The Security Strategist
When it comes to cybersecurity, every move is critical.
With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times.
“The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively.
Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.
Episodes
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
How Can Global Marketplaces Master Payment Security and Combat Fraud?
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
Why Fraud Prevention Silos Are Holding Your Business Back
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
The Never-Ending Chess Game in Personnel Security
Beyond The App Store: Cloud Marketplace Security
Data Backups: The Digital Safety Deposit Box
DDoS Demystified: Understanding the Threat
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
Can You Afford to Ignore Exploitability?
From Peacetime to Wartime Cloud Security: How Does Your Team Defend Against Real-Time Threats?
How to Streamline IT Operations and Enhance Security with RMM and Automation
Can You Stop an API Business Logic Attack?
The Critical Role of MDM in Safeguarding Dedicated Devices
Meeting of the Minds: State of Cybersecurity in 2025 Part II
Why Cyber Needs to Rebrand from a Boys Club
Reducing Risk with Effective Exposure Management in Enterprise Tech
The Evolving Cyber Threat Space: A Geopolitical Perspective
Diversity in Cybersecurity: A Key to Innovation
Is AI and Zero Trust the Future of Cyber Warfare?
Meeting of the Minds: State Of Cybersecurity in 2025
Navigating Cybersecurity: Insights from Jim Liddle
Unlocking the Power of APIs in AI
Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution
The Cyber Game: Simulations, Ranges, and Digital Twins
Why Tracking Your Digital Risk is a Big Deal
The Psychology of Security: Empowering People to Protect
How do Hackers Collect Intelligence on their Victims?
Courage & Resilience: Bringing FBI Grit to Cybersecurity
Ransom-Repeat: How to Stop Funding Your Favorite Hackers!
The Innovation Paradox: Security and Productivity in a Regulatory World
Hackers: Heroes vs Villains – The Code Wars
Identity - a Quick Win in your Zero Trust Roadmap
Infiltration Insights: Red Team Operations
AI and Data Security: How to Protect What’s Powering the Future
Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys
Neural Networks at Risk: AI and Cyber Threats
Authenticating Users with Traditional SSO is Not Enough
SCION: The Future of Critical Infrastructure Defence
How is Proactive CDR Revolutionising Cloud Security
Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management
Cutting Through the Noise: Redefining Detection and Response With Secureworks
What Would 1% Do to Your Business: ML for Optimal Security Strategies - Kount
Rethinking Security in the Age of Zero Trust - ManageEngine
Zero Trust Security: Mastering the Weakest Link
Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security
Cybersecurity Automation: Cutting Through the Manual Clutter
Understanding PCI DSS 4.0, NIS2, and DORA Compliance
Improv: a Secret Weapon Against Cyber Threats
Why the Cybersecurity Industry Needs Podcasts
The Next Phase of Cybersecurity
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
Preventing Account Takeovers in Cloud Applications
Guardz: Empower MSPs to Secure & Insure Small Businesses
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
Tackling SOC Analyst Burnout
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
Palo Alto Networks: The State of SOC Platformization
HID Global: Leading Through Challenges of Hospital Worker Violence
The Role of Generative AI in Red Canary's Security Evolution
Cyera: The Future of Data Security in the Age of Artificial Intelligence
Beyond the Firewall: How Censornet Secures the Modern Enterprise
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices
Radware: Why You Need Advanced Threat Intelligence
Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO
Pentera: Automated Security Validation and Empowering Pen Testing Teams
Zero Networks: The Problem with VPNs
Palo Alto Networks: The Role of Automation in Rapid Breach Response
Thoropass: Fixing the Broken Audit Process
CloudSEK: The Future of Software Supply Chain Security
Radware: Moving From Responsive Protection to Proactive Protection
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Radware: 360 Application Protection and Why Companies Need It
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Cyera: Why Data Defence is so Difficult in the TikTok Era
Zero Networks: We’re Sick of Zero Trust Too!
Blumira: Choosing the Right XDR Strategy In The Financial Industry
Huntress: The Future of Cybersecurity Leadership
Cyera: Revolutionising Data Security for the Cloud Era
CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence
TrustArc: The Evolution of Privacy Laws
Salvador Technologies: The Art of Cyber Attack Recovery
Red Sift: Brand Protection is Key for Your Security Strategy
ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity
Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success
Rapid7: Scaling Cybersecurity Into a Business Process
BlackFog: DLP is Dead - Long Live Data Exfiltration!
HID Global: Physical Identity Challenges in the Healthcare Industry
TrustArc: Effectively Managing Third-Party Risk
Blumira: Difficulties SMEs Face with Cybersecurity
Radware: Understanding Supply Chain Attacks and Client Side Protection
Honeycomb: Measuring the Success of an Incident Response Program
Keyfactor: Why You Need to Care About Machine Identity
Radware: Bot Mitigation is Key for Application Protection
Egnyte: Keeping Up With The Next Generation of Data Privacy
Beyond Identity: Software Supply Chain Attacks and the Best Defence
Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust
Omada: The Pitfalls of IGA Deployments
HID Global: Why Authentication is Still Such an Issue
Sign up for the EM360Tech Newsletter
Get the latest insights, analysis and tech news delivered straight to your inbox