Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A CISO's Guide to API Security

APIs are powering digital transformation but also exposing organizations to new risks. Securing them requires collaboration between CISOs, CIOs, and the board. This webinar will demystify the evolving API threat landscape, outline governance strategies, and provide leaders with the tools to communicate API risk in business terms. Key Learnings: Why You Should Attend.

IAM Principal Consultant & Head of Center of Excellence One Identity - iC Consult

iC Consult’s partnership with One Identity has gone back a long time, thanks to the comprehensive One Identity portfolio of unified IAM solutions. Join Oliver Paulzen to explore the advantages of the iC Consult-One Identity partnership and the benefits of the integrated solutions that make up the One Identity Fabric.

Give First: Shifting to an Abundance Mindset in IT with Venture Capital Legend Brad Feld

In this installment of Make Work Happen, we're joined by Brad Feld, partner at Foundry Group, to dive into the powerful "Give First" philosophy that has shaped the Boulder startup community for decades. Brad discusses his career, from starting his first company 40 years ago to co-founding Foundry Group and Techstars. We explore how core values, or cultural norms, like non-transactional, positive-sum, multi-turn relationships, can define the success of a business or a community.

EP 17 - Privilege creep and the machine identity surge: Securing the modern enterprise

The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems. Chris shares insights on the risks of unmanaged access, the impact of AI and automation on both defense and attack strategies, and practical advice for CISOs and boards on managing identity risk while enabling business transformation..

The New CISO Podcast Ep.134 - Evan Ferree | From Breach to BISO: Becoming a Security Influencer

Most security professionals know what a CISO does. But what about a BISO? And why are Fortune 500 companies increasingly creating this executive role? In this episode of The New CISO Podcast, host Steve Moore sits down with Evan Ferree, Staff Vice President and Business Information Security Officer at a Fortune 50 company, to decode one of cybersecurity's most misunderstood leadership positions. What You'll Learn.

Quantum Computing and How it Breaks RSA | Ep. 1 - Quantum Learning Series

On October 7, 2025, the Nobel Prize in Physics was awarded to John Clarke, Michel H. Devoret, and John M. Martinis for their work with superconducting circuits and Josephson junctions—experiments that proved quantum mechanics can govern entire electronic systems, not just individual particles. Their discoveries laid the foundation for today’s quantum computers. Quantum computing is now redefining what’s possible in data security. In Episode 1 of the Quantum Learning Series, we explore what quantum computing really is—and why it poses such a powerful threat to modern encryption.

Bridging the identity gap: Orchestrating IAM across teams and systems

In most organizations, identity is everyone’s responsibility, and yet no one’s accountable. Security defines the policy, but IT carries out the execution. IAM workflows span cloud and on-prem systems, multiple departments, and often rely on manual processes. The result? Delays, inconsistent access, audit gaps, and mounting operational risk.