Look for any podcast host, guest or anyone
Showing episodes and shows of

El Cyber Podcast

Shows

The Med Device Cyber PodcastThe Med Device Cyber PodcastAI in Medical Devices: Opportunities & Regulation with Matt LemayWhat does responsible AI implementation look like in medical devices?This episode explores the intersection of AI, cybersecurity, and medical device regulation with guest Matt Lemay, CEO of Lemay.ai. Hosts Christian Espinosa and Trevor Slattery of Blue Goat Cyber dig into how AI models are trained, certified, and deployed in clinical contexts—and what can go wrong. Key points: (7:29) Data, Security, and Deployment Risks* Training data inconsistencies and data drift in AI models.* Cybersecurity concerns tied to cloud deployment and version control.2025-06-0342 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastEssential Software Documentation for Med Device ManufacturersWhat documents should engineers prepare to get ready for submitting a medical device to the FDA? In this episode, Christian and Trevor dig into the underestimated role software documentation plays in cybersecurity, especially in the medical device space. They highlight how incomplete or contextless documentation can hinder everything from SBOM utility to regulatory compliance. With sharp insights and real-world examples, they make the case for elevating documentation as a strategic priority.Key points: (00:43) The Real Purpose of Documentation* Software documentation is often seen as a checklist item rather...2025-05-2727 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - From Window Fabricator to SOC Analyst with Caleb Matthews - Episode 62Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Caleb, a former student who successfully transitioned from window fabrication to cybersecurity.Caleb shares his journey from spending seven years in window fabrication to landing his dream role as a Level 1 SOC Analyst at Triskel Labs. He discusses the challenges of changing careers, the intense training process, and how his previous leadership experience has helped him adapt to his new role in a 24/7 Security Operations Center.If you're considering a...2025-05-2221 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastEarly Cyber Strategies for MedTech TrailblazersWhat are some strategies founders can use to incorporate cybersecurity into the early stages of developing a medtech product? In this episode, Christian and Trevor break down the critical role of cybersecurity in early-stage medtech startups. They explore why cybersecurity is often overlooked, what the real-world consequences are, and how startups can shift left to avoid costly pitfalls. From VC funding to FDA requirements, they offer a roadmap for founders who want to get it right from the start.Key points: (0:33) The Cybersecurity Awareness Gap* Many early-stage medtech st...2025-04-2927 minCyber Crime JunkiesCyber Crime JunkiesAre you at Risk? Personal Liability Cyber Breaches.We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of c...2025-04-2854 minCyber Crime JunkiesCyber Crime JunkiesSecrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.Chapters00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiation with Threat Actors11:53 Case Studies in Ransomware Negotiation16:00 The Role of Cyber Insurance18:49 Incident Response Planning21:57 How To Deal With Online Extortion25:09 The Business of Ransomware30:04 Secrets To Cyber...2025-04-2458 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - Overcoming Career Change Anxiety with Akhil George - Episode 60Welcome back to The Cyber Revolution Podcast!This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Akhil George, a former warehouse worker who successfully transitioned into cybersecurity.Akhil shares his inspiring journey from working in a warehouse to landing his first role as an Information Security Consultant, focusing on Governance, Risk, and Compliance (GRC). With a small IT background from his time in India, Akhil explains how he recognized security vulnerabilities in his warehouse workplace and developed a passion for contributing to the cybersecurity industry.If...2025-04-2431 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastThe Growing Importance of Interoperability and Third-Party Component SecurityWhy is interoperability increasing cybersecurity risks in healthcare, and what can we do about it?Interoperability is making healthcare more efficient but also more vulnerable to cyber threats. In this episode, Christian and Trevor discuss how second-order attacks, misconfigured cloud systems, and poor data integrity controls can compromise medical devices. They also share practical steps manufacturers can take to protect their devices and networks.Key points: (02:00) Understanding Interoperability Risks* The increasing number of connected medical devices and their security challenges.