Zero Trust, SMB and National Security. INTEL CTO Exclusive. Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and the latest cyber security concerns. New episode. Available everywhere you get podcasts and on YouTube.
🛡Cyber Crime Junkies Podcast🛡’s Post
More Relevant Posts
-
Just in case you want something other than election coverage to listen to in the next few days, there is a new Man In The Middle Podcast episode 🎙️ out that I’m on! Jeremy Mullally and I dive into the nitty gritty of the new Cyber Bill that is currently before Parliament. I promise it is more fun than it sounds… #podcast #cyberlaw #cybersecurity
👉 Welcome to another episode of the 'Man in the Middle Podcast,' diving into stories from the world of Cyber Security. In this episode, we’re joined by Annie Haggar, a partner of Norton Rose Fulbright who sheds light on the complexities of cyber incident reporting and the crucial role of legal privilege in protecting businesses. Annie and I discuss the 2024 Cyber Security Bill, as well as the legal responsibilities when it comes to incident management and response. Whether you’re a cybersecurity professional, a business leader, or simply interested in the legal side of cybersecurity, this episode provides practical insights and strategies to help you prepare for and respond to cyber incidents effectively. Apple/iTunes: https://lnkd.in/gEsFiecj Spotify: https://lnkd.in/g3_gQnbz Amazon Music: https://lnkd.in/gc_nwyJY YouTube: https://lnkd.in/g3gJS5Rh You can find out more about Annie and Norton Rose Fulbright by following the links below: https://lnkd.in/g9YFprhU https://lnkd.in/gKms_ts2
To view or add a comment, sign in
-
In this conversation, I discussed various cybersecurity reports, highlighting the increasing risks associated with AI, human behavior, and organizational vulnerabilities. He emphasizes the need for better security practices, the implications of recent data breaches, and the importance of updated cybersecurity legislation. The conversation also touches on the failures of government agencies to secure communications and the need for accountability in cybersecurity funding. #drzerotrust #zerotrust #podcast #truthtopower https://lnkd.in/eN2Wv-Cg
To view or add a comment, sign in
-
What is your cybersecurity IQ? If you have 20 minutes, you could be listening to The SafeHouse, a podcast designed to be listened to anywhere, like driving to work, taking a break, or even while working. Hear from industry leading cybersecurity experts discuss how to improve your businesses cyber defense in an easy to understand, conversational style. No tech jargon here, just plain, clear information on how to protect your business. Listen on: Spotify, Apple, Amazon, Overcast, Castbox, Radio Public, iHeartRadio, Goodpods, and YouTube. Catch them at the link in the comments ⤵️. #cybersecurity #cyberprotection #cyberattack #ransomware #malware #businesscontinuity #operationalresilience
To view or add a comment, sign in
-
https://lnkd.in/eWavyjpM Interesting discussion on how integrating machine learning into an IDS can enhance efficiency, key traits needed in a successful cybersecurity entrepreneur, and a possible future absent password authentication.
#137 - Exploring AI-powered cybersecurity with Rodrigo Loureiro, CEO of Cyber Connective Corporation
https://spotify.com
To view or add a comment, sign in
-
In today’s Cyber Security Headlines podcast: - Anna Jaques Hospital confirms details of Christmas Day ransomware breach - Microsoft expands Recall preview to Intel and AMD Copilot+ PCs - Blue Yonder announces restoration progress after November 21 attack These stories and more are featured in our news podcast for today, produced and narrated by yours truly. Check it out at https://lnkd.in/gkbczR7m or subscribe to Cyber Security Headlines on your preferred podcast platform. #Cybersecuritynews #cybersecurity
To view or add a comment, sign in
-
I'm proud to share insights from the latest EY-Snowflake Alliance research, revealing that 50% of C-suite executives are prioritizing technology investments to navigate cross-border cybersecurity challenges. From #automation to #artificialintelligence and #blockchain, these technologies are not just buzzwords—they are the tools that will redefine operational efficiency and accuracy. Make data-driven decisions the cornerstone of our supply chain strategy with some actionable insights as the first step towards a smarter, more resilient future. Learn more: https://lnkd.in/e4wM_ruf
