The Future Of The CISO - Part 2 - Jess Burn, Jeff Pollard - BSW #379 27:28
27:28
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:28![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess Burn, Principal Analyst, both from Forrester Research join Business Security Weekly to discuss the second part of The Future Of The CISO report. What if you don't like the future of the CISO role and want to get out? The report also provides guidance on what comes after the CISO role, as leaders contemplate the next step in their career. If you think it's a board role, you better know what skills are needed, as cybersecurity by itself is not enough. Join in for part 2. Show Notes: https://securityweekly.com/bsw-379…
![Artwork](/static/images/128pixel.png)
1 The Future Of The CISO - Part 1 - Jess Burn, Jeff Pollard - BSW #379 32:14
32:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי32:14![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Becoming a CISO is a lofty goal for many security and risk pros, and the role brings new sets of challenges. CISOs who accept the wrong opportunities will be forced to conform, rather than excel, and take on outsized liability for the scope of responsibilities. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess Burn, Principal Analyst, both from Forrester Research join Business Security Weekly to discuss The Future Of The CISO report. This report outlines the six most common types of CISOs based on Forrester Research and interactions with security leaders, including the characteristics and competencies of each type. This report helps security leaders define who they are, their values, and optimal situations for their skill set. Show Notes: https://securityweekly.com/bsw-379…
![Artwork](/static/images/128pixel.png)
1 Boards Stepping Up, as CISOs Build Stronger Bonds with Legal and Safeguard Leadership - BSW #378 36:18
36:18
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי36:18![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, New Year, New Cyber Threats: How Boards Are Stepping Up (or Not), Why CISOs should build stronger bonds with the legal function in 2025, New Managers: You Don’t Need to Know It All, and more! Show Notes: https://securityweekly.com/bsw-378
![Artwork](/static/images/128pixel.png)
1 The Business of Cybersecurity, as CISOs Budget Wisely for 2025 Priorities - BSW #377 28:23
28:23
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי28:23![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, The Business of Cybersecurity: The CISO’s Role in Alignment and Pervasive Governance, CISO Priorities for 2025: Budget Wisely, How Do I Position Myself to Influence Senior Leadership?, and more! Show Notes: https://securityweekly.com/bsw-377
![Artwork](/static/images/128pixel.png)
1 Organizations Must Adapt To Safeguard Data In Evolving Environments - Lamont Orange - BSW #377 29:24
29:24
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי29:24![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Data is the fastest growing enterprise attack surface, and is projected to surpass 181 Zettabytes in 2025. Couple data growth with the growing demands of Artificial Intelligence, and the attack surface expands even more. How should organizations adapt their security programs to safeguard their data? Lamont Orange, Chief Information Security Officer at Cyera, joins Business Security Weekly to help you solve your biggest data security challenges. By starting with inventory and classification, data access review can help you answer your biggest data security questions, including: what data you have, where it's stored, who, or what, can access it, and which data risks exist. Show Notes: https://securityweekly.com/bsw-377…
![Artwork](/static/images/128pixel.png)
1 Say Easy, Do Hard, Minimum Viable Security - Part 2 - Jon Fredrickson - BSW Vault 47:30
47:30
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי47:30![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on January 3, 2023. With the current macro economic head winds, 2023 budgets are either frozen or are flat. Where should CISOs focus these limited budgets to maximize the most out of their security program? In this segment, we invite Jon Fredrickson, Chief Risk Officer at Blue Cross Blue Shield of Rhode Island, to debate what should be in your minimum viable security program. This segment is part 2 and focuses on the minimum viable security vendors for our top 6 capabilities: Asset Management Patch Management IAM/MFA/PIM/PAM EDR/MDR/XDR Backup/Recovery Risk Management Show Notes: https://securityweekly.com/vault-bsw-16…
![Artwork](/static/images/128pixel.png)
1 Say Easy, Do Hard, Minimum Viable Security - Part 1 - Jon Fredrickson - BSW Vault 27:14
27:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:14![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on January 3, 2023. With the current macro economic head winds, 2023 budgets are either frozen or are flat. Where should CISOs focus these limited budgets to maximize the most out of their security program? In this segment, we invite Jon Fredrickson, Chief Risk Officer at Blue Cross Blue Shield of Rhode Island, to debate what should be in your minimum viable security program. This segment is part 1 of 2 parts and focuses on the minimum viable security capabilities. Show Notes: https://securityweekly.com/vault-bsw-15…
![Artwork](/static/images/128pixel.png)
1 Day in the Life of a CISO, as They Consider Personal Risks and New Defenses in 2025 - BSW #376 28:17
28:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי28:17![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, CISOs need to consider the personal risks associated with their role, CISOs: Don’t rely solely on technical defences in 2025, The Questions Leaders Need to Be Asking Themselve, and more! Show Notes: https://securityweekly.com/bsw-376
![Artwork](/static/images/128pixel.png)
1 NAC is Back - How Network Access Control Can Protect Your Remote Devices and Data - Rob Allen - BSW #376 27:32
27:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:32![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
The local network is no more. Neither is the corporate firewall. Users are not only working from the office but also remotely, meaning the network we utilize has quickly become the internet, leaving devices and data vulnerable to cyber threats. But how do we monitor this new, expanded network? Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss how the dissolution of the business perimeter makes network access controls essential to protect your devices and, by extension, your data. Network Access Control helps protect business assets whether employees are in the office or remote. ThreatLocker Network Control provides a direct connection between the client and server, as opposed to a VPN that goes through a central point. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/bsw-376…
![Artwork](/static/images/128pixel.png)
1 The CISO's Vital Role, As They Step Away and Companies Seek Top Cyber Talent - BSW #375 32:16
32:16
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי32:16![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In the leadership and communications segment, How Good Leaders Become Great By Never Leading Alone, How Leaders Can Prepare Their Teams For 2025, Nervous About Public Speaking? Here’s How to Use Notes Like a Pro, and more! Show Notes: https://securityweekly.com/bsw-375
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.