Artwork

المحتوى المقدم من Mission. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mission أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

3 Biggest Cybersecurity Threats & What IT Leaders Need To Know

36:04
 
مشاركة
 

Manage episode 508351395 series 2943647
المحتوى المقدم من Mission. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mission أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield.

In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025.

From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what’s really happening behind the scenes of today’s most dangerous attacks.

With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it’s no longer a matter of “if” but “when.”

Don’t miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it’s too late.

Key Moments:

00:00: Lacey Peace Interviews Chris Brandt

04:45 Cyber Extortion and Ransomware

08:17 Supply Chain Attacks

18:20 Creating an Isolated Recovery Environment

20:08 Threat Number Two: IT Worker Attacks

22:14 The Rise of Phishing Attacks

27:26 The Evolution of Social Engineering

30:19 The Role of AI in Cybersecurity

33:01 Challenges in Reporting Cyber Incidents

33:46 The Complexity of Cyber Incident Recovery

34:45 The Role of Governments in Cybersecurity

--

This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.

That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.
---

Mission.org is a media studio producing content alongside world-class clients. Learn more at

mission.org

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

502 حلقات

Artwork
iconمشاركة
 
Manage episode 508351395 series 2943647
المحتوى المقدم من Mission. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Mission أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield.

In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025.

From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what’s really happening behind the scenes of today’s most dangerous attacks.

With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it’s no longer a matter of “if” but “when.”

Don’t miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it’s too late.

Key Moments:

00:00: Lacey Peace Interviews Chris Brandt

04:45 Cyber Extortion and Ransomware

08:17 Supply Chain Attacks

18:20 Creating an Isolated Recovery Environment

20:08 Threat Number Two: IT Worker Attacks

22:14 The Rise of Phishing Attacks

27:26 The Evolution of Social Engineering

30:19 The Role of AI in Cybersecurity

33:01 Challenges in Reporting Cyber Incidents

33:46 The Complexity of Cyber Incident Recovery

34:45 The Role of Governments in Cybersecurity

--

This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.

That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.
---

Mission.org is a media studio producing content alongside world-class clients. Learn more at

mission.org

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

502 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل