Data Security Decoded cover art

All Episodes

Data Security Decoded — 52 episodes

#
Title
1

The Terrorist Designation: A New Red Line for Ransomware with Cynthia Kaiser

2

The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik and Amit Malik

3

Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff

4

Downtime in Healthcare is Fatal: Achieving Resilience in Health & Life Sciences

5

AI Takes Over RSAC Conference (Now What?) with Dave Bittner.

6

Your Backups Are Talking — Are You Listening?

7

AI Moves Fast. Privacy Has to Move Faster.

8

The Real Risks of Agentic AI in the Enterprise

9

When Hacktivists Target Water Utilities: Inside a Russian-Aligned OT Attack

10

How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed

11

Ransomware, Remote Access, and the OT Reality Check

12

The Hidden Risk in Your Stack

13

Top CISO Priorities and Global Digital Trust with Morgan Adamski

14

Agentic AI and Identity Sprawl

15

Secure by Design, Secure by Default, Secure by Demand

16

Three Threats Reshaping Financial Services: Identity, Supply Chain, and AI

17

Scattered Spider: the Evolution of Identity-Based Ransomware

18

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

19

Breaking the Intelligence-Defense Divide with Scott Scher

20

The Geopolitical Security Playbook: When Nations Clash in Cyberspace

21

HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare

22

Securing the Software Supply Chain

23

AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout

24

Making Generative AI Transparent

25

The State of Data Security: A Distributed Crisis

26

Data Weaponization: How Cyber Attacks Impact the Vulnerable

27

Civilian Cyber Corps: Protecting Underfunded Organizations

28

How to Effectively Train Your Employees on Cybersecurity

29

Regulatory Readiness and Resilience with Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl

30

Bridging Cyber Policy Gaps for Rural and Underserved Communities with Nicole Tisdale

31

Bridging the Gap Between IT and Security with Marcela Escobar-Alava and Joe Stenaka, CIO and CISO of the U.S. Social Security Administration

32

Navigating Cybersecurity Through Leadership Transitions with Maria Roat, Former US Deputy Federal CIO

33

Embracing Conscious Leadership and AI Integration with Aysha Khan, CIO and CISO at Treasure Data

34

Cultivating a Year-Round Cybersecurity Culture: Data Security Decoded Greatest Hits

35

Navigating Data Governance and Compliance Challenges with Candy Alexander, CISO & Security Practice Lead at NeuEon

36

Building a Cyber Resilient Healthcare System with Anahi Santiago, Chief Information Security Officer at ChristianaCare

37

E59: How to Monetise Your Personal Training Knowledge

38

Preparing for Breaches: the Importance of Incident Response Plans and Exercises

39

The Impact of Cyber Events on Patient Care

40

What CISOs Must Consider During a Breach with Amy Bogac, CISO at Elevate Textiles

41

Ransomware: A Major Threat to Data Security with Renata Spinks of CyberSec International

42

War Fighting in Cybersecurity: Lessons from the Military with Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp

43

Driving Strategic Excellence in Cybersecurity: Insights from Sue Bergamo, CISO and CIO at BTE Partners

44

The Impact of Ransomware on Hospitals and Patient Care with Hannah Neprash, PhD of the University of Minnesota, School of Public Health

45

Communicating Cyber Risk to Executives and Boards with Shamane Tan

46

How Generative AI Will Accelerate Cybersecurity with Sherrod DeGrippo

47

The Evolving Role of the CISO and the Language of Resilience with Marene Allison

48

Manipulating Science for the Greater Good with Kavitha Mariappan

49

The Hard Truths of Data Security with Wendi Whitmore

50

Leading A Cybersecurity Organization Through Periods of Burnout with Sandra Joyce

51

Making Cyber Resilience Accessible to Every Organization with Suzette Kent

52

Dissecting The Human Impact of Cybercrime with Wendi Whitmore