Powered by RND
PodcastsNewsCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Latest episode

Available Episodes

5 of 335
  • The Dark Pattern Paradox: AI, Phishing, and the Convenience Trap
    The cybersecurity landscape continues to evolve, demonstrating worrying trends as rapidly advancing Generative AI capabilities enable sophisticated attacker tactics, making phishing attempts much more targeted and customized. This episode explores how pervasive digital dark patterns leverage consumer cognitive biases, tricking users into sharing personal information and navigating manipulative interfaces, like pre-selected consent checkboxes, for corporate gain. Ultimately, this manipulation sustains the "consumer privacy paradox," where individuals who intellectually value security readily compromise their data for immediate convenience or functionality.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com   
    --------  
    36:38
  • ACR and Alexa: The Mandatory Surveillance of the Modern Smart Home
    Smart devices like Amazon's Alexa and modern smart TVs are perpetually monitoring domestic life, utilizing technologies such as Automatic Content Recognition (ACR) to harvest viewing habits and inadvertently recording private conversations through frequent, long-duration misactivations. These recorded interactions are sent to the cloud for training sophisticated AI systems through human review, a mandatory data collection process that companies are reinforcing by eliminating user privacy options, such as Amazon discontinuing the "Do not send voice recordings" feature. We explore how this pervasive data harvesting fuels targeted advertising and investigate the technical lengths users must go to—such as deploying network-level ad blockers like PiHole or building local, internet-free systems like Home Assistant—to regain privacy.   Sponsors: www.secureiot.house www.secureiotoffice.world www.cisomarketplace.com    Merch - 25% off Black Friday securitybydesignshop.etsy.com
    --------  
    40:33
  • Deepfakes, Donations, and Deception: The Psychology of the Cyber Con
    Threat actors are exploiting human psychology using sophisticated techniques like AI-powered deepfakes and emotional manipulation to bypass traditional security defenses. This episode explores how nonprofits and consumer organizations are increasingly targeted by highly effective scams, including CEO impersonation fraud, Business Email Compromise (BEC), and fraudulent social media donation requests. We break down the new threat landscape, highlighting why effective countermeasures require comprehensive security awareness training and strong organizational policies to combat the persuasive principles of Liking, Authority, and Scarcity.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com  
    --------  
    40:50
  • The Accidental Leak: Why You're the Biggest Threat to Your Own Data
    We dive into the most financially devastating threats of 2025, revealing how ransomware, which accounted for 76% of incurred losses in one portfolio, and vendor breaches continue to drive significant financial damage. The discussion explores how AI is turbocharging social engineering and credential stuffing (which caused a 250% increase in Account Takeover attacks in 202), enabling threat actors like Scattered Spider to "log in" using valid credentials rather than breaking in. We break down critical defenses—from Multi-Factor Authentication (MFA) to tokenization—and examine how everyday human mistakes, like pasting production credentials into random online formatting tools, create massive enterprise risk.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com    
    --------  
    29:01
  • MTTR: Tactics, Trust, and Time-to-Report
    This podcast dissects adversary tactics, techniques, and procedures (TTPs), focusing on how attackers leverage social engineering and human psychological weaknesses like fear and trust to gain unauthorized access. We explore the proactive strategies of Red Teaming and Breach and Attack Simulation (BAS), which use the MITRE ATT&CK framework to emulate real-world attacks and test defensive capabilities. Tune in to understand the critical security metrics—like Mean Time to Detect (MTTD), Mean Time to Resolve (MTTR), and Reporting Rate—that quantify security program success and resilience against modern threats.   Sponsors: www.cisomarketplace.services securitybydesignshop.etsy.com - 25% off Black Friday Sale  
    --------  
    45:15

More News podcasts

About CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Podcast website

Listen to CISO Insights: Voices in Cybersecurity, Economist Podcasts and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.0.4 | © 2007-2025 radio.de GmbH
Generated: 11/29/2025 - 12:16:52 PM