CISO Insights: Voices in Cybersecurity

Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an ever-evolving field. Whether you’re in the boardroom or on the front lines of defense, tune in for actionable strategies and thought leadership designed to enhance your cybersecurity program. Shop @ https://www.cisomarketplace.com || News @ https://threatwatch.news || Podcast @ https://cisoinsights.show
Episodes
Episodes



Thursday Mar 06, 2025
2024 Cyber Underworld: Recorded Future Unpacking Malicious Infrastructure
Thursday Mar 06, 2025
Thursday Mar 06, 2025
This episode dives into the key findings of Recorded Future's 2024 Malicious Infrastructure Report, revealing the dominant malware families like LummaC2 and AsyncRAT, the continued reign of Cobalt Strike, and the evolving tactics of threat actors, including the abuse of legitimate internet services and relay networks. We'll explore the top threats, targeted regions, and the resilience of cybercriminals in the face of law enforcement efforts, providing crucial insights for defenders navigating today's complex threat landscape.
www.breached.company/unpacking-the-2024-cyber-underworld-a-technical-deep-dive-into-malicious-infrastructure



Wednesday Mar 05, 2025
ThreatDown's 2025 Malware State: Autonomous AI and the Rise of Dark Horse Ransomware
Wednesday Mar 05, 2025
Wednesday Mar 05, 2025
Delve into the key findings of ThreatDown's 2025 State of Malware report, exploring the anticipated impact of agentic AI on cybercrime and the evolving ransomware landscape, including the emergence of smaller, more agile "dark horse" groups. We'll discuss how cybercriminals are leveraging AI to scale attacks and the shift towards Living Off The Land (LOTL) tactics for stealthier operations. We also examine the increasing threats from macOS stealers and sophisticated Android phishing malware, providing crucial insights into the challenges and defenses shaping the threat landscape in 2025.
www.breached.company/decoding-the-2025-malware-landscape-a-technical-deep-dive



Tuesday Mar 04, 2025
Greynoise Legacy Exploits & Zero-Days: Mass Internet Attacks in 2024
Tuesday Mar 04, 2025
Tuesday Mar 04, 2025
Dive into the key findings of the Greynoise 2025 Mass Internet Exploitation Report. We dissect how attackers are reviving old vulnerabilities, the impact of home router exploits, and the speed at which new vulnerabilities are weaponized. Discover actionable defense strategies for staying ahead of mass internet exploitation.
breached.company/mass-internet-exploitation-in-2024-a-technical-overview



Monday Mar 03, 2025
OT/ICS Cybersecurity: Defending Against Evolving Threats
Monday Mar 03, 2025
Monday Mar 03, 2025
A deep dive into the latest trends, threat actors, and defense strategies in Operational Technology and Industrial Control Systems cybersecurity. We discuss how geopolitical tensions, ransomware, and hacktivist activities are shaping the threat landscape, and provide actionable insights to improve your organization's security posture. Learn about implementing the SANS ICS 5 Critical Controls, vulnerability management, incident response, and more to protect your critical infrastructure.
breached.company/technical-brief-strengthening-ot-ics-cybersecurity-in-2024-and-beyond



Sunday Mar 02, 2025
Enterprising Adversaries: Staying Ahead of Evolving Cyber Threats
Sunday Mar 02, 2025
Sunday Mar 02, 2025
Explore the evolving landscape of cyber threats with insights from the CrowdStrike 2025 Global Threat Report. We delve into the tactics, techniques, and procedures of modern adversaries, from social engineering and AI-driven attacks to cloud exploitation and vulnerability exploits. Learn how to proactively defend your organization against these ever-changing threats and stay one step ahead of enterprising adversaries.
breached.company/technical-brief-evolving-threat-actor-tactics-in-2025



Saturday Mar 01, 2025
CERT-EU Unveiling the 2024 Cyber Threat Landscape: Key Trends and Targeted Sectors
Saturday Mar 01, 2025
Saturday Mar 01, 2025
This episode dissects the cyber threat landscape of 2024, drawing insights from a comprehensive analysis of malicious activities targeting Union entities and their vicinity. We explore the major trends, including the rise of cyber espionage and prepositioning the exploitation of zero-day vulnerabilities, and the techniques employed by threat actors. The discussion highlights the most targeted sectors, such as defense, transportation, and technology, and emphasizes the critical role of service providers as prime targets. We also delve into the global events that shaped the threat landscape, such as elections and conflict.
breached.company/deep-dive-analyzing-the-2024-cyber-threat-landscape-and-emerging-attack-vectors



Friday Feb 28, 2025
Black Basta: Inside the Ransomware Gang
Friday Feb 28, 2025
Friday Feb 28, 2025
Explore the inner workings of the Black Basta ransomware group through leaked chat logs and technical analysis. Discover their tactics, techniques, and procedures (TTPs), from initial access and lateral movement to data exfiltration and encryption. Learn how the group exploited vulnerabilities, managed internal conflicts, and targeted critical infrastructure. Gain insights into defending against ransomware attacks with actionable intelligence and mitigation strategies derived from real-world incidents and expert analysis.
https://breached.company/stopransomware-black-basta



Thursday Feb 27, 2025
Navigating Vietnam's Data Law: Key Compliance for Businesses
Thursday Feb 27, 2025
Thursday Feb 27, 2025
This podcast episode explores Vietnam's new Law on Data, effective July 1, 2025, and its implications for businesses. We'll break down the law's key aspects, including scope of application, digital data definitions, data ownership rights, regulations on cross-border data transfers (especially for "important" and "core" data), and the requirements for mandatory risk assessments. We also discuss data-related products and services, the establishment of the National General Database and National Data Centre, and practical steps businesses can take to ensure compliance and mitigate risks in Vietnam's evolving digital landscape.
www.compliancehub.wiki/vietnams-law-on-data-key-provisions-and-implications

Welcome to CISO Insights: Voices in Cybersecurity
Welcome to CISO Insights, where we bring critical cybersecurity discussions straight to your ears. This podcast is designed specifically for CISOs and cybersecurity professionals who want to stay ahead in the ever-changing digital landscape. Each episode dives into real-world challenges, emerging trends, and practical strategies, offering expert insights to help you safeguard your organization. Tune in for actionable advice, expert interviews, and deep dives into the topics that matter most. Whether you're navigating compliance, tackling data breaches, or exploring the future of cybersecurity, CISO Insights is your go-to resource. Stay informed, stay secure—hit play now!