Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/c9/84/52/c98452fa-e828-689d-cf1b-31ebcef31722/mza_13758622863524184997.jpg/600x600bb.jpg
The CISO Perspective: Cybersecurity, AI and Emerging Tech
The CISO Perspective
4 episodes
4 days ago
The CISO Perspective delivers straight-to-the-point insights on cybersecurity, artificial intelligence, and the emerging technologies reshaping our digital world. This podcast breaks down complex security concepts, new frameworks, and cutting-edge innovations into plain language you can actually use. From Zero Trust Architecture and ransomware defense to AI governance, quantum threats, and the latest security tools — each episode explains what it is, why it matters, and how it impacts your organization.
Show more...
Technology
RSS
All content for The CISO Perspective: Cybersecurity, AI and Emerging Tech is the property of The CISO Perspective and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The CISO Perspective delivers straight-to-the-point insights on cybersecurity, artificial intelligence, and the emerging technologies reshaping our digital world. This podcast breaks down complex security concepts, new frameworks, and cutting-edge innovations into plain language you can actually use. From Zero Trust Architecture and ransomware defense to AI governance, quantum threats, and the latest security tools — each episode explains what it is, why it matters, and how it impacts your organization.
Show more...
Technology
Episodes (4/4)
The CISO Perspective: Cybersecurity, AI and Emerging Tech
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response

Extended Detection and Response (XDR) is a cybersecurity tool that integrates with multiple products to detect and respond to threats. While EDR (Endpoint Detection and Response) focuses on the endpoint, XDR uses A.I. to ingests information from multiple sources and detect patterns across different device types.
You’ll learn:

  • What EDR does: how it monitors endpoint activity and helps isolate threats in real time 
  • How MDR elevates EDR by providing 24/7 managed monitoring, threat hunting, and guided response from security experts 
  • How XDR takes it further—correlating data across endpoints, network, cloud, identities, and more to give a unified view and faster response   



  • A clear breakdown of each detection layer
  • A comparison of when to use which solution (or combination)
  • Practical tips for choosing based on your organization’s expertise and infrastructure


Whether you’re defining your security strategy or just curious about detection platforms, this episode gives you:Topics covered: EDR functionality, MDR benefits, XDR scope, vendor considerations, and strategic fit for CISOs and security practitioners. Tune in to sharpen your detection stack—without the jargon.

Show more...
2 months ago
8 minutes 53 seconds

The CISO Perspective: Cybersecurity, AI and Emerging Tech
Zero Trust in the Real World: Technologies Behind the Theory | The CISO Perspective

How do you turn Zero Trust theory into real-world implementation?


In this episode of The CISO Perspective, we break down the actual technologies and solutions that power modern Zero Trust Architecture (ZTA). You’ll hear how tools like identity providers, next-gen firewalls, endpoint protection, and segmentation gateways all work together to meet the core principles of NIST SP 800-207.


We’ll explore how each technology brings unique strengths to the framework — and more importantly, how they integrate to build a practical, enforceable Zero Trust environment.


👉 This is Part 2 of our Zero Trust series. If you missed Part 1, be sure to check it out for an overview of the key components, design principles, and architectural models that define Zero Trust.

Show more...
2 months ago
10 minutes 54 seconds

The CISO Perspective: Cybersecurity, AI and Emerging Tech
Zero Trust Architecture Made Simple (NIST 800-207) | Part 1

Zero Trust is more than a buzzword — it’s a foundational shift in cybersecurity architecture.


In this episode of The CISO Perspective, we break down Zero Trust Architecture (ZTA) — defined by NIST SP 800-207 — into plain, actionable language.


Topics Discussed:

  • The core principles and components of Zero Trust: “never trust, always verify”
  • Core tenants and requirements of a Zero Trust Architecture (ZTA)
  • Real-world use cases and deployment strategies that make ZTA approachable for security leaders


New episodes every week. Subscribe to The CISO Perspective for more insights on cybersecurity, AI, and emerging tech.

Show more...
2 months ago
9 minutes 29 seconds

The CISO Perspective: Cybersecurity, AI and Emerging Tech
Breaking the Cyber Kill Chain Explained | A Defensive Security Approach

In this video, we break down the Cyber Kill Chain model — a proven defensive cybersecurity strategy originally developed by Lockheed Martin.What you’ll learn:


  • The seven stages of the Cyber Kill Chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives
  • Practical defense tactics for each stage to help you stop cyberattacks before they escalate
  • Analysis of real-world examples and strategic tips for enhancing incident response


Whether you’re a security leader or just curious about how cyber defenders stay one step ahead, this video makes complex concepts easy to understand.Watch more videos on advanced security frameworks, threat intelligence, and strategic defense by subscribing to our channel.

Show more...
2 months ago
13 minutes 18 seconds

The CISO Perspective: Cybersecurity, AI and Emerging Tech
The CISO Perspective delivers straight-to-the-point insights on cybersecurity, artificial intelligence, and the emerging technologies reshaping our digital world. This podcast breaks down complex security concepts, new frameworks, and cutting-edge innovations into plain language you can actually use. From Zero Trust Architecture and ransomware defense to AI governance, quantum threats, and the latest security tools — each episode explains what it is, why it matters, and how it impacts your organization.