CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development. Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment. Connect with us: Shop: cisomarketplace.com News: threatwatch.news Podcast: cisoinsights.show Tools: microsec.tools AI Resources: cybersecuritygpt.store Follow us: TikTok @cisomarketplace - Quick insights and security tips YouTube @cisomarketplace - In-depth discussions and CISO interviews Tiktok & Youtube: @ScamwatchHQ Powered by grit, fueled by caffeine. Thanks for keeping us going! coff.ee/cisomarketplace coindrop.to/cisomarketplace

Episodes

March 28, 2026 47 mins

This episode dives into the massive compliance fraud orchestrated by Delve, a Y Combinator-backed startup that generated hundreds of identical, fabricated SOC 2 reports using rubber-stamping certification mills. We explore how this "compliance theater" collided with a real-world supply chain attack when LiteLLM, a company boasting Delve-generated certifications, was breached through a compromised vulnerability scanner called Trivy....

Listen
Mark as Played

Il ruolo del Chief Information Security Officer si è radicalmente trasformato da una funzione puramente informatica a una posizione strategica a livello esecutivo, focalizzata sul rischio digitale dell'intera azienda. Spinti dalla rapida adozione dell'intelligenza artificiale agentica, dall'espansione delle identità non umane e dalle nuove e severe normative globali come la Direttiva NIS2 dell'UE, i CISO sono ora essenziali per gar...

Listen
Mark as Played

The cyber threat landscape is experiencing a massive paradigm shift, as adversaries move away from isolated network breaches to industrialize the compromise of global digital supply chains. This episode breaks down the unprecedented March 2026 TeamPCP campaign, exploring how attackers weaponized the trusted Trivy vulnerability scanner, compromised the widely used LiteLLM AI package, and unleashed the self-propagating Shai-Hulud wor...

Listen
Mark as Played

Rola dyrektora ds. bezpieczeństwa informacji (CISO) uległa fundamentalnej transformacji z funkcji operacyjnej IT w strategiczne stanowisko na szczeblu kierowniczym, koncentrujące się na ryzyku cyfrowym w całej organizacji. W związku z szybką adopcją agentycznej sztucznej inteligencji, rosnącą liczbą tożsamości nieludzkich oraz surowymi nowymi globalnymi regulacjami, takimi jak unijna dyrektywa NIS2, dyrektorzy CISO są teraz kluczow...

Listen
Mark as Played
O papel do Chief Information Security Officer (CISO) passou por uma transformação fundamental, deixando de ser uma função técnica de TI para se tornar um cargo estratégico de nível executivo focado no risco digital de toda a empresa. Impulsionados pela rápida adoção da inteligência artificial agêntica, pela expansão das identidades não humanas e por novas regulamentações globais rigorosas, como a Diretiva NIS2 da UE, os CISOs agora...
Listen
Mark as Played

Explore the evolving world of cyber threats in this deep dive into the 2025 malicious infrastructure landscape, where tools like Cobalt Strike and AsyncRAT continued to dominate global attacks. We unpack how cybercriminals and state-sponsored actors rapidly adapted to law enforcement disruptions, highlighting the critical role of Threat Activity Enablers (TAEs) in providing bulletproof hosting and resilient routing networks. Tune i...

Listen
Mark as Played

This episode delves into the complex web of China's influence operations within the Nordic-Baltic information environment, focusing specifically on the contrasting diplomatic landscapes of Denmark and Lithuania. We explore how Beijing utilizes eight distinct avenues of influence—ranging from United Front networks and economic coercion to clandestine espionage—to shape local narratives and pressure political decision-maker. Join us ...

Listen
Mark as Played

Le rôle du responsable de la sécurité des systèmes d'information (CISO) a fondamentalement évolué, passant d'une fonction informatique à un rôle stratégique de direction axé sur le risque numérique à l'échelle de l'entreprise. Poussés par l'adoption rapide de l'IA agéntique, l'expansion des identités non humaines et de nouvelles réglementations mondiales strictes comme la directive NIS2 de l'UE, les CISO sont désormais essentiels p...

Listen
Mark as Played

As foreign information manipulation and interference (FIMI) reach unprecedented levels of global complexity, state actors like Russia and China are increasingly weaponizing artificial intelligence to mass-produce deceptive content. In response, the European External Action Service has launched the FIMI Deterrence Playbook, a proactive strategy designed to systematically dismantle the underlying infrastructures, proxies, and financ...

Listen
Mark as Played

Die Rolle des Chief Information Security Officers hat sich grundlegend von einer funktionalen IT-Position zu einer strategischen Führungsposition gewandelt, die sich auf das unternehmensweite digitale Risiko konzentriert. Angetrieben durch die schnelle Einführung von agentischer KI, die Zunahme nicht-menschlicher Identitäten und strenge neue globale Vorschriften wie die NIS2-Richtlinie der EU, sind CISOs heute unerlässlich, um die ...

