CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development. Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment. Connect with us: Shop: cisomarketplace.com News: threatwatch.news Podcast: cisoinsights.show Tools: microsec.tools AI Resources: cybersecuritygpt.store Follow us: TikTok @cisomarketplace - Quick insights and security tips YouTube @cisomarketplace - In-depth discussions and CISO interviews Tiktok & Youtube: @ScamwatchHQ Powered by grit, fueled by caffeine. Thanks for keeping us going! coff.ee/cisomarketplace coindrop.to/cisomarketplace

Episodes

May 4, 2026 25 mins

Operational Technology (OT) interacts directly with the physical world, meaning that cyber attacks can have immediate, devastating real-world safety and environmental consequence. Standard IT security models fall short in OT environments due to decades-old legacy systems, insecure protocols, and strict requirements for continuous availability. This episode explores how organizations can practically adapt modern Zero Trust principle...

Listen
Watch
Mark as Played
As agentic AI systems increasingly automate complex tasks and operate with unprecedented autonomy, they introduce new and unpredictable cyber security risks. This podcast explores the unique vulnerabilities of these interconnected systems, ranging from privilege scope creep and deceptive behaviors to structural and accountability challenges. Tune in to discover actionable best practices for designing, developing, deploying, and ope...
Listen
Watch
Mark as Played

In the era of the autonomous enterprise, digital systems are evolving faster than traditional governance can keep up, exposing dangerous hidden vulnerabilities across the modern business. This podcast dives into the 2026 Cloudflare Security Signals Report to unpack the six critical fault lines threatening organizations, from shadow supply chains and legacy technical debt to ungoverned AI agents. Join us as we discuss how enterprise...

Listen
Watch
Mark as Played

Join us for the first public announcement of CISO.POKER's inaugural tournament at Hacker Summer Camp 2026, an exclusive, zero buy-in Texas Hold'em event designed for 80 senior security executives on the Las Vegas Strip. This episode unpacks how we are replacing the traditional "pay-to-play" vendor pitch with genuine networking, offering an Enterprise security prize pack, Knockout Bounties, and capturing real-time industry intellige...

Listen
Watch
Mark as Played

In 2026, the global digital landscape is undergoing a massive transformation as rapid technological advancement collides with complex new regulatory frameworks. This episode explores how African nations are pioneering digital public ecosystems for economic integration, while the United States navigates a strict new patchwork of state privacy laws designed to protect minors and consumer data. Join us as we dissect the delicate balan...

Listen
Watch
Mark as Played

From the expansion of U.S. state privacy laws and the HIPAA Security Rule overhaul to the enforcement of the EU AI Act, DORA, and India's DPDP Act, 2026 marks a definitive turning point for global regulatory compliance. We explore how these emerging frameworks demand that businesses move beyond static paperwork to demonstrate true operational resilience, continuous monitoring, and boardroom accountability. Tune in to discover the p...

Listen
Watch
Mark as Played

In April 2026, the cybersecurity landscape experienced a seismic shift as geopolitical tensions and industrialized fraud collided to create unprecedented enterprise risks. This episode dives into the most critical incidents of the month, including TeamPCP's cascading supply chain compromises, Iran-backed wiper attacks on corporate infrastructure, and the exploitation of third-party platforms by groups like ShinyHunters.

Join us as...

Listen
Watch
Mark as Played

Anthropic recently unveiled Claude Mythos, an unreleased frontier AI model with unprecedented cybersecurity capabilities that led the company to restrict its access exclusively to defensive partners via Project Glasswing. This revelation coincided with a chaotic week of accidental source code leaks and an unprecedented legal battle against the Pentagon, which blacklisted Anthropic as a "supply chain risk" over the company's refusal...

Listen
Watch
Mark as Played

In March 2026, a 40-minute supply chain attack on the open-source library LiteLLM allowed hackers to steal four terabytes of highly sensitive data from Mercor, a $10 billion AI training startup. The breach exposed a fragile trust infrastructure across the tech industry, revealing that LiteLLM's security certifications were fabricated by Delve Technologies, a compliance vendor that systematically rubber-stamped fake audits. As major...

Listen
Watch
Mark as Played

Anthropic's latest frontier model, Claude Mythos Preview, has demonstrated an unprecedented ability to autonomously discover and exploit zero-day vulnerabilities in critical software. Recognizing the extreme dual-use risks of these capabilities falling into the wrong hands, Anthropic has made the unprecedented decision to withhold the model from general public release. Instead, the model is being deployed through Project Glasswing,...

Listen
Watch
Mark as Played

Dive into the nuances of California's new CCPA cybersecurity audit requirements and discover how they redefine the standard for "reasonable security". We explore how businesses can strategically leverage existing NIST, ISO, or CIS assessments as a foundation, while identifying the critical scope mismatches they must "top off" to ensure compliance. Tune in for a practical, four-step roadmap to navigate CalPrivacy's 18 evaluation com...

