1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Can You Stop an API Business Logic Attack?

Can You Stop an API Business Logic Attack?

Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. API…

00:28:08  |   Thu 17 Apr 2025
The Critical Role of MDM in Safeguarding Dedicated Devices

The Critical Role of MDM in Safeguarding Dedicated Devices

In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between security and user experience in dedicated devices. 

T…

00:28:16  |   Tue 25 Mar 2025
Meeting of the Minds: State of Cybersecurity in 2025 Part II

Meeting of the Minds: State of Cybersecurity in 2025 Part II

Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christoph…

00:45:17  |   Tue 25 Mar 2025
Why Cyber Needs to Rebrand from a Boys Club

Why Cyber Needs to Rebrand from a Boys Club

Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance …

00:20:42  |   Thu 20 Mar 2025
Reducing Risk with Effective Exposure Management in Enterprise Tech

Reducing Risk with Effective Exposure Management in Enterprise Tech

“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of Sevco Security.

In this episode of The Securi…

00:18:15  |   Wed 19 Mar 2025
The Evolving Cyber Threat Space: A Geopolitical Perspective

The Evolving Cyber Threat Space: A Geopolitical Perspective

In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-…

00:28:15  |   Thu 20 Feb 2025
Diversity in Cybersecurity: A Key to Innovation

Diversity in Cybersecurity: A Key to Innovation

In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emphasizes how neurodiverse individuals can bring uni…

00:20:15  |   Wed 12 Feb 2025
Is AI and Zero Trust the Future of Cyber Warfare?

Is AI and Zero Trust the Future of Cyber Warfare?

The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defences. The critical role of AI and Zero Trust has be…

00:20:28  |   Fri 07 Feb 2025
Meeting of the Minds: State Of Cybersecurity in 2025

Meeting of the Minds: State Of Cybersecurity in 2025

The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain.

In the first episode of Meeting of the Minds, three leading industry analysts – Christopher S…

00:44:13  |   Thu 06 Feb 2025
Navigating Cybersecurity: Insights from Jim Liddle

Navigating Cybersecurity: Insights from Jim Liddle

This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity of proactive security measures in an increasingl…

00:20:23  |   Mon 20 Jan 2025
Unlocking the Power of APIs in AI

Unlocking the Power of APIs in AI

Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. APIs, the backbone of modern technology, are vital …

00:23:49  |   Wed 15 Jan 2025
The AI Shift: Transforming Roles and Securing IT Systems

The AI Shift: Transforming Roles and Securing IT Systems

In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the importance of collaboration between IT and AI teams. He…

00:23:09  |   Wed 08 Jan 2025
Unified Defences: Why CDR Matters

Unified Defences: Why CDR Matters

The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as organisations increasingly rely on the cloud, the at…

00:16:48  |   Wed 18 Dec 2024
Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve

Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve

Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geopolitical tensions, or unexpected global events lik…

00:17:59  |   Wed 18 Dec 2024
Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution

Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution

Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabilities can result in data breaches, financial losses,…

00:24:18  |   Mon 09 Dec 2024
The Cyber Game: Simulations, Ranges, and Digital Twins

The Cyber Game: Simulations, Ranges, and Digital Twins

Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To stay ahead in emerging risks, organisations must ad…

00:24:57  |   Wed 04 Dec 2024
Why Tracking Your Digital Risk is a Big Deal

Why Tracking Your Digital Risk is a Big Deal

Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safeguarding sensitive data to mitigating external th…

00:22:23  |   Mon 02 Dec 2024
The Psychology of Security: Empowering People to Protect

The Psychology of Security: Empowering People to Protect

Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effectiveness of security measures. By prioritising beh…

00:31:07  |   Wed 27 Nov 2024
How do Hackers Collect Intelligence on their Victims?

How do Hackers Collect Intelligence on their Victims?

Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data mining to get ahead. From scouring social media prof…

00:15:11  |   Mon 18 Nov 2024
Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs

Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs

As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and consumers alike. These advanced vehicles, packed wi…

00:25:38  |   Wed 13 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.