PLAY PODCASTS
CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

465 episodes — Page 9 of 10

Ep 65Navigating Vietnam's Data Law: Key Compliance for Businesses

This podcast episode explores Vietnam's new Law on Data, effective July 1, 2025, and its implications for businesses. We'll break down the law's key aspects, including scope of application, digital data definitions, data ownership rights, regulations on cross-border data transfers (especially for "important" and "core" data), and the requirements for mandatory risk assessments. We also discuss data-related products and services, the establishment of the National General Database and National Data Centre, and practical steps businesses can take to ensure compliance and mitigate risks in Vietnam's evolving digital landscape. www.compliancehub.wiki/vietnams-law-on-data-key-provisions-and-implications

Feb 27, 202519 min

Ep 64PDPA Data Breaches: Navigating Malaysia's Compliance Landscape

Understand the critical data breach notification requirements under Malaysia's Personal Data Protection Act (PDPA) 2010. Learn how to identify "significant harm" and when you must notify the Personal Data Protection Commissioner and affected data subjects. Stay informed about potential penalties for non-compliance and strategies for robust data breach management. www.compliancehub.wiki/understanding-data-breach-notification-requirements-under-malaysias-pdpa

Feb 27, 202515 min

Ep 63AI Threat Disruption: Staying Ahead of Malicious Actors

This podcast explores how AI companies are uniquely positioned to disrupt malicious uses of AI models. We delve into real-world case studies, such as surveillance operations, deceptive employment schemes, and influence campaigns, to understand how these threats are identified and neutralized. Join us as we uncover the latest strategies and insights in the fight against AI abuse. www.myprivacy.blog/the-ai-threat-landscape-disrupting-malicious-uses-of-ai-models

Feb 25, 202512 min

Ep 62The Algorithmic Battlefield: AI, Ethics, and the New Arms Race

Venture into the murky world where Silicon Valley's ethical lines blur as AI giants like Google and OpenAI chase lucrative military contracts. Explore how once-sacred principles are being abandoned in favor of algorithms that now dictate life-and-death decisions on the battlefield. Uncover the implications of a future where unaccountable AI systems reshape global conflict, privacy erodes, and the public remains in the dark. www.myprivacy.blog/from-dont-be-evil-to-drone-deals-silicon-valleys-reckless-ai-arms-race

Feb 24, 202512 min

Ep 61Encrypted Frontlines: Cyber Espionage, Messaging App Vulnerabilities, and Global Security

This episode examines the rising threats to encrypted communications and the geopolitical implications of cyber espionage. We analyze how Russian threat actors exploit vulnerabilities in messaging apps like Signal and how platforms like Telegram have become hubs for cybercrime. Also examined is the impact of government pressures on encryption standards, and the delicate balance between privacy and national security. https://www.breached.company/encrypted-frontlines-unpacking-cyber-espionage-messaging-app-vulnerabilities-and-global-security

Feb 23, 202530 min

Ep 60Privacy Matters: Navigating the Social Media Maze in 2025

From understanding end-to-end encryption (E2EE) on WhatsApp to mastering privacy settings on Snapchat and managing ad preferences on X (Twitter), MyPrivacy.blog equips you with the knowledge to navigate the social media landscape with confidence. Learn about the nuances of private versus public accounts on TikTok. how to leverage features like Close Friends on Instagram and the importance of reviewing third-party app permissions on Facebook. https://www.myprivacy.blog/the-complete-guide-to-social-media-privacy-protecting-your-digital-life-in-2025/

Feb 22, 202523 min

Ep 59AI Unveiled: DeepSeek R1 Red Team & the Future of LLM Security

Explore the cybersecurity and privacy challenges posed by Large Language Models (LLMs) through the lens of DeepSeek R1 red teaming. Dive into the vulnerabilities uncovered in DeepSeek R1, from harmful content generation to insecure code and biased outputs. Learn about practical strategies and frameworks like NIST AI RMF for mitigating risks and ensuring responsible AI deployment. https://www.breached.company/deepseek-r1-red-team-navigating-the-intersections-of-llm-ai-cybersecurity-and-privacy

Feb 21, 202536 min

Ep 58Geopolitical Tech Storm: Navigating Cybersecurity, AI, and Global Power

The intersection of technology and geopolitics is creating unprecedented challenges in cybersecurity and AI governance. Global powers are competing in AI and semiconductor technologies, leading to rising tensions and potential risks. Experts at the Munich Security Conference 2025 emphasized the urgent need for international cooperation and robust frameworks to navigate this evolving landscape and foster trust through public-private partnerships https://www.breached.company/navigating-the-geopolitical-tech-storm-cybersecurity-ai-governance-and-global-power-shifts/

Feb 20, 202517 min

Ep 57Cybersecurity in Africa: Threats, Trends, and Tech

This podcast explores the diverse cybersecurity challenges facing the African continent, from state-sponsored attacks to cybercriminal networks. It examines the development and implementation of legal and regulatory frameworks, as well as regional cooperation efforts to combat cyber threats. The podcast also discusses emerging trends like data sovereignty, AI regulation, and critical infrastructure protection, providing insights into the future of cybersecurity in Africa. www.compliancehub.wiki/cybersecurity-in-africa-navigating-threats-trends-and-the-tech-landscape/

Feb 19, 202527 min

S1 Ep 56Decoding Cybercrime: Platforms, Psychology, and Precautions

Cybercrime is a growing threat affecting all sectors, fueling a shadow economy with projected costs reaching $10.5 trillion by 2025. This episode explores the cybercrime ecosystem, from dark web platforms and cybercriminal psychology to specific attack techniques like social engineering and ransomware. Listeners will gain insights into how cybercriminals operate, their motivations, and the geographical distribution of cybercrime. We also discuss practical precautions and strategies for individuals and organizations to protect themselves against these evolving threats. www.breached.company/decoding-cybercrime-platforms-psychology-and-precautions

Feb 18, 202521 min

S1 Ep 55Decoding Digital Spain 2025: Strategies for a Connected Future

Decoding Digital Spain 2025" explores Spain's ambitious plan for digital transformation, focusing on key initiatives in connectivity, 5G, cybersecurity, and AI. The podcast examines how Spain aims to bridge digital divides, enhance public services, and boost its economy through strategic investments and policy reforms. Listeners will gain insights into the challenges and opportunities as Spain strives to become a leading digital hub in Europe while ensuring citizen rights and ethical AI development. www.compliancehub.wiki/span-cybersecurity-and-data-prviacy-with-gdpr-and-lopdgdd-synergy/

Feb 17, 202532 min

S1 Ep 54China's Cyber Campaigns: Salt & Volt Typhoon and Beyond

Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure. Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures. Learn about recommended mitigations and best practices to strengthen network defenses against these sophisticated cyber threats. https://www.breached.company/chinas-cyber-campaigns-a-deep-dive-into-salt-volt-typhoon-and-other-threat-actors/

Feb 16, 202537 min

S1 Ep 53State-Sponsored Cybercrime: When Nations Turn to Hackers

Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states collaborate with cybercriminals, from purchasing malware and tools to directly hiring attackers for specific missions.

Feb 15, 202522 min

S1 Ep 52Navigating Singapore's PDPA: Protecting Personal Data in the Digital Age

The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access and correct their personal data, ensuring a balance between data protection and business needs. https://www.compliancehub.wiki/understanding-the-personal-data-protection-act-singapores-framework-for-data-privacy/

Feb 14, 202518 min

Ep 51Securing Canada's Digital Future: The National Cyber Security Strategy 2025

Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats. This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors. Discover how the government plans to engage with all levels of society, from Indigenous communities to the private sector, to build a more resilient and secure digital Canada, as well as how the Canadian Cyber Defence Collective (CCDC) and other initiatives play a crucial role in achieving these goals.

Feb 13, 202514 min

Phobos Ransomware: A Deep Dive into Tactics, Techniques, and Mitigation

Feb 12, 202522 min

AI Smart Cities: Promises, Perils, and the Power of Governance

Feb 11, 202516 min

Decoding DORA: Navigating Digital Resilience in Finance

Feb 10, 202519 min

CISO's 20/20 Vision: Key Performance Indicators for Cybersecurity Success

Feb 9, 202524 min

Decoding NIS2: What It Means for Your Organization

Feb 8, 202541 min

Auditing AI: Navigating Risks and Regulations

Feb 8, 202527 min

Decoding AI Risks: A Deep Dive into the MIT AI Risk Repository

Feb 7, 202521 min

Tractor Tech Tug-of-War: Farmers, Manufacturers, and the Right to Repair

Feb 6, 202520 min

Cybersecurity Risks in Modern Machinery: From Construction Sites to Farm Fields and Beyond

Feb 5, 202514 min

DeepSeek: AI Innovation vs. Global Scrutiny

Feb 4, 202522 min

Zero Day to Breach: The 2024 Vulnerability Explosion

Feb 3, 202514 min

AI Security Deep Dive: Threats, Controls, and Red Teaming

Jan 27, 202520 min

The Rise of AI-Powered Cyberattacks and the Imperative of Cyber Resilience

Jan 11, 202513 min

GDPR Gets Personal: Fines, Class Actions, and Data Transfer Rules

Jan 3, 202523 min

META Versus You: Data, Deepfakes & Dangerous Algorithms

Nov 15, 202423 min

Zero-Day Exploits on the Rise: A Deep Dive into the NSA's Top Vulnerabilities of 2023

Nov 14, 202414 min

OWASP Top 10 for LLMs: Unveiling the Hidden Dangers of AI

Nov 11, 202427 min

Ransomware Insights: From Simple Extortion to Global Threat

Nov 9, 202416 min

Safe Internet By Default: Spain's Approach to Protecting Children Online

Oct 26, 202435 min

Cybersecurity Crossroads: Charting the Course for the Next Administration

Oct 25, 202430 min

North Korea's Secret Weapon: IT Workers Infiltrating the US

Oct 24, 202418 min

EU AI Act: Decoding the Future of AI

Oct 24, 202413 min

SolarWinds Hack: Fallout and Lessons Learned

Oct 22, 202426 min

Cybersecurity 2024: New Threats, Faster Attacks

Oct 18, 202416 min

The State of AI: A Global Perspective

Oct 18, 202425 min

Digital Panopticon: Unraveling the Fine Print of Your Online Life

Oct 16, 202416 min

Scammer Calendar: A Year-Round Guide

Oct 15, 202410 min

Brazil's LGPD: A Deep Dive into Data Protection

Oct 14, 202413 min

Breach Finances: The Price of Data Privacy

Oct 13, 202414 min

Digital Wild West: Greed, Chaos, and the Cyber Arms Race

Oct 12, 202413 min

Data Privacy: Crossing Borders in the Digital Age

Oct 11, 20248 min

Texas Cyber: My Data, My Rules

Oct 11, 202411 min

CISO's on Trial: Cybersecurity's Legal Battlefield

Oct 10, 202412 min

The CISO's Playbook

Oct 9, 202410 min

Cybersecurity Law 101

Oct 8, 202418 min