Videos
Cybersecurity is constantly evolving, and so are the leaders who shape it. Hosted by veteran journalist Joan Goodchild, Cyber Sessions brings candid conversations with top CISOs, strategists, and industry influencers. Each episode cuts through the no...
What if you could stop cyberattacks before they happen? In this episode of Cyber Sessions, host Joan Goodchild sits down with Erin Whitmore, former CIA case officer and current Head of the CYNTURION Group for CYPFER, to discuss how her team uses inte...
In this episode of Cyber Sessions, Senthil Ramakrishnan, Head of Cyber Product Strategy at AT&T, talks about why small and midsize businesses have become prime - and often unprepared - targets for cyberattacks and what they can do to improve their se...
In this episode of Cyber Sessions, Visa CISO Subra Kumaraswamy takes us inside the company’s 24/7 Cyber Fusion Centers, where AI-driven defenses block 90 million attacks and 11 million phishing emails each month. He shares how his team achieves “...
In this edition of Cyber Sessions, host Joan Goodchild talks with IANS researcher Nick Kakolowski about why midmarket CISOs now earn record-high pay but are still are stretched thin by expanding responsibilities and limited resources.
How is cybersecurity education changing — and what skills do tomorrow’s security leaders really need? In this episode of Security Sessions, host Joan Goodchild talks with Kevin Powers, Faculty Director and Lecturer at Boston College Law School, a...
In this debut episode of Cyber Sessions, host Joan Goodchild sits down with Andy Ellis, veteran CSO and member of the CSO Hall of Fame, to learn about his State of the Security Vendor report from the Black Hat show floor. From AI flooding vendor tagl...
Tech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists wil...
The ongoing saga between the LockBit ransomware gang and law enforcement officials feels like a made-for-TV movie with back-and-forth ‘trolling’, while at the same time the FBI provides warnings about ransomware aimed at hospitals. Paul Desmond j...
There are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate business value and ROI. However, to get true value from security performance metrics, it’s important that CISOs avoid drowning in metrics that...
Data is the enabling infrastructure for security AI. Three characteristics are deterministic of success: data framework structures; data management; and data curation. Every cybersecurity vendor is going to roll-out a generative AI interface for thei...
This session explores the metrics of most value to CISOs and outline how they can use them to not only measure and improve the effectiveness of their security efforts, but also show valuable business alignment.
Cyberattacks continue to threaten healthcare systems around the world, putting patients at risk and further eroding trust in healthcare providers. Can anything be done to reduce the risk, or will going to the doctor or hospital be a roll of the dice ...
If you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you h...
The high-profile hack of MGM Resorts International is shining a light on the latest tactics being used by organized hackers to exploit large companies. What lessons can consumers and other businesses learn from these attacks? Keith chats with Ben Smi...
Training employees to spot phishing attempts and raise security awareness is a multi-billion-dollar business, but does it really work? Recent high-profile cyberattacks have shown that it is still relatively easy for attackers to get employees to prov...
With new technology and attack methods such as AI voice phishing being used by hackers, the old methods of passwords and authentication may soon be going away. On this episode, Keith chats with Julianna Lamb, CTO and co-founder of Stytch, about new a...
Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of "trust no one". We explain the concept in this video.
To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Know...
Artificial intelligence and its effect on cybersecurity (both good and bad) was one of the hottest topics at the annual Black Hat security conference in Las Vegas. Keith chats with security writer and editor Joan Goodchild about the biggest trends fr...
Years of security solutions have not made the Internet more secure, as reports of new attacks and data breaches occurring regularly. The issue is a broken system based on an incorrect assumption of what security is. Keith talks with Wes Kussmaul, CTO...