CYBERCAST

PODCAST · business

CYBERCAST

CYBERCAST is a cybersecurity podcast where we break myths and tackle taboos. Our discussions cover topics for everyone—young and old, experienced professionals, and those just beginning their careers in the cyber world. Hosted by Ronnie Jaanhold.

  1. 78

    Quantum Computing & Cybersecurity: Real Risks, Post-Quantum Readiness, and What Businesses Must Do Now | NEVERHACK Webinar Replay

    Quantum computing is coming—but what does it really mean for cybersecurity? In this NEVERHACK webinar, Louis Zezeran (Host, NEVERHACK Estonia) is joined by Guillaume Tassin (Head of GRC, NEVERHACK France), Kalev Pihl (CEO, SK ID Solutions), and Marco Berardi (Business Unit Manager, Data Security, NEVERHACK Italy) to break down the reality behind the hype. You’ll learn: What quantum computing actually is—and why it matters The real risk behind “harvest now, decrypt later” How digital signatures and encryption could be impacted Practical steps to start your post-quantum readiness journey This session combines strategic insight, technical expertise, and real-world experience to give you a clear, grounded understanding of what’s coming—and how to prepare. 🎧 Listen now and stay ahead of the next major shift in cybersecurity.

  2. 77

    From Small-Town Estonia to Cybersecurity Leadership: Jürgen Erm on Building NEVERHACK Estonia

    What does it really take to become a cybersecurity leader? In this episode of NEVERHACK Estonia Cybercast, Louis Zezeran sits down with Jürgen Erm, Country Manager of NEVERHACK Estonia, for a personal and insightful conversation about leadership, career growth, and the human side of cyber. From growing up in eastern Estonia during a time of major social change to learning early lessons about online trust, military service, stakeholder management, and leading under pressure, Jürgen shares the experiences that shaped his approach. This episode covers: Jürgen’s path from IT student to cybersecurity leader How vulnerability management taught real leadership Why calm leadership matters in crisis Lessons from military service, mentors, and business growth How NEVERHACK Estonia evolved its cyber services for clients If you work in cybersecurity, lead teams, or want to understand the mindset behind resilient leadership, this episode is for you. Listen now, follow NEVERHACK Estonia Cybercast, and visit our website for more episodes and cybersecurity insights.

  3. 76

    Cyber Resilience in Modern Defense: Graham Taylor of OPSWAT on NATO, AI, and the Future of Security

    The future of defense will not be defined by hardware alone. In this episode of NEVERHACK Estonia Cybercast, Graham Taylor CBE, Director Defence Strategy for Northern Europe at OPSWAT, talks with Anett Numa, Chief of International Affairs for NEVERHACK to explore how cyber resilience, interoperability, AI, and trusted data are transforming modern military strategy.From NATO’s changing role and the lessons of Ukraine to the growing value of cyber talent and the challenge of securing multi-domain operations, this episode looks at what real defense readiness means in a digital age. Graham also explains why treating every file as a threat is more than a cybersecurity slogan — it is a mindset that matters for military and critical infrastructure resilience.If you work in cybersecurity, defense, policy, or critical infrastructure, this episode offers valuable perspective on where security strategy is heading and what organizations need to prioritize now.Listen now, visit our website for more episodes, and subscribe to NEVERHACK Estonia Cybercast for more expert insights.

  4. 75

    OpenXDR and the Evolution of Security Operations with Henk van der Heijden of Stellar Cyber

    How has the modern SOC evolved from basic log monitoring into an AI-assisted, OpenXDR-driven security operation?In this episode of the NEVERHACK Estonia Cybercast, Louis Zezeran is joined by Henk van der Heijden, Vice President of Sales at Stellar Cyber, for a conversation about the changing reality of security operations. They explore how the old SIEM model has given way to more connected platforms, why East-West visibility matters for spotting attacker movement, and how AI can help reduce alert fatigue and analyst burnout.The discussion also looks at one of the biggest challenges in cybersecurity today: how to build and retain strong SOC teams in a market with too many alerts and too few skilled people. Rather than replacing analysts, AI is helping them move toward higher-value work.If you want practical insight into where SOCs are heading and what modern security operations should look like, this is an episode worth hearing.Listen now, visit our website for more episodes, and subscribe to NEVERHACK Estonia Cybercast for more cybersecurity conversations.