Listen
Watch
Mark as Played
Dive into the rapidly evolving cyber threat landscape of Latin America and the Caribbean, where financially motivated threat actors are increasingly exploiting rapid digital adoption to target the region's largest economies. We explore how cybercriminals and hacktivist collectives like FiveFamilies are utilizing encrypted platforms like Telegram and WhatsApp to distribute banking trojans, deploy double-extortion ransomware against ...
Listen
Watch
Mark as Played

Explore the evolving landscape of youth digital protection across the European Union, where groundbreaking laws like the GDPR and the Digital Services Act (DSA) are being deployed to shield minors from data exploitation and harmful content. As emerging innovations like immersive virtual environments, neuromarketing, and AI-generated deepfakes introduce unprecedented risks to children's mental privacy and cognitive development, the ...

Listen
Watch
Mark as Played

This podcast dives into the current wave of Child Online Safety Legislation (COSL), such as the Kids Online Safety Act (KOSA), to unpack the political and societal forces driving these bipartisan bills. We critically examine the prevailing narrative that social media is the primary cause of the youth mental health crisis, exploring how "moral panics" over technology often ignore complex social realities. Furthermore, we discuss the...

Listen
Watch
Mark as Played

This episode dives into the massive compliance fraud orchestrated by Delve, a Y Combinator-backed startup that generated hundreds of identical, fabricated SOC 2 reports using rubber-stamping certification mills. We explore how this "compliance theater" collided with a real-world supply chain attack when LiteLLM, a company boasting Delve-generated certifications, was breached through a compromised vulnerability scanner called Trivy....

Listen
Watch
Mark as Played

Il ruolo del Chief Information Security Officer si è radicalmente trasformato da una funzione puramente informatica a una posizione strategica a livello esecutivo, focalizzata sul rischio digitale dell'intera azienda. Spinti dalla rapida adozione dell'intelligenza artificiale agentica, dall'espansione delle identità non umane e dalle nuove e severe normative globali come la Direttiva NIS2 dell'UE, i CISO sono ora essenziali per gar...

Listen
Watch
Mark as Played

The cyber threat landscape is experiencing a massive paradigm shift, as adversaries move away from isolated network breaches to industrialize the compromise of global digital supply chains. This episode breaks down the unprecedented March 2026 TeamPCP campaign, exploring how attackers weaponized the trusted Trivy vulnerability scanner, compromised the widely used LiteLLM AI package, and unleashed the self-propagating Shai-Hulud wor...

Listen
Watch
Mark as Played

Rola dyrektora ds. bezpieczeństwa informacji (CISO) uległa fundamentalnej transformacji z funkcji operacyjnej IT w strategiczne stanowisko na szczeblu kierowniczym, koncentrujące się na ryzyku cyfrowym w całej organizacji. W związku z szybką adopcją agentycznej sztucznej inteligencji, rosnącą liczbą tożsamości nieludzkich oraz surowymi nowymi globalnymi regulacjami, takimi jak unijna dyrektywa NIS2, dyrektorzy CISO są teraz kluczow...

Listen
Watch
Mark as Played
O papel do Chief Information Security Officer (CISO) passou por uma transformação fundamental, deixando de ser uma função técnica de TI para se tornar um cargo estratégico de nível executivo focado no risco digital de toda a empresa. Impulsionados pela rápida adoção da inteligência artificial agêntica, pela expansão das identidades não humanas e por novas regulamentações globais rigorosas, como a Diretiva NIS2 da UE, os CISOs agora...
Listen
Watch
Mark as Played

Explore the evolving world of cyber threats in this deep dive into the 2025 malicious infrastructure landscape, where tools like Cobalt Strike and AsyncRAT continued to dominate global attacks. We unpack how cybercriminals and state-sponsored actors rapidly adapted to law enforcement disruptions, highlighting the critical role of Threat Activity Enablers (TAEs) in providing bulletproof hosting and resilient routing networks. Tune i...

Listen
Watch
Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    Post Run High

    Post Run High features conversations with high-performing founders, athletes, artists, health and science experts, and leaders about what it really takes to succeed. Through honest, post-movement conversations, guests share how they’ve navigated challenges, built resilience, and used movement as a tool for clarity, discipline, and growth. Each episode explores the mindset behind performance — what keeps people going when things get hard — and offers tangible advice listeners can apply in their everyday lives.

    The Buck Sexton Show

    Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Interact with Buck by emailing him at teambuck@iheartmedia.com

    The Interface

    Stop doomscrolling. Start decoding the tech rewiring your week - and your world. The Interface is the BBC's fiercely informed, fast and funny take on how tech is changing everything. Hosted by journalists Tom Germain, Karen Hao, and Nicky Woolf, each episode unpacks week-by-week the unfolding story of how technology is shaping all our futures. No guests. No jargon. Just three sharp voices debating the tech news stories that matter - whether they shook a government, broke the internet, or quietly tipped the balance of power. As TikTok shifts geopolitics, Trump drives digital shockwaves, Elon Musk expands his space-internet empire and AI reroutes the routines of everyday life - the trio ask: what world are the tech titans building for us? And do we want to live in it?

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2026 iHeartMedia, Inc.

  • Help
  • Privacy Policy
  • Terms of Use
  • AdChoicesAd Choices