This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Task Force 7 Cyber Security Radio

By George Rettas

Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more about cyber security and new threats affecting the social, political, business, and economic concerns of our world. We explore a wide range of controversial issues that you won’t want to miss each week. Task Force 7 Radio is broadcast live every Monday at 8 PM Eastern Time, 5 PM Pacific Time, on the VoiceAmerica Business Channel.

  1. 1.
    Ep. 76: Hear What Keeps This CISO Up At Night03/18/2019
    1:04:50
  2. 2.
    Encore: The Cyber Conundrum: How Do We Fix Cyber Security?03/12/2019
    52:13
  3. 3.
    Ep. 75: Why Is The NIST Framework Important03/11/2019
    1:03:38
  4. 4.
    Ep. 74: What's Going On At RSA This Week03/04/2019
    1:13:12
  5. 5.
    Ep. 73: Will Huawei Take Down the Five Eye Alliance?02/25/2019
    1:14:16
  6. 6.
    Ep. 72: Where Did All The Stolen Equifax Data Go?02/18/2019
    1:09:52
  7. 7.
    Encore: What is the Future of Bug Bounties?02/14/2019
    56:00
  8. 8.
    Ep. 71: A Crypto Boss Dies With The Keys to 190 Million02/11/2019
    1:06:01
  1. 9.
    Ep. 70: EU Countries Are Clamping Down on U.S. Big Tech02/04/2019
    1:04:17
  2. 10.
    Ep. 69: The IFSEC 2 Global Cyber Security Influencer for 201801/28/2019
    56:12
  3. 11.
    Encore: Why Can't Organizations Patch Their Networks?01/23/2019
    57:12
  4. 12.
    Ep. 68: The Convergence of Politics and Cyber Security01/21/2019
    1:08:50
  5. 13.
    Ep. 67: A Recap of the Year in Data Security and Privacy 201801/14/2019
    1:02:16
  6. 14.
    Ep. 66: How to Build a Third Party Risk Management Program01/07/2019
    1:12:30
  7. 15.
    Ep. 65: What Cyber Security Skills Are Most In Demand12/31/2018
    1:15:34
  8. 16.
    Encore: Ep. 38: How a Unified Governance Model Facilitates Innovation12/26/2018
    1:08:21
  9. 17.
    Ep. 64: How to Build a Cyber Threat Intelligence Program12/24/2018
    1:07:58
  10. 18.
    Ep. 63: How to Turn Intelligence into a Risk Based Discussion12/17/2018
    1:03:08
  11. 19.
    Ep. 62: What CISO's are Sharing With Their Boards12/10/2018
    59:09
  12. 20.
    Ep. 61: TF7 EXTRA: The Quora Breach12/08/2018
    12:40
  13. 21.
    Ep. 60: Cyber Threats in The Era of the Unprecedented12/03/2018
    57:01
  14. 22.
    Ep. 59: TF7 EXTRA - The Marriott Breach12/02/2018
    23:14
  15. 23.
    Ep. 58: Advice and Guidance From the First Ever CISO11/26/2018
    1:21:53
  16. 24.
    Ep. 57: Do Our Adversaries Have The Advantage?11/19/2018
    55:45
  17. 25.
    Ep. 56: A Cyber Security View From a World Class CISO11/12/2018
    1:10:55
  18. 26.
    Ep. 55: Why Digital Resilience Is The Answer11/05/2018
    1:04:04
  19. 27.
    Ep. 54: How SOAR Technologies Force Multiply Your IR Assets10/29/2018
    46:33
  20. 28.
    Ep. 53: The Nexus Between Cyber Crime and Emerging Global Threats10/22/2018
    1:03:17
  21. 29.
    Ep. 52: Expert Advice From An Experienced CISO10/15/2018
    59:24
  22. 30.
    Ep. 51: How to Get a Cyber Security Job10/08/2018
    1:06:24
  23. 31.
    Ep. 50: All Things Cyber Security10/01/2018
    1:04:32
  24. 32.
    Ep. 49: The Importance of a Robust Cyber Intelligence Program09/24/2018
    1:15:47
  25. 33.
    Ep: 48: How Policing of Cyber Crimes Differs Around the World09/17/2018
    1:16:04
  26. 34.
    Ep. 47: Facebook Isn't Replacing Their CSO - Will Others Follow?09/10/2018
    1:21:56
  27. 35.
    Ep. 46: The Role of Identity Verification in Cyber Security08/27/2018
    1:09:07
  28. 36.
    Ep. 45: How To Attract More Women Into Cyber Security08/20/2018
    1:02:00
  29. 37.
    Ep. 44: The Top Cyber Security Threats Firms Face Today08/13/2018
    59:22
  30. 38.
    Ep. 43: Get Ready for the California Consumer Privacy Act08/06/2018
    56:28
