Secure Talk Podcast

Secure Talk Podcast

Podcast af Justin Beals

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Prøv gratis
Phone screen with podimo app open surrounded by emojis

Mere end 1 million lyttere

Du vil elske Podimo, og du er ikke alene

Rated 4.7 in the App Store

Læs mere Secure Talk Podcast

Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.

Alle episoder

232 episoder
episode Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven artwork
Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven

Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and automated processes that spawn and disappear by the minute. We've created more computing power than we have the ability to secure, and the machines are running amok. In this episode of SecureTalk, we dive deep into the invisible crisis affecting 91% of organizations: machine identity breaches. Join host Justin Beals and cybersecurity expert Oded Hareven, CEO of Akeyless, as they explore why password rotation is dead, how ephemeral computing is breaking traditional security models, and what revolutionary approaches like distributed fragment cryptography mean for the future of cybersecurity. What You'll Learn: • Why 85% of identity breaches now come from compromised machines, not humans • The fundamental mismatch between static security and dynamic infrastructure • How military-grade cybersecurity innovations are transforming commercial applications • Why the AI-quantum computing convergence is forcing us to rethink encryption • Practical steps toward "SSO for machines" and ephemeral security models Key Topics: * Machine identity management at scale * Zero-knowledge cryptography * Quantum-resistant security architectures * The evolution from static → rotation → ephemeral security * Building security that matches cloud-native infrastructure Guest: Oded Hareven, Co-founder & CEO of Akeyless. Timestamps:  00:00 Introduction to Cybersecurity and Machine Identities 04:37 The Evolution of Security Paradigms 09:30 Akeyless and Machine Identity Management 13:53 Zero Trust and Ephemeral Security 18:36 The Impact of AI and Quantum Computing on Security 23:19 Future Trends in Cybersecurity and Akeyless's Vision Resources: * Akeyless: https://akeyless.io * SecureTalk Podcast: www.securetalkpodcast.com #Cybersecurity #CloudSecurity #MachineLearning #QuantumComputing #DevSecOps #IdentityManagement #ZeroTrust

I går - 45 min
episode Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein artwork
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein

Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collaborative ecosystems, we all pay the price. But there's a profound irony: the more desperately these leaders chase absolute victory, the more they reveal themselves as losers of the most important game—building meaningful human communities. In this episode, Harvard and MIT Humanist Chaplain Greg Epstein explores how tech's false prophets have led us astray and, more importantly, how we might find our way back to building human-centered security that actually works. The strongest security has never come from building higher walls—it comes from creating ecosystems where everyone's success strengthens the whole. When we understand how to work together better, we all create better security. What You'll Learn:  • How winner-take-all thinking creates systemic vulnerabilities  • Why collaborative open-source principles build more resilient systems  • The hidden security costs of commercial dominance  • Practical strategies for building multi-stakeholder security  • How to shift from competition to collaboration in your organization Watch this episode to discover how changing your approach to teamwork and partnerships can dramatically improve your security posture. About Greg M. Epstein: Greg serves as Humanist Chaplain at Harvard University and MIT, and spent 18 months at TechCrunch exploring the ethics of companies shifting our definition of humanity. He's the author of "Tech Agnostic: How Technology Became the World's Most Powerful Religion, and Why it Desperately Needs a Reformation." Timestamps:  Chapters 00:00 The Corruption of Winning Culture 02:39 The Role of Community in Security 05:44 Navigating the Media Landscape 08:20 The Algorithmic Influence on Information 11:01 The Cult of Personality in Tech 13:44 The Messianic Figures in Technology 16:24 The Fall of Tech Prophets 19:15 The Importance of Losing 21:44 The Future of Technology and Humanity 24:29 The Need for Ethical Technology 26:56 The Role of Men in Modern Society 29:39 The Impact of AI on Society 32:15 The Cult-like Nature of Tech Culture 34:54 The Importance of Human Connection 37:43 The Future of Humanism in Tech 40:11 The Path Forward for Technology and Humanity #TechEthics #CommunityBuilding #DigitalSecurity #TechCulture #HumanistChaplain #SiliconValley #TechReformation

08. jul. 2025 - 1 h 0 min
episode Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin artwork
Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin

When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives at Walmart. Key Topics Covered: * Why traditional security rules fail with probabilistic AI systems * The exponential risk of scaling AI agents from dozens to thousands * Building secure data foundations for enterprise AI deployment * Protecting AI agents that operate beyond your firewall * Strategic approaches to AI implementation that balance innovation with risk * The ontological framework for mapping AI capabilities to business tasks * First principles thinking for AI security architecture Tobias brings over two decades of experience in digital transformation, having held senior leadership roles at Intel, VMware, Panasonic, and Citrix Systems. His practical insights from implementing AI at Walmart's massive scale offer invaluable guidance for CISOs and security professionals navigating the complexities of enterprise AI adoption. Perfect for: CISOs, Security Architects, IT Leaders, Enterprise Risk Managers, and anyone responsible for securing AI implementations in large organizations.

