PLAY PODCASTS
CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace

462 episodesEN

Show overview

CISO Insights: Voices in Cybersecurity has been publishing since 2024, and across the 2 years since has built a catalogue of 462 episodes. That works out to roughly 180 hours of audio in total. Releases follow a near-daily cadence.

Episodes typically run ten to twenty minutes — most land between 15 min and 28 min — though episode length varies meaningfully from one episode to the next. None of the episodes are flagged explicit by the publisher. It is catalogued as a EN-language Technology show.

The show is actively publishing — the most recent episode landed earlier today, with 96 episodes already out so far this year. The busiest year was 2025, with 330 episodes published. Published by CISO Marketplace.

Episodes
462
Running
2024–2026 · 2y
Median length
19 min
Cadence
Near-daily

From the publisher

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace

Latest Episodes

View all 462 episodes

Securing the AI Supply Chain: The G7 SBOM Guidelines

May 14, 202621 min

The Dual-Use Dilemma: OpenAI Daybreak vs. Project Glasswing

May 13, 202622 min

The 2026 Cyber Compliance Collision: AI, Quantum, and Global Mandates

May 12, 202623 min

The EdTech Supply Chain Collapse: Inside the PowerSchool and Canvas Breaches

May 11, 202647 min

Building the Human Resilience Infrastructure

May 7, 202614 min

Zero Trust in OT: Securing the Physical World

May 4, 202625 min

Autonomous Defenses: Securing Agentic AI

May 3, 202625 min

Autonomic Resilience: Navigating the Hidden Fault Lines

May 1, 202657 min

CISO.POKER — Where Security Leadership Meets the Felt

Apr 29, 202617 min

Digital Trust 2026: Identity, Privacy, and the New Regulatory Frontier

Apr 20, 202625 min

The 2026 Compliance Countdown: Navigating the New Era of Global Privacy and Cyber Regulations

Apr 19, 202652 min

The Digital Siege: Supply Chain Poisoning and the New Era of Cyber Warfare

Apr 18, 202650 min

Ep 451The Mythos Paradox: Leaks, Lawsuits, and the AI IPO of the Century

Anthropic recently unveiled Claude Mythos, an unreleased frontier AI model with unprecedented cybersecurity capabilities that led the company to restrict its access exclusively to defensive partners via Project Glasswing. This revelation coincided with a chaotic week of accidental source code leaks and an unprecedented legal battle against the Pentagon, which blacklisted Anthropic as a "supply chain risk" over the company's refusal to drop safety guardrails. Together, these dramatic events have fueled a massive hype narrative ahead of Anthropic's planned October 2026 IPO, where the company is targeting a valuation of up to $500 billion. https://podcast.cisomarketplace.com/e/the-mythos-dilemma-ai-zero-days-and-project-glasswing https://cisomarketplace.com/blog/project-glasswing-claude-mythos-cybersecurity https://cisomarketplace.com/blog/claude-mythos-leak-cybersecurity-stocks-crash-2026 Sponsors: www.breached.company www.compliancehub.wiki

Apr 12, 202642 min

Ep 450The 40-Minute Collapse: How Fake Compliance Broke the AI Supply Chain

In March 2026, a 40-minute supply chain attack on the open-source library LiteLLM allowed hackers to steal four terabytes of highly sensitive data from Mercor, a $10 billion AI training startup. The breach exposed a fragile trust infrastructure across the tech industry, revealing that LiteLLM's security certifications were fabricated by Delve Technologies, a compliance vendor that systematically rubber-stamped fake audits. As major AI labs like Meta indefinitely pause their contracts, Mercor now faces a wave of class-action lawsuits alleging that its mandatory, invasive contractor surveillance practices funneled unauthorized third-party trade secrets and personal data straight to cybercriminals. https://compliancehub.wiki/mercor-litellm-delve-class-action-supply-chain-compliance-fraud/ https://compliancehub.wiki/five-lawsuits-mercor-data-breach-litigation-breakdown/ Sponsors www.breached.company www.compliancehub.wiki

