{"id":84958,"date":"2026-04-20T12:22:28","date_gmt":"2026-04-20T12:22:28","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?page_id=84958"},"modified":"2026-04-20T13:25:46","modified_gmt":"2026-04-20T13:25:46","slug":"cybersecurity-podcast","status":"publish","type":"page","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/","title":{"rendered":"Cybersecurity Podcast"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"84958\" class=\"elementor elementor-84958\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-618b683 elementor-section-full_width elementor-section-height-min-height elementor-section-stretched elementor-section-height-default elementor-section-items-middle\" data-id=\"618b683\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6459250\" data-id=\"6459250\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1011d6 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"d1011d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Podcast<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b05bda elementor-widget elementor-widget-spacer\" data-id=\"7b05bda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1e34ac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d1e34ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f653bf2\" data-id=\"f653bf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6986495 elementor-widget elementor-widget-spacer\" data-id=\"6986495\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-91c2806 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"91c2806\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ebbcb33\" data-id=\"ebbcb33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-751f9f2 img-align-mobile-top icon-box-vertical-align-top img-align-left image-vertical-align-start preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts\" data-id=\"751f9f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-elements-simple-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-751f9f2 widget-divider-on\" data-post-limit=\"-1\" data-pagination-mode=\"standard\" data-scroll-offset=\"\">\t\t\t<div class=\"dt-css-grid custom-pagination-handler\" data-columns=\"{&quot;d&quot;:1,&quot;t&quot;:1,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84450 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-business-of-ransomware-how-modern-attacks-are-planned-and-negotiated\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"997\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201920%20997&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1920px) 100vw, 1920px\" style=\"--ratio: 1920 \/ 997;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14.png 1920w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14-300x156.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14-1024x532.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14-768x399.png 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/image-14-1536x798.png 1536w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-business-of-ransomware-how-modern-attacks-are-planned-and-negotiated\/\" rel=\"bookmark\" title=\"The Business of Ransomware: How Modern Attacks Are Planned and Negotiated\" class=\"post-title\">The Business of Ransomware: How Modern Attacks Are Planned and Negotiated<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-02-24T13:50:30+00:00\">February 24, 2026<\/time><\/span><\/div><p class=\"short-description\">The Business of Ransomware: How Modern Attacks Are Planned and Negotiated Ransomware has outgrown the stereotype of lone hackers operating from basements. Today, ransomware is&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-business-of-ransomware-how-modern-attacks-are-planned-and-negotiated\/\" target=\"\" aria-label=\"Read more about The Business of Ransomware: How Modern Attacks Are Planned and Negotiated\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84364 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/business-first-application-security-what-modern-organizations-must-get-right\/\"><img decoding=\"async\" width=\"800\" height=\"415\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20800%20415&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" style=\"--ratio: 800 \/ 415;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/abhay-1.jpeg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/abhay-1.jpeg 800w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/abhay-1-300x156.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/abhay-1-768x398.jpeg 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/business-first-application-security-what-modern-organizations-must-get-right\/\" rel=\"bookmark\" title=\"Business-First Application Security: What Modern Organizations Must Get Right\" class=\"post-title\">Business-First Application Security: What Modern Organizations Must Get Right<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-02-06T10:25:39+00:00\">February 6, 2026<\/time><\/span><\/div><p class=\"short-description\">Business-First Application Security: What Modern Organizations Must Get Right In this episode of the Cybersecurity Podcast by EC-Council, host Jay Bavisi speaks with Abhay Bhargav,&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/business-first-application-security-what-modern-organizations-must-get-right\/\" target=\"\" aria-label=\"Read more about Business-First Application Security: What Modern Organizations Must Get Right\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84263 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/\"><img decoding=\"async\" width=\"800\" height=\"415\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20800%20415&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" style=\"--ratio: 800 \/ 415;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak.jpeg 800w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak-300x156.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dale-Hoak-768x398.jpeg 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/\" rel=\"bookmark\" title=\"AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak\" class=\"post-title\">AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-01-29T07:10:09+00:00\">January 29, 2026<\/time><\/span><\/div><p class=\"short-description\">Securing the Future: Lessons on AI, Compliance, Supply Chain Security, and Leadership from Cybersecurity Leader Dale Hoak In this episode of the Cybersecurity Podcast by&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-new-cybersecurity-reality-conversations-with-dale-hoak\/\" target=\"\" aria-label=\"Read more about AI &amp; New Cybersecurity Reality- Conversations with Dale Hoak\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84174 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-role-of-legal-teams-in-cybersecurity-best-practices-for-effective-breach-management\/\"><img decoding=\"async\" width=\"800\" height=\"415\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20800%20415&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" style=\"--ratio: 800 \/ 415;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/img-1.jpeg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/img-1.jpeg 800w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/img-1-300x156.