
Sign up to save your podcasts
Or


00:00 Highlight
00:28 Intro
3:41 What's getting cut at CISA?
19:01 USCYBERCOM told to stop planning offensive attacks against Russia
27:54 ByBit hacked for $1.5B in cryptocurrency
40:01 CISO discussion: How to regain trust after a cyber breach
49:17 CISO discussion: Data security for GenAI tools
58:43 How to get the most out of RSA Conference
💰 Budget cuts hit CISA, and election security programs might be first on the chopping block. The team debates whether these cuts were expected, what they mean for cybersecurity, and whether some programs were outside CISA’s core mission in the first place.
Reference: https://www.scworld.com/perspective/a-sober-look-at-the-recent-cuts-at-cisa
⚔️ A sudden shift in cyber warfare strategy—USCYBERCOM has reportedly been asked to halt offensive cyber operations against Russia. The guys discuss what this means for national security, cyber deterrence, and whether it signals a political deal in the making.
Reference: https://www.nbcnews.com/politics/trump-administration/defense-secretary-pete-hegseth-orders-halt-offensive-cyber-operations-rcna194435
đź’¸ A massive crypto heist exposes software supply chain vulnerabilities. North Korean attackers allegedly compromised a JavaScript library to drain $1.5 billion. The team breaks down what happened, what it means for the future of crypto security, and whether cybercriminals will use the same techniques elsewhere.
Reference: https://docsend.com/view/s/rmdi832mpt8u93s7
🔄 When a company gets hacked, how do CISOs rebuild trust? The conversation explores the difference between trust and transparency, why some companies handle breaches better than others, and what lessons CISOs can learn from past incidents.
Reference: https://www.csoonline.com/article/3825447/how-cisos-can-rebuild-trust-after-a-security-incident.html
🤖 GenAI tools want access to everything—but should security teams allow it? The team debates whether CISOs should fight the inevitable, or if they should negotiate smarter ways to control AI access while still allowing business teams to benefit.
🎟️ RSA Conference survival guide! How do you maximize networking, avoid vendor overload, and make sure the week is productive?
By Jerry Perullo, Sounil Yu, Mario Duarte5
2222 ratings
00:00 Highlight
00:28 Intro
3:41 What's getting cut at CISA?
19:01 USCYBERCOM told to stop planning offensive attacks against Russia
27:54 ByBit hacked for $1.5B in cryptocurrency
40:01 CISO discussion: How to regain trust after a cyber breach
49:17 CISO discussion: Data security for GenAI tools
58:43 How to get the most out of RSA Conference
💰 Budget cuts hit CISA, and election security programs might be first on the chopping block. The team debates whether these cuts were expected, what they mean for cybersecurity, and whether some programs were outside CISA’s core mission in the first place.
Reference: https://www.scworld.com/perspective/a-sober-look-at-the-recent-cuts-at-cisa
⚔️ A sudden shift in cyber warfare strategy—USCYBERCOM has reportedly been asked to halt offensive cyber operations against Russia. The guys discuss what this means for national security, cyber deterrence, and whether it signals a political deal in the making.
Reference: https://www.nbcnews.com/politics/trump-administration/defense-secretary-pete-hegseth-orders-halt-offensive-cyber-operations-rcna194435
đź’¸ A massive crypto heist exposes software supply chain vulnerabilities. North Korean attackers allegedly compromised a JavaScript library to drain $1.5 billion. The team breaks down what happened, what it means for the future of crypto security, and whether cybercriminals will use the same techniques elsewhere.
Reference: https://docsend.com/view/s/rmdi832mpt8u93s7
🔄 When a company gets hacked, how do CISOs rebuild trust? The conversation explores the difference between trust and transparency, why some companies handle breaches better than others, and what lessons CISOs can learn from past incidents.
Reference: https://www.csoonline.com/article/3825447/how-cisos-can-rebuild-trust-after-a-security-incident.html
🤖 GenAI tools want access to everything—but should security teams allow it? The team debates whether CISOs should fight the inevitable, or if they should negotiate smarter ways to control AI access while still allowing business teams to benefit.
🎟️ RSA Conference survival guide! How do you maximize networking, avoid vendor overload, and make sure the week is productive?

4,304 Listeners

1,865 Listeners

3,148 Listeners

375 Listeners

1,016 Listeners

416 Listeners

8,010 Listeners

314 Listeners

188 Listeners

73 Listeners

1,584 Listeners

134 Listeners

5,470 Listeners

156 Listeners

1,327 Listeners