Powered by RND
PodcastsBusinessData Security Decoded

Data Security Decoded

Rubrik
Data Security Decoded
Latest episode

Available Episodes

5 of 32
  • Scattered Spider: the Evolution of Identity-Based Ransomware
    In this episode of Data Security Decoded, join Caleb Tolin as he welcomes back Joe Hladik, Head of Rubrik Zero Labs, to explore how modern adversaries like Scattered Spider are reshaping the ransomware landscape. From double extortion schemes to identity compromise and hypervisor encryption, Joe explains why these attackers succeed where traditional defenses fail and what security leaders must do to embed resilience and recovery at the core of their strategy. • Learn how double extortion turns data theft into a two-payout playbook • Hear why identity compromise and social engineering bypass even strong defenses • Understand why breakout times as fast as 48 minutes change the response equation • Get practical ways to build resilience and recovery without reintroducing attacker backdoors
    --------  
    12:13
  • Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore the realities of Chinese state-backed cyber operations. From the fragmented nature of China’s threat actor ecosystem to its growing focus on critical infrastructure, discover how cultural, political, and economic structures shape one of the world's most strategic cyber landscapes. Whether you’re defending critical infrastructure or shaping policy, this conversation provides clarity on China’s cyber strategy and what it means for global security. • Learn why Chinese cyber operations are fragmented, not centrally controlled • Explore how cultural and political structures influence Chinese threat actors • Understand which critical infrastructure sectors are most frequently targeted and why • See how China’s 14th Five-Year Plan shaped cyber operations and what to expect from the 15th
    --------  
    28:02
  • Breaking the Intelligence-Defense Divide with Scott Scher
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn’t just technical work, it’s about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most. • Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions • Hear how Scott’s off-grid lifestyle influenced his approach to resilience and technology reliance • Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like • Get practical ways to transform raw threat data into clear, actionable defense strategies
    --------  
    24:19
  • The Geopolitical Security Playbook: When Nations Clash in Cyberspace
    In this episode of Data Security Decoded, host Caleb Tolin sits down with Dustin Droullard, a cyber threat intelligence expert and former Army intelligence analyst and cyber operations officer. They explore the growing overlap between global conflict and cybersecurity, unpacking how nation-state actors use cyber-espionage, disinformation, and digital sabotage in geopolitical conflicts. Whether you're leading cybersecurity efforts or simply navigating today’s volatile digital landscape, this conversation offers valuable insights into preparing your organization for the rising tide of cyber threats driven by global conflict. Discover how geopolitical tensions trigger cyber fallout for businesses Learn the tactics behind influence operations and digital sabotage Understand why anthropology and business skills matter in cyber careers Explore what schools are still missing in cybersecurity education
    --------  
    23:13
  • HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare
    Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.
    --------  
    20:47

More Business podcasts

About Data Security Decoded

Welcome to the Data Security Decoded podcast — your guide to navigating the complex world of data protection. Each episode breaks down key cybersecurity issues and cyber resilience strategies in clear, accessible language. We speak with business leaders and cybersecurity experts to keep you informed about the latest trends and help you future-proof your data security. Join us on this essential journey.
Podcast website

Listen to Data Security Decoded, The Diary Of A CEO with Steven Bartlett and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Data Security Decoded: Podcasts in Family

Social
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 10/14/2025 - 2:49:32 PM