CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development. Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment. Connect with us: Shop: cisomarketplace.com News: threatwatch.news Podcast: cisoinsights.show Tools: microsec.tools AI Resources: cybersecuritygpt.store Follow us: TikTok @cisomarketplace - Quick insights and security tips YouTube @cisomarketplace - In-depth discussions and CISO interviews Tiktok & Youtube: @ScamwatchHQ Powered by grit, fueled by caffeine. Thanks for keeping us going! coff.ee/cisomarketplace coindrop.to/cisomarketplace

Episodes

December 28, 2025 42 mins

As 2026 approaches, cybersecurity leaders face a "strategic redesign" that prioritizes resilience and recovery over mere prevention to handle the $20 trillion cybercrime economy. This episode explores the critical convergence of autonomous Agentic AI, the urgent mandate for Post-Quantum Cryptography (PQC), and the cementing of Zero Trust as a non-negotiable regulatory standard. Tune in to understand how self-healing infrastructure ...

Mark as Played

In 2025, software supply chain attacks have surged by 34%, with threat actors like Salt Typhoon exploiting a "lack of visibility" to target critical infrastructure and manufacturing sectors. This episode explores the permanent "SolarWinds Effect" on executive liability and how CISA’s updated 2025 SBOM mandates are forcing organizations to cryptographically prove the integrity of their software "ingredients". Finally, we analyze the...

Mark as Played

In this episode, we dissect the escalating cyber threats targeting the cannabis industry in 2025, from the massive STIIIZY data breach to the rise of AI-driven ransomware groups like Everest and Qilin. We explore critical regulatory shifts, including the strategic partnership between Metrc and BioTrack and the strict new data privacy mandates under the NJDPA that are redefining retail compliance. Finally, we discuss how operators c...

Mark as Played

This episode uncovers the "12 Threats of Christmas" defining the 2025 holiday season, where AI-driven social engineering and deepfakes have turned festive shopping into a high-stakes battlefield. We explore the surge in retail ransomware and "smishing" attacks, while auditing the hidden privacy risks of popular smart toys that may be spying on your home. Tune in to learn why experts call this the "peak hunting season" for cybercrim...

Mark as Played

This episode unpacks a bold new strategy from the Vanderbilt University Institute of National Security, arguing that the U.S. must undertake a "whole-of-society" mobilization akin to World War II to counter persistent cyber aggression. We discuss the proposed shift to "Integrated Resilience," which focuses defense efforts on the five most critical infrastructure sectors—power, water, telecoms, finance, and healthcare—while mandatin...

Mark as Played

This episode dives into the declassified Chairman of the Joint Chiefs of Staff Manual 3500.08, which serves as the master training guide for establishing and operating a Joint Psychological Operations Task Force (JPOTF) headquarters. We explore how military planners were taught to integrate psychological operations with special forces, civil affairs, and information warfare to influence foreign audiences and achieve national object...

Mark as Played

Delve into the clandestine industry of Bulletproof Hosting (BPH), where providers utilize sophisticated "infrastructure laundering" and corporate shell games to shield ransomware gangs from the law. We explore how these digital fortresses have evolved from physical bunkers to complex networks of jurisdictional arbitrage and "DMCA ignored" policies designed to frustrate investigators. Finally, learn how unprecedented international a...

Mark as Played
With the operationalization of the DPDP Rules 2025, India has ushered in a stringent "zero-tolerance" regime that mandates reporting every data breach regardless of risk and replaces GDPR-style legitimate interest with strict verifiable consent. We break down the critical compliance timeline leading to full enforcement in May 2027, analyzing how the new "blacklist" approach to cross-border transfers and the removal of victim compen...

Mark as Played

This episode explores Vietnam's first comprehensive Law on Artificial Intelligence, set to take effect on March 1, 2026, which establishes a risk-based regulatory framework similar to the EU AI Act but with a distinct focus on national sovereignty. We analyze the four distinct risk categories ranging from "unacceptable" prohibitions to "low-risk" systems, detailing the compliance obligations for essential sectors such as healthcare...