  5. 74

    How Threat Hunting Really Works with Piotr Czopik of Recorded Future

    What does threat hunting actually look like in the real world — and where does cyber threat intelligence fit into a modern SOC? In this episode of the NEVERHACK Estonia Cybercast, Louis Zezeran speaks with Piotr Czopik from Recorded Future about the reality of threat hunting: the learning, investigation, pattern recognition, and deep analysis required to find what automated tools can miss. Together, they explore how attackers reuse familiar methods, why behavior matters more than simple indicators, and how intelligence-led detection helps analysts connect the dots faster. The conversation also covers supply-chain risk, third-party exposure, advanced threats hiding inside legitimate-looking processes, and why smaller organizations should never assume they are beneath an attacker’s interest. If you want to understand the human side of cybersecurity detection — beyond AI buzzwords and standard alerting — this episode is for you. Listen now, visit NEVERHACK Estonia for more insights, and subscribe for more expert cybersecurity conversations.

  6. 73

    The 8% Problem: How to Spot Insider Risk Before Data Walks Out the Door (Mimecast Incydr)

    something unusual at exactly the wrong time? In this Client Day 2026 special from Tallinn, Louis Zezeran speaks with Sander van den Nieuwenhuijzen (Mimecast Incydr) about Human Risk Management and how modern insider threat detection really works.We explore behavior-based risk scoring (0–10), why “nudges” can be more effective than instant blocking, and how AI tools can accidentally (or deliberately) become new data-exfiltration paths. Sander also shares a striking real-world style story: a lawyer printing PII late at night to a different printer than usual—individually allowed actions that, together, revealed a serious insider risk pattern.🎧 Listen now, connect with Louis and Sander on LinkedIn, and subscribe for more NEVERHACK Estonia Cybercast episodes.

  7. 72

    Enterprise AI Safety in the Real World: Guardrails, Policies, and “Good Enough” Risk (Jonne Tuomela from Netskope)

    Can your organization safely use ChatGPT-style tools—and trust what comes back? Recorded at NEVERHACK Estonia’s Client Day 2026 in Tallinn, Louis Zezeran sits down with Jonne Tuomela (Senior Solutions Engineer, Netskope) to unpack the real risks of large language models: prompt injection and jailbreaks, hallucinations and misinformation, poisoned training data, and why “perfect” safety is unrealistic.They discuss how AI red teaming works at scale (thousands of test prompts), how guardrails can inspect both prompts and responses, and why smart policies (like allowing prompts but blocking file uploads) can protect sensitive data without wrecking user experience. Plus: why coaching and employee education still beat buying “one more tool.”🎧 Listen now, follow NEVERHACK Estonia Cybercast, and subscribe for more real-world security conversations.

  8. 71

    Identity in the Age of AI: Trust, Digital Signatures, and Delegating Credentials (with Mihkel Tammsalu, SK ID Solutions)

    What happens to digital trust when AI agents start doing real work for us? In this episode, Louis Zezeran talks with Mihkel Tammsalu, Head of eID & Trust Services at SK ID Solutions, about identity in an AI future—where “trust” becomes verification, certificates act as assertions, and delegation becomes the missing layer.They explore a practical question with huge implications: if an AI logs in and acts on your behalf, is it using your identity—and are you responsible when it makes a mistake? From low-risk tasks like emails to high-value actions like purchases or registry updates, the conversation unpacks guardrails, time-limited permissions, “human in the loop” approvals, and why e-services may need more machine-to-machine APIs.Listen now, follow NEVERHACK Estonia Cybercast, and connect with us on LinkedIn to continue the conversation.

  9. 70

    From Attack to Courtroom: How Cybercrime Is Investigated and Prosecuted in Estonia (with State Prosecutor Vahur Verte)

    Cybercrime isn’t a niche problem anymore—it’s a scalable, borderless business. In this episode of NEVERHACK Estonia CyberCast, Anett Numa speaks with Estonian State Prosecutor Vahur Verte about how cybercrime has evolved, why one attacker can impact thousands (or more), and what it really takes to investigate and prosecute digital crimes in a world where data moves instantly.You’ll hear why international cooperation is the biggest bottleneck, why deterrence depends more on the likelihood of being caught than harsher punishment, and how Estonia thinks about defending a highly digital e-state without compromising citizens’ rights. Plus: the human side—what it’s like to prosecute crimes at massive scale, and why public officials must live with extra caution online.🎧 Listen now, follow NEVERHACK Estonia CyberCast, and visit our website for more episodes and insights.

