GRC & Cyber Security Podcast

By SureCloud

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by SureCloud

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 5
Reviews: 0
Episodes: 61

Description

Welcome to the GRC & Cybersecurity Podcast. On this podcast, you’ll find the latest strategies, advice, and tangible tactics to help you succeed in today’s risk estate. The content is a mix of interviews and fireside chats with CISOs and other GRC and Cybersecurity leaders, expert advice from Risk Management professionals, and the latest insights from our Cyber Threat Briefings. Produced by SureCloud, the provider of cloud based, Integrated GRC (Governance, Risk & Compliance) products and Cybersecurity services, which reinvent the way you manage risk.

Episode Date
The Role of Intelligence in CyberSecurity | AJ Nash
Apr 19, 2024
The Future of Risk Assessments | Tom Cornelius
Mar 28, 2024
How CCM Can Level Up Your Compliance | Jodie Lash
Feb 27, 2024
4 Key Steps to Reduce Your Organizational Risk & Budget | Brent Deterding
Jan 25, 2024
Automation in Compliance with Michelle Garcia | GRC & Cyber Leaders
Jan 10, 2024
Identity & Access Management Best Practices, with Stuart Powell | GRC & Cyber Leaders
Sep 13, 2023
4 Simple, Easy & Budget-Friendly Steps to Reduce Your Organizational Risk, with Brent Deterding | GRC & Cyber Leaders
Sep 07, 2023
How Secure is a WordPress Website (2023 Update)? | Cyber Threat Briefing
Aug 15, 2023
Strategies for Business Continuity & Disaster Recovery, with Alexander Zhitenev, CISO's IFCO | GRC & Cyber Leaders
Jul 20, 2023
MOVEit Breach & CISA Warning for Iphone: Patch Required for Vulnerabilities | Cyber Threat Briefing
Jul 06, 2023
Cybersecurity Leadership: A New Era, with Karla Reffold, COO at Orpheus Cyber | GRC & Cyber Leaders
Jun 06, 2023
AI in Cybersecurity: Opportunities, Risks, and Changes to Job Roles? | Cyber Threat Briefing
May 23, 2023
Why AI is a Threat to Your Business, with Sam Bisbee, F5's Senior Director & Distinguished Engineer | GRC & Cyber Leaders
May 18, 2023
Consumer Protection: US Government vs Tech Firms Disclaimers, with Jim Dempsey, Lecturer & Senior Policy Advisor | GRC & Cyber Leaders
Apr 27, 2023
ChatGPT & AI, Malware Traffic and C3X Supply Chain Attack | Cyber Threat Briefing
Apr 25, 2023
TPRM for Securing Healthcare, with Robert Wood, Chief Information Security Officer at CMS | GRC & Cyber Leaders
Mar 31, 2023
Microsoft OneNote Malware, TPM 2.0 Flaws, The Good & Bad in Cybersecurity | Cyber Threat Briefing
Mar 28, 2023
Europe under Russian Cyberattack, Reddit Security Incident & GoDaddy Hacked | Cyber Threat Briefing
Mar 06, 2023
Implementing Factor Analysis of Information Risk, with Tyler Britton, Cyber Risk Manager at Dropbox | GRC & Cyber Leaders
Mar 01, 2023
Vulnerability Management: What Value Does your Organization Get Running a Solid Program? | CISO's How-To
Feb 17, 2023
Red Teaming: What Values Can your Organization Get From It? | CISO's How-To
Feb 08, 2023
LastPass Incident, Slack's GitHub Breach & Biden's Classified Documents | Cyber Threat Briefing
Feb 03, 2023
What is Zero Trust Strategy and Why Security Awareness Matters, with George Finney, CISO & Author | GRC & Cyber Leaders
Jan 31, 2023
More Women in Male-dominated Industries, with Jane Frankland, Entrepreneur | GRC & Cyber Leaders
Jan 19, 2023
AppSec: How Can your Organization Implement Its Own Successful Program? | CISO's How-To
Dec 09, 2022
Why do CMMC and SCRM Matter with Katie Arrington - Former CISO at US DOD & Owner of LD Innovations | GRC & Cyber Leaders
Dec 01, 2022