* How interoperability expands...2025-03-2537 minThe Cyber Revolution PodcastThe Cyber Revolution PodcastCyber Revolution Podcast - From Teaching to Tech with Brett Leikas - Episode 58This week on The Cyber Revolution Podcast, Adam Hewitt, CEO of Cyber Revolution, is joined by Brett, a former student who successfully transitioned from a 14-year teaching career into cybersecurity.Brett shares his journey, from discovering Cyber Revolution through a Facebook ad to landing his first cybersecurity role as an Associate Cybersecurity Consultant at Vectra, just two weeks before Christmas of 2024. He discusses the challenges of changing careers, the learning process, and the importance of a growth mindset.Key Takeaways from this Episode:Why Brett decided to leave the...2025-03-2023 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsMuleSoft Co-Pilot – Revolutionizing API Management | Royal Cyber PodcastWelcome to Royal Cyber's official podcast, where we dive into the latest technologies, innovations, and concepts shaping the future of enterprise operations.In this episode, we explore MuleSoft Co-Pilot, an AI-driven automation tool transforming API management and infrastructure workflows. Join our host Humza Tareen as he speaks with Syed Owais Ali, an expert in AI-driven automation, to discuss:✅ The challenges traditional enterprises face in API management ✅ How MuleSoft Co-Pilot enhances efficiency, visibility, and reduces manual workloads ✅ Real-world benefits, including 40-50% cost reduction and 80% manual workload reduction ✅ ROI insights and how businesses can seamlessly implement MuleSoft C...2025-03-1407 minCyber Crime JunkiesCyber Crime JunkiesAI Exposed. Latest Social Engineering Business Cyber Risk.Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish  nick@thenetdefender.com  https://thenetdefender.com/ Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions. Chapters 2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Traini...2025-03-141h 10Cyber Crime JunkiesCyber Crime JunkiesIs Ransomware Dead? What Cyber Criminals Are Saying.Is Ransomware Dead?  Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tacticsinsight from the mouths of top cyber crime gang leaders. We bring you Inside the Corporate-Style Operations of Cyber Criminals.·       Don't miss the Video episodes!·       Our YouTube Channel @Cybercrimejunkiespodcast·       Contact us direct! Find the Podcast, extra content, extras and more at https...2025-03-0634 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsThe Hidden Costs of Poor Product Data & How to Fix It | Blue Meteor x Royal Cyber PodcastBad product data is costing businesses more than they realize! Delayed product launches, lost sales, and frustrated customers—these are just some of the hidden costs. In this podcast, we explore how companies can overcome these challenges with smarter product data management. 🎙️ Join Aditya Bharti from Royal Cyber and Cherag Rana from Blue Meteor as they discuss: ✅ Why poor product data is a major issue for brands and retailers ✅ The risks of using spreadsheets for product information management ✅ How PIM, PXM, and AI-powered solutions improve efficiency and accuracy ✅ Solutions for better collaboration between suppliers, distributors, and retailers ✅ A real-life success story of...2025-03-0514 minCyber Insurance News & Information PodcastCyber Insurance News & Information PodcastEpisode #2 - Cyber Insurance News & Information Podcast - Understanding Cybersecurity InsuranceIn this episode of the Cyber Insurance News and Information Podcast, host Martin Hinton discusses the complexities of cybersecurity insurance with experts Craig Sekowski with thetechcollective.net and Ralph Pasquariello with care-report.com. They explore the challenges small businesses face in understanding cyber insurance, the importance of building cyber resilience, and the various cyber threats, such as business email compromise and ransomware. The conversation emphasizes the need for businesses to invest in cybersecurity insurance and security measures to protect against potential attacks, highlighting the evolving nature of cyber threats and the necessity for adaptable cyber insurance policies.2025-02-1734 minCyber Crime JunkiesCyber Crime JunkiesWhen Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for BusinessesCyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this week, cyber crime podcast, latest cyber crime news we all need to know, most recent top cyber security news, new cyber crime news, new...2025-01-1727 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastThe Evolution of Medical Device Cyber Threats: Past, Present, and FutureHow do medical device vulnerabilities pose life-threatening risks?In this episode, Christian and Trevor again explore the fascinating and critical world of medical device cybersecurity. Specifically, they discuss past attacks, present challenges, and future risks, from vulnerable pacemakers to autonomous surgical robots. They highlight the importance of transparency, proactive security design, and responsible research in protecting the devices we trust with our lives.Key points: * The 2007 cybersecurity concerns surrounding Dick Cheney’s pacemaker.