  10. 69

    NIS2 Is Now a CEO Problem: Board Liability, Real-World Risk & Practical First Steps (with Henri & Rainer Ratnik, WIDEN Legal)

    Cybersecurity is no longer “handled by IT.” Under NIS2 Directive, it’s a leadership responsibility—with real accountability, fast incident reporting expectations, and growing supply-chain pressure. In this Cybercast episode, host Anett Numa speaks with Henri Ratnik and Rainer Ratnik from WIDEN legal about what NIS2 changes in everyday business, how boards should think about liability and resilience, and the biggest mistakes companies make when preparing. You’ll also hear practical advice for SMEs and scale-ups: how to prioritize, build layered defenses (“Swiss cheese”), and avoid expensive security theater. 🎧 Listen now and share this with your CEO/board team. For more episodes, visit our website and subscribe.

  11. 68

    NIS2 for Estonian Business Leaders: Compliance, Liability, and First Steps (with Andres Järv)

    NIS2 is now reshaping cybersecurity expectations for Estonian businesses—and the scope has grown fast. In this episode of the NeverHack Cybercast, Louis Zezeran is joined by NEVERHACK security advisor Andres Järv to break down what NIS2 really is (an EU directive), how Estonia implemented it through the Cybersecurity Act (KüTS), and why thousands more organizations may now be in scope. You’ll learn the difference between E-ITS (Estonia’s detailed, prescriptive standard) and ISO 27001 (international, risk-based), what audits and evidence look like, and what “management responsibility” means in practice. Andres also shares practical first-step examples—policies, risk management, incident handling, asset/vulnerability management, and staff awareness—so you can start building compliance without panic. 🎧 Listen now, subscribe for more, and contact NEVERHACK if you need guidance on where to begin.

  12. 67

    Phishing Trends for 2026: AI-Personalized Attacks, Deepfakes & ClickFix (with Urmo Keskel, Phishbite)

    Phishing is evolving fast—and in 2026 it’s no longer “just suspicious emails.” In this episode of NeverHack CyberCast, host Louis Zezeran talks with Urmo Keskel from Phishbite (Estonia) about the newest phishing tactics: AI-personalized lures in perfect local language, deepfake social engineering, hybrid attacks that jump from LinkedIn to Telegram, ClickFix campaigns that trick users into running commands, and the growing underground market for stolen sessions and access.They also cover hiring-process malware traps, supply-chain invoice scams, and how QR code phishing moves victims from protected laptops to less protected phones. Most importantly: what actually works in the real world—continuous simulations, behavior-driven metrics, and building awareness without blame.🎧 Listen now, follow/subscribe for more CyberCast episodes, and share this with someone who still thinks “I’d never fall for phishing.”

  13. 66

    From Noise to Action: How Cyber Threat Intelligence Protects Businesses (with Britta Sillaots)

    Most organizations understand the idea of “cybersecurity” as tools, controls, and response plans. But Cyber Threat Intelligence (CTI) often sits in a strange place: it’s widely advertised, frequently misunderstood, and sometimes dismissed as buzzword fuel. In this NEVERHACK CyberCast episode, host Louis Zezeran sits down with Britta Sillaots, a NEVERHACK Cyber Threat Intelligence analyst, to unpack what CTI actually is—what it looks like in the real world, how it supports security teams, and why it’s not reserved for “big enterprise only.”Britta’s definition is simple, and that simplicity is the point: CTI is about making information useful. Not just collecting data, not just “watching the dark web,” and not just generating reports. CTI is the process of taking scattered signals—news, indicators, chatter, leaks, vulnerabilities—and adding enough context that a security team can act.

  14. 65

    When GPS fails at sea: Understanding Spoofing, Jamming, and Maritime Navigation Risk

    In this CyberCast episode, host Louis Zezeran is joined by Rob Gillette (NAL Research) and Stefan Grefsgaard (SGM Technology) to unpack a growing and often misunderstood threat: GPS spoofing and jamming in the maritime domain. The conversation explores why GNSS systems are vulnerable by design, how interference manifests in real-world operations, and why this issue has become a critical concern for safety, security, and commercial shipping.Through real-world examples and testing experiences, the discussion explains the difference between jamming and spoofing, how navigation systems behave under interference, and why trust in positioning data has become a security concern. Rather than focusing on a single solution, the episode looks at broader principles such as independent verification, resilience, and operational awareness.🎧 Listen now and subscribe for more practical discussions on real-world security challenges from NEVERHACK Estonia.

