PodcastsNoticiasCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Último episodio

386 episodios

  • CISO Insights: Voices in Cybersecurity

    Securing the Agentic Revolution: The New Rules of Model Context Protocol Security

    23/1/2026 | 17 min
    As AI agents move from experimental pilots to production via the Model Context Protocol (MCP), they introduce a fundamental architectural shift where Large Language Models sit at the center of security-critical decisions. This episode unpacks the Coalition for Secure AI’s comprehensive framework, exploring twelve core threat categories that range from novel vectors like tool poisoning and shadow servers to the "confused deputy" problem. Tune in to learn why traditional perimeter defenses are insufficient and how to implement defense-in-depth strategies, including cryptographic identity propagation, hardware-based isolation, and zero-trust validation for AI outputs

    https://cisomarketplace.com/blog/ai-agent-security-crisis-mcp-vulnerabilities

     

    https://www.coalitionforsecureai.org/securing-the-ai-agent-revolution-a-practical-guide-to-mcp-security

    Whitepaper: https://github.com/cosai-oasis/ws4-secure-design-agentic-systems/blob/mcp/model-context-protocol-security.md

     

    Sponsors: 

    https://vibehack.dev

    www.cisomarketplace.services
  • CISO Insights: Voices in Cybersecurity

    The Agentic Revolution: Decision Advantage and the Future of Command

    22/1/2026 | 18 min
    This episode explores the Department of War's strategic pivot to "Agentic Warfare," where proactive AI systems evolve from passive tools into digital staff officers capable of executing complex workflows rather than just generating text. We discuss how commanders are shifting from "in the loop" controllers to "on the loop" mission directors, overseeing a "planning multiverse" that runs millions of simulations to "self-heal" operational plans in real time. Finally, we examine the critical race for "decision advantage," arguing that the ability to out-think adversaries with "force guided by foresight" has replaced mass as the primary mechanism of modern deterrence.

    https://cisomarketplace.com/blog/pentagon-ai-strategy-defense-startups-innovation-shakeup

    https://scale.com/agentic-warfare

     

    Sponsor:

    www.cisomarketplace.services

    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    Bridging the Gap: Mastering the CTI Capability Maturity Model

    21/1/2026 | 23 min
    This series explores the Cyber Threat Intelligence Capability Maturity Model (CTI-CMM), a stakeholder-first framework designed to help intelligence programs support the specific decisions and actions of those protecting the organization. We guide listeners through the model’s eleven distinct domains and the cyclical five-step implementation process—Prepare, Assess, Plan, Deploy, and Measure—to transition teams from reactive, ad hoc practices to standardized, predictive operations. By analyzing specific use cases and maturity indicators, we demonstrate how to evolve metrics from simply counting effort to quantifying systemic impact and business value.

    www.breached.company/briefing-the-cyber-threat-intelligence-capability-maturity-model-cti-cmm

     

    Sponsors: 

    www.breached.company

    www.cisomarketplace.com
  • CISO Insights: Voices in Cybersecurity

    Choke Points and Synthetic Faces: Systemic Disruption of the Modern Cybercrime Ecosystem

    20/1/2026 | 15 min
    Transnational cybercrime has evolved into a globally distributed ecosystem where identity is now "synthetic, scalable and weaponizable" due to the proliferation of deepfakes and camera injection tools targeted at digital verification systems. To counter this, the Cybercrime Atlas fosters global collaboration to map criminal infrastructure and identify technical "choke points," a strategy validated by the Serengeti operations which resulted in thousands of arrests and the seizure of $140 million in criminal funds. Simultaneously, experts recommend that institutions implement multi-layered defenses—such as trusted camera source controls and active liveness checks—to harden Know Your Customer (KYC) processes against the democratized threat of AI-generated impersonation.

    https://initiatives.weforum.org/cybercrime-atlas/home

    www.scamwatchhq.com/your-voice-your-face-your-money-the-terrifying-rise-of-ai-powered-scams-in-2026

     

    Sponsors:

    www.securitybydesign.shop

    SECURE15 - 15% off cybersecurity swag

    www.generatepolicy.com

    CISO30  - 30% OFF for first-time buyers
  • CISO Insights: Voices in Cybersecurity

    Secure, Defend, Thwart: Navigating the NIST Cyber AI Profile

    18/1/2026 | 15 min
    This episode explores the newly drafted Cyber AI Profile, a guide designed by the National Institute of Standards and Technology (NIST) to help organizations manage the complex intersection of artificial intelligence and cybersecurity. We break down the three primary focus areas—Secure, Defend, and Thwart—which provide a structured approach to protecting AI system components, leveraging AI for defensive operations, and building resilience against AI-powered threats. Listeners will learn how this Profile integrates with the existing NIST Cybersecurity Framework (CSF) 2.0 to offer prioritized outcomes and considerations for organizations at any stage of their AI journey.

     

    Sponsors:

    www.cisomarketplace.com

    www.airiskassess.com

    compliance.airiskassess.com

Más podcasts de Noticias

Acerca de CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Sitio web del podcast

Escucha CISO Insights: Voices in Cybersecurity, La brújula y muchos más podcasts de todo el mundo con la aplicación de radio.es

Descarga la app gratuita: radio.es

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/24/2026 - 7:21:31 AM