logo
episode-header-image
Apr 2025
54m 49s

545: CIA Hacker to Tech Entrepreneur: Ho...

FirmsConsulting.com & StrategyTraining.com
About this episode
tail spinning
Up next
Mar 4
633: The Invincible Brain with Johns Hopkins Professor Dr. Majid Fotuhi
Dr. Majid Fotuhi, neurologist, neuroscientist, and adjunct professor at Johns Hopkins University, has spent decades studying how the brain ages and what determines whether cognitive performance declines or strengthens over time. In this discussion, he challenges one of the most w ... Show More
55m 17s
Mar 2
632: Building Healthier Workplaces Through Attuned Leadership (with Nidhi Tewari)
Nidhi Tewari, a highly sought after wellbeing and work culture speaker who applies her experience as a licensed therapist to the work world, has spent more than a decade advising high-performing leaders on burnout, trauma, communication, and work culture. In this conversation, sh ... Show More
54m 34s
Feb 25
631: How Elon Musk Thinks (with Charles Steel)
Charles Steel reflects on "more than two decades in private equity, banking," combined with "public service roles, including advising Tony Blair," and how these experiences led him to a late but powerful discovery: "the best way to really find purpose in life is to be creative, t ... Show More
52m 45s
Recommended Episodes
Jul 2024
Essential Cybersecurity Strategies
Welcome back to another episode of "Accelerate Your Business Growth." I'm your host, Diane Helbig, and today we have a critical and timely discussion lined up for you. We’re joined by Terry Ziemniak, a cybersecurity expert with over 25 years of experience ranging from technical r ... Show More
25m 1s
Sep 2025
Ransomware in the rearview.
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal ... Show More
30m 10s
Feb 2025
10,000 Days in Cybersecurity
Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ... Show More
36m 19s
Feb 2025
The Role of Cybersecurity
<p dir="ltr">In this episode of Life of a CISO, Dr. Eric Cole dives deep into a critical question every cybersecurity professional must ask themselves: What is your real role? It's easy to hide behind job titles like "CISO" or "cybersecurity professional," but understanding the t ... Show More
29m 58s
Apr 2025
When Hackers Hijack Your Factory Floor
In the future, hackers will have many new vulnerabilities to exploit, especially as industries move from legacy IT to state-of-the-art digital systems. BCG’s Vanessa Lyon looks at how cyber-attacks are likely to evolve over the next ten years, and what business leaders need to do ... Show More
29m 25s
Jan 2022
Saving the Day: Becoming a Cybersecurity Superhero
You’ve probably got a security system for your building, with locks on your doors and safes for your important documents. But criminals don’t just try to take what’s in your cash register anymore. As the world shifts increasingly online, there are more and more opportunities for ... Show More
23m 10s
Aug 2024
“Security is an Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers | PBD Podcast | Ep. 460
<p>Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing online predators, shares insights into his journey as a hacker, his motivati ... Show More
2h 4m
Jun 2021
Role of Top Management in Cybersecurity Governance
The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability ... Show More
29m 47s
Jan 2025
Hacking the bureau.
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulne ... Show More
34m 16s
Mar 2024
Safeguarding American data from foreign hands.
The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division a ... Show More
36m 44s