Nis2 عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
In cybersecurity, every move is critical. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We explore the latest trends and threats in cybersecurity, providing insights on how to protect your organisation effectively. Our discussions, featuring thought leaders and pioneering organisations, cover the most pressing issues businesses face today. Tune in as we dissect major threats, explore emergi ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

Unsubscribe
Unsubscribe
ماهیانه+
 
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
  continue reading
 
Artwork

1
Safety Corner

Florian Wagner

Unsubscribe
Unsubscribe
ماهیانه
 
Der Podcast für die Safety Community. Expert:inn:en im Gespräch über Safety Engineering und Management im Kontext von großen, komplexen Systemen. About the host: Florian Wagner is a Functional Safety Consultant with msg Plaut Austria. He has worked in Automotive, Railway and Aerospace projects. Mehr erfahren: https://safetycorner.wagnerflorian.eu/index.php/de/der-host
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

Unsubscribe
Unsubscribe
ماهیانه
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Loading …
show series
 
Are you ready for DORA and NIS2? Discover how these regulations could transform your security strategy! Welcome back to another episode of Razorwire! Today we unpack the DORA and NIS2 regulations with esteemed cybersecurity expert Richard Cassidy. I’m your host, Jim Rees, and I’ll be guiding the conversation for anyone navigating the evolving lands…
  continue reading
 
Slut på semester, hösten är på ingång och med den är det dags att förbereda sig på nya lagar och förordningar som kommer. Hur förbereder du dig bäst, vad är viktigast och hur påverkar det dig? Agnes Hammarstrand, advokat på advokatbyrån Delphi och expert på tech-juridik, guidar oss igenom vad som behöver göras. Omsorgspodden leds av Cecilia Anderss…
  continue reading
 
When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies? In this episode of the EM360 Podcast, Chris Steffen, EMA's Vi…
  continue reading
 
We already talked with Kim Theilgaard once. And the response was, that you all want more. In the first episode (episode 12 of the podcast), Kim mentioned the 20-50 questions they ask all companies to determine whether they are ready for cyber insurance. In this episode, we dive a bit deeper into these questions which are focused on five different a…
  continue reading
 
En pratstund med Patrik Nilsson och Shadan Ghafouri som jobbar i Eskilstuna kommun. De delar med sig av sina erfarenheter av att jobba med utveckling och digitalisering i en kommun, både framgångsrecept och misslyckanden. Omsorgspodden leds i detta avsnitt av Cecilia Andersson och Bjarne Darwall.توسط Omsorgspodden
  continue reading
 
Is the IT job market strong or in crisis? Where should you search for jobs? How do you land interviews and stand out? These are the main questions we tackle in this episode of Ticket Volume. Join host Matt Beran as he dives into the IT job market with experts David Lowe and Stephanie Lundberg. They explore current trends, challenges, and strategies…
  continue reading
 
Earlier this month, our Swarm of ethical hackers attended DEF CON 32 in Las Vegas, one of the most anticipated events in the hacking community. On this episode, join our Head of People and Culture and host, Ellie Lancaster, as she interviews our colleagues Faith, Alex, and Joao about their standout moments from the event. Learn about the different …
  continue reading
 
Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats. Embrace a dynamic approach to security that adapts to …
  continue reading
 
In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight t…
  continue reading
 
Welcome back to Razorwire! I'm Jim, your host, and joining me today are cybersecurity experts Richard Cassidy and Oliver Rochford. Following on from our last episode of Razorwire, where Oliver and I discussed the key issues that cyber professionals need to focus on in 2024, this episode centres on key takeaways from recent security conferences, par…
  continue reading
 
Join us in Episode 85 of Ticket Volume as we delve into the world of Service Management Maturity and Service Desk Certifications with industry experts Joshua Nelson, Alex Harding, and Sarah Jayne Bulley. Discover the five levels of Service Desk Certifications, their importance in IT Service Management, and how achieving these certifications can ele…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, we delve into the complex provisions of the new EU AI Act, exploring its global effects and extraterritorial implications similar to the GDPR. Tom, Jonathan and a few friends discuss the multifaceted regulatory framework, wh…
  continue reading
 
Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This model helps prevent breaches and limits the spread of threats within a network. While transitioning to Zero Trust can be challenging, it can be implemen…
  continue reading
 
Anthropology and cyber security might not be the first two words you would connect in an association game. But maybe they should. We've invited Laura Lynggard Nielsen who works at Alexandra Instituttet as a Senior Security Anthropologist. She uses methods from anthropology to uncover how organizations can create stronger cyber security. You can lea…
  continue reading
 
Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. That’s where automated network testing comes in! It’s like having a tactical SWAT team on standby, ready to spot exploitable vulnerabilities and provide you…
  continue reading
 
Welcome to Razorwire, the podcast that cuts through the noise of the information security industry. I'm your host, Jim, and today we're talking a look at the state of the infosec industry so far in 2024 with our guest, Oliver Rochford. If you're a cybersecurity professional taking on the evolving threats and challenges of our field, you won't want …
  continue reading
 
In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods are time-consuming and error-prone and struggle to scale with the growing volume of threat sophistication. Automation, particularly in Software Composition Analysis (SCA), is a beacon of hope in the …
  continue reading
 
Join us for an enlightening episode of the Ticket Volume podcast as host Matt Beran sits down with Dr. Tuuli Bell, a leading expert in sustainability and Environmental, Social, and Governance (ESG) criteria. In this discussion, they explore the critical role of sustainability across various sectors, including construction, textiles, and IT.Dr. Bell…
  continue reading
 
Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives Explained Compliance with cybersecurity standards is essential for any organisation to protect sensitive information, maintain customer trust, and mitigate the risks associated with data breaches and cyber threats. Adhering to recognized frameworks and regulations, not o…
  continue reading
 
Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wit and adaptability of seasoned improvisers! Communication and collaboration are the secret sauce of robust cybersecurity. Improv supercharges team communication and cranks up problem-solving skills to…
  continue reading
 
Those of you at DEF CON 31 might remember the badges our swarm members had. Well, this year, we've got something even better! With DEF CON 32 around the corner, we are ready to introduce the team behind the awesome badge we will bring to the event. Meet our host and Head of People and Culture, Ellie Lancaster, as she discusses with Paul, John, and …
  continue reading
 
Podcasts are revolutionising how we raise awareness about cybersecurity. They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday conversations. By breaking down these complex issues into relatable and exciting discussions, podcasts make cybersecurity accessible and understandable…
  continue reading
 
The deadline for financial entities is looming – get actionable information and advice on DORA compliance with industry expert Paul Dwyer! Welcome to Razorwire, your go-to podcast for cutting edge insights and expert analysis in the world of information security. I'm your host, Jim, and in today's episode, we have the privilege of speaking with Pau…
  continue reading
 
Join us for a thrilling dive into the world of AI in IT Service Management with expert Daniel Ciolek from InvGate. In this episode, Daniel spills the secrets on how AI is transforming ITSM—from supercharging response times to enhancing document privacy. Get ready for a fun and insightful journey into the future of ITSM. Don’t miss out! What do you …
  continue reading
 
Tom Fox and Jonathan Armstrong, a renowned expert in cybersecurity, co-host the award-winning “Life with GDPR.” Jonathan has returned from his hiatus, and in this episode, we examine the UK election results and their potential impact on compliance. The recent UK election has significant implications for compliance, particularly concerning the dynam…
  continue reading
 
Unlock the secrets to successfully navigating the cybersecurity business landscape with insights from industry legend Jane Frankland on this episode of Razorwire. Welcome to Razorwire, I'm your host, Jim and in today’s episode, we have the privilege of discussing the intricacies of running a successful cybersecurity business with none other than Ja…
  continue reading
 
Are IT professionals really socially awkward? Does rebooting solve everything? Join us in Episode 82 of Ticket Volume as Matt Beran and guests Chris Chagnon, Caitlin Price, and Valence Howden dive into common IT stereotypes.They explore the evolution of IT roles, discuss the industry's gender dynamics, and share how modern IT pros use fashion as a …
  continue reading
 
Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collabora…
  continue reading
 
We've invited Kim Theilgaard on to our podcast. Kim is partner at fairside. fairside help and advise companies in insurances. One of these insurances is cyber insurances which is becoming more and more popular. In the episode Kim tells me about: What a cyber insurance is What it covers and what it doesn't cover What you need to have in place to get…
  continue reading
 
Omsorgspodden har besökt Almedalsveckan 2024.Regeringen har tagit fram ett förslag på en ny socialtjänstlag. Redan i förra veckan fångade vi Camilla Waltersson Grönvall, Sveriges socialtjänstminister, i Almedalen och lyssnade till hennes tankar om lagförslaget. Omsorgspodden leds i detta avsnitt av Cecilia Andersson. Välkommen att lyssna på Omsorgs…
  continue reading
 
Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today are using more cloud applications than ever, and with the interconnected nature of the cloud, entry into one application can result in lateral movement to others—making the time to a breach faster th…
  continue reading
 
Omsorgspodden har besökt Almedalsveckan 2024.En solig förmiddag hade vi en pratstund med Per Nydén, jurist på IMY och något av en expert vad gäller den kommande AI-förordningen. Vad behöver man som kommun tänka och förbereda sig på? Lyssna till Pers tips och råd. Omsorgspodden leds i Almedalen av Cecilia Andersson och Anna Wernersson.Välkommen att …
  continue reading
 
Omsorgspodden har besökt Almedalsveckan 2024.Där pratade vi en stund med Anna Eriksson, generaldirektör på DIGG. Vad kommer hända när AI-förordningen träder i kraft? Hur påverkar det kommunerna runt om i landet?Omsorgspodden leds i Almedalen av Cecilia Andersson och Anna Wernersson.Välkommen att lyssna på Omsorgspodden. Har du tankar/idéer eller vi…
  continue reading
 
