The Security Strategist
When it comes to cybersecurity, every move is critical.
With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times.
“The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively.
Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.

Episodes

What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?



How Can Global Marketplaces Master Payment Security and Combat Fraud?



From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats



Why Fraud Prevention Silos Are Holding Your Business Back




Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?



Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges



Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes



Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?



The Never-Ending Chess Game in Personnel Security


Beyond The App Store: Cloud Marketplace Security


Data Backups: The Digital Safety Deposit Box


DDoS Demystified: Understanding the Threat


Is Traditional Client-Based Access Obsolete? Rethinking Internal Security



Can You Afford to Ignore Exploitability?



From Peacetime to Wartime Cloud Security: How Does Your Team Defend Against Real-Time Threats?



How to Streamline IT Operations and Enhance Security with RMM and Automation




Can You Stop an API Business Logic Attack?



The Critical Role of MDM in Safeguarding Dedicated Devices



Meeting of the Minds: State of Cybersecurity in 2025 Part II





Why Cyber Needs to Rebrand from a Boys Club


Reducing Risk with Effective Exposure Management in Enterprise Tech



The Evolving Cyber Threat Space: A Geopolitical Perspective



Diversity in Cybersecurity: A Key to Innovation


Is AI and Zero Trust the Future of Cyber Warfare?


Meeting of the Minds: State Of Cybersecurity in 2025





Navigating Cybersecurity: Insights from Jim Liddle


Unlocking the Power of APIs in AI


Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution



The Cyber Game: Simulations, Ranges, and Digital Twins



Why Tracking Your Digital Risk is a Big Deal



The Psychology of Security: Empowering People to Protect



How do Hackers Collect Intelligence on their Victims?



Courage & Resilience: Bringing FBI Grit to Cybersecurity



Ransom-Repeat: How to Stop Funding Your Favorite Hackers!



The Innovation Paradox: Security and Productivity in a Regulatory World




Hackers: Heroes vs Villains – The Code Wars



Identity - a Quick Win in your Zero Trust Roadmap



Infiltration Insights: Red Team Operations



AI and Data Security: How to Protect What’s Powering the Future



Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys



Neural Networks at Risk: AI and Cyber Threats



Authenticating Users with Traditional SSO is Not Enough



SCION: The Future of Critical Infrastructure Defence



How is Proactive CDR Revolutionising Cloud Security



Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management



Cutting Through the Noise: Redefining Detection and Response With Secureworks



What Would 1% Do to Your Business: ML for Optimal Security Strategies - Kount



Rethinking Security in the Age of Zero Trust - ManageEngine



Zero Trust Security: Mastering the Weakest Link



Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security



Cybersecurity Automation: Cutting Through the Manual Clutter



Understanding PCI DSS 4.0, NIS2, and DORA Compliance



Improv: a Secret Weapon Against Cyber Threats



Why the Cybersecurity Industry Needs Podcasts


The Next Phase of Cybersecurity

Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC



Preventing Account Takeovers in Cloud Applications



Guardz: Empower MSPs to Secure & Insure Small Businesses



Trends and Threats: Rapid7's 2024 Cybersecurity Findings



Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives



Tackling SOC Analyst Burnout



Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI



Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation



Palo Alto Networks: The State of SOC Platformization



HID Global: Leading Through Challenges of Hospital Worker Violence




The Role of Generative AI in Red Canary's Security Evolution



Cyera: The Future of Data Security in the Age of Artificial Intelligence



Beyond the Firewall: How Censornet Secures the Modern Enterprise



Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation



Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices




Radware: Why You Need Advanced Threat Intelligence



Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO



Pentera: Automated Security Validation and Empowering Pen Testing Teams



Zero Networks: The Problem with VPNs



Palo Alto Networks: The Role of Automation in Rapid Breach Response



Thoropass: Fixing the Broken Audit Process



CloudSEK: The Future of Software Supply Chain Security



Radware: Moving From Responsive Protection to Proactive Protection



Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation



Radware: 360 Application Protection and Why Companies Need It



Huntress: Doing More With Less in Your Cybersecurity Strategy



Savvy: SaaS Identity Discovery and Visibility



Cyera: Why Data Defence is so Difficult in the TikTok Era



Zero Networks: We’re Sick of Zero Trust Too!



Blumira: Choosing the Right XDR Strategy In The Financial Industry



Huntress: The Future of Cybersecurity Leadership



Cyera: Revolutionising Data Security for the Cloud Era



CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence



TrustArc: The Evolution of Privacy Laws



Salvador Technologies: The Art of Cyber Attack Recovery



Red Sift: Brand Protection is Key for Your Security Strategy



ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity



Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success



Rapid7: Scaling Cybersecurity Into a Business Process



BlackFog: DLP is Dead - Long Live Data Exfiltration!



HID Global: Physical Identity Challenges in the Healthcare Industry




TrustArc: Effectively Managing Third-Party Risk



Blumira: Difficulties SMEs Face with Cybersecurity



Radware: Understanding Supply Chain Attacks and Client Side Protection



Honeycomb: Measuring the Success of an Incident Response Program



Keyfactor: Why You Need to Care About Machine Identity



Radware: Bot Mitigation is Key for Application Protection



Egnyte: Keeping Up With The Next Generation of Data Privacy



Beyond Identity: Software Supply Chain Attacks and the Best Defence



Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust



Omada: The Pitfalls of IGA Deployments



HID Global: Why Authentication is Still Such an Issue


Sign up for the EM360Tech Newsletter
Get the latest insights, analysis and tech news delivered straight to your inbox
Recommended for you
