CYBERCAST cover art

All Episodes

CYBERCAST — 81 episodes

#
Title
1

Quantum Computing & Cybersecurity: Real Risks, Post-Quantum Readiness, and What Businesses Must Do Now | NEVERHACK Webinar Replay

2

From Small-Town Estonia to Cybersecurity Leadership: Jürgen Erm on Building NEVERHACK Estonia

3

Cyber Resilience in Modern Defense: Graham Taylor of OPSWAT on NATO, AI, and the Future of Security

4

OpenXDR and the Evolution of Security Operations with Henk van der Heijden of Stellar Cyber

5

How Threat Hunting Really Works with Piotr Czopik of Recorded Future

6

The 8% Problem: How to Spot Insider Risk Before Data Walks Out the Door (Mimecast Incydr)

7

Enterprise AI Safety in the Real World: Guardrails, Policies, and “Good Enough” Risk (Jonne Tuomela from Netskope)

8

Identity in the Age of AI: Trust, Digital Signatures, and Delegating Credentials (with Mihkel Tammsalu, SK ID Solutions)

9

From Attack to Courtroom: How Cybercrime Is Investigated and Prosecuted in Estonia (with State Prosecutor Vahur Verte)

10

NIS2 Is Now a CEO Problem: Board Liability, Real-World Risk & Practical First Steps (with Henri & Rainer Ratnik, WIDEN Legal)

11

NIS2 for Estonian Business Leaders: Compliance, Liability, and First Steps (with Andres Järv)

12

Phishing Trends for 2026: AI-Personalized Attacks, Deepfakes & ClickFix (with Urmo Keskel, Phishbite)

13

From Noise to Action: How Cyber Threat Intelligence Protects Businesses (with Britta Sillaots)

14

When GPS fails at sea: Understanding Spoofing, Jamming, and Maritime Navigation Risk

15

CyberCast Year in Review: Ransomware, AI-Driven Attacks & What’s Coming in 2026 (Meet the New NEVERHACK Hosts)

16

Intelligent Architecture in Industry 4.0: Smart Manufacturing, Cybersecurity & the Future

17

Why Humans Matter Most in Cybersecurity: Cognitive Bias, Micro-Habits & Real-World Defense

18

Securing the Last Mile: Inside Estonia’s Nation-Scale Endpoint Defense

19

Getting Thought Leadership Right – Lessons from Vendor Research

20

Autonomous Negotiators: The New Cyber Attack Surface?

21

Minutes to Meltdown: Cyber Resilience, Zero Trust & Clean Rooms with Ravi Baldev Singh

22

When the grid thinks for itself: cyber, AI & clean power with Sunly

23

Beyond Passwords: The Future of Authentication with Keeper Security

24

AI in Cybersecurity: Hype vs. Reality with Marvin Ngoma (Elastic)

25

NBSS edition: How to make cybersecurity clear, engaging, and impactful

26

Inside APT Warfare: Trellix on Outsmarting Tomorrow’s Threats

27

The Rise of Machine Identities: Securing AI in a Zero Trust World

28

2024 Through the Eyes of a Threat Intelligence Analyst: Ransomware, AI, and Cyber Warfare

29

Gert Auväärt: Eesti küberturbe hetkeseis ja tulevik

30

Kübermeeskonna juhtimise kunst: karjäärivõimalused ja väljakutsed

31

EITS eesrindel - kuidas on seotud andmete ja elude kaitsmine tervishoius

32

From Data to Defence: Unified Tools for SIEM, Endpoint, and Cloud Protection with Elastic

33

Incident Response: Why Preparation is Your Best Defense Against Cyber Attacks

34

AI at Work: Innovation, Risks, and the EU’s New Rules

35

Demystifying Cybercrime: Insights from Estonia's Cybercrime Bureau

36

Understanding Cyber Warfare: Beyond the Myths and Into Modern Military Strategies

37

Navigating Retail Cybersecurity: Insights from Coop Estonia's CIO & CSO

38

Tööstussektor ja küberrünnakud – kogemused Saku Metalli praktikast

39

Mastering Difficult Conversations: Brutal Honesty Without Being a Jerk (en)

40

Strategic threat intelligence: from tactical insights to strategic decision-making

41

Nordic-Baltic Security Summit – mida tähendab säilenõtkus küberturbes?

42

Navigating cyber storms: phantom ships, gps deceptions, and maritime cybersecurity (en)

43

Müüdimurdjad küberis – räägime kuulujuttudest mis liiga laialt levivad

44

Kübermaailma trendid: minevik, tulevik ja õppetunnid

45

Kübermaailma sõjamängud: sissepõige Locked Shields õppusele

46

Sukeldume tootmissektorisse – mis on kaalul, kuidas läheneda ja mida toob tulevik?

47

The Merge – CYBERS and NEVERHACK: a new dawn in cybersecurity (en)

48

Andmeleke - kibe tablett, tugev ravim?

49

Mõtteviisi häkkimine: Velmari teekond häkkerist küberturvalisuse eksperdini

50

Küberturvalisemaks läbi teenusedisaini - miks ja kuidas?

51

Navigating the Shadows: The Rise, Fall, and Complexities of LockBit Ransomware

52

BIG TALK: The Era of Data, Security and AI (en)

53

Vene häktivistid - odav populaarsus, käitumismustrid ja Eesti kaitsevõimekus

54

Kuidas alustada isikliku küberkaitsega?

55

Suured keelemudelid – kas võluvits või tavaline tööriist? (ee)

56

Kuidas SOC analüütik päästab päeva: sissevaade küberturbe argipäeva (ee)

57

Sukeldume andmete maailma ElasticON kogemuse läbi (ee)

58

The road of security automation. Join us!

59

Will Next Generation Firewalls have feelings? Injecting AI to Firewalls – monsters or angels?

60

CISO positsioon ettevõttes – kes, miks ja milleks?

61

What to do with Cyber Risk?

62

A Mysterious Broadcast Podcast– UVB-76

63

Kes, mis ja miks on ISO 27001?

64

Nordic-Baltic Security Summit – mis toimus ja mis tulemas on

65

Leidsid maast mälupulga - õnn või õnnetus - irdseadmetega seotud riskid

66

Mis on digitaalne jalajälg ja kuidas seda ära kasutatakse?

67

Küberturvalisuse ministeerium

68

Paroolid – Sinu digitaalne identiteet

69

Mis värk nende paroolidega on ja miks need nii ärritavad on?

70

Milline näeb välja õngitsuskiri?

71

Küpsisepuru

72

Outlook

73

Häkkeri portree

74

Mis minult ikka võtta on?

75

Mis tarkvara hapneb 2023. aastal?

76

Küberkindlustus

77

How to quantify risk?

78

Cyber threat intelligence – your headlights on the internet 

79

Kuidas teha esimest korda küberturbe eelarvet?

80

Kas petta petturit?

81

KickOff