  15. 64

    CyberCast Year in Review: Ransomware, AI-Driven Attacks & What’s Coming in 2026 (Meet the New NEVERHACK Hosts)

    In this end-of-year CyberCast, Ronnie welcomes new hosts Anett Numa, Britta Sillaots, and Louis Zezeran as they reflect on 2025’s biggest security lessons—from the Cinamon cinemas ransomware incident to the rising impact of AI on both attackers and defenders. They also share practical 2026 priorities: cloud sovereignty, supply chain resilience, war-gaming, and patching basics.

  16. 63

    Intelligent Architecture in Industry 4.0: Smart Manufacturing, Cybersecurity & the Future

    Step inside the world of smart manufacturing with Ericsson architect Allan Puusepp, as we explore how intelligent architecture, AI, robotics, and cybersecurity are reshaping the factory floor. From private 5G networks to real-time data models and layered industrial design, Allan reveals how modern factories achieve agility, reliability, and security at massive scale.Discover why microsegmentation and Zero Trust matter, how to secure legacy machinery, and why monitoring network traffic is the fastest path to stronger industrial cybersecurity. Packed with practical insights and future-focused thinking, this episode is a must-listen for anyone navigating Industry 4.0.

  17. 62

    Why Humans Matter Most in Cybersecurity: Cognitive Bias, Micro-Habits & Real-World Defense

    Humans remain the strongest—and weakest—link in cybersecurity. In this eye-opening episode, psychologist and leadership trainer Andero Teras reveals how cognitive bias, micro-habits, and everyday communication patterns shape cyber risk far more than technology alone. Learn why our brains misjudge digital threats, how attackers exploit human heuristics, and what small behavioral changes can dramatically improve security culture.From storytelling to closed-loop communication, Andero shares practical, real-world strategies that CISOs and teams can start using today. Tune in to discover how to build stronger defenses by understanding the human mind.

  18. 61

    Securing the Last Mile: Inside Estonia’s Nation-Scale Endpoint Defense

    How do you secure nearly 9,000 government endpoints? In this episode of CyberCast, recorded live at the Nordic-Baltic Security Summit, Andri Rebane from the Estonian IT Center and Indrek Turmen from Trend Micro share how Estonia unified endpoint protection across its public sector.They reveal what it takes to roll out EDR at national scale — from automation and tuning to trust, collaboration, and long-term learning. Discover how “last-mile security” became Estonia’s strongest defense layer and what other organizations can learn from it.Listen now and explore the full playbook behind one of the most ambitious public-sector cybersecurity rollouts in Europe.

  19. 60

    Getting Thought Leadership Right – Lessons from Vendor Research

    What separates real thought leadership from marketing noise in cybersecurity? Henry Rõigas, CEO of evisec.xyz, joins host Ronnie Jaanhold at the Nordic-Baltic Security Summit to explain how vendors can publish credible, evidence-based research that earns trust instead of skepticism. Learn how to spot bias, apply data transparency, and use research as a tool for strategy — not just PR.

  20. 59

    Autonomous Negotiators: The New Cyber Attack Surface?

    What happens when AI starts negotiating deals on your behalf?In this episode, recorded live at the Nordic-Baltic Security Summit, Margus Anvelt, Head of Security and Compliance at Pactum AI, joins Ronnie Jaanhold from NEVERHACK to discuss how autonomous negotiation platforms are transforming enterprise procurement and what new cyber risks they introduce.Discover how Pactum empowers procurement teams with AI-driven agents that negotiate with suppliers, the security challenges of rule-based vs. generative AI, and why continuous penetration testing is essential in the age of AI autonomy.

  21. 58

    Minutes to Meltdown: Cyber Resilience, Zero Trust & Clean Rooms with Ravi Baldev Singh

    How long can your business survive after a breach? In this episode, Commvault’s Ravi Baldev Singh reveals what it really takes to build cyber resilience. From zero-trust backup to the power of clean rooms and “minutes to meltdown” simulations, Ravi shares expert strategies to prepare for the inevitable. Learn how to align IT, security, and the board on a survival-first mindset.