Listen
Mark as Played

Dive deep into the U.S. Intelligence Community's 2026 Annual Threat Assessment to uncover the most pressing security challenges facing the world today. This episode explores the shifting dynamics of global power, highlighting how major power competition and emerging technologies like artificial intelligence and quantum computing are redefining international security. Join us as we break down what these evolving threats—from transna...

Listen
Mark as Played

El papel del Director de Seguridad de la Información (CISO) se ha transformado fundamentalmente de una posición funcional de TI a un rol estratégico de nivel ejecutivo centrado en el riesgo digital a nivel empresarial. Impulsados por la rápida adopción de la inteligencia artificial agéntica, la expansión de las identidades no humanas y las nuevas y estrictas regulaciones globales como la Directiva NIS2 de la UE, los CISO son ahora ...

Listen
Mark as Played

The role of the Chief Information Security Officer has fundamentally transformed from a functional IT position into a strategic, executive-level role focused on enterprise-wide digital risk. Driven by the rapid adoption of agentic AI, expanding non-human identities, and strict new global regulations like the EU's NIS2 Directive, CISOs are now essential for ensuring operational resilience and protecting business continuity. This pod...

Listen
Mark as Played

This episode examines the Hellscape concept, an evolving asymmetric strategy designed to repel a potential Chinese invasion by flooding the Taiwan Strait with thousands of low-cost uncrewed systems. We analyze the four-layered defensive gauntlet—ranging from over-the-horizon undersea drones to short-range beach-defense quadcopters—intended to deny the People’s Liberation Army both air and sea superiority. Finally, the program explo...

Listen
Mark as Played
This episode explores Ukraine’s transformation from a reactive cyber posture to a proactive, multi-layered defense system that culminated in the 2025 creation of a dedicated Cyber Forces Command. We examine the pioneering "patriotic hacktivist" model, where groups like the IT Army and BO Team collaborate with state intelligence to expand the reach and impact of offensive operations. Finally, the discussion covers the vital contribu...
Listen
Mark as Played

As drones become increasingly common, the need to protect critical infrastructure, airports, and public events from unauthorized unmanned aerial vehicles has never been greater. This episode dives into the layered Counter-Unmanned Aircraft Systems (C-UAS) that utilize radio frequency, radar, and advanced algorithms to detect, track, and locate both drones and their operators. We also explore the crucial legal and privacy safeguards...

Listen
Mark as Played

Traditional robot security, which long relied on the assumption that attackers needed specialized robotic expertise, is being rendered obsolete by the democratization of AI-powered offensive tools. Using the open-source CAI framework, researchers autonomously identified 38 critical vulnerabilities—including safety-critical motor controls—across diverse consumer robots in just a fraction of the time required by human experts. This t...

Listen
Mark as Played

Threat actors are increasingly abandoning traditional malware in favor of exploiting valid credentials and native cloud services to move laterally and execute destructive attacks. This episode explores the latest cloud security trends, including the rise of cloud-native ransomware, the abuse of AI and LLM supply chains, and how attackers leverage third-party integrations to breach multiple tenants. Join us as we unpack the strategi...

Listen
Mark as Played

This episode delves into the high-stakes legal battles between authors and tech giants over training generative AI models, like Meta's Llama and Anthropic's Claude, on millions of copyrighted books. We explore recent federal court rulings to understand how the traditional "fair use" defense is being tested by accusations of unauthorized torrenting and the threat of "market dilution". Tune in to discover whether the courts will prot...

Listen
Mark as Played

When AI startup Anthropic refused to let the Pentagon use its Claude model for fully autonomous weapons and mass domestic surveillance, the Department of Defense retaliated by designating the American company an unprecedented "supply chain risk". This standoff highlights a growing crisis as consumer AI systems are rapidly integrated into kinetic military operations and lethal kill chains, accelerating targeting in conflicts like th...

Listen
Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Betrayal Season 5

    Saskia Inwood woke up one morning, knowing her life would never be the same. The night before, she learned the unimaginable – that the husband she knew in the light of day was a different person after dark. This season unpacks Saskia’s discovery of her husband’s secret life and her fight to bring him to justice. Along the way, we expose a crime that is just coming to light. This is also a story about the myth of the “perfect victim:” who gets believed, who gets doubted, and why. We follow Saskia as she works to reclaim her body, her voice, and her life. If you would like to reach out to the Betrayal Team, email us at betrayalpod@gmail.com. Follow us on Instagram @betrayalpod and @glasspodcasts. Please join our Substack for additional exclusive content, curated book recommendations, and community discussions. Sign up FREE by clicking this link Beyond Betrayal Substack. Join our community dedicated to truth, resilience, and healing. Your voice matters! Be a part of our Betrayal journey on Substack.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    Las Culturistas with Matt Rogers and Bowen Yang

    Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2026 iHeartMedia, Inc.

  • Help
  • Privacy Policy
  • Terms of Use
  • AdChoicesAd Choices