PodcastsNewsCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Latest episode

408 episodes

  • CISO Insights: Voices in Cybersecurity

    The Right Fit: A C3PAO Shopping Guide for SMBs

    2026/2/18 | 14 mins.
    This episode breaks down the ND-ISAC’s essential guide designed to help small and medium-sized businesses avoid the "race to the bottom" when selecting a Third-Party Assessment Organization (C3PAO). We discuss how to utilize a comprehensive scoring system to evaluate potential assessors on critical criteria like technical aptitude, reasonableness, and the all-important intake process. Listeners will learn why the lowest price often carries the highest risk and how to identify an assessor who truly understands their unique environment.

    www.securitycareers.help/c3pao-selection-guide-for-small-and-medium-sized-businesses-strategic-briefing

     

    Sponsors:

    https://baseline.compliancehub.wiki

    https://cmmcnist.tools
  • CISO Insights: Voices in Cybersecurity

    Digital Fingerprints: Unmasking Russian Influence

    2026/2/17 | 16 mins.
    Join us as we explore the "Information Influence Attribution Framework," a methodology designed to pierce the veil of anonymous Russian disinformation campaigns in Ukraine and beyond. We break down how analysts combine technical infrastructure data, behavioral patterns like those in the DISARM framework, and contextual clues to distinguish organic viral content from coordinated state attacks. Through real-world case studies—from fake BBC videos to anti-mobilization TikToks—we reveal how digital detectives build high-confidence cases to hold state actors accountable.

    www.scamwatchhq.com/attributing-russian-information-influence-operations-insights-and-frameworks

     

    Sponsors:

    www.myprivacy.blog

    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    Code Dark: The Systemic Crisis of Healthcare Cybersecurity

    2026/2/15 | 32 mins.
    This episode explores how catastrophic ransomware attacks like the Change Healthcare and Ascension incidents have transformed cybercrime from a financial nuisance into a lethal patient safety emergency. We uncover the emerging threats defining 2026, including AI data poisoning, "ghost bug" vulnerabilities in legacy medical devices, and the fragile interdependence of the global diagnostic supply chain. Finally, we break down the federal government’s aggressive new enforcement against information blocking and the "Secure by Design" mandates essential for hospital survival.

    www.breached.company/healthcare-under-siege-47-ransomware-victims-in-30-days-as-patient-safety-crisis-deepens

     

    Sponsors

    www.cisomarketplace.com

    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    State of Security 2026: The Era of Fragmentation and Access

    2026/2/14 | 15 mins.
    Dive into the 2026 State of Security report to understand how geopolitical fragmentation is blurring the lines between statecraft, crime, and war. We explore the shift toward "access-first" strategies by major powers like China and Russia, who are prioritizing the quiet accumulation of access to critical infrastructure and connectivity systems over immediate destruction. Finally, the episode examines the deepening crisis of synthetic identities and how AI is evolving from a hyped threat into a practical tool for fraud and coercion.

    www.breached.company/2026-state-of-security-geopolitical-fragmentation-and-the-redefining-of-global-conflict

     
    Sponsors:
    www.cisomarketplace.com
    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    Global Privacy: Closing the Enforcement Gap

    2026/2/12 | 15 mins.
    This episode investigates why international data protection enforcement currently lags behind the seamless cooperation seen in competition and consumer law. Listeners will discover how legal barriers and resource constraints hinder Data Protection Authorities from effectively sharing investigative information across borders. We conclude by outlining key recommendations from a recent EDPB report, including the adoption of confidentiality waivers and a secure global platform for cross-border complaints.
     

    www.compliancehub.wiki/international-data-protection-enforcement-cooperation-analysis-and-recommendations

     

    Sponsors:

    www.myprivacy.blog

    www.breached.company

    www.compliancehub.wiki

More News podcasts

About CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Podcast website

Listen to CISO Insights: Voices in Cybersecurity, The Corder Report and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.6.0 | © 2007-2026 radio.de GmbH
Generated: 2/19/2026 - 7:59:50 AM