Keeping a company secure and compliant is no easy feat, especially with constantly evolving cyber challenges. So what should organizations be prioritizing to stay ahead of the curve? In the newest episode of the Tech Directions podcast, host Susannah Streeter sits down with EY Digital Identity Leader for the Americas Sam Tang, EY Managing Director Kevin Runyan and Microsoft Security Specialist Paul Frate to discuss cross-border cybersecurity and how organizations should be building a proactive #cyber strategy. Listen to the full episode: https://lnkd.in/eE6_-g6h #EYMicrosoft
To view or add a comment, sign in
-
Join us on Threat Talks where we move into the tactical battleground of cybersecurity, where understanding the enemy’s moves is half the battle won. Imagine the potency of a DOS attack powered by the reflection of network requests. In this episode we discuss how attackers exploit ordinary protocol functionalities to launch devastating assaults on unsuspecting victims. Follow us on Spotify, Apple Podcast or YouTube: https://lnkd.in/eXS5CVsc Threat Talks are produced by ON2IT and AMS-IX. Should you have any tips on how to improve the Threat Talks: every feedback gets rewarded with a limited Threat Talks T-shirt. #ZeroTrust #Cybersecurity #ThreatTalks
To view or add a comment, sign in
-
Excited to share my recent conversation on the EY and Microsoft Tech Directions podcast where we tackled the timely topic of cross-border cybersecurity. We're facing a complex web of identities across networks and applications, and it's clear that we've got our work cut out for us. But with challenge comes the chance to innovate, especially when it comes to securing these identities. I had the pleasure of joining EY Digital Identity Leaders Sam Tang and Kevin Runyan to discuss: - The complexities of managing digital identities in a global context and the innovative strategies to stay secure. - The importance of education in mitigating internal cybersecurity risks and the key principles that strengthen our defenses. - How integrating digital identity with zero trust isn't just smart—it's essential, including insights on Secure Access Service Edge architecture. - The careful balance required when sharing data with third-party vendors to maintain both accessibility and security. This discussion is packed with insights for anyone keen on staying ahead in cybersecurity. I encourage you to listen to the full podcast to get a comprehensive understanding of these issues and how they might affect your organization's strategy. Listen to the full episode: https://bit.ly/3RqPFh0 Join the conversation and share your thoughts. Your next strategic move might just stem from our talk! #EYMicrosoft #Cybersecurity #EYTechDirections #DigitalIdentity #ZeroTrust
Keeping a company secure and compliant is no easy feat, especially with constantly evolving cyber challenges. So what should organizations be prioritizing to stay ahead of the curve? In the newest episode of the Tech Directions podcast, host Susannah Streeter sits down with EY Digital Identity Leader for the Americas Sam Tang, EY Managing Director Kevin Runyan and Microsoft Security Specialist Paul Frate to discuss cross-border cybersecurity and how organizations should be building a proactive #cyber strategy. Listen to the full episode: https://lnkd.in/eE6_-g6h #EYMicrosoft
To view or add a comment, sign in
-
In an era where cyber threats are intensifying, businesses around the globe are striving to stay secure and meet compliance demands. Listen into our conversation on the emergence of zero trust—a strategy that limits access strictly to what's indispensable—as a vital component in today's cyber defense playbook. Join our host, Susannah Streeter as she speaks with Paul Frate from Microsoft, Sam Tang from EY, and Kevin Runyan, also from EY. They'll unpack the evolving terrain of global data protection laws, underscore the significance of building reliable digital identities, and explore how integrating digital identity with zero trust principles can bolster security and drive business efficiency. Don't miss out on these expert insights.
Keeping a company secure and compliant is no easy feat, especially with constantly evolving cyber challenges. So what should organizations be prioritizing to stay ahead of the curve? In the newest episode of the Tech Directions podcast, host Susannah Streeter sits down with EY Digital Identity Leader for the Americas Sam Tang, EY Managing Director Kevin Runyan and Microsoft Security Specialist Paul Frate to discuss cross-border cybersecurity and how organizations should be building a proactive #cyber strategy. Listen to the full episode: https://lnkd.in/eE6_-g6h #EYMicrosoft
To view or add a comment, sign in
Growth Without Interruption🛡️Reducing Breach Risk🛡️Advanced I.T. & Cyber Services🛡️Cyber-Awareness-Public-Service🛡️NetGain Technologies🛡️Cyber Crime Junkies Podcast🛡️
7moSteve Orrin Mark Mosher