Omsorgspodden har besökt Almedalsveckan 2024. Där passade vi på att få en pratstund med Åsa Furén-Thulin angående den nya socialtjänstlagen som ska presenteras i juli. Vad kommer bli de största skillnaderna, och hur har processen gått till? Omsorgspodden leds i Almedalen av Cecilia Andersson och Anna Wernersson. Välkommen att lyssna på Omsorgspodde…
  continue reading
 
The YOU DESERVE TO BE HACKED™ slogan has reached Hartford, the insurance capital of North America, to challenge the cybersecurity approach of CISOs in the industry. On this episode, listen to our host and CRO, Will Morrish, and Ilan Fehler, our first hired member in the US, as they explore the type of fraud companies are exposed to, what we have le…
  continue reading
 
In a landscape where cyber attacks are constantly evolving, is your business insurance keeping pace? Welcome to another episode of Razorwire! I'm your host, Jim, and today we dive deep into the dynamic world of cyber insurance. Neil Hare-Brown and Matt Clark, two industry experts, are with us to share their wealth of knowledge and insights on how c…
  continue reading
 
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats. Managed Service Providers (MSPs) are tasked with the daunting responsib…
  continue reading
 
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&CK framework, the report offer…
  continue reading
 
As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard security protocols. The potential consequences of Shadow AI are severe, introducing vulnerabilities, compromising data integrity, and leading to complian…
  continue reading
 
There's a reality we can't deny: the IT world is dominated by men. Fortunately, spaces like Women of ITSM emerge, an online community designed by women for women. Led by Sophie Hussey and Lucy Grimwade, this platform aims to be a safe space to share experiences and grow personally and professionally. In this episode, our host, Matt Beran, engages i…
  continue reading
 
Unmask the reality of the information security world in this week's episode of Razorwire! Join me, Jim, and my guests, Chris Dawson and Iain Pye, as we talk about our daily frustrations working in infosec and the pressing issues facing cybersecurity professionals. We dissect the gripes, pet peeves and laughable clichés that saturate our industry. F…
  continue reading
 
Today's Cyber Cookie was recorded live on June 6th at the Castleknock Hotel, in front of over 50 IT leaders hungry for knowledge. The energy in the room was electric, reflecting the high demand for information and clarity on today's critical topic. CommSec's very own founder, David McNamara, is back on the show to help us demystify NIS2. This EU di…
  continue reading
 
Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead to serious burnout. This condition not only hampers analysts' performance and job satisfaction but also poses a threat to overall security. Organisati…
  continue reading
 
I Norrbotten samarbetar 14 kommuners socialtjänster - inte bara med samma system utan med gemensamma processer.Nu har alla kommuner infört systemet och vi möter Anna-Lena Andersson, socialchef i Kalix kommun, och Jenny Liljebäck, socialchef i Överkalix, för ett samtal kring hur de arbetat – och vad andra kommuner kan göra.Omsorgspodden leds av Ceci…
  continue reading
 
In this episode, I'm joined by Sarah Aalborg - CISO at Tivoli, Keynote speaker, and soon-to-be author. She's a cyber security expert and a behavioral science expert. Which makes her the perfect guest for this podcast. In the podcast, we talk about: Why Security Awareness might be dead as a term Why you need to think about behavior when you think ab…
  continue reading
 
The NIS2 implementation deadline is upon us. Next October, the member states of the European Union and the organizations operating within their territories will need to adapt to this directive.If you work in cybersecurity and still don't know how to start this adaptation process or what needs to be taken into account to meet the deadline, don't wor…
  continue reading
 
In this episode of Razorwire, I sit down with Rob Black, a dynamic figure in the world of cybersecurity with a unique background in military strategy and defence. From the realms of computer game design to the high stakes world of defusing IEDs, Robert brings unparalleled insight into how we can revolutionise cybersecurity by understanding and mani…
  continue reading
 
The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses over the last decade. Unfortunately, these numbers will continue to rise with the proliferation of AI, and your email inboxes are your most likely targ…
  continue reading
 
NIS2 is coming, but many people and companies don't know what it means for them. Therefore, we've invited Sarah Hofmann into the studio to talk about: What NIS2 is Who it apply to What happens if you don't comply How you can get started working with the NIS2 requirements In the episode we also mention a blog post, you can find it right here: https:…
  continue reading
 
Listen to our host and Swarm Director, Louis Blackburn, as he discusses with our new Hive Member, Ben Stickland, their interpretation of DORA (Digital Operational Resilience Act) and NIS2 (Network and Information Security Directive 2) and how they will help financial entities and critical infrastructure sectors to strengthen their cybersecurity pos…
  continue reading
 
Loading …

راهنمای مرجع سریع