Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Cyber Security Transformation Podcast

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Showing 101-131 of 131
«« ← Prev Page 2 of 2

Series 2 - Episode 12 - Cyber Security, Governance & Risk for the Digital Age - with guest Richard Preece

02 Nov 2021

Contributed by Lukas

JC Gaillard is joined by Richard Preece, Founder & Director, DA Resilience to discuss how the pandemic has affected cybersecurity governance, cont...

Series 2 - Episode 11 - Cyber Security, the CISO and the CIO: Seeing it From Both Sides of the Fence - with guest Natasha McCabe

30 Sep 2021

Contributed by Lukas

JC Gaillard is joined by Natasha McCabe to discuss the leadership  lessons which can be learned from having held both CISO and CIO roles,  a...

Series 2 - Episode 10 - Oscar O'Connor and JC Gaillard on Security Transformation, Covid-19, People and Trust

12 Aug 2021

Contributed by Lukas

JC Gaillard is joined by Oscar O'Connor to discuss "Playing the Triangles", his latest piece on the Corix Partners blog: A reflection on business and ...

Series 2 - Episode 9 - Looking Back at the Cyber Security Skills Gap: Real Problem or Self-inflicted Pain? - with guest Rayna Stamboliyska

20 Jul 2021

Contributed by Lukas

JC Gaillard is joined by Rayna Stamboliyska to look back at the cyber security skills back, its implications and how to address it through better tale...

Series 2 - Episode 8 - The Impact of the COVID Pandemic on Cyber Insurance: What has changed and what to expect? - with guest Hani Banayoti

06 Jul 2021

Contributed by Lukas

JC Gaillard is joined with Hani Banayoti from CyberSolace to explore the impact the COVID-19 pandemic has had on the cyber insurance sector and what c...

Series 2 - Episode 7 - Cyber Security Career Paths: How do you bridge between security roles and IT management roles? - with guest Alexa Glynn

15 Jun 2021

Contributed by Lukas

JC Gaillard is joined by Alexa Glynn, from Rabobank Australia & New Zealand, to discuss how you transition from security roles into IT management ...

Series 2 - Episode 6 - GDPR and the Schrems II ruling: Where are we now around data transfers between the EU and the US? - with guest Bostjan Makarovic

25 May 2021

Contributed by Lukas

JC Gaillard is joined again by guest Bostjan Makarovic from Aphaia to discuss the impact of the Schrems II ruling on GDPR compliance and data transfer...

Series 2 - Episode 5 - IT Security vs. OT Security: What's the state of play? - with guest Steven O'Sullivan

20 Apr 2021

Contributed by Lukas

JC Gaillard is joined by cyber security expert Steven O'Sullivan to explore the issues surrounding IT and OT convergence and their implications for cy...

Series 2 - Episode 4 - Observability: What does it really mean for cyber security? - with guest Chris Burtenshaw

30 Mar 2021

Contributed by Lukas

JC Gaillard is joined by Chris Burtenshaw from Strata Security; together they explore the meaning of observability in the cyber security space: Is it ...

Series 2 - Episode 3 - Where are we now with GDPR? - with guest Bostjan Makarovic

09 Mar 2021

Contributed by Lukas

JC Gaillard is joined by Bostjan Makarovic from Aphaia for a great discussion on GDPR, the size of fine and role of regulators, the risk of irrelevanc...

Series 2 - Episode 2 - Resilience: What Does It Really Mean in Business Terms? - with guest Nick Simms

25 Feb 2021

Contributed by Lukas

JC Gaillard is joined by experienced operational resilience consultant Nick Simms to explore what resilience really means in business terms and where ...

Series 2 - Episode 1 - How to Frame the Cyber Security Conversation at Board Level? - with guest Richard Preece

16 Feb 2021

Contributed by Lukas

JC Gaillard is joined by Richard Preece, director of DA Resilience, to explore how best to frame the conversation at Board level around cyber security...

