by IANS Research
IANS Cyber Intel Podcast addresses must-know-now topics, such as AI risk, prominent breaches, Zero Day exploitation, compliance updates, and much much more. Each podcast provides actionable, practical guidance for CISOs and Information Security professionals. The podcast includes exclusive highlights from IANS client-only weekly Tech Briefings. With IANS Research, get security expertise at speed. IANS Research is a clear-headed resource for decision making and articulating risk, providing experience-based security insights for Chief Information Security Officers and their teams.
Language
🇺🇲
Publishing Since
2/7/2024
Email Addresses
1 available
Phone Numbers
0 available
March 5, 2025
<p>March 5th, 2025 Security Briefing with IANS Faculty <a href="https://www.iansresearch.com/our-faculty/faculty/detail/jake-williams">Jake Williams</a> and <a href="https://www.iansresearch.com/our-faculty/faculty/detail/wolfgang-goerlich" target="_blank" rel="noopener noreferer">Wolfgang Goerlich</a></p><p>This Episode Details: <strong>U.S. Pauses Offensive Cyber Ops Against Moscow</strong> - The United States has <a href="https://www.cnn.com/2025/03/02/politics/us-cyber-operations-russia-suspend/index.html">suspended its offensive cyber activities targeting Russia</a>. This decision, authorized by U.S. Defense Secretary, aims to encourage Moscow to engage in negotiations to end the ongoing conflict in Ukraine.</p><p><strong>DPRK Behind the $1.5B Bybit Heist</strong> - The <a href="https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/">FBI confirmed that the North Korean Lazarus Group</a> (also known as TraderTraitor) was responsible for the recent theft of approximately $1.5 billion in virtual assets from the cryptocurrency exchange Bybit.<strong>Copilot Exposes Private GitHub Pages</strong> - The AI security firm Lasso has identified GitHub Copilot, an AI coding assistant, was <a href="https://arstechnica.com/information-technology/2025/02/copilot-exposes-private-github-pages-some-removed-by-microsoft/">inadvertently exposing private GitHub Pages</a>. So called “zombie repositories" (repositories that were once public and are now private) were retrievable using specific Copilot prompts.</p><p>With IANS Research, get security expertise at speed. IANS Research is a clear-headed resource for decision making and articulating risk, providing experience-based security insights for Chief Information Security Officers and their teams.</p><p>Any views or opinions presented in this document are solely those of the Faculty and do not necessarily represent the views and opinions of IANS. Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our written reports, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by the client in connection with such information, opinions, or advice.</p>
February 17, 2025
<p>CISOs are currently under more pressure than ever to deliver results with lean teams and increasingly scrutinized budgets. </p><p>CISOs’ scope continues to expand while boards and leaders are continually focused on cyber budgets and program execution. At the same time, resources are tight and orgs are still figuring out how to navigate emerging areas of digital risk – particularly AI and its corresponding data governance implications. </p><p>CISOs who navigate these challenges successfully will set themselves apart by enhancing their personal brand and the reputation and success of the programs they lead.</p><p>In this session, IANS Faculty <a href="https://www.iansresearch.com/our-faculty/faculty/detail/steven-martano" target="_blank" rel="noopener noreferer">Steve Martano</a> and IANS Senior Research Director Nick Kakolowski will provide a deep dive into the current state of the CISO role. They’ll cover:</p><ul><li>How the job scope of the CISO is shifting and what CISOs think about those changes.</li><li>Trends in how CISOs are interacting with the board and advice for influencing at the highest levels of the organization.</li><li>Market observations and anecdotal guidance on how to position yourself to achieve your career goals.</li></ul><p><br></p><p>Interested in learning more about IANS and Artico's State of the CISO findings? Download <a href="https://www.iansresearch.com/resources/ians-state-of-the-ciso-report" target="_blank" rel="noopener noreferer">IANS State of the CISO Summary Report</a>!</p><p><br></p><p>Any views or opinions presented in this document are solely those of the Faculty and do not necessarily represent the views and opinions of IANS. Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our written reports, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by the client in connection with such information, opinions, or advice.</p>
January 15, 2025
<p>2025 Deep Dive Webinar and Podcast with IANS Faculty<a href="https://www.iansresearch.com/our-faculty/faculty/detail/jessica-hebenstreit" target="_blank" rel="noopener noreferer">Jessica Hebenstreit</a> and <a href="https://www.iansresearch.com/our-faculty/faculty/detail/jake-williams">Jake Williams</a></p><p>Infosec teams are stretched. Budgets are flat, resources are strained, and we’re always trying to stay one step ahead of adversaries.</p><p>Layer in new regulations, the integration of AI into seemingly all aspects of the business, and other disruptions. It’s no wonder CISOs and their teams are constantly challenged as to where to prioritize their time, resources, and activities.</p><p>In this podcast, IANS Faculty Jake Williams and Jessica Hebenstreit call out the areas they believe will be most impactful to CISOs and their teams in 2025. Hear an overview of the trends and recommendations of actionable steps to work into your roadmap. Topics of discussion include:</p><ul><li>How to ensure you’re getting value out of AI in security operations (and words of caution)</li><li>The evolving role of the SOC in the face of increased coverage of MDR services (e.g., Falcon Complete)</li><li>Cyber resiliency and planning for CrowdStrike 2.0</li><li>Implications of the new EU product liability directive</li></ul><p><br></p><p>With IANS Research, get security expertise at speed. IANS Research is a clear-headed resource for decision making and articulating risk, providing experience-based security insights for Chief Information Security Officers and their teams.</p><p>Any views or opinions presented in this document are solely those of the Faculty and do not necessarily represent the views and opinions of IANS. Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our written reports, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by the client in connection with such information, opinions, or advice.</p>
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.