<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/css" href="/css/feed.css"?>
<rss xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<channel>
<title>Business Security Weekly (Video)</title>
<link>//podcastplus.net/feed/business-security-weekly-video~767ed708</link>
<description>About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.</description>
<pubDate>Wed, 15 Apr 2026 00:14:08 +0000</pubDate>
<item>
<title>Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_415_1--9848336d-e546-474b-816b-63837f2c4c27--sd-converted--e3150763-72c0-427e-b48d-14655327832f.mp4?dest-id=406374</link>
<description>  More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report released by Experis, a global leader in IT workforce solutions and part of the ManpowerGroup (NYSE: MAN) family of brands, modern technology leaders are walking a tightrope between protecting their organizations and driving innovation in an era of relentless cyber threats and rapid digital transformation.   Amanda Jack, CTO at Manpower Group, joins Business Security Weekly to share the finding, including:    77% of organizations plan to increase cybersecurity budgets in 2025, followed by cloud infrastructure (68%) and AI (67%)   76% of IT employers worldwide report difficulty finding skilled tech talent   52% of tech leaders are embedding AI skills into existing ...</description>
<pubDate>Wed, 01 Oct 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_415_1--9848336d-e546-474b-816b-63837f2c4c27--sd-converted--e3150763-72c0-427e-b48d-14655327832f.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_415_1--9848336d-e546-474b-816b-63837f2c4c27--sd-converted--e3150763-72c0-427e-b48d-14655327832f.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_414_1--3e9fd8c6-c690-4fba-8443-b0513845ebb7--sd-converted--1cebd34c-fa5e-4d1a-9d7b-4ea9538bfde1.mp4?dest-id=406374</link>
<description>  As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats?   O Company founder and CEO, Guillaume Jaulerry, believes we’ve crossed a critical threshold -- cloud dependence has quietly become a strategic liability, and individuals, professionals, and enterprises alike are facing a looming privacy crisis. Guillaume joins Business Security Weekly to share his perspective on how technology should shift, putting in the center of it human privacy.   In the leadership and communications segment, Fewer CISOs feel aligned with their boards on cybersecurity this year, AI agents are here, now comes the hard part for CISOs, How to Network Better, Build Leadership Skills, and Negotiate Raises Effectively, and more!   Show Notes:  ...</description>
<pubDate>Wed, 24 Sep 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_414_1--3e9fd8c6-c690-4fba-8443-b0513845ebb7--sd-converted--1cebd34c-fa5e-4d1a-9d7b-4ea9538bfde1.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_414_1--3e9fd8c6-c690-4fba-8443-b0513845ebb7--sd-converted--1cebd34c-fa5e-4d1a-9d7b-4ea9538bfde1.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Board Priority But Lack of Access &amp; CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_413_1--e148252e-1c1d-43be-b9ce-da7a40a0426e--sd-converted--513033a0-30dd-43c6-becf-9db131da1181.mp4?dest-id=406374</link>
<description>  In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more!   Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence &amp;amp; Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click.   From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust.   Whether you're in cyber, physical security, or executive leadership...</description>
<pubDate>Wed, 17 Sep 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_413_1--e148252e-1c1d-43be-b9ce-da7a40a0426e--sd-converted--513033a0-30dd-43c6-becf-9db131da1181.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_413_1--e148252e-1c1d-43be-b9ce-da7a40a0426e--sd-converted--513033a0-30dd-43c6-becf-9db131da1181.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Danny Jenkins, Matt Muller - BSW #412</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_412_1--e6d07ca1-8bc4-4d9e-94e6-f36d1143a256--sd-converted--04205a7c-57db-4527-9a08-8c6559828fb8.mp4?dest-id=406374</link>
<description>  With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look?   Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven report provides spending benchmarks and recommendations that will help you budget for an unpredictable near term while enabling the business and mitigating the most critical risks facing your organization. If you're preparing your 2026 budgets, don't miss this interview where you'll learn where to invest, divest, and experiment.   From the buzzing floors of BlackHat 2025 in Las Vegas, CyberRisk TV brings you an exclusive sit-down with Danny Jenkins, CEO &amp;amp; Co-Founder of ThreatLocker. In this high-energy interview, host Doug White dives deep into the real-world challenges of FedRAMP compliance, the million-dollar prep lessons, and the critical importance of secu...</description>
<pubDate>Wed, 10 Sep 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_412_1--e6d07ca1-8bc4-4d9e-94e6-f36d1143a256--sd-converted--04205a7c-57db-4527-9a08-8c6559828fb8.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_412_1--e6d07ca1-8bc4-4d9e-94e6-f36d1143a256--sd-converted--04205a7c-57db-4527-9a08-8c6559828fb8.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_411_1--61a149df-dd21-41de-bb51-e1c82afd4d0f--sd-converted--ac643798-3ac4-4946-817a-83ce6961a15d.mp4?dest-id=406374</link>
<description>  The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has consolidated over the past 20 years, showing how 200 companies turned into just 11.   Then we cover our quarterly Security Money segment. The markets are on a high, but the Security Weekly 25 index dips. What's up? We'll dig into the latest earnings and news for both the public and private security markets.   Show Notes:  https://securityweekly.com/bsw-411   </description>
