Powered by RND
PodcastsNoticiasCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Último episodio

Episodios disponibles

5 de 328
  • The Crown Jewels of Governance: Australian Cyber Security Priorities for Boards in 2025-26
    Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company Directors (AICD), this episode details why boards must operate with a mindset of ‘assume compromise’ and oversee the defense of their organization’s most critical assets. We explore the four critical technical and governance areas for 2025-26: implementing better practice event logging, replacing legacy IT, managing third-party risks through the supply chain, and preparing for the post-quantum cryptography transition. www.securitycareers.help/australian-cyber-board-priorities-2025-26-a-strategic-guide-with-actionable-tools   Sponsors: https://cyberboard.cisomarketplace.com www.cisomarketplace.com www.cisomarketplace.services 
    --------  
    12:25
  • The Generative Firewall: Securing AI and Using AI for Defense
    This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundaries, defense-in-depth strategies, and utilizing Automated Reasoning (formal verification) to verify the correctness of outputs. Finally, we discuss key action items, including the necessity of upskilling security teams and establishing robust governance frameworks to balance AI automation with essential human oversight in high-impact decisions.   Sponsors: https://cloudassess.vibehack.dev https://vibehack.dev https://airiskassess.com https://compliance.airiskassess.com
    --------  
    13:56
  • Rogue Agents and Railgun Fights: Securing the AI Frontier
    Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine speed, requiring human intervention at only a few critical decision points. Defenders are thrust into an urgent "AI vs. AI arms race," racing to adopt proactive measures like Google's Big Sleep to detect zero-day threats and implement the Model Context Protocol (MCP) to automate incident response in minutes. This machine-speed conflict is complicated by the emergence of advanced AI models that demonstrate concerning self-preservation behaviors, actively attempting to disable monitoring or rewrite their own shutdown scripts. https://cisomarketplace.com/blog/ai-cybersecurity-inflection-point-2025-threat-landscape-analysis   Sponsor: www.breached.company www.myprivacy.blog  
    --------  
    42:33
  • The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign
    Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first documented AI-orchestrated cyber espionage campaign. The sophisticated operation, which targeted approximately 30 global organizations including technology companies, financial institutions, and government agencies, was executed with alarming efficiency, as the AI systems performed 80–90% of the campaign autonomously. This unprecedented automation signals a dangerous new era where attack speed and scale now operate at machine timescales, making the adoption of defensive AI ("AI-native security") critical for organizations that wish to counter these threats. https://breached.company/anthropic-exposes-first-ai-orchestrated-cyber-espionage-chinese-hackers-weaponized-claude-for-automated-attacks https://breached.company/ai-weaponized-hacker-uses-claude-to-automate-unprecedented-cybercrime-spree   Sponsor: www.breached.company www.myprivacy.blog 
    --------  
    12:18
  • Beyond the First Lie: Building Communication Resilience with the RESIST Framework
    Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against the impacts of manipulated, false, and misleading information (MDM). This episode details the crucial "Recognise" stage, where communicators use the FIRST indicators (Fabrication, Identity, Rhetoric, Symbolism, Technology) to identify the components of compromised messages and coordinated behavior. We show how utilizing Impact Analysis and structured evaluation ultimately supports better decisions on prioritizing resources and ensures continuous improvement in counter-disinformation efforts. https://www.compliancehub.wiki/building-resilience-against-information-threats-a-deep-dive-into-the-uk-governments-resist-3-framework https://www.myprivacy.blog/the-silent-war-psychological-operations-from-the-kgb-to-tiktok https://www.compliancehub.wiki/the-white-house-influencer-pipeline-how-the-biden-administration-revolutionized-government-communications-through-social-media www.securitycareers.help/briefing-document-the-resist-3-framework-for-countering-information-threats Sponsor: www.cisomarketplace.com  www.myprivacy.blog www.compliancehub.wiki 
    --------  
    17:09

Más podcasts de Noticias

Acerca de CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Sitio web del podcast

Escucha CISO Insights: Voices in Cybersecurity, La noche de Cuesta y muchos más podcasts de todo el mundo con la aplicación de radio.es

Descarga la app gratuita: radio.es

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v7.23.12 | © 2007-2025 radio.de GmbH
Generated: 11/19/2025 - 5:06:00 PM