Powered by RND
PodcastsEconomía y empresaData Security Decoded

Data Security Decoded

Rubrik
Data Security Decoded
Último episodio

Episodios disponibles

5 de 31
  • Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore the realities of Chinese state-backed cyber operations. From the fragmented nature of China’s threat actor ecosystem to its growing focus on critical infrastructure, discover how cultural, political, and economic structures shape one of the world's most strategic cyber landscapes. Whether you’re defending critical infrastructure or shaping policy, this conversation provides clarity on China’s cyber strategy and what it means for global security. • Learn why Chinese cyber operations are fragmented, not centrally controlled • Explore how cultural and political structures influence Chinese threat actors • Understand which critical infrastructure sectors are most frequently targeted and why • See how China’s 14th Five-Year Plan shaped cyber operations and what to expect from the 15th
    --------  
    28:02
  • Breaking the Intelligence-Defense Divide with Scott Scher
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn’t just technical work, it’s about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most. • Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions • Hear how Scott’s off-grid lifestyle influenced his approach to resilience and technology reliance • Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like • Get practical ways to transform raw threat data into clear, actionable defense strategies
    --------  
    24:19
  • The Geopolitical Security Playbook: When Nations Clash in Cyberspace
    In this episode of Data Security Decoded, host Caleb Tolin sits down with Dustin Droullard, a cyber threat intelligence expert and former Army intelligence analyst and cyber operations officer. They explore the growing overlap between global conflict and cybersecurity, unpacking how nation-state actors use cyber-espionage, disinformation, and digital sabotage in geopolitical conflicts. Whether you're leading cybersecurity efforts or simply navigating today’s volatile digital landscape, this conversation offers valuable insights into preparing your organization for the rising tide of cyber threats driven by global conflict. Discover how geopolitical tensions trigger cyber fallout for businesses Learn the tactics behind influence operations and digital sabotage Understand why anthropology and business skills matter in cyber careers Explore what schools are still missing in cybersecurity education
    --------  
    23:13
  • HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare
    Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.
    --------  
    20:47
  • Securing the Software Supply Chain
    In this episode of Data Security Decoded, Allison Wikoff, a 20-year cybersecurity veteran and threat intelligence expert, cuts through the noise and identifies some unique threats within today's security landscape. From the surprising shift toward exploiting old vulnerabilities to the reality of AI-powered attacks, discover why the fundamentals of cybersecurity matter more than ever. Whether you're a CISO navigating supply chain risks or a security analyst trying to separate hype from reality, this episode delivers practical intelligence from someone who tracks threats for a living. • Understand why known vulnerabilities have become the dominant attack vector (even for criminal groups) • Learn to identify and manage third-party risks before they become ransomware nightmares • Discover the truth about AI attacks and why they're not as revolutionary as headlines suggest • Get actionable steps to strengthen your security posture without massive budget increases
    --------  
    15:37

Más podcasts de Economía y empresa

Acerca de Data Security Decoded

Welcome to the Data Security Decoded podcast — your guide to navigating the complex world of data protection. Each episode breaks down key cybersecurity issues and cyber resilience strategies in clear, accessible language. We speak with business leaders and cybersecurity experts to keep you informed about the latest trends and help you future-proof your data security. Join us on this essential journey.
Sitio web del podcast

Escucha Data Security Decoded, Oso Trava Podcast y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Data Security Decoded: Podcasts del grupo

Aplicaciones
Redes sociales
v7.23.3 | © 2007-2025 radio.de GmbH
Generated: 8/29/2025 - 1:26:32 PM