Apr 11, 202651 min

Ep 449The Mythos Dilemma: AI, Zero-Days, and Project Glasswing

Anthropic's latest frontier model, Claude Mythos Preview, has demonstrated an unprecedented ability to autonomously discover and exploit zero-day vulnerabilities in critical software. Recognizing the extreme dual-use risks of these capabilities falling into the wrong hands, Anthropic has made the unprecedented decision to withhold the model from general public release. Instead, the model is being deployed through Project Glasswing, a collaborative initiative with major tech industry partners aimed at using this powerful AI exclusively to secure the world's digital infrastructure. https://cisomarketplace.com/blog/project-glasswing-claude-mythos-cybersecurity https://cisomarketplace.com/blog/claude-mythos-leak-cybersecurity-stocks-crash-2026 https://www.anthropic.com/glasswing Sponsors: www.cisomarketplace.com

Apr 8, 202625 min

Ep 448Decoding CCPA: Navigating Cybersecurity Audits and Existing Frameworks

Dive into the nuances of California's new CCPA cybersecurity audit requirements and discover how they redefine the standard for "reasonable security". We explore how businesses can strategically leverage existing NIST, ISO, or CIS assessments as a foundation, while identifying the critical scope mismatches they must "top off" to ensure compliance. Tune in for a practical, four-step roadmap to navigate CalPrivacy's 18 evaluation components and prepare your organization's data protection strategy for the next wave of regulatory scrutiny. Sponsors: www.compliancehub.wiki www.cisomarketplace.com

Apr 6, 202616 min

Ep 447Encrypted Extortion: Inside Latin America's Cybercrime Boom

Dive into the rapidly evolving cyber threat landscape of Latin America and the Caribbean, where financially motivated threat actors are increasingly exploiting rapid digital adoption to target the region's largest economies. We explore how cybercriminals and hacktivist collectives like FiveFamilies are utilizing encrypted platforms like Telegram and WhatsApp to distribute banking trojans, deploy double-extortion ransomware against critical industries, and launch highly convincing AI-driven social engineering attacks. Join us as we unpack the tactics of these digital adversaries and discuss the urgent need for modernized infrastructure and public-private collaboration to secure the LAC region's digital future. Sponsors: www.myprivacy.blog www.breached.company

Apr 5, 202622 min

Ep 446Growing Up Digital: Safeguarding Youth in the EU

Explore the evolving landscape of youth digital protection across the European Union, where groundbreaking laws like the GDPR and the Digital Services Act (DSA) are being deployed to shield minors from data exploitation and harmful content. As emerging innovations like immersive virtual environments, neuromarketing, and AI-generated deepfakes introduce unprecedented risks to children's mental privacy and cognitive development, the battle for digital safety is becoming increasingly complex. Join us as we examine how local and regional authorities are stepping up to bridge the gap between high-level regulations and frontline realities, transforming overarching policies into tangible, community-based safeguards for families and schools. Sponsors: www.myprivacy.blog www.compliancehub.wiki

Apr 4, 202623 min

Ep 445Panic, Privacy, and Protecting Youth: Unpacking Child Online Safety Laws

This podcast dives into the current wave of Child Online Safety Legislation (COSL), such as the Kids Online Safety Act (KOSA), to unpack the political and societal forces driving these bipartisan bills. We critically examine the prevailing narrative that social media is the primary cause of the youth mental health crisis, exploring how "moral panics" over technology often ignore complex social realities. Furthermore, we discuss the potential unintended consequences of these legislative efforts, including severe threats to data privacy, free expression, and the well-being of marginalized youth through mandated age verification and expanded parental surveillance. Sponsors: www.myprivacy.blog www.cisomarketplace.com

Apr 4, 202623 min

Ep 444The Illusion of Trust: Fake Compliance and the LiteLLM Hack

This episode dives into the massive compliance fraud orchestrated by Delve, a Y Combinator-backed startup that generated hundreds of identical, fabricated SOC 2 reports using rubber-stamping certification mills. We explore how this "compliance theater" collided with a real-world supply chain attack when LiteLLM, a company boasting Delve-generated certifications, was breached through a compromised vulnerability scanner called Trivy. Ultimately, we unpack the devastating consequences of prioritizing automated compliance badges over actual security controls, and what this structural failure means for enterprise vendor risk management in 2026. https://compliancehub.wiki/litellm-delve-soc2-trust-chain-compliance-failure-2026 https://breached.company/litellm-supply-chain-attack-teampcp-trivy-pypi-2026 https://compliancehub.wiki/delve-compliance-startup-fake-soc2-audit-scandal https://cisomarketplace.com/blog/auditor-vs-assessor-compliance-trust-2026 Sponsors www.compliancehub.wiki www.cisomarketplace.com www.breached.company

Mar 28, 202647 min
Copyright 2025 All rights reserved.