  22. 57

    When the grid thinks for itself: cyber, AI & clean power with Sunly

    Electricity or internet—what came first? Sunly’s Paul Post joins us to rethink the future of utilities. From building a secure digital grid from scratch to using AI-driven analytics and automating threat detection, this episode dives into what a “tech-driven utility” really looks like. Tune in to explore the cyber threats, bold innovations, and data-first thinking behind the Baltics’ most progressive energy company.

  23. 56

    Beyond Passwords: The Future of Authentication with Keeper Security

    Passwords have long been a weak link in cybersecurity. With the rise of password managers, passkeys, and multi-factor authentication, are we moving towards a passwordless future? In this episode, Ronnie Jaanhold sits down with Padraigh Conway from Keeper Security to discuss the evolution of password security, best practices for businesses, and the latest trends in authentication.

  24. 55

    AI in Cybersecurity: Hype vs. Reality with Marvin Ngoma (Elastic)

    AI in cybersecurity: Real innovation or just marketing hype?In this episode of Cybercast, Marvin Ngoma from Elastic joins host Ronnie Jaanhold to cut through the noise and uncover what AI actually does in cybersecurity.Topics covered:* AI vs. machine learning—what’s the difference?* How security teams can leverage AI for real impact* Common AI myths—will AI replace cybersecurity jobs?* Elastic’s latest AI innovations and real-world use cases AI isn’t magic—but when used correctly, it reduces alert fatigue, speeds up investigations, and helps analysts focus on real threats. Learn how AI-powered threat detection is evolving and what your security team should do next.

  25. 54

    NBSS edition: How to make cybersecurity clear, engaging, and impactful

    What do IT consulting, stand-up comedy, and cybersecurity moderating have in common? Louis Zezeran, the vibrant host of the Nordic-Baltic Security Summit, joins CyberCast to share how he brings energy and clarity to one of the region’s most impactful cybersecurity events.In this special episode, Louis reveals his behind-the-scenes secrets to engaging a technical audience, the power of humor, and how AI shapes the conversation in 2025. From his unexpected career path to lessons learned moderating for over five years, you’ll get both laughs and leadership insights.We also explore the practical side of NBSS — from hands-on workshops to Capture the Flag challenges — and why it’s a must-attend for business leaders and tech pros alike.🎧 Listen now and discover how to make security content human, engaging, and impossible to ignore.

  26. 53

    Inside APT Warfare: Trellix on Outsmarting Tomorrow’s Threats

    How do today’s most dangerous cybercriminals stay one step ahead—and how can you catch up?In this episode of CyberCast, Trellix’s Peter Helms pulls back the curtain on the modern threat landscape, from ransomware-as-a-service to stealthy living-off-the-land attacks. Learn how APTs are evolving, why phishing remains a top entry point, and what it takes to defend against adversaries using your own tools against you.Peter shares jaw-dropping examples from his ethical hacking days, explains how Trellix helped disrupt major threat actor groups, and outlines why alert fatigue can be your biggest blind spot.Plus, discover how AI is reshaping threat detection and why adaptive, risk-based defenses are the key to staying ahead.

  27. 52

    The Rise of Machine Identities: Securing AI in a Zero Trust World

    In a world where digital identity is as critical as your passport, are we ready for the explosion of machine identities and AI-driven automation?In this episode of CyberCast, CyberArk’s Bartosz Krynski joins Ronny Jaanhold to explore:* What machine identities really are* Why traditional passwords are failing us* How attackers exploit identity as their top entry point* The rise of MFA, certificates, and zero trust architecture* Real-world stories from ransomware to reputation lossTune in for practical tips, surprising insights, and why identity is the new battleground.

  28. 51

    2024 Through the Eyes of a Threat Intelligence Analyst: Ransomware, AI, and Cyber Warfare

    What do modern cyber threats look like?Cybercriminals are evolving faster than ever—ransomware gangs are more resilient, cyber extortion is thriving, and AI-driven disinformation is reshaping digital security. In this episode, cybersecurity expert Maciej Martinek from Recorded Future joins Ronnie Jaanhold to break down:* The rise of new ransomware gangs after LockBit’s takedown* AI’s role in phishing and disinformation campaigns* Why threat intelligence is critical for cybersecurity strategy* The biggest cyber risks businesses must prepare for in 2025 Stay ahead of emerging threats and discover expert strategies to fortify your cybersecurity defenses.

