Obtenez 3 mois à 0,99 $/mois + 20 $ de crédit Audible

OFFRE D'UNE DURÉE LIMITÉE
Page de couverture de CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

Auteur(s): CISO Marketplace
Écouter gratuitement

À propos de cet audio

CISO Insights: The Cybersecurity Leadership Podcast

Where Security Leaders Shape Tomorrow’s Defenses

Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.

CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.

Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.

Connect with us:
Shop: cisomarketplace.com
News: threatwatch.news
Podcast: cisoinsights.show
Tools: microsec.tools
AI Resources: cybersecuritygpt.store

Follow us:
TikTok @cisomarketplace - Quick insights and security tips
YouTube @cisomarketplace - In-depth discussions and CISO interviews
Tiktok & Youtube: @ScamwatchHQ

Powered by grit, fueled by caffeine. Thanks for keeping us going!
coff.ee/cisomarketplace
coindrop.to/cisomarketplaceCopyright 2025 All rights reserved.
Politique
Épisodes
  • The Privacy Divide: State Laws, Age Limits, and the Battle for the Under-18 Consumer.
    Nov 21 2025

    This episode explores the complex division in state mandates between general consumer privacy laws and specific children’s design codes, which often function as separate acts or amendments. We break down how compliance is determined either by broad, quantitative thresholds like annual gross revenue and high data volume, or by the specific service's intention or likelihood of being accessed by minors. Crucially, we contrast the age ranges, noting that while general consumer laws often apply up to age 15 or 17, specific design codes and app store regulations increasingly mandate protections for users up to Under 18

    www.compliancehub.wiki/beyond-coppa-the-surprising-legal-maze-of-u-s-childrens-data-privacy

    Sponsors:

    https://childrenprivacylaws.com

    https://www.compliancehub.wiki

    https://www.myprivacy.blog

    Voir plus Voir moins
    36 min
  • The Crown Jewels of Governance: Australian Cyber Security Priorities for Boards in 2025-26
    Nov 19 2025

    Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company Directors (AICD), this episode details why boards must operate with a mindset of ‘assume compromise’ and oversee the defense of their organization’s most critical assets. We explore the four critical technical and governance areas for 2025-26: implementing better practice event logging, replacing legacy IT, managing third-party risks through the supply chain, and preparing for the post-quantum cryptography transition.

    www.securitycareers.help/australian-cyber-board-priorities-2025-26-a-strategic-guide-with-actionable-tools

    Sponsors:

    https://cyberboard.cisomarketplace.com

    www.cisomarketplace.com

    www.cisomarketplace.services

    Voir plus Voir moins
    12 min
  • The Generative Firewall: Securing AI and Using AI for Defense
    Nov 18 2025

    This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundaries, defense-in-depth strategies, and utilizing Automated Reasoning (formal verification) to verify the correctness of outputs. Finally, we discuss key action items, including the necessity of upskilling security teams and establishing robust governance frameworks to balance AI automation with essential human oversight in high-impact decisions.

    Sponsors:

    https://cloudassess.vibehack.dev

    https://vibehack.dev

    https://airiskassess.com

    https://compliance.airiskassess.com

    Voir plus Voir moins
    14 min
Pas encore de commentaire