Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/c0/0d/84/c00d8413-7504-ba84-aba0-6d711baac8d3/mza_13531451817678750225.jpg/600x600bb.jpg
The Risk Wheelhouse
Wheelhouse Advisors LLC
47 episodes
1 week ago
The ground under GRC is shifting, and it’s not subtle. We break down how unified integrated risk management is replacing checklist compliance with an operating model that ties performance, resilience, assurance, and compliance together. From AI governance to ESG at the board level, we follow the money, the deals, and the data to show where risk management is actually going—and how to get there without drowning in spreadsheets. We dive into why AI governance is now table stakes for any seriou...
Show more...
Management
Technology,
Business
RSS
All content for The Risk Wheelhouse is the property of Wheelhouse Advisors LLC and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The ground under GRC is shifting, and it’s not subtle. We break down how unified integrated risk management is replacing checklist compliance with an operating model that ties performance, resilience, assurance, and compliance together. From AI governance to ESG at the board level, we follow the money, the deals, and the data to show where risk management is actually going—and how to get there without drowning in spreadsheets. We dive into why AI governance is now table stakes for any seriou...
Show more...
Management
Technology,
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/c0/0d/84/c00d8413-7504-ba84-aba0-6d711baac8d3/mza_13531451817678750225.jpg/600x600bb.jpg
S4E9: The SaaS Domino Effect - How Compromised OAuth Tokens Created a Cybersecurity Nightmare
The Risk Wheelhouse
17 minutes
2 months ago
S4E9: The SaaS Domino Effect - How Compromised OAuth Tokens Created a Cybersecurity Nightmare
Behind every digital business lies an invisible web of trust: the OAuth tokens silently connecting your applications. What happens when these trusted connections become your greatest vulnerability? A sophisticated attack campaign recently exploited these connections, bypassing traditional security measures to breach major cybersecurity companies including Cloudflare, Palo Alto Networks, and Proofpoint. Rather than directly attacking primary platforms, threat actors targeted Drift's OAuth int...
The Risk Wheelhouse
The ground under GRC is shifting, and it’s not subtle. We break down how unified integrated risk management is replacing checklist compliance with an operating model that ties performance, resilience, assurance, and compliance together. From AI governance to ESG at the board level, we follow the money, the deals, and the data to show where risk management is actually going—and how to get there without drowning in spreadsheets. We dive into why AI governance is now table stakes for any seriou...