  29. 50

    Gert Auväärt: Eesti küberturbe hetkeseis ja tulevik

    Seekord on saatekülaliseks Gert Auväärt, Riigi Infosüsteemi Ameti (RIA) küberturvalisuse keskuse juht ja peadirektori asetäitja.Mida saates käsitleme?– Mis on NCSC-EE ja milline on selle roll Eesti küberkaitses? – RIA 2025. aasta küberturvalisuse aastaraamat – olulised teemad ja trendid – Kuidas igaüks meist saab aidata tugevdada riigi ja ettevõtete küberturvet?

  30. 49

    Kübermeeskonna juhtimise kunst: karjäärivõimalused ja väljakutsed

    Selles episoodis vestleb Ronnie Kristjan Kaskmaniga kübermeeskonna juhtimise väljakutsetest ning selle valdkonna karjäärivõimalustest. Uurime, kuidas erineb tehniliste ekspertide juhtimine teistest valdkondadest, kuidas arendada kübermeeskonda ning millised omadused on vajalikud heaks juhiks saamiseks. Kristjan jagab oma laialdast kogemust ning praktilisi nõuandeid, mis aitavad spetsialistidel kasvada tugevateks juhtideks.

  31. 48

    EITS eesrindel - kuidas on seotud andmete ja elude kaitsmine tervishoius

    Selles episoodis arutleb saatejuht Jüri Voronov koos külaliste Kristjan Hinni (PERH) ja Martin Ojalaga (Kordon) Eesti infoturbestandardi (EITS) rakendamise vajaduse ja kogemuste üle. Kristjan jagab oma kogemusi EITS-i rakendamisest Põhja-Eesti Regionaalhaiglas, rõhutades protsessi keerukust ja olulisi õppetunde. Martin tutvustab Kordoni infosüsteemi, mis aitab organisatsioonidel EITS-i rakendamist lihtsustada ja jälgida. Arutelu keskendub ka riskianalüüsi tähtsusele ja praktilistele nõuannetele, kuidas vältida rakendamise käigus tekkivaid takistusi.

  32. 47

    From Data to Defence: Unified Tools for SIEM, Endpoint, and Cloud Protection with Elastic

    In this episode, cybersecurity meets innovation!Recorded live at the Nordic-Baltic Security Summit 2024, we sit down with Elastic's Security Architect Marvin Ngoma to discuss Elastic Security. Elastic empowers organizations with advanced SIEM, endpoint, and cloud security capabilities built on a powerful data and search foundation.Key takeaways: – The evolution of Elastic Security from a data platform to a security powerhouse. – How AI and GenAI streamline security workflows. – The flexibility of Elastic’s free and paid models for organizations of all sizes.

  33. 46

    Incident Response: Why Preparation is Your Best Defense Against Cyber Attacks

    In this CyberCast episode, recorded at the Nordic-Baltic Security Summit 2024, we explore the crucial world of incident response with Aleksei Zjabkin, CTO of NEVERHACK Estonia, and industry expert Gabriel De Brosses. Whether your organization is prepared or caught off guard, this discussion provides actionable insights on handling cyber incidents.🛑 Key topics include: Real-life ransomware cases and their impact The psychological chaos of unprepared responses Top mistakes organizations make during cyber incidents The difference a prepared incident response team makes Indicators of effective recovery

  34. 45

    AI at Work: Innovation, Risks, and the EU’s New Rules

    In this episode of CyberCast, recorded live at the Nordic-Baltic Security Summit 2024, hosts Ronnie Jaanhold and Siim Pajusaar explore the legal and ethical dimensions of workplace AI with Henri Ratnik, Co-Head of IT, IP and Data Protection at Widen Legal. From real-world court cases involving chatbots to the implications of the EU’s AI Act, this episode is a must-listen for anyone navigating the evolving landscape of AI in the workplace. Don’t miss Henri’s expert advice on using AI responsibly while staying compliant!

  35. 44

    Demystifying Cybercrime: Insights from Estonia's Cybercrime Bureau

    In this episode of CYBERCAST, we bring you insights straight from the Nordic-Baltic Security Summit 2024, hosted by NEVERHACK Estonia. Our guest, Ago Ambur, Head of the Cybercrime Bureau at the Estonian Police and Border Guard Board, delves deep into the evolving landscape of cybercrime.From phishing scams to cryptocurrency heists, Ago discusses the most common cyber threats affecting individuals and organizations in Estonia and beyond. He explains how the criminal landscape has transformed into a "crime-as-a-service" model, making cyberattacks more accessible and harder to defend against.

