podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
El Cyber Podcast
Shows
The Med Device Cyber Podcast
AI in Medical Devices: Opportunities & Regulation with Matt Lemay
What does responsible AI implementation look like in medical devices?This episode explores the intersection of AI, cybersecurity, and medical device regulation with guest Matt Lemay, CEO of Lemay.ai. Hosts Christian Espinosa and Trevor Slattery of Blue Goat Cyber dig into how AI models are trained, certified, and deployed in clinical contexts—and what can go wrong. Key points: (7:29) Data, Security, and Deployment Risks* Training data inconsistencies and data drift in AI models.* Cybersecurity concerns tied to cloud deployment and version control.
2025-06-03
42 min
The Med Device Cyber Podcast
Essential Software Documentation for Med Device Manufacturers
What documents should engineers prepare to get ready for submitting a medical device to the FDA? In this episode, Christian and Trevor dig into the underestimated role software documentation plays in cybersecurity, especially in the medical device space. They highlight how incomplete or contextless documentation can hinder everything from SBOM utility to regulatory compliance. With sharp insights and real-world examples, they make the case for elevating documentation as a strategic priority.Key points: (00:43) The Real Purpose of Documentation* Software documentation is often seen as a checklist item rather...
2025-05-27
27 min
The Cyber Revolution Podcast
Cyber Revolution Podcast - From Window Fabricator to SOC Analyst with Caleb Matthews - Episode 62
Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Caleb, a former student who successfully transitioned from window fabrication to cybersecurity.Caleb shares his journey from spending seven years in window fabrication to landing his dream role as a Level 1 SOC Analyst at Triskel Labs. He discusses the challenges of changing careers, the intense training process, and how his previous leadership experience has helped him adapt to his new role in a 24/7 Security Operations Center.If you're considering a...
2025-05-22
21 min
The Med Device Cyber Podcast
Early Cyber Strategies for MedTech Trailblazers
What are some strategies founders can use to incorporate cybersecurity into the early stages of developing a medtech product? In this episode, Christian and Trevor break down the critical role of cybersecurity in early-stage medtech startups. They explore why cybersecurity is often overlooked, what the real-world consequences are, and how startups can shift left to avoid costly pitfalls. From VC funding to FDA requirements, they offer a roadmap for founders who want to get it right from the start.Key points: (0:33) The Cybersecurity Awareness Gap* Many early-stage medtech st...
2025-04-29
27 min
Cyber Crime Junkies
Are you at Risk? Personal Liability Cyber Breaches.
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of c...
2025-04-28
54 min
Cyber Crime Junkies
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.Chapters00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiation with Threat Actors11:53 Case Studies in Ransomware Negotiation16:00 The Role of Cyber Insurance18:49 Incident Response Planning21:57 How To Deal With Online Extortion25:09 The Business of Ransomware30:04 Secrets To Cyber...
2025-04-24
58 min
The Cyber Revolution Podcast
Cyber Revolution Podcast - Overcoming Career Change Anxiety with Akhil George - Episode 60
Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Akhil George, a former warehouse worker who successfully transitioned into cybersecurity.Akhil shares his inspiring journey from working in a warehouse to landing his first role as an Information Security Consultant, focusing on Governance, Risk, and Compliance (GRC). With a small IT background from his time in India, Akhil explains how he recognized security vulnerabilities in his warehouse workplace and developed a passion for contributing to the cybersecurity industry.If...
2025-04-24
31 min
The Med Device Cyber Podcast
The Growing Importance of Interoperability and Third-Party Component Security
Why is interoperability increasing cybersecurity risks in healthcare, and what can we do about it?Interoperability is making healthcare more efficient but also more vulnerable to cyber threats. In this episode, Christian and Trevor discuss how second-order attacks, misconfigured cloud systems, and poor data integrity controls can compromise medical devices. They also share practical steps manufacturers can take to protect their devices and networks.Key points: (02:00) Understanding Interoperability Risks* The increasing number of connected medical devices and their security challenges.* How interoperability expands...
