• Bridging the Gap: Mastering the CTI Capability Maturity Model
    Jan 21 2026

    This series explores the Cyber Threat Intelligence Capability Maturity Model (CTI-CMM), a stakeholder-first framework designed to help intelligence programs support the specific decisions and actions of those protecting the organization. We guide listeners through the model’s eleven distinct domains and the cyclical five-step implementation process—Prepare, Assess, Plan, Deploy, and Measure—to transition teams from reactive, ad hoc practices to standardized, predictive operations. By analyzing specific use cases and maturity indicators, we demonstrate how to evolve metrics from simply counting effort to quantifying systemic impact and business value.

    www.breached.company/briefing-the-cyber-threat-intelligence-capability-maturity-model-cti-cmm

    Sponsors:

    www.breached.company

    www.cisomarketplace.com

    Mostra di più Mostra meno
    24 min
  • Choke Points and Synthetic Faces: Systemic Disruption of the Modern Cybercrime Ecosystem
    Jan 20 2026

    Transnational cybercrime has evolved into a globally distributed ecosystem where identity is now "synthetic, scalable and weaponizable" due to the proliferation of deepfakes and camera injection tools targeted at digital verification systems. To counter this, the Cybercrime Atlas fosters global collaboration to map criminal infrastructure and identify technical "choke points," a strategy validated by the Serengeti operations which resulted in thousands of arrests and the seizure of $140 million in criminal funds. Simultaneously, experts recommend that institutions implement multi-layered defenses—such as trusted camera source controls and active liveness checks—to harden Know Your Customer (KYC) processes against the democratized threat of AI-generated impersonation.

    https://initiatives.weforum.org/cybercrime-atlas/home

    www.scamwatchhq.com/your-voice-your-face-your-money-the-terrifying-rise-of-ai-powered-scams-in-2026

    Sponsors:

    www.securitybydesign.shop

    • SECURE15 - 15% off cybersecurity swag

    www.generatepolicy.com

    • CISO30 - 30% OFF for first-time buyers
    Mostra di più Mostra meno
    16 min
  • Secure, Defend, Thwart: Navigating the NIST Cyber AI Profile
    Jan 18 2026

    This episode explores the newly drafted Cyber AI Profile, a guide designed by the National Institute of Standards and Technology (NIST) to help organizations manage the complex intersection of artificial intelligence and cybersecurity. We break down the three primary focus areas—Secure, Defend, and Thwart—which provide a structured approach to protecting AI system components, leveraging AI for defensive operations, and building resilience against AI-powered threats. Listeners will learn how this Profile integrates with the existing NIST Cybersecurity Framework (CSF) 2.0 to offer prioritized outcomes and considerations for organizations at any stage of their AI journey.

    Sponsors:

    www.cisomarketplace.com

    www.airiskassess.com

    compliance.airiskassess.com

    Mostra di più Mostra meno
    16 min
  • Securing the Global Ledger: Balancing Proportionality and Resilience in Financial Cyber Risk
    Jan 17 2026

    The International Monetary Fund (IMF) actively strengthens the global financial system by evaluating national cyber frameworks through the Financial Sector Assessment Program (FSAP) and providing demand-driven Technical Assistance to address increasingly sophisticated threats. Effective regulation requires a delicate balance between principles-based flexibility and prescriptive rules, while ensuring that supervisory intensity is proportionate to an institution's size and systemic importance. However, because the financial sector is an interconnected chain, regulators must ensure that even small institutions maintain a baseline of security to prevent them from becoming the "weakest link" that triggers a systemic crisis.

    www.securitycareers.help/good-practices-in-cyber-risk-regulation-and-supervision

    Sponsors:

    www.cisomarketplace.com

    www.cisomarketplace.services

    Mostra di più Mostra meno
    41 min
  • The Silicon Siege: How AI and Quantum Computing are Rewriting Global Security
    Jan 16 2026

    This episode examines how Artificial Intelligence and quantum computing have transitioned from frontier concepts to systemic forces that are fundamentally reshaping geostrategic competition and the nature of modern warfare. We investigate the critical milestone of "Q-Day," the point where the deployment of Shor's algorithm threatens to collapse the cryptographic foundations of digital trust, alongside the risks of automated military escalation driven by AI. Lastly, we explore the potential for a "quantum arms race" and the widening "quantum divide" that could leave entire regions behind in a new, bifurcated global order.

    www.breached.company/global-risks-report-2026-key-insights-and-analysis

    Sponsors:

    www.quantumsecurity.ai

    www.cisomarketplace.com

    www.breached.company

    Mostra di più Mostra meno
    36 min
  • Digital Siege: Beyond the Numbers of the 2025 Cyber Catastrophe
    Jan 15 2026

    This podcast explores why 2025 marked a watershed moment where counting compromised records proved to be an inadequate measure of a cyberattack's true devastation. We delve into the "cyber shockwaves" of 2025, ranging from the UK’s first officially confirmed ransomware-related death to the £1.9 billion economic hit that crippled national car production and threatened over 100,000 supply chain jobs. Finally, we examine an emerging five-dimension framework that redefines cybersecurity as a global ESG and human safety issue, focusing on operational disruption and societal harm rather than just data volume.

    www.breached.company/beyond-the-numbers-the-2025-data-breach-landscape

    Sponsors:

    www.breached.company

    www.cisomarketplace.com

    Mostra di più Mostra meno
    40 min
  • The Global Gig Economy of Cybercrime
    Jan 14 2026

    The Cyber-as-a-Service (CaaS) model has fundamentally reshaped the threat landscape by lowering technical barriers, allowing individuals with minimal expertise to conduct complex operations like ransomware or phishing. Thriving in marketplaces that mimic legitimate e-commerce sites, specialized "initial access brokers" act as digital key makers, selling persistent entry points to other criminals in a professionalized supply chain. This modular ecosystem is highly resilient to disruption, as actors frequently rebrand their services and state-sponsored adversaries leverage these tools to target critical infrastructure globally.

    www.breached.company/national-cyber-threat-assessment-2025-2026-key-insights

    www.breached.company/beyond-the-numbers-the-2025-data-breach-landscape

    Sponsors:

    www.breached.company

    www.cisomarketplace.com

    Mostra di più Mostra meno
    12 min
  • Navigating the 2026 Intelligence Supercycle: Data, Law, and the New Global Marketplace
    Jan 13 2026

    This episode explores the transition into the "Intelligence Supercycle," where organizations are deploying security AI and automation to identify data breaches 80 days faster and mitigate nearly $1.9 million in potential losses per incident. We delve into the shifting global regulatory landscape, highlighting how aggressive enforcement in the U.S., Canada, and the EU is introducing personal executive liability and mandatory cybersecurity audits that are fundamentally reshaping international business operations. Special focus is placed on the cannabis industry's "perfect storm," examining how federal rescheduling in the U.S. and clinical pivots in Thailand are forcing a rapid move toward blockchain-enabled traceability and biometric age assurance to meet institutional compliance standards.

    www.cannasecure.tech/briefing-on-global-regulatory-and-data-security-trends-for-2026

    Sponsors:

    https://www.cannasecure.tech

    https://cannabisrisk.diy

    Mostra di più Mostra meno
    48 min