<pubDate>Wed, 03 Sep 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_411_1--61a149df-dd21-41de-bb51-e1c82afd4d0f--sd-converted--ac643798-3ac4-4946-817a-83ce6961a15d.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_411_1--61a149df-dd21-41de-bb51-e1c82afd4d0f--sd-converted--ac643798-3ac4-4946-817a-83ce6961a15d.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_410_1--c31ba279-500c-4e59-9e09-076dd03d25e6--sd-converted--e6b8d06d-3863-4754-8cd9-23a9bcf94b72.mp4?dest-id=406374</link>
<description>  Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider?   Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise without the costs and resource requirements of a full-time hire. Brian will share:    Current vCISO trends   What to look for in vCISO services   Who fits/doesn't fit as a vCISO    vCISOs can be an effective solution for organizations that need to enhance their security program or respond to a breach, but know what to look for. If you're in the market for vCISO services or want to become a vCISO, don't miss this interview.   In the leadership and communications segment, Boards should bear ultimate responsibility for cybersecurity, From WannaCry to AI: How CISOs Became Strategic Leaders, The Best Leaders Edit What They Say Before They Say It, and more!   Show No...</description>
<pubDate>Wed, 27 Aug 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_410_1--c31ba279-500c-4e59-9e09-076dd03d25e6--sd-converted--e6b8d06d-3863-4754-8cd9-23a9bcf94b72.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_410_1--c31ba279-500c-4e59-9e09-076dd03d25e6--sd-converted--e6b8d06d-3863-4754-8cd9-23a9bcf94b72.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_409_1--e94bcddf-1635-43ae-8eff-d58574045282--sd-converted--22a7ee2f-b17c-487d-b5ea-1d625fd64941.mp4?dest-id=406374</link>
<description>  The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?   Danny Jenkins, CEO and Founder at ThreatLocker, joins BSW to discuss why misconfigurations matter. Simply, you can prevent many cyberattacks by eliminating your misconfigurations. That's why ThreatLocker released Defense Against Configurations (DAC). Danny will discuss the benefits of DAC, including:    Immediate visibility into system misconfigurations before they become vulnerabilities   Compliance transparency, showing exactly where systems fall short of industry standards   One unified view, with filters by criticality, system, and framework   Actionable insights, updated weekly and delivered straight to customers’ inboxes    Segment Resources:     https:...</description>
<pubDate>Wed, 20 Aug 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_409_1--e94bcddf-1635-43ae-8eff-d58574045282--sd-converted--22a7ee2f-b17c-487d-b5ea-1d625fd64941.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_409_1--e94bcddf-1635-43ae-8eff-d58574045282--sd-converted--22a7ee2f-b17c-487d-b5ea-1d625fd64941.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Defending Trust &amp; Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_408_1--7cc808df-9c0b-4594-8021-3502c1daf747--sd-converted--fc862b14-83dd-4bc7-ae57-e140fa27a42d.mp4?dest-id=406374</link>
<description>  As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust?   Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including:    Impersonations and Deepfakes   Employee Scams   Financial Fraud    Segment Resources: -  https://styxintel.com/blog/what-is-brand-protection/  -  https://styxintel.com/blog/brand-impersonation-hurts-business/  -  https://styxintel.com/blog/social-engineering-tactics/    In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communic...</description>
<pubDate>Wed, 13 Aug 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_408_1--7cc808df-9c0b-4594-8021-3502c1daf747--sd-converted--fc862b14-83dd-4bc7-ae57-e140fa27a42d.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_408_1--7cc808df-9c0b-4594-8021-3502c1daf747--sd-converted--fc862b14-83dd-4bc7-ae57-e140fa27a42d.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Say Easy, Do Hard - AI Governance in the Supply Chain - Nick Mistry, Richard Bird - BSW #407</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_407_1--07aaf2af-9de4-4431-a722-4a0fa55acec6--sd-converted--34943de8-d212-4c07-9884-b8ff7a804254.mp4?dest-id=406374</link>
<description>  Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party AI component and services use comes an expanded security threat often not included in traditional supply chain management processes. It's time to update our supply chain management process to include AI governance. Easier said than done.   In this Say Easy, Do Hard segment, we invite three CISOs to discuss the challenges of AI and the supply chain, including:    Data privacy concerns   Flaws and malicious code in AI dependencies   Lack of security tools to test for AI   Vibe coding risks    and more. But we also do the hard part, by discussing the changes needed to your supply chain management process to address these concerns.   Show Notes:  https://securityweekl...</description>
<pubDate>Wed, 06 Aug 2025 09:00:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_407_1--07aaf2af-9de4-4431-a722-4a0fa55acec6--sd-converted--34943de8-d212-4c07-9884-b8ff7a804254.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_407_1--07aaf2af-9de4-4431-a722-4a0fa55acec6--sd-converted--34943de8-d212-4c07-9884-b8ff7a804254.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
<item>
<title>Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406</title>
<link>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_406_1--42f60695-3fbf-46d2-a4c5-dd2ddf1e31c3.mp4?dest-id=406374</link>
<description>  In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more!   Show Notes:   https://securityweekly.com/bsw-406   </description>
<pubDate>Wed, 30 Jul 2025 17:13:00 +0000</pubDate>
<guid>https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_406_1--42f60695-3fbf-46d2-a4c5-dd2ddf1e31c3.mp4?dest-id=406374</guid>
<enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/sswvideo/BSW_406_1--42f60695-3fbf-46d2-a4c5-dd2ddf1e31c3.mp4?dest-id=406374" type="audio/mpeg" length="1"/>
</item>
</channel>
</rss>