What did we learn about cyber in the crazy year that was 2020?

11 Dec 2020

Contributed by Lukas

.By any account the last year has been crazy. So much had to change so quickly and that included cyber security. In this episode we discuss the key le...

Digital transformation - is the role of the CISO becoming an outdated concept?

27 Nov 2020

Contributed by Lukas

COVID has led many organizations to rush their provision or remote access to their employees and many have accelerated their digital transformation pr...

Ransomware: Why is defense in depth so important?

20 Nov 2020

Contributed by Lukas

We discuss a recent survey that reveals the continued prevalence of ransomware and the shocking amount that organizations typically pay. We talk about...

How to embed security and privacy on the board agenda?

13 Nov 2020

Contributed by Lukas

In this episode we discuss the need for top down engagement by the board to bring life into the to security and privacy strategy of their organisation...

GDPR - when are the regulators going to show their muscles?

06 Nov 2020

Contributed by Lukas

Following the recent announcement from the ICO of significantly reduced fines for BA and Marriott the question has to be asked "Where are the landmark...

From Cyber Security Awareness to Genuine Cultural Change: What do you need to make this work?

22 Oct 2020

Contributed by Lukas

.We’re joined by Zsuzsanna Berenyi from the London Stock Exchange Group who shares her experience on how to drive cultural change to embed security ...

Where are we with Cyber Insurance?

16 Oct 2020

Contributed by Lukas

In this episode we are joined by Hani Banayoti ([email protected]) from Cyber Solace to discuss the ways in which the cyber insurance ma...

Why it’s important for CISOs not to get lost firefighting

09 Oct 2020

Contributed by Lukas

Incoming CISOs clearly have to identify and put out fires. In this episode we discuss why many CISOs get stuck in this phase. We look at ways to enabl...

Why should security and privacy be included in the MVP of startups

02 Oct 2020

Contributed by Lukas

We discuss why it’s important to think carefully about how to ensure the Minimum Viable Product (MVP) software written by startups pays attention to...

How to address the proliferation of security tools

25 Sep 2020

Contributed by Lukas

Chris Burtenshaw, CEO of Strata Security joins us to discuss how many organizations have far too many security products and how to address the complex...

Cyber security skills gap - what skills gap?

11 Sep 2020

Contributed by Lukas

We discuss the extent to which there are opportunities in the cyber industry and how to encourage people to join

Where are we with GDPR?

04 Sep 2020

Contributed by Lukas

Given the financial strain caused by COVID-19 which has been especially severe on the hospitality and airline sectors the likelihood of large fines be...

Is it the right time to adopt Zero Trust Networking?

13 Aug 2020

Contributed by Lukas

Zero Trust Networking promises much and is being touted extensively... how much sense does it make at the moment?

Ransomware - key elements to bear in mind and how to respond

07 Aug 2020

Contributed by Lukas

The threat to business continuity posed by malicious actors using ransomware isn’t new but it’s causing pain to many. The most recent high profile...

The importance of data privacy

24 Jul 2020

Contributed by Lukas

I’m this episode we discuss the need for privacy to be carefully considered and for appropriate controls to be applied together with the challenges ...

Does the role of the "Virtual CISO" make any sense

17 Jul 2020

Contributed by Lukas

Faced by constant reports of cyber-attacks in the media, most small and medium-size organisations have woken up to the reality of cyber threats over t...

The hard truth around cyber security awareness programmes

10 Jul 2020

Contributed by Lukas

In this episode we discuss how to bring constructive change by culture and top down leadership

The tenure of CISOs

03 Jul 2020

Contributed by Lukas

We discuss the likely reasons for the trend towards CISOs having short tenure

Ensuring security and privacy for bespoke software

26 Jun 2020

Contributed by Lukas

We discuss the challenges of ensuring that code that’s written either in-house or commissioned from a third party follows the Security Development L...

«« ← Prev Page 2 of 2