1. EachPod

re:invent security - Podcast

re:invent security

re:invent security is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.


re:invent security is hosted by Jeroen Prinse and Irfaan Santoe.


Hosted on Acast. See acast.com/privacy for more information.

Tech Business Technology Self-Improvement Education Ai
Update frequency
every 28 days
Average duration
54 minutes
Episodes
17
Years Active
2024 - 2025
Share to:
Laurens Jagt (CSD) & Medea de Jong (Sonepar): “Build cyber security teams that actually thrive”

Laurens Jagt (CSD) & Medea de Jong (Sonepar): “Build cyber security teams that actually thrive”

In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with two cybersecurity leaders tackling the talent gap from opposite directions. Laurens Jagt, founder of Cyber S…

00:59:45  |   Thu 31 Jul 2025
Arnaud Wiehe (FedEx) & Tiago Teles (ABN Amro): “The Next-Gen CISO Must Stay Curious, or Fall Behind”

Arnaud Wiehe (FedEx) & Tiago Teles (ABN Amro): “The Next-Gen CISO Must Stay Curious, or Fall Behind”

In this episode of re:invent security, we sit down with Arnaud Wiehe (Managing Director of Information Security at FedEx) and Tiago Teles (Head of Advanced Analytics & AI at ABN AMRO), co-authors of …

00:58:32  |   Thu 26 Jun 2025
Petra Oldengarm (CVN): “Digital Sovereignty Starts With Smart Dependence, Not Full Independence”

Petra Oldengarm (CVN): “Digital Sovereignty Starts With Smart Dependence, Not Full Independence”

In this episode of re:invent security, we sit down with Petra Oldengarm, Director of Cyberveilig Nederland (CVN), to explore the real meaning of digital sovereignty—and why it’s more than just a poli…

00:55:20  |   Wed 28 May 2025
Sri Manda (Peloton): From Gatekeeper to Innovator: How CISOs Can Harness Startup Power

Sri Manda (Peloton): From Gatekeeper to Innovator: How CISOs Can Harness Startup Power

In this episode of Reinvent Security, we dive into the world of cybersecurity innovation with Sri Manda, the Chief Security and Trust Officer at Peloton. Sri brings a unique perspective—he’s not only…

01:13:24  |   Thu 24 Apr 2025
Esther Schagen-van Luit (Microsoft):

Esther Schagen-van Luit (Microsoft): "Security leadership requires courage and curiosity"

Join hosts Jeroen Prinse and Irfaan Santoe in this episode of re:invent security as they sit down with Esther Schagen-van Luit to explore what it truly means to be a Strategic CISO in today’s securit…

00:52:51  |   Thu 27 Mar 2025
Carlo Alexander Schreurs (FrieslandCampina):

Carlo Alexander Schreurs (FrieslandCampina): "As a CISO, how do you lead in a Human-Centered way?"

In this episode, we talk with Carlo Alexander Schreurs, CISO of FrieslandCampina, about his journey of reinvention after surgery and his transition into a transformational CISO role. He advocates for…

01:02:56  |   Thu 27 Feb 2025
Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”

Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”

Join hosts Jeroen Prinse and Irfaan Santoe in this episode of Reinvent Security as they sit down with Dimitri van Zantvliet as they talk about the challenges of securing critical infrastructure and O…

01:06:55  |   Thu 30 Jan 2025
Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People

Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People

In this episode of Reinvent Security, we dive deep into the world of vulnerability management with Dr. Nikki Robinson, a distinguished cybersecurity expert, author, and educator. With years of experi…

00:52:28  |   Thu 28 Nov 2024
Bibi van den Berg (LEI): “Why traditional risk management falls short in cyber security

Bibi van den Berg (LEI): “Why traditional risk management falls short in cyber security"

Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they sit down with Prof. Dr. Bibi van den Berg, a renowned expert in cybersecurity governance. Bib…

00:55:04  |   Thu 31 Oct 2024
Sander Zwiebel (NN Group) on DORA:

Sander Zwiebel (NN Group) on DORA: "The Final Countdown"

Join hosts Jeroen Prinse and Irfaan Santoe as they dive in the world of DORA, together with Sander Zwiebel (NN). During this episode we discuss what DORA is, why it came to existence, the scope of DO…

00:58:38  |   Thu 26 Sep 2024
Steve Hollands (BQCM):

Steve Hollands (BQCM): "The future of security is quantum-proof: Start preparing today!"

Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they welcome quantum computing and security expert Steve Hollands, Chair of the Board at Blackhill…

00:50:33  |   Thu 29 Aug 2024
Ashish Rajan (Kaizenteq):

Ashish Rajan (Kaizenteq): "Data Sovereignty Will Define the Future of Cloud Security and Compliance"

Join hosts Jeroen Prinse and Irfaan Santoe in this enlightening episode of Reinvent Security as they sit down with cloud security expert Ashish Rajan, founder of Kaizenteq and host of the Cloud Secur…

00:50:26  |   Thu 25 Jul 2024
Paul Watts (ISF): “Here is what it takes to be a NextGen CISO!”

Paul Watts (ISF): “Here is what it takes to be a NextGen CISO!”

This episode of re:invent security shares what it takes to be the next generation (NextGen) CISO. Our guest Paul Watts, a multiple times CISOs at companies like Kantar, Domino’s Pizza UK & Ireland, N…

01:01:59  |   Thu 27 Jun 2024
Toon Segers (Roseman Labs):

Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"

Join hosts Jeroen Prinse and Irfaan Santoe as they dive into the world of multi-party computation with expert Toon Segers. In this episode, they explore how multi-party computation keeps data secure …

00:53:20  |   Thu 30 May 2024
Sunette Runhaar (Uber):

Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"

Insider Threat deals with the fact that every employee in the organization is a potential threat. How does one identify the actual threats and how to act and respond to them? What are the good practi…

00:53:49  |   Thu 25 Apr 2024
Rob van der Veer:

Rob van der Veer: "Treat Artificial Intelligence as Software Initiatives"

What is the relationship between AI and Security? Learn from world industry expert Rob van der Veer what to consider when securing AI. This episode goes into detail about the security risks of develo…

00:51:01  |   Thu 28 Mar 2024
Welcome to re:invent security

Welcome to re:invent security

Welcome to re:invent security, the podcast where we look at ways to reinvent information security together with industry leaders.

Hosted on Acast. See acast.com/privacy for more information.

00:01:17  |   Wed 27 Mar 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Karel Zegers. This content is not affiliated with or endorsed by eachpod.com.