NCSC, UK's £6m Cyber Defense Program & Iran Exploits Log4j | Cyber Threat Briefing
Nov 30, 2022
Innovative Approaches to Data Protection: Insights from a Former Gartner, with Claude Mandy | GRC & Cyber Leaders
Nov 17, 2022
Microsoft Data Leak, Australian Cyberattacks & Age Impact on Security | Cyber Threat Briefing
Nov 09, 2022
Inclusion: The Cyber Advantage, with Holly Foxcroft | GRC & Cyber Leaders
Nov 03, 2022
Market Challenges and Best Practice with Jake Bernardes, VP of Security, and Compliance at Whistic | GRC & Cyber Leaders
Oct 18, 2022
Uber, Rockstar Games, and Revolut Hacked | Cyber Threat Briefing
Oct 14, 2022
Cisco, Twilio, Cloudflare: Cyber Attacks / NCSC & ICO: Ransomware Payments | Cyber Treat Briefing
Oct 11, 2022
Information Security Management Best Practice with Benjamin Corll, CISO at Coats | GRC & Cyber Leaders
Aug 15, 2022
Managing Spectris cybersecurity and compliance burdens with Ian Brown, CISO at Spectris | GRC & Cyber Leaders
Aug 01, 2022
Managing Okta’s password-stealing risk and Linux-based malware strains | Cyber Treat Briefing
Jul 29, 2022
Challenges of Managing Cybersecurity and Compliance Threats for a Government-focused Services Provider with Mike Privette, VP of Cyber Security at Passport | GRC & Cyber Leaders
Jul 18, 2022
Examining the Follina and Confluence Vulnerabilities | Cyber Threat Briefing
Jun 23, 2022
GRC Past, Present and Future | Capabilities
Jun 20, 2022
Cybersecurity and the SCF, with Tom Cornelius, Co-Founder of the Secure Controls Framework | GRC & Cyber Leaders
Jun 06, 2022
UK SOX: What is the purpose of this emerging legislation and how will it impact your business? | Capabilities
May 30, 2022
Examining the CISA Report for Exploited Vulnerabilities | Cyber Threat Briefing
May 20, 2022
Practical Steps to Improve your Third-Party Risk Management Program | Capabilities
May 19, 2022
Common Third-Party Risk Management Challenges for Organizations | Capabilities
May 12, 2022
Cybersecurity Essentials for Cloud Environments | CISO's How-To
May 09, 2022
Interpreting the 2022 Cyber Security Breaches Survey from the DCMS I Cyber Threat Briefing
Apr 28, 2022
Making Cybersecurity a Quality Function, with Greg van der Gaast, CISO at ScoutBee | GRC & Cyber Leaders
Apr 25, 2022
Data Privacy Compliance and Cybersecurity Challenges with Phil Lea, Chief Privacy Officer at Tenth Revolution Group | GRC & Cyber Leaders
Apr 06, 2022
Ukrainian Fundraiser Phishing Scams
Apr 06, 2022
The Strengthening American Cybersecurity Act, with Chad Brustin, Lead Security Engineer at Clyde
Apr 04, 2022
Assessing the Russian Cyber Threat Landscape I Cyber Threat Briefing
Mar 23, 2022
Cybersecurity and Risk Best Practice with Robin Smith, Chief Security Officer at Aston Martin | GRC & Cyber Leaders
Mar 21, 2022
Cyber Warfare: How will It Impact your Organization and What Can you do to Stay Safe?
Mar 10, 2022
Enterprise Architecture And Its Role Against Security Threats | Cyber Threat Briefing
Mar 02, 2022
CMMC 2.0 - What's New with Tom Cornelius, Founder & Contributor at SCF
Feb 28, 2022
CMMC (Cybersecurity Maturity Model Certification) - What, When, Who and Why?
Feb 24, 2022
An Organization's Susceptibility to Supply Chain Attacks | Cyber Threat Briefing
Feb 21, 2022
Tooling Considerations To Support Your GRC / IRM Programs | Capabilities
Feb 16, 2022
Vendor Risk Best Practice with Ryan Walker, Third-Party Risk Manager at AutoZone | GRC & Cyber Leaders
Feb 15, 2022
Through The Eyes of an APT | Cyber Threat Briefing
Feb 11, 2022
Welcome to the Capability-Centric GRC & Cyber Security Podcast
Feb 10, 2022