PodcastsNieuwsCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Nieuwste aflevering

384 afleveringen

  • CISO Insights: Voices in Cybersecurity

    Bridging the Gap: Mastering the CTI Capability Maturity Model

    21-1-2026 | 23 Min.
    This series explores the Cyber Threat Intelligence Capability Maturity Model (CTI-CMM), a stakeholder-first framework designed to help intelligence programs support the specific decisions and actions of those protecting the organization. We guide listeners through the model’s eleven distinct domains and the cyclical five-step implementation process—Prepare, Assess, Plan, Deploy, and Measure—to transition teams from reactive, ad hoc practices to standardized, predictive operations. By analyzing specific use cases and maturity indicators, we demonstrate how to evolve metrics from simply counting effort to quantifying systemic impact and business value.

    www.breached.company/briefing-the-cyber-threat-intelligence-capability-maturity-model-cti-cmm

     

    Sponsors: 

    www.breached.company

    www.cisomarketplace.com
  • CISO Insights: Voices in Cybersecurity

    Choke Points and Synthetic Faces: Systemic Disruption of the Modern Cybercrime Ecosystem

    20-1-2026 | 15 Min.
    Transnational cybercrime has evolved into a globally distributed ecosystem where identity is now "synthetic, scalable and weaponizable" due to the proliferation of deepfakes and camera injection tools targeted at digital verification systems. To counter this, the Cybercrime Atlas fosters global collaboration to map criminal infrastructure and identify technical "choke points," a strategy validated by the Serengeti operations which resulted in thousands of arrests and the seizure of $140 million in criminal funds. Simultaneously, experts recommend that institutions implement multi-layered defenses—such as trusted camera source controls and active liveness checks—to harden Know Your Customer (KYC) processes against the democratized threat of AI-generated impersonation.

    https://initiatives.weforum.org/cybercrime-atlas/home

    www.scamwatchhq.com/your-voice-your-face-your-money-the-terrifying-rise-of-ai-powered-scams-in-2026

     

    Sponsors:

    www.securitybydesign.shop

    SECURE15 - 15% off cybersecurity swag

    www.generatepolicy.com

    CISO30  - 30% OFF for first-time buyers
  • CISO Insights: Voices in Cybersecurity

    Secure, Defend, Thwart: Navigating the NIST Cyber AI Profile

    18-1-2026 | 15 Min.
    This episode explores the newly drafted Cyber AI Profile, a guide designed by the National Institute of Standards and Technology (NIST) to help organizations manage the complex intersection of artificial intelligence and cybersecurity. We break down the three primary focus areas—Secure, Defend, and Thwart—which provide a structured approach to protecting AI system components, leveraging AI for defensive operations, and building resilience against AI-powered threats. Listeners will learn how this Profile integrates with the existing NIST Cybersecurity Framework (CSF) 2.0 to offer prioritized outcomes and considerations for organizations at any stage of their AI journey.

     

    Sponsors:

    www.cisomarketplace.com

    www.airiskassess.com

    compliance.airiskassess.com
  • CISO Insights: Voices in Cybersecurity

    Securing the Global Ledger: Balancing Proportionality and Resilience in Financial Cyber Risk

    17-1-2026 | 40 Min.
    The International Monetary Fund (IMF) actively strengthens the global financial system by evaluating national cyber frameworks through the Financial Sector Assessment Program (FSAP) and providing demand-driven Technical Assistance to address increasingly sophisticated threats. Effective regulation requires a delicate balance between principles-based flexibility and prescriptive rules, while ensuring that supervisory intensity is proportionate to an institution's size and systemic importance. However, because the financial sector is an interconnected chain, regulators must ensure that even small institutions maintain a baseline of security to prevent them from becoming the "weakest link" that triggers a systemic crisis.

    www.securitycareers.help/good-practices-in-cyber-risk-regulation-and-supervision

     

    Sponsors:

    www.cisomarketplace.com

    www.cisomarketplace.services
  • CISO Insights: Voices in Cybersecurity

    The Silicon Siege: How AI and Quantum Computing are Rewriting Global Security

    16-1-2026 | 35 Min.
    This episode examines how Artificial Intelligence and quantum computing have transitioned from frontier concepts to systemic forces that are fundamentally reshaping geostrategic competition and the nature of modern warfare. We investigate the critical milestone of "Q-Day," the point where the deployment of Shor's algorithm threatens to collapse the cryptographic foundations of digital trust, alongside the risks of automated military escalation driven by AI. Lastly, we explore the potential for a "quantum arms race" and the widening "quantum divide" that could leave entire regions behind in a new, bifurcated global order.

    www.breached.company/global-risks-report-2026-key-insights-and-analysis

     

    Sponsors:

    www.quantumsecurity.ai

    www.cisomarketplace.com

    www.breached.company

Meer Nieuws podcasts

Over CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Podcast website

Luister naar CISO Insights: Voices in Cybersecurity, NOS Met het Oog op Morgen en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/22/2026 - 11:02:55 AM