  36. 43

    Understanding Cyber Warfare: Beyond the Myths and Into Modern Military Strategies

    In this episode of CYBERCAST, cybersecurity expert Kieren Lovell joins us to unpack the complexities of cyber warfare. Broadcasting from the Nordic-Baltic Security Summit 2024, Lovell dives deep into how cyber threats extend beyond traditional battlefields, impacting everything from military operations to the spread of misinformation and public perception. Learn how modern cyber warfare is reshaping strategies in defense and why it requires vigilance and understanding from all levels of society. This insightful conversation covers the role of AI, open-source intelligence, and the critical importance of public awareness in the face of ever-evolving cyber threats.

  37. 42

    Navigating Retail Cybersecurity: Insights from Coop Estonia's CIO & CSO

    In this special episode of KüberCast, recorded live at the Nordic-Baltic Security Summit 2024, we dive deep into the cybersecurity challenges faced by Coop Estonia, a retail giant with over a century of history. Join us as Kaspar Hioväin, CIO, and Jaanus Sootla, CSO, share insights on how Coop balances operational efficiency with cybersecurity demands in today’s rapidly digitalizing retail landscape.From supply chain intricacies to preventing cyber threats, this episode offers valuable lessons for anyone navigating the intersection of retail and cybersecurity.

  38. 41

    Tööstussektor ja küberrünnakud – kogemused Saku Metalli praktikast

    Selles episoodis arutame küberturvalisuse üle tööstussektoris, keskendudes Saku Metalli ja nende CIO Sven Ahtama kogemustele. Koos NEVERHACK Estonia tegevjuhi Jürgen Ermiga räägime küberturvalisuse võtmeteemadest: riskianalüüs, rünnakute ennetamine, tööstusspionaaž, digitaalse tarneahela turvalisus ja küberturvalisuse roll äriprotsessides. Saates toome välja praktilised näited ja parimad praktikad, mida iga tootmisettevõte peaks teadma.

  39. 40

    Mastering Difficult Conversations: Brutal Honesty Without Being a Jerk (en)

    In this special episode of KüberCast, recorded live at Latitude 59, we dive deep into the art of clear, effective communication with startup coach Kalev Kaarna. Join host Ronny Jaanhold as they explore how brutal honesty and professional dialogue can prevent conflicts, improve decision-making, and boost team dynamics — all without coming across as a jerk. Learn how these communication principles extend beyond the tech world and into the vital "people factor" in cybersecurity and AI-driven environments.

  40. 39

    Strategic threat intelligence: from tactical insights to strategic decision-making

    In this episode of KüberCast, hosts Ronnie Jaanhold and Siim Pajusaar welcome Hannaire Mekaouar from Recorded Future to explore the concept of strategic threat intelligence. While previous episodes have delved into operational and tactical threat intelligence, today’s discussion focuses on the broader, long-term view of strategic intelligence. The conversation covers how strategic threat intelligence differs from other forms, its critical role in decision-making, and the integration of intelligence at all levels—from daily SOC operations to executive decision-making.

  41. 38

    Nordic-Baltic Security Summit – mida tähendab säilenõtkus küberturbes?

    Selles episoodis keskendume eelseisvale Nordic-Baltic Security Summitile, mis toimub 12. septembril Tallinnas Kultuurikatlas. Arutleme konverentsi peamiste teemade üle, sealhulgas küberturvalisuse vastupidavus ja uued tehnoloogilised suundumused. Saate külalised Eendrik Randoja ja Jürgen Erm annavad põhjaliku ülevaate konverentsi programmist, esinejatest ning eelmistest aastatest saadud õppetundidest.Kuula, et saada teada, mida sellelt aasta tippsündmuselt oodata ja miks sa sellest ilma jääda ei taha!

  42. 37

    Navigating cyber storms: phantom ships, gps deceptions, and maritime cybersecurity (en)

    Join host Ronnie Jaanhold as he delves into the intricate world of maritime cybersecurity with experts Dan Heering and Sanja Bauk from TalTech. Explore the challenges modern seafarers face, the rise of digitalization on ships, and the critical importance of cybersecurity in preventing incidents at sea. Learn about the latest research, real-world incidents, and the future of maritime cyber defense.