* Barnaby Jack’s insulin pump and pacemaker hacking demonstrations....2024-12-2424 minCyber Crime JunkiesCyber Crime JunkiesHigher Education under Cyber Attack. Clemson CISO John Hoyt.John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new...2024-12-2057 minRoyal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsThe Future of Headless CMS & DXM | Crown Peak Insights | Royal Cyber Podcast In this episode of the Royal Cyber Partner Podcast, hosted by Aditya, we’re joined by Paul, VP of Solutions Engineering at Crown Peak, to discuss the future of Headless CMS, Digital Experience Management (DXM), and the shift toward Omni-Channel Commerce. Paul shares insights on how businesses can create agile digital ecosystems, deliver personalized content across multiple touchpoints, and stay compliant with evolving data privacy laws.🔹 Key Topics: How composable solutions enhance flexibility and scalability The power of Crown Peak’s hybrid headless CMS for seamless content delivery Delivering consistent, personalized experiences across websites, apps, kiosks, an...2024-12-0311 minThe Med Device Cyber PodcastThe Med Device Cyber PodcastTrailer - The Med Device Cyber PodcastYou rely on a medical device to stay healthy, but what if that device could be hacked? What if someone, miles away, could manipulate it, putting your loved one’s life at risk? Welcome to the trailer for The Med Device Cyber Podcast, the podcast dedicated to medical device cybersecurity. Join Christian Espinosa, CEO of Blue Goat Cyber, and Trevor Slattery, Director of Medical Device Cybersecurity, as they reveal the hidden risks and solutions to protect our health. Every fortnight, Christian and Trevor bring you insights from industry experts, healthcare professionals, and cybersecurity leaders who ar...2024-10-0101 minCyber Crime JunkiesCyber Crime JunkiesUnmasking Cyber Threats with a Master StorytellerDan Elliott, Principal Cyber Security Risk Advisor at Zurich, and notoriously talented storyteller for complex subjects, joins us.Topics: how story telling helps leaders, Benefits Of Story Telling In Business, cyber security story telling, benefits of story telling for complex topics, analogies used in cyber security, benefits for having security assessments done, benefits of security roadmap, best cybersecurity practices for business, best policies to limit cyber liability, best practices for businesses to limit cyber liabilityand more...For more real cybercrime stories, visit our website at https://cybercrimejunkies.com2024-09-3056 minCyber Crime JunkiesCyber Crime JunkiesHow to Measure Cyber Risk Today: Guidelines for LeadersWhat can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to KnowRyan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experience as a Cyber Expert for McKinsey & Company and was formerly with the US De...2024-09-131h 03Royal Cyber - Today’s IT TrendsRoyal Cyber - Today’s IT TrendsExploring SAP Omni-Channel Pricing & Promotion Service | Royal Cyber Podcast | EP - 01 Join us as we dive into SAP Omni-Channel Pricing & Promotion Service with Royal Cyber's Senior Solution Architect, Bupesh Kumar. Discover how centralized pricing and promotions help streamline complex calculations across multiple sales channels, ensuring a unified customer experience and increased brand loyalty. Learn about key components, integrations, and benefits in this insightful discussion. 2024-09-1026 minKaram PradhanKaram PradhanCyber Security | HINDI mein | Definition QnAIn this episode of 'Cyber Security', Host 'Kashish Gambhir' is in conversation with well-known Cyber Security expert 'Vandna Guliya'. Vandna shares everything about Cyber Security , all questions answered. This is Part-1 of the episode. ©KashishGambhir 2024 All QUestions mentioned below - Cyber security meaning Cyber security news Cyber security ppt Cyber security course Cyber security jobs Cyber security define Cyber security salary Cyber security definition Cyber security companies Cyber security pdf Cyber security awareness Cyber security i...2024-08-3139 minCyber Crime JunkiesCyber Crime JunkiesFBI vs Cyber Crime. EXCLUSIVE Scott Augenbaum Interview.Former FBI Special Agent who served with the FBI’s original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio.We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity education, cyber security mindset, individual user audits, how to educate users, and how cyber crime is like the mafia.https://CYBERSECURITYMINDSET.comSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6...2024-07-0346 min