Home
Categories
EXPLORE
Music
Comedy
Society & Culture
History
Education
Business
True Crime
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/16/c1/e4/16c1e4ab-be21-5f74-4543-e8740c61cb22/mza_13977326273488773411.png/600x600bb.jpg
CISO Insights: Voices in Cybersecurity
CISO Marketplace
326 episodes
1 day ago
CISO Marketplace is a dedicated platform providing cybersecurity professionals with expert resources, tools, and insights to protect their organizations. From policy templates to industry updates, we empower CISOs with the knowledge needed to navigate the evolving threat landscape. Shop @ https://www.cisomarketplace.com || News @ https://threatwatch.news || Podcast @ https://cisoinsights.show
Show more...
Technology
News,
Tech News
RSS
All content for CISO Insights: Voices in Cybersecurity is the property of CISO Marketplace and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CISO Marketplace is a dedicated platform providing cybersecurity professionals with expert resources, tools, and insights to protect their organizations. From policy templates to industry updates, we empower CISOs with the knowledge needed to navigate the evolving threat landscape. Shop @ https://www.cisomarketplace.com || News @ https://threatwatch.news || Podcast @ https://cisoinsights.show
Show more...
Technology
News,
Tech News
Episodes (20/326)
CISO Insights: Voices in Cybersecurity
Rogue Agents and Railgun Fights: Securing the AI Frontier
The battle for digital security has fundamentally shifted from human-speed defense to an unprecedented autonomous conflict marked by AI-orchestrated cybercrime, proactive machine protection, and the alarming emergence of systems that actively resist human control
Show more...
1 day ago
42 minutes

CISO Insights: Voices in Cybersecurity
The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign
The disclosure of Chinese state-sponsored hackers using Anthropic’s Claude Code to autonomously execute 80–90% of a large-scale cyber espionage campaign confirms that AI has fundamentally altered the threat landscape by enabling sophisticated attacks to operate at machine speed and scale
Show more...
2 days ago
12 minutes

CISO Insights: Voices in Cybersecurity
Beyond the First Lie: Building Communication Resilience with the RESIST Framework
The RESIST framework provides a consistent, six-step approach for government communicators to recognize, analyze, and strategically respond to information threats, ensuring resilience and effective countermeasures against evolving MDM
Show more...
3 days ago
17 minutes

CISO Insights: Voices in Cybersecurity
From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era
The latest OWASP Top 10 provides a roadmap for CISOs and developers, demonstrating that application security now depends on securing configuration, managing the software supply chain, and rigorously enforcing authorization, rather than just fixing individual coding mistakes
Show more...
5 days ago
13 minutes

CISO Insights: Voices in Cybersecurity
From BOLA to Bots: Building a Layered API Defense Against the Modern Top 10
Securing APIs requires moving beyond perimeter defenses to implement a strategic, integrated approach that continuously enforces least privilege, strictly validates input to prevent injection, and monitors resource consumption limits from the first line of code.
Show more...
6 days ago
40 minutes

CISO Insights: Voices in Cybersecurity
Orchestrating Security: The DevSecOps Blueprint for 2025
DevSecOps is essentially the culture of collaboration, automation, and continuous verification required to integrate security into all aspects of the software delivery pipeline, accelerating deployment while reducing risk.
Show more...
1 week ago
36 minutes

CISO Insights: Voices in Cybersecurity
The Algorithmic Adversary: Tracking the Shift to Novel AI-Enabled Malware
Threat actors have entered a new operational phase by deploying novel, autonomous malware, including PROMPTFLUX and PROMPTSTEAL, that leverage Large Language Models mid-execution to dynamically alter their behavior and evade detection
Show more...
1 week ago
15 minutes

CISO Insights: Voices in Cybersecurity
The Scorched Earth CISO: Extinguishing Burnout with AI and Executive Support
Fighting an internal operational war inside the SOC due to alert overload, security leaders must leverage intelligent automation and critical executive support to break the cycle of burnout and high turnover.
Show more...
1 week ago
43 minutes

CISO Insights: Voices in Cybersecurity
Hybrid Resilience: Mastering Digital Tech and Collaboration for Supply Chain Recovery
Effective supply chain recovery relies on hybrid strategies that integrate proactive measures, such as adopting digital technology for greater visibility and fostering stakeholder collaboration, to mitigate uncertainty and secure future operations.
Show more...
1 week ago
31 minutes

