
Secure, Defend, Thwart: Navigating the NIST Cyber AI Profile
18/1/2026 | 15 min
This episode explores the newly drafted Cyber AI Profile, a guide designed by the National Institute of Standards and Technology (NIST) to help organizations manage the complex intersection of artificial intelligence and cybersecurity. We break down the three primary focus areas—Secure, Defend, and Thwart—which provide a structured approach to protecting AI system components, leveraging AI for defensive operations, and building resilience against AI-powered threats. Listeners will learn how this Profile integrates with the existing NIST Cybersecurity Framework (CSF) 2.0 to offer prioritized outcomes and considerations for organizations at any stage of their AI journey. Sponsors: www.cisomarketplace.com www.airiskassess.com compliance.airiskassess.com

Securing the Global Ledger: Balancing Proportionality and Resilience in Financial Cyber Risk
17/1/2026 | 40 min
The International Monetary Fund (IMF) actively strengthens the global financial system by evaluating national cyber frameworks through the Financial Sector Assessment Program (FSAP) and providing demand-driven Technical Assistance to address increasingly sophisticated threats. Effective regulation requires a delicate balance between principles-based flexibility and prescriptive rules, while ensuring that supervisory intensity is proportionate to an institution's size and systemic importance. However, because the financial sector is an interconnected chain, regulators must ensure that even small institutions maintain a baseline of security to prevent them from becoming the "weakest link" that triggers a systemic crisis. www.securitycareers.help/good-practices-in-cyber-risk-regulation-and-supervision Sponsors: www.cisomarketplace.com www.cisomarketplace.services

The Silicon Siege: How AI and Quantum Computing are Rewriting Global Security
16/1/2026 | 35 min
This episode examines how Artificial Intelligence and quantum computing have transitioned from frontier concepts to systemic forces that are fundamentally reshaping geostrategic competition and the nature of modern warfare. We investigate the critical milestone of "Q-Day," the point where the deployment of Shor's algorithm threatens to collapse the cryptographic foundations of digital trust, alongside the risks of automated military escalation driven by AI. Lastly, we explore the potential for a "quantum arms race" and the widening "quantum divide" that could leave entire regions behind in a new, bifurcated global order. www.breached.company/global-risks-report-2026-key-insights-and-analysis Sponsors: www.quantumsecurity.ai www.cisomarketplace.com www.breached.company

Digital Siege: Beyond the Numbers of the 2025 Cyber Catastrophe
15/1/2026 | 39 min
This podcast explores why 2025 marked a watershed moment where counting compromised records proved to be an inadequate measure of a cyberattack's true devastation. We delve into the "cyber shockwaves" of 2025, ranging from the UK’s first officially confirmed ransomware-related death to the £1.9 billion economic hit that crippled national car production and threatened over 100,000 supply chain jobs. Finally, we examine an emerging five-dimension framework that redefines cybersecurity as a global ESG and human safety issue, focusing on operational disruption and societal harm rather than just data volume. www.breached.company/beyond-the-numbers-the-2025-data-breach-landscape Sponsors: www.breached.company www.cisomarketplace.com

The Global Gig Economy of Cybercrime
14/1/2026 | 11 min
The Cyber-as-a-Service (CaaS) model has fundamentally reshaped the threat landscape by lowering technical barriers, allowing individuals with minimal expertise to conduct complex operations like ransomware or phishing. Thriving in marketplaces that mimic legitimate e-commerce sites, specialized "initial access brokers" act as digital key makers, selling persistent entry points to other criminals in a professionalized supply chain. This modular ecosystem is highly resilient to disruption, as actors frequently rebrand their services and state-sponsored adversaries leverage these tools to target critical infrastructure globally. www.breached.company/national-cyber-threat-assessment-2025-2026-key-insights www.breached.company/beyond-the-numbers-the-2025-data-breach-landscape Sponsors: www.breached.company www.cisomarketplace.com



CISO Insights: Voices in Cybersecurity