Mark as Played

The Intelligence and Security Committee’s 2023–2025 report reveals an Intelligence Community operating on a permanent "crisis footing," forcing agencies to continuously divert resources from long-term priorities to handle immediate conflicts in Ukraine and the Middle East. While the community pivots to address the complex "whole-of-state" threats posed by China, Russia, and Iran, it is simultaneously racing to modernize its technol...

Mark as Played
The Chief Information Security Officer's mandate has shifted from a technical focus on infrastructure to that of a strategic business partner who aligns security directly with value creation. Amidst geopolitical volatility and the "velocity of change," modern CISOs must act as storytellers and resilience guardians to protect the organization's "crown jewels". This episode explores how leaders are moving beyond compliance to become ...
Mark as Played

This episode uncovers the "perfect storm" of cyber risks facing cannabis operators, from the regulatory "cashless ATM" crackdowns to the sophisticated phishing campaigns responsible for nearly 9 out of 10 industry breaches. We analyze high-profile incidents like the Stiiizy data exposure to show how third-party vendor vulnerabilities can cascade through POS and seed-to-sale systems, putting customer data and state licenses at risk....

Mark as Played
As the Department of Defense activates Phase 1 of the CMMC rollout, government contractors must race to validate their cybersecurity posture or risk losing contract eligibility. This episode breaks down the critical path to Level 2 certification, including the costs of remediation, the 110 controls of NIST SP 800-171, and the mandatory reporting requirements for the Supplier Performance Risk System (SPRS). Tune in for a strategic g...

Mark as Played

In deze aflevering duiken we in de nieuwe Cyberbeveiligingswet (Cbw), die de Europese NIS2-richtlijn naar Nederlandse wetgeving vertaalt en de huidige Wbni vervangt. We bespreken waarom de implementatie is vertraagd tot het tweede kwartaal van 2026 en waarom de Rijksoverheid adviseert om nu al te starten met de tien verplichte zorgplichtmaatregelen. Daarnaast analyseren we de impact op bestuurders, die persoonlijk aansprakelijk kun...

Mark as Played

This episode unpacks the new timeline for the Cyberbeveiligingswet, the Dutch implementation of NIS2 now projected for the second quarter of 2026, and explains the critical distinction between Essential and Important entities. We dive into the expanded fiduciary duties for board members, who now face mandatory training and potential personal liability if they fail to approve and supervise strict risk management measures. Experts di...

Mark as Played

As governments from Australia to Texas enforce "digital borders" through mandates like the Social Media Minimum Age Act, the internet is rapidly shifting from an open forum to a surveillance state requiring government ID or biometric scans for entry. While intended to protect children, experts warn these systems create "massive centralized repositories" of sensitive data ripe for hackers, while determined minors easily bypass them ...

Mark as Played
We investigate the "Firewall Crisis" where the four dominant vendors—Cisco, Fortinet, SonicWall, and Check Point—collectively contributed over 50 actively exploited vulnerabilities to CISA's catalog, effectively transforming defensive appliances into primary attack vectors. The discussion uncovers how this systemic failure enabled the Akira ransomware group to generate $244 million by targeting Cisco VPNs and allowed the Qilin grou...
Mark as Played

After years of controversy, EU member states have agreed on a revised position for the "Chat Control" regulation that drops mandatory mass scanning but introduces a framework for "voluntary" detection of private messages. Privacy advocates and security experts warn that this new "risk mitigation" approach, coupled with mandatory age verification, could still effectively force platforms to implement surveillance infrastructure and e...

Mark as Played

Australia is launching a world-first "grand experiment" by banning social media for under-16s and mandating age verification for search engines, threatening fines of up to $49.5 million for tech giants that fail to comply. We explore the massive privacy trade-offs as millions of Australians—adults included—face requirements to submit government IDs or undergo biometric face scans just to remain logged into services like Google and ...

Mark as Played

Discover how a veteran security consultant rebuilt a media empire from scratch following a business collapse, all while operating full-time from a solar-powered Honda Odyssey with Starlink. We explore how the CyberAdX Network leverages extreme automation to deliver 25 million annual impressions and undercut legacy publishers by 50 to 100 times in cost efficiency. This episode reveals the operational grit required to manage 11 speci...

Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    The Clay Travis and Buck Sexton Show

    The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by Audiochuck Media Company.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.