CISO Insights: Voices in Cybersecurity
Warding the Walls: Ransomware, Zero Trust, and the Fight for Critical Infrastructure
Smart cities must immediately adopt integrated risk management frameworks and a ”never trust, always verify” Zero Trust approach to mitigate the catastrophic financial and physical consequences of modern cyber-physical attacks.
Show more...
1 week ago
33 minutes

CISO Insights: Voices in Cybersecurity
Compliance Convergence: Harmonizing DORA, NIS2, and SEC for 2025 Resilience
Facing the immense complexity and high financial penalties associated with regulatory fragmentation, firms must adopt a unified Governance, Risk, and Compliance (GRC) program to efficiently manage overlapping requirements for executive accountability, critical third-party oversight, and rapid incident disclosure across DORA, NIS2, and the SEC rules.
Show more...
1 week ago
13 minutes

CISO Insights: Voices in Cybersecurity
Guardrails and Attack Vectors: Securing the Generative AI Frontier
This installment provides security executives with actionable strategies for embedding security into the entire AI lifecycle to mitigate novel adversarial threats and responsibly manage complex compliance risks associated with enterprise Generative AI deployments
Show more...
2 weeks ago
15 minutes

CISO Insights: Voices in Cybersecurity
Trick or Threat: Your Personal Cybersecurity Survival Guide for 2026
This episode explores how security teams must pivot toward AI-powered defense augmentation and prioritize human vigilance through targeted training, given that 85% of breaches involve human error and AI-driven threats are escalating in speed and sophistication
Show more...
2 weeks ago
45 minutes

CISO Insights: Voices in Cybersecurity
The Digital Hustle: RaaS, EDR Killers, and the Cybercrime Business Model
Modern, highly evasive RaaS groups, exemplified by strains like LockBit 5.0 and Qilin, are maximizing impact by systematically targeting virtual infrastructure and exploiting legitimate platforms (LOTS) to steal credentials and data, making AI-driven behavioral monitoring and robust network controls the only effective defense.
Show more...
2 weeks ago
40 minutes

CISO Insights: Voices in Cybersecurity
Speaking 'Boardish': A CISO's Guide to Risk, Resilience, and Revenue
Focused on the strategic imperatives of modern cybersecurity, this podcast offers CISOs the practical expertise needed to frame technical risks, manage governance, and justify investments in terms that directly align with the board’s focus on enterprise value and business outcomes
Show more...
2 weeks ago
25 minutes

CISO Insights: Voices in Cybersecurity
When Trust Breaks: Auditing the $300M Third-Party Liability Cap
As service providers increasingly become the breach point, organizations must proactively navigate the inherent risk disparity where the massive value of client data often far exceeds the monetary ceiling or limited liability imposed by the vendor’s service contract
Show more...
3 weeks ago
36 minutes

CISO Insights: Voices in Cybersecurity
Resilience in an AI-Accelerated World: The CISO's Objective Challenge
CISO confidence in an AI-accelerated world is achieved through continuous, community-powered adversarial testing that delivers the objective data needed to translate technical risk for the board and ultimately drive true security resilience
Show more...
3 weeks ago
26 minutes

CISO Insights: Voices in Cybersecurity
The Hybrid SOC Revolution: AI, ATT&CK, and Fortifying Resilience in 2025
The foundation for cybersecurity resilience in 2025 requires modernizing the Security Operations Center through targeted AI integration, meticulous MITRE ATT&CK coverage mapping, and a strategic shift in budget priority toward workforce development and threat hunting
Show more...
3 weeks ago
41 minutes

CISO Insights: Voices in Cybersecurity
The Trust Trap: Why Employees Turn Malicious and How Causal AI Predicts the Breaking Point
Mitigating the most damaging security risk requires organizations to abandon technical ”silver bullets” and adopt a holistic, human-centric approach that monitors digital footprints alongside psychological and organizational health to intervene before betrayal occurs.
Show more...
3 weeks ago
39 minutes

CISO Insights: Voices in Cybersecurity
Smart Cities, Critical Failures: Unpacking the IoT Ransomware Threat
As urban infrastructure becomes smarter through connected technology, the reliance on often insecure IoT systems exposes critical services to devastating ransomware attacks that threaten citizen safety and operational integrity.
Show more...
3 weeks ago
37 minutes

CISO Insights: Voices in Cybersecurity
CISO Marketplace is a dedicated platform providing cybersecurity professionals with expert resources, tools, and insights to protect their organizations. From policy templates to industry updates, we empower CISOs with the knowledge needed to navigate the evolving threat landscape. Shop @ https://www.cisomarketplace.com || News @ https://threatwatch.news || Podcast @ https://cisoinsights.show