2025-03-25
37 min
The Cyber Revolution Podcast
Cyber Revolution Podcast - From Teaching to Tech with Brett Leikas - Episode 58
This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Brett, a former student who successfully transitioned from a 14-year teaching career into cybersecurity.Brett shares his journey, from discovering Cyber Revolution through a Facebook ad to landing his first cybersecurity role as an Associate Cybersecurity Consultant at Vectra, just two weeks before Christmas of 2024. He discusses the challenges of changing careers, the learning process, and the importance of a growth mindset.Key Takeaways from this Episode:Why Brett decided to leave the...
2025-03-20
23 min
Royal Cyber - Today’s IT Trends
MuleSoft Co-Pilot – Revolutionizing API Management | Royal Cyber Podcast
Welcome to Royal Cyber's official podcast, where we dive into the latest technologies, innovations, and concepts shaping the future of enterprise operations.In this episode, we explore MuleSoft Co-Pilot, an AI-driven automation tool transforming API management and infrastructure workflows. Join our host Humza Tareen as he speaks with Syed Owais Ali, an expert in AI-driven automation, to discuss:✅ The challenges traditional enterprises face in API management ✅ How MuleSoft Co-Pilot enhances efficiency, visibility, and reduces manual workloads ✅ Real-world benefits, including 40-50% cost reduction and 80% manual workload reduction ✅ ROI insights and how businesses can seamlessly implement MuleSoft C...
2025-03-14
07 min
Cyber Crime Junkies
AI Exposed. Latest Social Engineering Business Cyber Risk.
Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com https://thenetdefender.com/ Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions. Chapters 2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Traini...
2025-03-14
1h 10
Cyber Crime Junkies
Is Ransomware Dead? What Cyber Criminals Are Saying.
Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tacticsinsight from the mouths of top cyber crime gang leaders. We bring you Inside the Corporate-Style Operations of Cyber Criminals.· Don't miss the Video episodes!· Our YouTube Channel @Cybercrimejunkiespodcast· Contact us direct! Find the Podcast, extra content, extras and more at https...
2025-03-06
34 min
Royal Cyber - Today’s IT Trends
The Hidden Costs of Poor Product Data & How to Fix It | Blue Meteor x Royal Cyber Podcast
Bad product data is costing businesses more than they realize! Delayed product launches, lost sales, and frustrated customers—these are just some of the hidden costs. In this podcast, we explore how companies can overcome these challenges with smarter product data management. 🎙️ Join Aditya Bharti from Royal Cyber and Cherag Rana from Blue Meteor as they discuss: ✅ Why poor product data is a major issue for brands and retailers ✅ The risks of using spreadsheets for product information management ✅ How PIM, PXM, and AI-powered solutions improve efficiency and accuracy ✅ Solutions for better collaboration between suppliers, distributors, and retailers ✅ A real-life success story of...
2025-03-05
14 min
Cyber Insurance News & Information Podcast
Episode #2 - Cyber Insurance News & Information Podcast - Understanding Cybersecurity Insurance
In this episode of the Cyber Insurance News and Information Podcast, host Martin Hinton discusses the complexities of cybersecurity insurance with experts Craig Sekowski with thetechcollective.net and Ralph Pasquariello with care-report.com. They explore the challenges small businesses face in understanding cyber insurance, the importance of building cyber resilience, and the various cyber threats, such as business email compromise and ransomware. The conversation emphasizes the need for businesses to invest in cybersecurity insurance and security measures to protect against potential attacks, highlighting the evolving nature of cyber threats and the necessity for adaptable cyber insurance policies.
2025-02-17
34 min
Cyber Crime Junkies
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all need to know, most recent top cyber security news, new cyber crime news, new...
2025-01-17
27 min
The Med Device Cyber Podcast
The Evolution of Medical Device Cyber Threats: Past, Present, and Future
How do medical device vulnerabilities pose life-threatening risks?In this episode, Christian and Trevor again explore the fascinating and critical world of medical device cybersecurity. Specifically, they discuss past attacks, present challenges, and future risks, from vulnerable pacemakers to autonomous surgical robots. They highlight the importance of transparency, proactive security design, and responsible research in protecting the devices we trust with our lives.Key points: * The 2007 cybersecurity concerns surrounding Dick Cheney’s pacemaker.* Barnaby Jack’s insulin pump and pacemaker hacking demonstrations....