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/img-1-768x398.jpeg 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-role-of-legal-teams-in-cybersecurity-best-practices-for-effective-breach-management\/\" rel=\"bookmark\" title=\"The Role of Legal Teams in Cybersecurity: Best Practices for Effective Breach Management\" class=\"post-title\">The Role of Legal Teams in Cybersecurity: Best Practices for Effective Breach Management<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-01-12T11:44:35+00:00\">January 12, 2026<\/time><\/span><\/div><p class=\"short-description\">The Role of Legal Teams in Cybersecurity: Best Practices for Effective Breach Management Cyber threat incidents have become a boardroom issue, like a legal minefield,&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/the-role-of-legal-teams-in-cybersecurity-best-practices-for-effective-breach-management\/\" target=\"\" aria-label=\"Read more about The Role of Legal Teams in Cybersecurity: Best Practices for Effective Breach Management\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84168 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/\"><img decoding=\"async\" width=\"1600\" height=\"830\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201600%20830&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1600px) 100vw, 1600px\" style=\"--ratio: 1600 \/ 830;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg 1600w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson-300x156.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson-1024x531.jpeg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson-768x398.jpeg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson-1536x797.jpeg 1536w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/\" rel=\"bookmark\" title=\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\" class=\"post-title\">Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-01-12T07:26:40+00:00\">January 12, 2026<\/time><\/span><\/div><p class=\"short-description\">Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson AI\u2019s potential and its dangers for cybersecurity: Insights&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/\" target=\"\" aria-label=\"Read more about Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84090 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/cybersecurity-implants-are-augmented-humans-the-next-attack-surface\/\"><img decoding=\"async\" width=\"1600\" height=\"830\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201600%20830&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1600px) 100vw, 1600px\" style=\"--ratio: 1600 \/ 830;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len.jpeg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len.jpeg 1600w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len-300x156.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len-1024x531.jpeg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len-768x398.jpeg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/len-1536x797.jpeg 1536w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/cybersecurity-implants-are-augmented-humans-the-next-attack-surface\/\" rel=\"bookmark\" title=\"Cybersecurity Implants: Are Augmented Humans the Next Attack Surface?\" class=\"post-title\">Cybersecurity Implants: Are Augmented Humans the Next Attack Surface?<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2025-12-05T14:07:42+00:00\">December 5, 2025<\/time><\/span><\/div><p class=\"short-description\">Cybersecurity Implants: Are Augmented Humans the Next Attack Surface? Imagine sitting across from someone who can unlock a door with a flick of their wrist,&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/cybersecurity-implants-are-augmented-humans-the-next-attack-surface\/\" target=\"\" aria-label=\"Read more about Cybersecurity Implants: Are Augmented Humans the Next Attack Surface?\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84084 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/\"><img decoding=\"async\" width=\"1920\" height=\"997\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201920%20997&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"Cyber Resilience and Leadership\" sizes=\"(max-width: 1920px) 100vw, 1920px\" style=\"--ratio: 1920 \/ 997;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg 1920w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3-300x156.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3-1024x532.jpg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3-768x399.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3-1536x798.jpg 1536w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/\" rel=\"bookmark\" title=\"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0\" class=\"post-title\">Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2025-10-30T12:57:00+00:00\">October 30, 2025<\/time><\/span><\/div><p class=\"short-description\">Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure In the ever-evolving world of cybersecurity, leaders from diverse backgrounds are&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/\" target=\"\" aria-label=\"Read more about Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84079 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-in-healthcare-building-a-resilient-healthcare-system-with-ai-driven-cybersecurity\/\"><img decoding=\"async\" width=\"1920\" height=\"997\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201920%20997&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1920px) 100vw, 1920px\" style=\"--ratio: 1920 \/ 997;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2.jpg 1920w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2-300x156.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2-1024x532.jpg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2-768x399.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-2-1536x798.jpg 1536w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-in-healthcare-building-a-resilient-healthcare-system-with-ai-driven-cybersecurity\/\" rel=\"bookmark\" title=\"AI in Healthcare: Building a Resilient Healthcare System with AI-Driven Cybersecurity\" class=\"post-title\">AI in Healthcare: Building a Resilient Healthcare System with AI-Driven Cybersecurity<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2025-10-02T12:48:00+00:00\">October 2, 2025<\/time><\/span><\/div><p class=\"short-description\">AI in Healthcare: Building a Resilient Healthcare System with AI-Driven Cybersecurity Most industries, including healthcare and pharmaceuticals, are relying more and more on AI-powered tools.