Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/35/66/2a/35662a5e-8cc2-2a41-9c3b-804574f7beb8/mza_13057736488520478394.jpg/600x600bb.jpg
Breaching the Boardroom
NetGain Technologies, LLC
50 episodes
6 days ago
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Show more...
Business
RSS
All content for Breaching the Boardroom is the property of NetGain Technologies, LLC and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Show more...
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/35/66/2a/35662a5e-8cc2-2a41-9c3b-804574f7beb8/mza_13057736488520478394.jpg/600x600bb.jpg
AI Compliance: What Organizations Need to Know
Breaching the Boardroom
1 hour 4 minutes
3 months ago
AI Compliance: What Organizations Need to Know
This conversation explores the rapid advancement of AI technology, its benefits, and the significant risks associated with its use, particularly in compliance and cybersecurity. The discussion emphasizes the importance of understanding the differences between generative AI and traditional AI, the necessity of compliance with regulations, and the art of prompting to avoid data breaches. It also highlights the evolving threats posed by AI, including social engineering, ransomware, and deepfakes...
Breaching the Boardroom
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...