  43. 36

    Müüdimurdjad küberis – räägime kuulujuttudest mis liiga laialt levivad

    Ronnie Jaanhold ja Siim Pajusaar viivad Sind selles episoodis müütide müstilisele maale. Kas oled kunagi mõelnud, kas inkognito režiim tõesti tagab anonüümsuse? Või kas paroolide sagedane vahetamine muudab sind turvalisemaks? Kas antiviirus on nõrkadele ja ega minult niikuidnii midagi võtta pole? Kui jah, siis see saade on just sulle!

  44. 35

    Kübermaailma trendid: minevik, tulevik ja õppetunnid

    Seekordses KüberCasti episoodis vaatavad saatejuhid Siim Pajusaar ja Ronnie Jaanhold ajas tagasi, analüüsides küberintsidente ja trende, mis seda perioodi kujundasid. Arutluse all on teenusetõkestusrünnakud, petuskeemid, kolmandate osapoolte roll küberintsidentides ja nullpäeva turvanõrkused. Samuti on rõhk tuleviku trendidel, nagu identiteedipõhised rünnakud ja tehisintellekti kasutamine küberrünnakutes.Saatest kuuled praktilisi soovitusi küberhügieeni parandamiseks ja kriisijuhtimisplaanide koostamiseks.Head kuulamist!

  45. 34

    Kübermaailma sõjamängud: sissepõige Locked Shields õppusele

    Tere tulemast tagasi KüberCasti kuulama! Seekordse episoodi fookuses on üks maailma suurimaid ja realistlikumaid küberkaitse õppusi - Locked Shields. Meil on külas õppuse peakorraldaja, Eesti Kaitseväe kolonelleitnant Urmet Tomp, kes jagab õppuse kohta veidi tausta ja kogemusi. Mida siis tähendab kübermaailma sõjamäng 41 riigi ja üle 4000 osalejaga?

  46. 33

    Sukeldume tootmissektorisse – mis on kaalul, kuidas läheneda ja mida toob tulevik?

    Pidevalt areneval digitaalsel maastikul seisavad tootmisettevõtted silmitsi üha suurema hulga küberjulgeolekuohtudega. KüberCASTi seekordses osas on saatejuht Ronnie Jaanhold koos Hansa Grupi infoturbejuhi Kristian Teiteriga, et süveneda kriitilise infrastruktuuri kaitsmise keerukesse. Saates arutatakse küberturvalisuse rolli olulisust jätkusuutliku tootmise säilitamiseks ja uurivad strateegiaid küberohtude eest kaitsmiseks.

  47. 32

    The Merge – CYBERS and NEVERHACK: a new dawn in cybersecurity (en)

    In this special edition of KüberCast, we are thrilled to feature Jürgen Erm (CEO of CYBERS) and Arthur Bataille (CEO of NEVERHACK) to discuss their recent mergers. Tune in as they explore the synergies between their technologies, the impact on the cybersecurity industry, and what this means for stakeholders worldwide. This episode is a must-listen for anyone interested in the evolving dynamics of cybersecurity.

  48. 31

    Andmeleke - kibe tablett, tugev ravim?

    Seekordses podcastis käsitlevad saatejuht Ronnie Jaanhold ja advokaat Sten Tikerpe (Advokaadibüroo Nove) hiljutist suurt andmelekke juhtumit, mis puudutas Allium UPI hallatud süsteeme, kuhu kuulusid Apotheka, PetCity ja teised seotud ettevõtted. Andmeleke on alati tõsine sündmus, kuid sellest saadud õppetunnid võivad olla hindamatud nii tarbijatele kui ettevõtetele, kes soovivad oma tegevuses rakendada parimaid andmekaitse praktikaid.

  49. 30

    Mõtteviisi häkkimine: Velmari teekond häkkerist küberturvalisuse eksperdini

    Seekordses saates avame saladuseloori häkkerite ümber. Justnimelt heade häkkerite ja selle avamiseks oli külas Velmar, kelle kirg ja professionaalsus säravad kübertube maastikul eredalt.Velmar jagab intrigeerivaid näiteid oma tööst, sealhulgas juhtumeid, kus näiliselt turvalised süsteemid varjavad olulisi riske.

  50. 29

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

CYBERCAST is a cybersecurity podcast where we break myths and tackle taboos. Our discussions cover topics for everyone—young and old, experienced professionals, and those just beginning their careers in the cyber world. Hosted by Ronnie Jaanhold.

HOSTED BY

Ronnie Jaanhold

CATEGORIES

URL copied to clipboard!