Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Exposing Shortcomings in Cybersecurity Leadership and why we need more Dana Scullys
|
Aug 29, 2023 |
Built-In Bias: Existing Real-World Inequality in AI and Other Technology
|
Aug 15, 2023 |
Protecting Shoes: Balancing Cybersecurity Strategy and Business Success at Dr Martens
|
Aug 01, 2023 |
CIS Roundtable – Keeping the Public Sector Secure
|
Jul 18, 2023 |
What has ESG got to do with Cybersecurity?
|
Jul 04, 2023 |
CIOs Should think like Entrepreneurs on Dragon’s Den
|
Jun 20, 2023 |
Proud Hackers: Understanding Criminal Minds
|
Jun 06, 2023 |
Keeping Threats ‘At-Bay’ – Normalizing Cyber Insurance as Part of Business
|
May 23, 2023 |
RSAC Part 2: CISO trends + thinking differently about tradeshows
|
May 11, 2023 |
ChatGPT buzz + much more from the RSAC show floor
|
May 09, 2023 |
Using Criminal Skills for Good - a Memoir of a Burglar for Hire
|
Apr 25, 2023 |
It’s Time to Retire the Risk Management Profession
|
Apr 11, 2023 |
Why Security Professionals Should Consider Career Coaching
|
Mar 28, 2023 |
Scary Smart AI? Or the Potential to Be a Force for Good?
|
Mar 14, 2023 |
Work Inspired – What’s Possible in Shaping Corporate Culture
|
Feb 21, 2023 |
Cyber Extortion – The Next Evolution of Ransomware
|
Feb 07, 2023 |
Marketing as Customer Experience – Be an Active Listener
|
Jan 24, 2023 |
Cybermindz - Bonus Episode
|
Jan 16, 2023 |
Cybermindz – Hope in a Burnt-Out Sector
|
Jan 10, 2023 |
Criminals are like water, adapting to new circumstances
|
Dec 13, 2022 |
Risk, Risk, Risk…and Beer: What Keeps the Cyber C-Suite Up at Night
|
Nov 29, 2022 |
Is Data the new Uranium?
|
Nov 15, 2022 |
Supercharging the AI tortoise
|
Nov 01, 2022 |
Beyond Awareness Training: How to Improve User Behavior
|
Oct 04, 2022 |
Shining a Light on Bots: The Good and the Bad
|
Sep 20, 2022 |
The Billion Dollar Cryptocurrency Scam
|
Sep 06, 2022 |
Closing the cybersecurity skills gap through education and opportunity
|
Aug 09, 2022 |
Actors, tabletop exercises, and insider threats
|
Jul 26, 2022 |
The Internet Tattoo Effect and common sense online safety
|
Jul 12, 2022 |
Advanced Persistent Threat Groups: Preparing Instead of Hoping
|
Jun 28, 2022 |
Quantum Computing: Qubits, Algorithms, and Cybersecurity?
|
Jun 14, 2022 |
The Lazarus Heist: From Phishing Emails to Half a Ton of Cash
|
May 31, 2022 |
A Real Life Phishy Business: Jobfished, catfished by your boss?
|
May 17, 2022 |
Hacker life: Insights into hacking, penetration testing, and more
|
May 03, 2022 |
Making cybersecurity a business priority - the World Economic Forum’s Global Cybersecurity Outlook 2022
|
Apr 19, 2022 |
Hacked, and hacked again
|
Apr 05, 2022 |
Being ‘always on’ earned our guest a front row seat to the best tech stories of the last few decades
|
Mar 21, 2022 |
Starting small to succeed – two inspiring women with a bright future
|
Mar 08, 2022 |
Giving orders can get you in big trouble – intent-based leadership tales
|
Feb 15, 2022 |
Recovering from a cyberattack, openness, snacks and memory sticks
|
Jan 31, 2022 |
Workhorses, kidnappings, and ransomware
|
Jan 18, 2022 |
Chasing cybercriminals across borders – the world of digital forensics
|
Jan 04, 2022 |
Cartoon eyes, and other cybersecurity awareness training techniques
|
Dec 21, 2021 |
Our guest may enjoy being naked, but you should have your brand covered
|
Dec 07, 2021 |
The New Normal in cyber security, an interview with Michelle Price by The Economist Impact
|
Nov 30, 2021 |
Small company – Big cybersecurity issues
|
Nov 23, 2021 |
How data protection relates to cyber security, an interview with Kerissa Varma by The Economist Impact
|
Nov 16, 2021 |
Teenagers and cybercrime – the draw of malice and money?
|
Nov 09, 2021 |
The impact of ransomware, an interview with Prof. Ciaran Martin by The Economist Impact
|
Nov 02, 2021 |
Cybersecurity and crisps
|
Oct 26, 2021 |
How to ‘level up’ ransomware protection and the curious case of the $54,000 ransom
|
Oct 12, 2021 |
From cyber stalking to online grooming, the real-world consequences of cybercrime.
|
Sep 29, 2021 |
The art of being a cyber smoke jumper
|
Sep 13, 2021 |
Best of – Funniest bits from Phishy Business season 1
|
Aug 09, 2021 |
Resilience – a key component to sporting (and cyber) success
|
Jul 12, 2021 |
Escaping ‘Zoom fatigue’ – how to organise new ways of working effectively
|
Jun 28, 2021 |
Heard the one about identity theft?
|
Jun 14, 2021 |
Predicting tomorrow’s news today – the fascinating world of Threat Intelligence
|
Jun 01, 2021 |
Generation Z – the Born Digital generation with Bob Wigley
|
May 20, 2021 |
Curious cases of identity theft with Maria Genova
|
May 06, 2021 |
Peeking beyond the forms at the mysterious world of marketing
|
Apr 26, 2021 |
Recruiting incredible women in cybersecurity
|
Apr 12, 2021 |
How modern cybercrime works – and pays
|
Mar 29, 2021 |
POPIA and GDPR after Brexit – Dario Milo, Lawyer
|
Mar 15, 2021 |
Why difference (and mints) are strengths in cybersecurity – Jenny Radcliffe, People Hacker
|
Mar 01, 2021 |