Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Building a Scalable Compliance Program: Mapping, Integration, and Control Reliance
|
May 01, 2026 |
|
CIS Critical Security Controls: Translating Risk into Prioritized Action
|
Apr 24, 2026 |
|
SOX IT General Controls: Access, Operations, and Change Discipline
|
Apr 17, 2026 |
|
NIST: A Risk-Based Framework for Scalable Security Programs
|
Apr 04, 2026 |
|
ISO 27017 and ISO 27018: Cloud Security and the Protection of Personal Data
|
Mar 28, 2026 |
|
ISO 27001: The Management System Behind the Controls
|
Mar 21, 2026 |
|
Understanding SOC 2 Type I and Type II: Design and Operational Maturity
|
Mar 13, 2026 |
|
SOC 2 Boundaries : Subservice Organizations and User Entity Controls
|
Mar 07, 2026 |
|
SOC 2 Fundamentals: Understanding the Trust Services Criteria
|
Feb 28, 2026 |
|
Why Compliance Frameworks Exist and How Seasoned Security Leaders Use Them
|
Feb 21, 2026 |
|
Season 3 Launch : Compliance, Controls & Confidence
|
Feb 16, 2026 |
|
Beyond Compliance : How Do You Build Trustworthy AI as a Strategic Advantage
|
Dec 20, 2025 |
|
AI-Washing & Hidden Integrations : The New Compliance Blindspot
|
Dec 12, 2025 |
|
AI in the Boardroom: Translating Risks for Non-Technical Leaders
|
Dec 05, 2025 |
|
Incident Response in an AI-Driven World
|
Nov 28, 2025 |
|
Operational Resilience with AI: Friend or Foe?
|
Nov 22, 2025 |
|
AI and Bias : When Compliance Meets Ethics
|
Nov 14, 2025 |
|
The AI Supply Chain: Risks Beyond Your Organization
|
Nov 08, 2025 |
|
Governance in the Age of AI: Who Owns the Risk?
|
Nov 01, 2025 |
|
AI and Data Privacy: When Sensitive Data Trains the Algorithm
|
Oct 25, 2025 |
|
Securing AI Models: Protecting the Brain of the Machine
|
Oct 18, 2025 |
|
SOC 2 for AI : Can Traditional Frameworks Keep Up?
|
Oct 10, 2025 |
|
Shadow AI: The Unseen Expansion of Your Attack Surface
|
Oct 04, 2025 |
|
Season 2 Is Here: Securing AI
|
Sep 26, 2025 |
|
Incident Response 101: How to Contain, Control, and Come Back Strong
|
Aug 09, 2025 |
|
Protecting the Crown Jewels : Why Data Security Really Matters
|
Aug 01, 2025 |
|
Give Me 5 Minutes to End Your Bad Coding Habits: Why Secure Development Matters
|
Jul 25, 2025 |
|
You Forgot to Revoke It: The Real Risk of Access Gone Wrong
|
Jul 19, 2025 |
|
Secure Authentication: What Most Startups Get Wrong (and How to Fix It)
|
Jul 11, 2025 |
|
Logging & Monitoring: The Quiet Pillars of Real Security
|
Jul 04, 2025 |
|
Vulnerability Management: Finding the Cracks Before They Break You
|
Jun 27, 2025 |
|
Is Your Change Management Just a Rubber Stamp?
|
Jun 20, 2025 |
|
Third-Party Risk: The Silent Threat to Your Security Program
|
Jun 14, 2025 |
|
Security Without Governance? Here is why it fails #Securely Speaking
|
Jun 07, 2025 |
|
Officially Introducing The Virtual CISO - The Cybersecurity Advice You’ve Been Missing Starts Here
|
May 31, 2025 |
|
What is Third Party/Vendor Risk Management all about?
|
Nov 14, 2022 |
|
Data Privacy Series: Everything you need to know about GDPR and how it affects your organization.
|
Oct 31, 2022 |
|
Does your organization require FSMA or FEDRAMP Compliance. Here is what you need to know about NIST 800-53 as it relates to these certifications.
|
Oct 24, 2022 |
|
Is your organization complying to the right level of PCI DSS? What is changing with the new PCI DSS version 4.0?
|
Oct 17, 2022 |
|
How can NIST Cybersecurity framework improves your organization's business processes?
|
Oct 03, 2022 |
|
All you need to know about Cybersecurity Maturity Model Certification (CMMC) Version 2.0
|
Oct 03, 2022 |
|
Data Privacy Series: What is California Privacy Right Act (CPRA) and how does it differ from the California Consumer Privacy Act (CCPA)
|
Sep 26, 2022 |
|
Data Privacy Series: What is California Consumer Privacy Act (CCPA) and does it apply to your organization?
|
Sep 25, 2022 |
|
Data Privacy Series: What is HIPAA?
|
Sep 18, 2022 |
|
Data Privacy Series: What you need to know about ISO 27701
|
Sep 18, 2022 |
|
Everything you need to know about ISO27001:2022
|
Sep 18, 2022 |
|
What are CIS Controls v8 (CIS 18)
|
Jul 28, 2022 |
|
SOCIT2ME: Introduction to SOC 2
|
Jul 18, 2022 |