Subscribe
Sign in
Home
Podcast
Notes
Chat
Archive
Leaderboard
About
Latest
Top
Discussions
Demystifying Digital Risk: A Holistic Guide to Enterprise Cybersecurity Assessment
Master cybersecurity maturity. Explore our multi-layered security assessment covering NIST CSF, CIS Controls, Zero Trust, IAM, vulnerability management…
Sep 22
•
Christophe Foulon
The Scalable Security Playbook: A CISO & CIO Partnership Guide
Discover how to test, refine, and replicate a standardized set of security controls for a resilient, enterprise-wide defense.
Sep 18
•
Christophe Foulon
1
Your Cybersecurity Career Blueprint: Expert Advice from Motti Tal
Listen now | Feeling stuck trying to break into cybersecurity? Learn the exact steps to go from beginner to pro with insider advice on building your…
Sep 12
•
Christophe Foulon
31:12
Beyond the Bank Account: Phishing as a Tool for Espionage
Why Impersonation is a Powerful Tool for State-Sponsored Espionage
Sep 12
•
Christophe Foulon
2
Navigating the Future of Cybersecurity: Insights from William (Bill) Welser IV
Discover what lies ahead in cybersecurity with technology expert Bill Welser IV. Gain insights into AI's influence, key skills needed, and ways to…
Sep 5
•
Christophe Foulon
38:02
Cybersecurity Entrepreneurship: Real-World Advice from Serial Founder Sinan Eren
In this episode of "Breaking into Cybersecurity," we sat down with Sinan Eren, a seasoned cybersecurity professional, entrepreneur, and founder. Sinan’s…
Sep 3
•
Christophe Foulon
and
Sinan Eren
1
50:43
How to Build a Security Culture with Data-Driven Reporting
Foster a true security-first culture by mastering effective cloud security reporting. Learn to translate technical risk into business impact for…
Sep 1
•
Christophe Foulon
2
August 2025
Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program
Measure, Monitor, and Mature Your Program with Actionable Metrics: Use data-driven KPIs to track progress, demonstrate value, and guide continuous…
Aug 25
•
Christophe Foulon
1
Perk of being a paid subscriber, a chat discuss challenges and opportunities!
A private space for us to converse and connect
Aug 23
•
Christophe Foulon
1
The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack
Unmasking the "low and slow" identity attacks where threat actors lie in wait within your cloud accounts, and how to fight back before they strike.
Aug 20
•
Christophe Foulon
2
Data-Centric Security: Protect Your Cloud Data with Microsoft Defender
Leverage Defender for Cloud and Microsoft Purview to discover sensitive data, analyze attack paths, and focus your remediation efforts on the risks that…
Aug 18
•
Christophe Foulon
The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration
🚀 Transform Your Cybersecurity Approach! 🚀Join me on a journey through "The Phantom Workforce," where I delve into combating state-sponsored IT…
Aug 13
•
Christophe Foulon
2
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts