• Beyond the Hype: The CISO's Guide to Vetting AI Security
    Feb 22 2026

    The cybersecurity market is currently flooded with "AI-washed" products, making it critical for CISOs to rigorously vet vendor claims to avoid wasting budgets and creating new vulnerabilities. This episode breaks down a practical evaluation framework, exploring the essential technical, security, and business questions you must ask to avoid compliance nightmares and secure genuine operational efficiency. Tune in to learn how to identify immediate vendor red flags, demand proof over promises, and successfully transition your SOC team through AI augmentation without sacrificing morale.

    • www.securitycareers.help/ciso-strategic-briefing-vetting-ai-security-vendors-and-navigating-the-ai-soc-landscape-2025-2026
    • https://cisomarketplace.com/blog/cisos-guide-ai-security-vendor-evaluation
    • https://cisomarketplace.com/blog/building-security-vendor-evaluation-framework-ciso-guide

    Sponsors:

    www.cisomarketplace.com

    www.cisomarketplace.services

    Mehr anzeigen Weniger anzeigen
    43 Min.
  • Defending the Frontlines: The SC CIC 2025 Year in Review
    Feb 21 2026

    The South Carolina Critical Infrastructure Cybersecurity (SC CIC) program actively defends the state's essential services from escalating digital threats like account compromise and double extortion ransomware. In 2025, the program expanded its reach to 326 participating organizations across 15 critical infrastructure sectors, offering free, proactive resources such as threat intelligence, vulnerability scanning, and readiness exercises. Join us as we explore how SC CIC equips local governments and vital facilities with the tools, grants, and training needed to stop cyberattacks before they disrupt critical daily operations.

    www.breached.company/south-carolina-critical-infrastructure-cybersecurity-2025-year-in-review

    Sponsors:

    www.cisomarketplace.com

    Packt Publishing

    AI Defense in Action – Feb 21 (TODAY) 40% discount code: CISOMP40

    https://www.eventbrite.com/e/ai-defense-in-action-tickets-1848270770629?aff=CISOMP&discount=CISOMP40
    Mehr anzeigen Weniger anzeigen
    25 Min.
  • AI Accountability: The Moment Security Leadership Gets Tested
    Feb 20 2026

    AI failures will not be treated like traditional cyber incidents. When automated systems produce biased decisions, leak sensitive data, or cause regulatory violations, accountability will land at the executive and board level. In this episode, we examine how AI risk is reshaping CISO expectations and what security leaders must prepare for before the first major AI governance crisis hits.

    www.compliancehub.wiki/ai-governance-and-regulatory-convergence-what-cisos-must-prepare-for-now

    https://www.securitycareers.help/ai-governance-will-be-a-core-skill-for-the-next-generation-of-cisos

    https://www.hackernoob.tips/the-ai-governance-maturity-gap-why-most-security-teams-are-behind

    Sponsors:

    www.cisomarketplace.com

    Packt Publishing

    AI Defense in Action – Feb 21 40% discount code: CISOMP40

    https://www.eventbrite.com/e/ai-defense-in-action-tickets-1848270770629?aff=CISOMP&discount=CISOMP40

    Mehr anzeigen Weniger anzeigen
    37 Min.
  • The AI Governance Gap: Why Security Leaders Are Falling Behind
    Feb 19 2026

    AI adoption is accelerating inside organizations, but governance maturity is not keeping pace. In this episode, we break down the emerging AI security gap — from adversarial model risks to executive accountability failures — and why this shift will redefine the CISO role. If you're building toward senior security leadership, understanding AI governance is no longer optional — it's strategic leverage.

    https://www.hackernoob.tips/the-ai-governance-maturity-gap-why-most-security-teams-are-behind

    https://www.securitycareers.help/ai-governance-will-be-a-core-skill-for-the-next-generation-of-cisos

    Sponsors:

    www.cisomarketplace.com

    Packt Publishing

    AI Defense in Action – Feb 21 40% discount code: CISOMP40

    https://www.eventbrite.com/e/ai-defense-in-action-tickets-1848270770629?aff=CISOMP&discount=CISOMP40
    Mehr anzeigen Weniger anzeigen
    36 Min.
  • Kill Chains and Code: Russia’s Pragmatic Shift to Tactical AI
    Feb 19 2026

    This episode explores how the Russian military has pivoted from failed, centralized command architectures to a fragmented but effective ecosystem of volunteer-built tactical software like the "Glaz/Groza" complex. We discuss the critical role of civilian engineers in adapting commercial technology and open-weight AI models to accelerate drone-to-artillery kill chains. Finally, we examine the security risks of using open-source tech and how Russia is mitigating them through domestic platforms like Astra Linux and systematic data collection.

    www.securitycareers.help/russian-command-and-control-transitioning-toward-ai-enabled-warfare

    Sponsors:

    www.cisomarketplace.com

    www.myprivacy.blog

    Mehr anzeigen Weniger anzeigen
    15 Min.
  • The Right Fit: A C3PAO Shopping Guide for SMBs
    Feb 18 2026

    This episode breaks down the ND-ISAC’s essential guide designed to help small and medium-sized businesses avoid the "race to the bottom" when selecting a Third-Party Assessment Organization (C3PAO). We discuss how to utilize a comprehensive scoring system to evaluate potential assessors on critical criteria like technical aptitude, reasonableness, and the all-important intake process. Listeners will learn why the lowest price often carries the highest risk and how to identify an assessor who truly understands their unique environment.

    www.securitycareers.help/c3pao-selection-guide-for-small-and-medium-sized-businesses-strategic-briefing

    Sponsors:

    https://baseline.compliancehub.wiki

    https://cmmcnist.tools

    Mehr anzeigen Weniger anzeigen
    15 Min.
  • Digital Fingerprints: Unmasking Russian Influence
    Feb 17 2026

    Join us as we explore the "Information Influence Attribution Framework," a methodology designed to pierce the veil of anonymous Russian disinformation campaigns in Ukraine and beyond. We break down how analysts combine technical infrastructure data, behavioral patterns like those in the DISARM framework, and contextual clues to distinguish organic viral content from coordinated state attacks. Through real-world case studies—from fake BBC videos to anti-mobilization TikToks—we reveal how digital detectives build high-confidence cases to hold state actors accountable.

    www.scamwatchhq.com/attributing-russian-information-influence-operations-insights-and-frameworks

    Sponsors:

    www.myprivacy.blog

    www.breached.company

    Mehr anzeigen Weniger anzeigen
    16 Min.
  • Code Dark: The Systemic Crisis of Healthcare Cybersecurity
    Feb 15 2026

    This episode explores how catastrophic ransomware attacks like the Change Healthcare and Ascension incidents have transformed cybercrime from a financial nuisance into a lethal patient safety emergency. We uncover the emerging threats defining 2026, including AI data poisoning, "ghost bug" vulnerabilities in legacy medical devices, and the fragile interdependence of the global diagnostic supply chain. Finally, we break down the federal government’s aggressive new enforcement against information blocking and the "Secure by Design" mandates essential for hospital survival.

    www.breached.company/healthcare-under-siege-47-ransomware-victims-in-30-days-as-patient-safety-crisis-deepens

    Sponsors

    www.cisomarketplace.com

    www.breached.company

    Mehr anzeigen Weniger anzeigen
    32 Min.