1. EachPod

Bill Murphy's RedZone 10X Podcast - Podcast

Bill Murphy's RedZone 10X Podcast

The 10X Podcast explores the latest in technology, innovation, creativity, leadership, psychology, health/wellness, and more. Host Bill Murphy is joined by top CIOs, authors, and other leaders at the forefronts of business and innovation. A great listen for business IT leaders guiding their organizations through disruption and exponential change.

Business Technology Tech Creativity Careers Leadership Innovation Health
Update frequency
every 15 days
Average duration
48 minutes
Episodes
167
Years Active
2015 - 2023
Share to:
S2 E9: Will STIX and TAXII Revolutionize IT Security Forever?

S2 E9: Will STIX and TAXII Revolutionize IT Security Forever?

Are you a CIO, CSO, CISO, VP of IT, Dir of IT, SR VP of IT?

What does it cost you to manually examine threat intelligence information? Are you doing it at all?

If you are an IT decision maker you wil…

00:56:54  |   Sat 10 Oct 2015
S2 E8: Top 4 Cyber Security Competitions to build Tenacity, Will, Grit, Determination, IQ and Neuro-musculature

S2 E8: Top 4 Cyber Security Competitions to build Tenacity, Will, Grit, Determination, IQ and Neuro-musculature

Ron is an expert in what it takes to develop the next generation of cyber security leaders.

• He is the Air Force Association US CyberPatriot 2013-2014 Mentor of the Year for his work with high schoo…

00:58:45  |   Fri 02 Oct 2015
S2 E7: Van Gogh, Michelangelo, Da Vinci Teachings on Business, Intention, and Creativity

S2 E7: Van Gogh, Michelangelo, Da Vinci Teachings on Business, Intention, and Creativity

Internationally acclaimed creativity expert Michael Michalko joins me today to discuss his creative thinking techniques that have inspired business thinkers around the world to create the innovative …

00:58:34  |   Wed 23 Sep 2015
S2 E6: IoT Learning 201| Happy Plants| Pumps| Gremlins| Coffee Makers| Patch Wars| Tidal Waves & Turning Tides| Coffee Machines Connected to AD

S2 E6: IoT Learning 201| Happy Plants| Pumps| Gremlins| Coffee Makers| Patch Wars| Tidal Waves & Turning Tides| Coffee Machines Connected to AD

Uris is a leader in the world of research as it relates to IoT Security. This interview is a great learning tool to educate business leaders and your peers about where IoT is going and what it means …

00:58:42  |   Wed 16 Sep 2015
S2 E5: Epic Quests and 2 Week River Adventures for You and Your Family|Nature|Boardrooms|Business| & Iran

S2 E5: Epic Quests and 2 Week River Adventures for You and Your Family|Nature|Boardrooms|Business| & Iran

Mark is a world renowned expedition paddler and explorer and he has a powerful story to he shared about kayaking the entire length of the Amazon, Mississippi, Volga River (Europe’s largest river) and…

00:47:32  |   Wed 09 Sep 2015
S2 E4: The All-Time Computer Science Hero| How Alan Turing Cut WW2 by 2 Years and Saved 20 Million Lives

S2 E4: The All-Time Computer Science Hero| How Alan Turing Cut WW2 by 2 Years and Saved 20 Million Lives

The CISO Should Not Report to the CIO |Assume you Have Been Hacked|6 Kill Chain Fundamentals You Must Know|How Can You Deny Command and Control Attacks| The Best Cyber Security Books - Hall of Fame|A…

01:01:53  |   Wed 02 Sep 2015
S2 E3: The Two Best Ways for a CIO to Immediately Add Value, Right Now!

S2 E3: The Two Best Ways for a CIO to Immediately Add Value, Right Now!

Two Ways to Avoid Being Perceived as a “Door Matt” and an “Order Taker” In Your Business. The Two Best Ways to Immediately Add Value to the Business, Converged Orgs Drive 4x More Profit, New Language…

00:52:34  |   Tue 25 Aug 2015
S2 E2: How Do You Keep Your Job if Breached? |Pinball Machines|Geo Fencing| Targeted attack vs Apt|Leadership| bulletproof hosting report| Dark Web

S2 E2: How Do You Keep Your Job if Breached? |Pinball Machines|Geo Fencing| Targeted attack vs Apt|Leadership| bulletproof hosting report| Dark Web

Hacking-Back vs Attribution| APT Attack vs Targeted Attacks| Mobility and Virtualization| Leadership and Team Innovation| Ethics and the Selling of Vulnerabilities| The Best Zero Day definition Ever|…

00:55:56  |   Wed 19 Aug 2015
S2 E1: Selfie Based Authentication| Authentication History and the Future

S2 E1: Selfie Based Authentication| Authentication History and the Future

Kayvan is an authentication expert. He gives a fascinating review of the old and future related to User Authentication Trends and Methods for Native Mobile Applications. Do you want to know pros and …

