Friendly Fire Podcast
How to Leave a Review
To rate our podcast “5-stars” on Apple Podcasts or Podchaser please scroll to the corresponding instructions below. All other platforms do not have ratings or reviews for podcasts on their apps.
First, ensure that you are signed in by clicking the Account menu at the top of your screen and selecting your Apple ID.
Next, click the Subscribe button if you are not already subscribed.
Then scroll down and click on Write a Review.
First click on Subscribe if you have not done so already.
Then click on the Ratings and Reviews tab.
Then click Write a Review and fill out the form to leave a rating and review.
First, tap on the Rate Podcast button.
Then fill out the form and tap the Save button.
Listen on Your Platform
Theresa Payton: Security And Privacy In The World Of Insider Threats With Theresa Payton
Theresa Payton, the co-author of Privacy in the Age of Big Data, delves into security and privacy in the world of insider threats.
Tim Callahan: Is Any Fire Friendly?
Tim Callahan, the Global CISO at Aflac, dives deep into friendly fires within the cybersecurity space and how he is preventing and responding to those threats.
Insight Global: The Human-Centric Side Of Security With Jonathan Waldrop
Jonathan Waldrop, the Senior Director at Insight Global, shares how the company leverages the human element when it comes to security and dealing with threats.
Kai Roer – Awareness… Culture… Behavior… OH MY!
Kai Roer, the Author of Build a Security Culture, shares her insight into the importance and impact of security culture.
Ira Winkler: Stop Relying On The Human Firewall
Data security needs more than relying on user awareness. Ira Winkler balances criticism and promotion of security awareness to bring about effective change in data security models.
Chad Skipper: The landscape looks partly cloudy with major chances of breaches.
Protect your network from internal threats with measures discussed by Chad Skipper. Learn about cybercrime in digital transformation and multi-cloud and get tips on protecting systems before a breach.