2024-12-24
24 min
Cyber Crime Junkies
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new...
2024-12-20
57 min
Royal Cyber - Today’s IT Trends
The Future of Headless CMS & DXM | Crown Peak Insights | Royal Cyber Podcast
In this episode of the Royal Cyber Partner Podcast, hosted by Aditya, we’re joined by Paul, VP of Solutions Engineering at Crown Peak, to discuss the future of Headless CMS, Digital Experience Management (DXM), and the shift toward Omni-Channel Commerce. Paul shares insights on how businesses can create agile digital ecosystems, deliver personalized content across multiple touchpoints, and stay compliant with evolving data privacy laws.🔹 Key Topics: How composable solutions enhance flexibility and scalability The power of Crown Peak’s hybrid headless CMS for seamless content delivery Delivering consistent, personalized experiences across websites, apps, kiosks, an...
2024-12-03
11 min
The Med Device Cyber Podcast
Trailer - The Med Device Cyber Podcast
You rely on a medical device to stay healthy, but what if that device could be hacked? What if someone, miles away, could manipulate it, putting your loved one’s life at risk? Welcome to the trailer for The Med Device Cyber Podcast, the podcast dedicated to medical device cybersecurity. Join Christian Espinosa, CEO of Blue Goat Cyber, and Trevor Slattery, Director of Medical Device Cybersecurity, as they reveal the hidden risks and solutions to protect our health. Every fortnight, Christian and Trevor bring you insights from industry experts, healthcare professionals, and cybersecurity leaders who ar...
2024-10-01
01 min
Cyber Crime Junkies
Unmasking Cyber Threats with a Master Storyteller
Dan Elliott, Principal Cyber Security Risk Advisor at Zurich, and notoriously talented storyteller for complex subjects, joins us.Topics: how story telling helps leaders, Benefits Of Story Telling In Business, cyber security story telling, benefits of story telling for complex topics, analogies used in cyber security, benefits for having security assessments done, benefits of security roadmap, best cybersecurity practices for business, best policies to limit cyber liability, best practices for businesses to limit cyber liabilityand more...For more real cybercrime stories, visit our website at https://cybercrimejunkies.com
2024-09-30
56 min
Cyber Crime Junkies
How to Measure Cyber Risk Today: Guidelines for Leaders
What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to KnowRyan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experience as a Cyber Expert for McKinsey & Company and was formerly with the US De...
2024-09-13
1h 03
Royal Cyber - Today’s IT Trends
Exploring SAP Omni-Channel Pricing & Promotion Service | Royal Cyber Podcast | EP - 01
Join us as we dive into SAP Omni-Channel Pricing & Promotion Service with Royal Cyber's Senior Solution Architect, Bupesh Kumar. Discover how centralized pricing and promotions help streamline complex calculations across multiple sales channels, ensuring a unified customer experience and increased brand loyalty. Learn about key components, integrations, and benefits in this insightful discussion.
2024-09-10
26 min
Karam Pradhan
Cyber Security | HINDI mein | Definition QnA
In this episode of 'Cyber Security', Host 'Kashish Gambhir' is in conversation with well-known Cyber Security expert 'Vandna Guliya'. Vandna shares everything about Cyber Security , all questions answered. This is Part-1 of the episode. ©KashishGambhir 2024 All QUestions mentioned below - Cyber security meaning Cyber security news Cyber security ppt Cyber security course Cyber security jobs Cyber security define Cyber security salary Cyber security definition Cyber security companies Cyber security pdf Cyber security awareness Cyber security i...
2024-08-31
39 min
Cyber Crime Junkies
FBI vs Cyber Crime. EXCLUSIVE Scott Augenbaum Interview.
Former FBI Special Agent who served with the FBI’s original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio.We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity education, cyber security mindset, individual user audits, how to educate users, and how cyber crime is like the mafia.https://CYBERSECURITYMINDSET.comSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6...
2024-07-03
46 min