&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/ai-in-healthcare-building-a-resilient-healthcare-system-with-ai-driven-cybersecurity\/\" target=\"\" aria-label=\"Read more about AI in Healthcare: Building a Resilient Healthcare System with AI-Driven Cybersecurity\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84069 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-podcast\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/\"><img decoding=\"async\" width=\"600\" height=\"312\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20600%20312&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"--ratio: 600 \/ 312;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg 600w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1-300x156.jpg 300w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/\" rel=\"bookmark\" title=\"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\" class=\"post-title\">Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Cybersecurity Podcast<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2025-08-13T12:04:16+00:00\">August 13, 2025<\/time><\/span><\/div><p class=\"short-description\">Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2026 At the heart of every digital business today lies an&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/\" target=\"\" aria-label=\"Read more about Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\" class=\"box-button elementor-button elementor-size-md\">Read more  <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 440 799\" width=\"20\" height=\"36\"><style>\t\t.s0 { fill: #ffffff } \t<\/style><g><path class=\"s0\" d=\"m65.99 787.63l362.76-359.81c14.9-14.78 15-39.3 0.22-54.2l-359.82-362.76c-24.42-24.62-65.77-7.37-65.91 26.82l-2.95 722.58c-0.14 34.2 41.08 51.79 65.7 27.37z\"><\/path><\/g><\/svg><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f584acd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f584acd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20f7b57\" data-id=\"20f7b57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fc2eed elementor-widget elementor-widget-heading\" data-id=\"7fc2eed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Cybersecurity Podcast by EC-Council: Smart Insights from Top Security Minds<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b824615 elementor-widget elementor-widget-text-editor\" data-id=\"b824615\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity decisions have never carried higher stakes. The Cybersecurity Podcast by <a href=\"https:\/\/www.eccouncil.org\/\">EC-Council<\/a> is created for the professionals who have to make them. Hosted by Jay Bavisi, Group President of EC-Council\u2014a global leader in cybersecurity education\u2014the podcast features perspectives from CISOs, founders, CEOs, legal experts, ransomware negotiators, researchers, and operational leaders who have navigated real incidents, led security teams, and shaped policy at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6ee312 elementor-widget elementor-widget-text-editor\" data-id=\"c6ee312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEach episode explores how organizations assess cyber risk, respond to change, and make decisions that shape security outcomes in practice. The focus is not on commentary alone, but on the firsthand judgments, hard-won tradeoffs, and leadership considerations that influence cybersecurity across real-world environments. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2184d1d elementor-widget elementor-widget-text-editor\" data-id=\"2184d1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDesigned for professionals seeking the best cybersecurity podcast grounded in real-world experience, it delivers the insight, context, and leadership perspectives needed to make more informed decisions.   \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Podcast The Business of Ransomware: How Modern Attacks Are Planned and Negotiated Cybersecurity PodcastFebruary 24, 2026 The Business of Ransomware: How Modern Attacks Are Planned and Negotiated Ransomware has outgrown the stereotype of lone hackers operating from basements. Today, ransomware is&hellip; Read more Business-First Application Security: What Modern Organizations Must Get Right Cybersecurity PodcastFebruary&hellip;<\/p>\n","protected":false},"author":105,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"class_list":["post-84958","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Podcast | Expert Insights by EC-Council<\/title>\n<meta name=\"description\" content=\"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Podcast | Expert Insights by EC-Council\" \/>\n<meta property=\"og:description\" content=\"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T13:25:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Podcast | Expert Insights by EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/\",\"name\":\"Cybersecurity Podcast | Expert Insights by EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"datePublished\":\"2026-04-20T12:22:28+00:00\",\"dateModified\":\"2026-04-20T13:25:46+00:00\",\"description\":\"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Podcast\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Podcast | Expert Insights by EC-Council","description":"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Podcast | Expert Insights by EC-Council","og_description":"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/","og_site_name":"Cybersecurity Exchange","article_modified_time":"2026-04-20T13:25:46+00:00","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Podcast | Expert Insights by EC-Council","twitter_description":"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/","name":"Cybersecurity Podcast | Expert Insights by EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"datePublished":"2026-04-20T12:22:28+00:00","dateModified":"2026-04-20T13:25:46+00:00","description":"Listen to the best cybersecurity podcast by EC-Council. Get expert insights on AI, ransomware, ethical hacking, and evolving cyber threats. Tune in now.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Podcast"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/84958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84958"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/84958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}