01. jul. 2025 - 44 min
episode Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!) artwork
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)

SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enhanced Threats * Advanced phishing detection in the AI era * Voice and video deepfake attack recognition * Financial verification protocols to prevent fraud * Healthcare data protection against social engineering Cloud Security & Infrastructure * Common cloud misconfigurations and prevention * Secure AI model development and deployment * Financial data protection in cloud environments * Package dependency management and vulnerability scanning Supply Chain & Third-Party Risk * Vendor security assessment frameworks * Zero Trust architecture implementation * HIPAA compliance for business associates * AI vendor risk evaluation checklists Insider Threats & Hybrid Work Security * Behavioral analytics for threat detection * Environment-adaptive security controls * Data loss prevention in remote work settings * Segregation of duties in digital workflows Regulatory Compliance & Automation * 2025-2026 regulatory calendar overview * Control-centric compliance approach * Continuous monitoring and automation strategies * Multi-framework compliance alignment Building Security Culture * Security mindset vs. rule-following approach * Positive reinforcement security programs * Organizational security maturity models * Leadership's role in security culture 💼 Compliance Frameworks This Training Addresses: * SOC 2 Type I & II * ISO 27001 * HIPAA & Healthcare Security * PCI DSS * CMMC (Cybersecurity Maturity Model Certification) * GDPR & EU AI Act * AI Accountability Act * NIST Cybersecurity Framework * State privacy laws (CCPA, CPRA, etc.) 🏆 Perfect For: * Annual security awareness training requirements * Compliance audit preparation * New employee onboarding * Security culture development * Multi-framework compliance programs 🎓 Certification Available: Complete the training and receive a certification of completion for your compliance documentation.     https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA [https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA] 📺 About SecureTalk: SecureTalk explores critical information security innovation and compliance topics. Hosted by Justin Beals, founder and CEO of StrikeGraph, featuring expert insights from cybersecurity professionals across finance, healthcare, engineering, and compliance. 🔔 Subscribe for more security insights and compliance guidance! Chapters:  0:00 Introduction & Training Overview  3:18 Social Engineering with Steven Ferrell (IT Compliance Expert)  15:00 Advanced Threats with Kenneth Webb (CISA, CISSP)  30:30 Cloud Security with Josh (Head of Engineering)  44:55 Insider Threats with Elmy Peralta (Assessments Manager)  49:09 Regulatory Compliance with Micah Spieler (Chief Product Officer)  1: 01:42 Security Culture with Juliett Eck (CFO) #CybersecurityTraining #SecurityAwareness #ComplianceTraining #SOC2 #HIPAA #ISO27001 #SecurityCulture #StrikeGraph #SecureTalk

24. jun. 2025 - 1 h 11 min
episode The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel artwork
The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel

🌙 THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?" This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's most forward-thinking leaders, and why his journey from infrastructure skeptic to AI evangelist mirrors the entire industry's evolution. 📖 THE THREE-ACT TRANSFORMATION: Act I: The Infrastructure Skeptic's Awakening Watch Satyam's journey from traditional "firewall and load balancer guy" to realizing that employees can't be forced behind VPNs anymore. The moment he discovered that flexibility doesn't mean vulnerability—it means evolution. Learn how this mindset shift led him from protecting perimeters to protecting people. Act II: The Culture Shock That Changed Everything Picture this: After years of doing "security roadshows" and begging for budget, Satyam walks into Kandji and experiences reverse culture shock. Instead of chasing people for security buy-in, they come to HIM asking, "What does security think?" Witness the CEO moment that flipped his world: "It's not a request—it's a mandate to protect our company at ANY cost." Act III: The AI Prophet's Dilemma The heated boardroom debate that keeps CISOs awake: Replace human SOC analysts with AI, or keep the human element? Follow Satyam's internal struggle as he weighs 10,000 daily AI-analyzed calls against human intuition, leading to his bold prediction about "Minority Report" style predictive cybersecurity. 🎭 CHARACTER-DRIVEN MOMENTS: The Paranoid Father: Why Satyam forces his family to use alphanumeric passwords and what Tom Cruise's "Minority Report" taught him about threat prediction. The Reformed Skeptic: How a career infrastructure guy learned to embrace endpoint security and why he now believes MDM is the new perimeter. The Reluctant Prophet: His uncomfortable realization that automation will replace thousands of cybersecurity jobs—and why he's helping it happen. ⚡ PLOT TWISTS YOU WON'T SEE COMING: * The university graduate's graduation post that led to complete identity theft * Why 99% security equals 100% vulnerability (and the math that proves it) * The Signal app scandal that changed how he thinks about mobile security 🎬 THE SUPPORTING CAST: * Adam (Kandji CEO): The leader who gave unlimited security budget * The Development Team: Who learned to ask security questions first * The 2 AM Security Team: Who actually appreciate the paranoid texts * The AI SOC Analyst: The non-human teammate changing everything 🚀 MEET THE PROTAGONIST: Satyam Patel isn't your typical CISO. He's the guy who went from customer to C-suite, from skeptic to believer, from infrastructure defender to AI advocate. With 25+ years of plot twists, failed budgets, successful breaches prevented, and one very understanding family who puts up with alphanumeric phone passwords. #CISOStory #CyberSecurityJourney #AIvsHuman #ZeroTrust #SecurityLeadership #ThreatDetection #Kandji #EndpointSecurity #ParanoidCISO #CyberStory #SecurityCulture #TechTransformation This isn't just another security interview—it's a cybersecurity thriller with real-world consequences. Subscribe for more stories from the digital frontlines! 🎬🔐

17. jun. 2025 - 42 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.
Phone screen with podimo app open surrounded by emojis

Rated 4.7 in the App Store

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Eksklusive podcasts

Uden reklamer

Gratis podcasts

Lydbøger

20 timer / måned

Prøv gratis

Kun på Podimo

Populære lydbøger