Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What happens when you switch audit firms? | TrustTalks - Ep 4 | Security and GRC Podcast

Switching audit firms is not just a routine decision; it’s a strategic move that can significantly impact your business’s financial health and compliance. Whether you’re dissatisfied with your current auditor’s performance, seeking specialized expertise, or looking to cut costs, making the switch can offer numerous benefits and challenges. In this podcast, we’ll explore what happens when you switch audit firms, including the steps involved, potential risks, and key considerations to ensure a smooth transition.

Privacy and confidentiality: what is the difference? | TrustTalks - Ep 3 | Security and GRC Podcast

Are you confused about the difference between privacy and confidentiality? Don’t worry, you’re not alone. While these terms are often used interchangeably, they actually have distinct meanings. In this podcast, we will explore the nuances of privacy and confidentiality, helping you understand their significance and how they relate to each other. Privacy refers to the right to maintain control over your personal information. It involves the ability to keep certain details about your life, preferences, and activities private and secure.

Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF | TrustTalks - Ep 2

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces risks related to privacy, bias, and security, prompting organizations to seek robust frameworks to manage these concerns. In response to this surge in AI adoption, national and international bodies have been developing guidelines to help companies navigate these challenges.

What are the consequences of losing Active Directory (AD)?

Did you know that 54% of breaches result from stolen or hacked credentials, according to DHS and CISA? Active Directory (AD) is a prime target for attackers, and compromising it can lead to catastrophic consequences for any organization. In this video, we dive into: Why AD is a prime target: Once compromised, attackers gain "the keys to the kingdom" and access to your entire enterprise. The hidden threat: Attackers can remain undetected in your network for up to 10 days, extracting sensitive information. On average, a data breach costs an organization around $4.4 million.

Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe

As AI reshapes cybersecurity threats, understanding how scams are evolving has never been more critical. Welcome to Razorwire. I'm Jim, and today I'm talking with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt. We'll explore how AI is transforming cybersecurity threats and what that means for protecting ourselves and our organisations.

Random but Memorable - Episode 14.0: Retired Granny Scam Award with Frank Li

Are the world's most popular websites using outdated password policies? We invite security researcher, Frank Li to the show to walk us through the largest study of its kind, and share how his team built a first-of-its-kind automated tool to assess existing password policies. Join us, as we discuss what can be done to improve password habits and the authentication experience.