00:50:49  |   Thu 06 Aug 2015
S1 E18: Big Data IoT Security, The Mosaic Effect, Demise of Passwords, IoT TOCTOU Attacks, IoT Security Loose Membranes, and more

S1 E18: Big Data IoT Security, The Mosaic Effect, Demise of Passwords, IoT TOCTOU Attacks, IoT Security Loose Membranes, and more

In the following interview Hadi and I discuss Big Data Security Topics like the Mosaic Effect, Mobile Security, The Demise of Passwords, IoT TOCTOU Attacks, Driverless Cars, Atomic Views of IoT, Orc…

01:01:19  |   Wed 29 Jul 2015
S1 E17: Being a Bullfrog CIO is about Making Leapfrog Steps vs Incremental Progress

S1 E17: Being a Bullfrog CIO is about Making Leapfrog Steps vs Incremental Progress

 

Are you and your team ready to make Leapfrog Steps or are you simply making Incremental Progress? 

 

How do you get hard things done? 

 

 

 

We are so often conditioned to look at the negat…

00:25:19  |   Wed 03 Jun 2015
S1 E16: Sushi and IT Security – How You Can Run Your IT Shop Like the Best Sushi Restaurant in the World

S1 E16: Sushi and IT Security – How You Can Run Your IT Shop Like the Best Sushi Restaurant in the World

Alex Hutton major bank CISO, thought leader, influencer, presenter, award winning speaker, as he discusses with me inspiration he gets from the best sushi in the world and a having a vision of crafts…

00:49:03  |   Wed 27 May 2015
S1 E15: Innovation & Risk – How to remove emotion and superficial thinking from Cyber Security decision making

S1 E15: Innovation & Risk – How to remove emotion and superficial thinking from Cyber Security decision making

Jack Jones is widely considered a thought leader in risk management and information security, Jack has been employed in technology for the past thirty years; specializing in information security and …

00:48:57  |   Wed 20 May 2015
S1 E14: A CIO in the Boardroom / 11 Tips for a Remarkable IT Security Presentation Mark Robnett, CIO Justice Federal Credit Union

S1 E14: A CIO in the Boardroom / 11 Tips for a Remarkable IT Security Presentation Mark Robnett, CIO Justice Federal Credit Union

You are really going to enjoy my interview with Mark Robnett, CIO Justice Federal Credit Union. Mark is a rising star in the Credit Union industry and I asked him to detail for you in this episode ho…

00:37:11  |   Wed 29 Apr 2015
S1 E13: Is Enterprise Security  ‘Shelf’ware meant to be bought but not used?

S1 E13: Is Enterprise Security ‘Shelf’ware meant to be bought but not used?

This interview was a lot of fun.

Enterprises frequently buy security products with the best of intentions, but they end up being abandoned. Sometimes the product never makes it out of the box and int…

00:35:05  |   Wed 22 Apr 2015
S1 E12: Can a ‘Servant Leadership’ culture create a superior IT Security product?

S1 E12: Can a ‘Servant Leadership’ culture create a superior IT Security product?

In this interview with Thycotic software’s CEO Jonathan Cogley it would be easy to have our discussion based solely on the success of his product and company. Thycotic has been on a tear dominating t…

00:39:19  |   Thu 16 Apr 2015
S1 E11: The Way We’re Working Isn’t Working – Jean Gomes, Chairman The Energy Project

S1 E11: The Way We’re Working Isn’t Working – Jean Gomes, Chairman The Energy Project

My discussion with Jean Gomes, Chairman of the Energy Project is a fascinating one.

Jean works with some of the largest IT companies in the world like Google and Yahoo as well as Sony and other brand…

01:00:11  |   Wed 08 Apr 2015
S1 E10: Big Data Security AND - Waste Water, Cholera, Small Pox, Germ Theory, Data De-Identification

S1 E10: Big Data Security AND - Waste Water, Cholera, Small Pox, Germ Theory, Data De-Identification

In this episode with Davi Ottenheimer you are going to love learning more about Big Data Security and the challenges that CIOs face as well as the planet.  The challenges that the IT profession and I…

00:41:43  |   Wed 01 Apr 2015
S1 E9: Data Governance Warrior

S1 E9: Data Governance Warrior

Data Governance from core to edge. Smart alerting, file permissions, active directory, and other technical areas in IT Security monitoring with Big Data Security Analytics, HIPPA, and PCI. Reducing n…

00:24:09  |   Wed 04 Mar 2015
S1 E8: The Next Gen-CIO. What Does this Person Look Like?

S1 E8: The Next Gen-CIO. What Does this Person Look Like?

Bob Fecteau is a Tier 1 CIO with SAIC. This episode reviews leadership vs management, being a financial expert, examples of owning problems, building CIOs, the skills needed to be a next gen CIO

00:46:09  |   Thu 26 Feb 2015
Disclaimer: The podcast and artwork embedded on this page are the property of Bill Murphy. This content is not affiliated with or endorsed by eachpod.com.