  31. 39.
    Ep. 42: The World of Crime and Cryptocurrencies07/30/2018
    1:13:34
  32. 40.
    Ep. 41: Which Cyber Security Startups Will Survive?07/23/2018
    1:12:23
  33. 41.
    Ep. 40: Managing Third Party Cyber Risk Assessments07/16/2018
    1:05:55
  34. 42.
    Ep. 39: How To Solve The Biggest Challenges Around Data Security07/09/2018
    1:03:48
  35. 43.
    Ep. 38: How a Unified Governance Model Facilitates Innovation07/02/2018
    1:08:21
  36. 44.
    Ep. 37: The Role Risk Management Plays in Cyber Security06/25/2018
    1:05:37
  37. 45.
    Ep. 36: How Cyber Security Can Enable Digital Transformation06/18/2018
    1:04:49
  38. 46.
    Ep. 35: The Collision of Cyber Security and Insurance06/11/2018
    1:07:36
  39. 47.
    Ep. 34: Why You Should Automate Your Incident Response Operation06/04/2018
    1:05:57
  40. 48.
    Encore: An Analysis of the Congressional Hearings into the Equifax Breach05/28/2018
    59:09
  41. 49.
    Ep. 33: Will Encryption Soon Be Useless?05/21/2018
    53:20
  42. 50.
    Ep. 32: Who Says We Can't Measure Risk in Cyber Security!05/14/2018
    59:23
  43. 51.
    Ep. 31: What Types of Data Are Subject To GDPR?05/07/2018
    55:23
  44. 52.
    Ep. 30: How Do Organizations Mitigate the Insider Threat?04/30/2018
    1:02:09
  45. 53.
    Ep. 29: Why is Aleksandr Kogan Being Singled Out?04/23/2018
    1:05:04
  46. 54.
    Ep. 28: Did Facebook Violate Their 2011 FTC Consent Decree?04/16/2018
    59:16
  47. 55.
    Ep. 27: Getting Security Right At The Design Phase04/09/2018
    57:42
  48. 56.
    Why Can't Organizations Patch Their Networks?04/02/2018
    57:12
  49. 57.
    The Cyber Conundrum: How Do We Fix Cyber Security?03/26/2018
    52:13
  50. 58.
    Is Blockchain Technology Going to Change the World?03/19/2018
    51:39
  51. 59.
    The Front Lines: The Cyber Battle Between Good and Evil03/12/2018
    1:03:37
  52. 60.
    Apple is No Longer the Champion of Privacy It Once Claimed It Was03/05/2018
    57:31
  53. 61.
    Are we in a Cyber Security Bubble?02/26/2018
    1:01:25
  54. 62.
    U.S. Intelligence Officials: The United States is Under Attack02/19/2018
    57:29
  55. 63.
    Who Are the Innovators in Cyber Security?02/12/2018
    56:16
  56. 64.
    Reaching Out to the Cyber Security Generation02/05/2018
    57:29
  57. 65.
    Data Privacy Day - What You Need To Know01/29/2018
    50:22
  58. 66.
    What is the Future of Bug Bounties?01/22/2018
    56:00
  59. 67.
    New News! Uber Wasn't Hacked?01/15/2018
    53:14
  60. 68.
    Disclosure of Whistle Blower Letter Rocks Uber Again01/08/2018
    53:51
  61. 69.
    The Future of Decentralized Authentication Solutions12/18/2017
    57:46
  62. 70.
    Does Every Company Need a CISO?12/11/2017
    59:37
  63. 71.
    The Cyber Security Talent Crisis: Fact or Fiction?12/04/2017
    57:55
  64. 72.
    The Cyber Security Talent Crisis: Where Are the Women?11/27/2017
    58:02
  65. 73.
    Are Insiders in U.S. Intelligence Agencies Damaging Our Mission?11/20/2017
    1:00:35
  66. 74.
    The Qatar Crisis and The Cyber Attack That Started the Crisis11/13/2017
    58:57
  67. 75.
    Encryption vs. Privacy From an Israeli Perspective11/06/2017
    54:54
  68. 76.
    Encryption: Privacy Vs. Security10/30/2017
    52:18
  69. 77.
    Intelligence Agencies are Using Anti-Virus Software to Spy on You10/23/2017
    57:27
  70. 78.
    An Analysis of the Congressional Hearings into the Equifax Breach10/16/2017
    59:09
  71. 79.
    A Look at the Cyber Security Events of September 201710/09/2017
    59:25
  72. 80.
    A Conversation About the Equifax Breach10/02/2017
    55:23
  73. 81.
    The Proliferation of Nation State Attacks09/25/2017
    50:28

Listen to Task Force 7 Cyber Security Radio now.

Listen to Task Force 7 Cyber Security Radio in full in the Spotify app