PodcastsOnderwijsEnterprise Security Weekly (Audio)

Enterprise Security Weekly (Audio)

Adrian Sanabria
Enterprise Security Weekly (Audio)
Nieuwste aflevering

471 afleveringen

  • Enterprise Security Weekly (Audio)

    Battling payment fraud with tokenization and executive interviews from RSAC 2026 - Jimmy White, Thyaga Vasudevan, Brian Oh, Mickey Bresman, Ashish Jain - ESW #453

    06-04-2026 | 1 u. 45 Min.
    Interview with Brian Oh from FIS Global
    Merchant-Specific Tokenization: Making Embedded Finance More Fraud-Resistant
    Payment fraud has not gone away. It has evolved into a largely social engineering-driven problem that increasingly lands on security leaders' desks. In this episode, Brian Oh from FIS Global explains how merchant-specific tokenization and virtual cards work, why embedded finance raises the stakes, and how approaches like behavioral biometrics and tokenized payments can reduce fraud while keeping checkout experiences fast and seamless.
    Segment Resources:
    FIS Global - The Future of Embedded Finance
    PYMNTS Article - FDIC Support Clears a Path for Tokenized Deposits to Scale
    FIS Global Blog - How behavioral biometrics are leading the way in secure banking and fraud defense for Digital One™ Flex clients
    FIS Global Blog - Inside Flex's Advanced Fraud Defense: What Tech Leaders Need to Know
    Interviews with Mickey Bresman from Semperis and Ashish Jain from OneSpan
    The Making of Midnight in the War Room
    Semperis is producing Midnight in the War Room, a full length feature film on cyberwar and CISO heroism and their work defending their companies against the onslaught of cyberattacks. Midnight in the War Room puts a human face on the front lines of cyber defense and will reveal the weight carried by defenders every day and why resilience must be built not only into systems, but into people and institutions.
    This segment is sponsored by Semperis! Visit https://securityweekly.com/semperisrsac to learn more.
    Why Passkeys Are Ready for Prime Time in Modern Banking
    Authentication has long required an uneasy tradeoff between strong security and smooth user experience. This interview segment explores why passkeys are ready now for even the highest risk banking use cases, why banks should be moving quickly to adopt them, and how OneSpan delivers the most complete, secure, and enterprise ready passkey solution on the market.
    This segment is sponsored by OneSpan. Visit https://securityweekly.com/onespanrsac to learn more about them!
    Interviews with Jimmy White from F5 and Thyaga Vasudevan from SkyHigh Security
    Securing AI Agents: Managing Runtime Risk in Enterprise AI Systems
    As organizations deploy AI agents and automated workflows, security challenges are increasingly emerging once these systems interact with APIs, enterprise data, and business processes in production.
    For more information about F5, please visit https://securityweekly.com/f5rsac.
    AI's Security Inflection Point: Hybrid, Browser Security, and Data Compliance
    The rapid adoption of AI applications is reshaping enterprise security architectures. As organizations integrate AI copilots, agentic workflows, and cloud-native platforms, traditional network-centric security models are proving insufficient.
    This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighrsac to learn more about them!
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-453
  • Enterprise Security Weekly (Audio)

    Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - Alexandre Sieira, Lenny Zeltser, Helen Patton - ESW #452

    30-03-2026 | 1 u. 50 Min.
    Interview with Helen Patton about her new book, Switching to Cyber
    Helen joins us to discuss her second book, "Switching to Cyber." Her first book discussed strategies for handling various stages of the cybersecurity career, while this one, co-written with Josiah Dykstra, provides a guide for switching to cyber mid-career.
    Check out her book, Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career:
    on Amazon
    on Barnes & Noble
    and on the publisher's website
    Interview with Lenny Zeltzer: Reflections on Being a CISO
    After a cybersecurity career in various roles, doing everything from product management to malware analysis training, Lenny spent 6 years in the CISO seat at Axonius, from near the inception of the company through its growth from its modest Series A stage in 2019 to the present, with nearly a billion in funding today.
    Lenny's CISO Essays:
    What Being a CISO Taught Me About Security Leadership
    As a CISO, Are You a Builder, Fixer, or Scale Operator?
    The Chief Insecurity Officer
    Interview with Alexandre Sieira: The state of TPCRM is shifting
    The gold standard for third party cyber risk management has long been the humble questionnaire. While we've seen security rating services companies generate scores by scanning a company's external resources. Both approaches are widely considered inaccurate for either creating trust relationships or determining the true risk of doing business with a third party.
    Every analysis of this problem comes to the same conclusion: without internal data about the state of systems and the security program, TPCRM can't improve substantially. Most this believe this to be an impossible problem: third parties would never share data this sensitive with a customer and first parties assume the same.
    What if they did?
    That's exactly the premise behind Tenchi Security, and Alexandre joins us to talk about how they've accomplished the 'impossible' in Brazil and aim to expand their success to the US.
    Resources:
    Thoughts from a panel discussion at a recent FS-ISAC event, shared on LinkedIn
    Predicts 2026: Third-Party Cybersecurity Risk Management Evolves for the AI Era (Gartner Subscribers only, sorry)
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-452
  • Enterprise Security Weekly (Audio)

    Can AI help critical infrastructure, the state of the cyber market, and weekly news - Mike Privette, Kara Sprague - ESW #451

    23-03-2026 | 1 u. 42 Min.
    Interview with Kara Sprague - The AI Fix for Infrastructure's Oldest Security Risks.
    Critical infrastructure, often built on decades-old systems and legacy code, remains vulnerable to cyberattacks. From pipelines and energy grids to transportation networks, we break down where critical infrastructure is vulnerable and how AI could potentially help strengthen defenses.
    Interview with Mike Privette - The State of the Cybersecurity Market
    Here at ESW, we use Mike Privette's Security, Funded newsletter to prepare for every news segment. His newsletter covers the latest fundings, acquisitions, public market performance, layoffs, and other pertinent market details every week. We particularly enjoy the weekly Vibe Check.
    In this interview, he joins us for the third year in a row, to discuss the most interesting insights from his annual State of Market Report.
    Post recording Adrian here: Whooooo, so this conversation was SO good, I decided to punt the news segment in favor of a part 2 with Mike, so enjoy!
    Also, though I punted the news segment, I did collect these stories and annotated them, so I think there's still some value in leaving them in the show notes. Scroll down for the links and my comments on each of these!
    Weekly Enterprise News
    Finally, in the enterprise security news,
    funding announcements seem to be ramping up before RSA
    Should security architects be shifting right?
    How McKinsley's AI platform got hacked… by AI
    Amazon is having a bad time with AI lately
    Europe announces a Google Workspace/Microsoft 365 replacement
    Robot dogs are apparently guarding datacenters now
    Some much needed security humor in our squirrel stories before we all fly to San Francisco and lose our minds for a week
    All that and more, on this episode of Enterprise Security Weekly.
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-451
  • Enterprise Security Weekly (Audio)

    AI Governance, new book (Code War) from Allie Mellen, and the weekly news! - Jeremy Snyder, Allie Mellen - ESW #450

    16-03-2026 | 1 u. 51 Min.
    Interview with Jeremy Snyder from FireTail about AI Governance
    Death by a thousand cuts: the AI shadow IT problem
    I think the best description of the AI governance problem during this interview was the title of the award-winning movie, Everything, Everywhere, All At Once. Generative AI has been disrupting businesses, products, and vendor risk management for a few years now. FireTail is one of the companies trying to address this problem for enterprises, so we check in with Jeremy Snyder to see how things are going.
    Segment 1 Resources:
    https://www.firetail.ai/ai-breach-tracker
    Interview with Allie Mellen about her new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield
    We're VERY excited to check out Allie's new book, which will be released on St. Patrick's Day 2026! The timing could not be better, as her book is perfectly positioned to provide some much needed perspective on the cyber aspects of the ongoing war in Iran.
    Is it normal to see the use of wipers on healthcare companies in the midst of the conflict? Is there any precedent for hyperscaler datacenters getting targeted (some of AWS's EMEA regions are still recovering)? Check out the conversation to find out!
    Pick up the book!
    from Wiley
    from Barnes & Noble
    from Amazon
    Allie's personal website
    The Weekly Enterprise News
    Finally, in the enterprise security news,
    Vibes and funding!
    Starting to see some disruption in the vuln mgmt space (finally!)
    Tons of new free tools
    lots of essays
    lots of reports
    logs of breaches
    the talks our hosts are giving at RSAC conference
    and someone is selling an actual cone of silence???
    All that and more, on this episode of Enterprise Security Weekly.
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-450
  • Enterprise Security Weekly (Audio)

    Breaking in with CrashFix, supply chain security, and CMMC phase 1 - David Zendzian, Anna Pham, Jacob Horne - ESW #449

    09-03-2026 | 1 u. 34 Min.
    Interview with Anna Pham
    Breaking in with ClickFix: Anatomy of a modern endpoint attack
    Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group.
    In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter.
    The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command.
    Segment Resources:
    BLOG - Dissecting CrashFix: KongTuke's New Toy
    Interview with David Zendzian
    Continuous compliance and real security lifecycle management
    Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable.
    In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people.
    Segment Resources:
    BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation
    Interview with Jacob Horne
    CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain
    With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits.
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-449

Meer Onderwijs podcasts

Over Enterprise Security Weekly (Audio)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
Podcast website

Luister naar Enterprise Security Weekly (Audio), Omdenken Podcast en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies