Rephonic
Artwork for re:invent security
Cybersecurity
Multi-Party Computation
Risk Management
Data Security
Cyber Security
Healthcare Collaboration
Data Encryption
Information Security
Data Breaches
Risk Assessment
Cloud Security
Cybersecurity Startups
Data Sovereignty
Quantum Computing
Encryption
EU Regulations
Digital Operational Resilience Act
Third-Party Risk
Value-Driven Decision-Making
Artificial Intelligence

re:invent security is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorr... more

PublishesMonthlyEpisodes19Founded2 years ago
Categories
Self-ImprovementTechnologyEducation

Listen to this Podcast

Artwork for re:invent security

Latest Episodes

In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with Kay Behnke, CISO at Genmab. Kay has built security organizations in three very different global companies: NXP, FrieslandCampina, and Genmab. Spanning tech, fo... more

In this episode of re-invent security, we sit down with Patric Versteeg, European CISO of the Year 2024, to unpack the “inner game” of cybersecurity leadership. Patric argues that real change isn’t about putting on a new mask—it’s about returning to ... more

In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with two cybersecurity leaders tackling the talent gap from opposite directions. Laurens Jagt, founder of Cyber Security District, is building one of Europe’s most ... more

In this episode of re:invent security, we sit down with Arnaud Wiehe (Managing Director of Information Security at FedEx) and Tiago Teles (Head of Advanced Analytics & AI at ABN AMRO), co-authors of Emerging Tech, Emerging Threats, to explore what it... more

Key Facts

Accepts Guests
Contact Information
Podcast Host

Similar Podcasts

People also subscribe to these shows.

Maarten van Rossem en Tom Jessen
Maarten van Rossem en Tom JessenTom Jessen en Maarten van Rossem
De Stemming van Vullings en De Rooy
De Stemming van Vullings en De RooyNPO Radio 1 / NOS / EenVandaag
Betrouwbare Bronnen
Betrouwbare BronnenJaap Jansen - Dag en Nacht Media

Recent Guests

Sri Manda
Chief Security and Trust Officer at Peloton with extensive experience in cybersecurity
Peloton
Episode: Sri Manda (Peloton): From Gatekeeper to Innovator: How CISOs Can Harness Startup Power
Esther Schagen-van Luit
Chief Security Advisor at Microsoft, former CCO of Deloitte Netherlands, Belgium and the Dutch Caribbean
Microsoft
Episode: Esther Schagen-van Luit (Microsoft): "Security leadership requires courage and curiosity"
Carlo Schreurs
Chief Information Security Officer of FrieslandCampina
FrieslandCampina
Episode: Carlo Alexander Schreurs (FrieslandCampina): "As a CISO, how do you lead in a Human-Centered way?"
Dimitri van Zandvliet
Cybersecurity director and chief information security officer at Dutch Railways (NS)
Dutch Railways (NS)
Episode: Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”
Dr. Nikki Robinson
Distinguished cybersecurity expert, author, and educator with an impressive background in IT operations and security
IBM, Capital Technology University
Episode: Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People
Bibi van den Berg
Professor of cybersecurity governance at Leiden University and head of cybersecurity governance research at the Institute of Security and Global Affairs.
Leiden University
Episode: Bibi van den Berg (LEI): “Why traditional risk management falls short in cyber security"
Sander Zwiebel
Group-wide business information security officer at Nationale Nederlander.
Nationale Nederlander
Episode: Sander Zwiebel (NN Group) on DORA: "The Final Countdown"
Steve Hollands
Chair of the Board of Directors and Chief Information Security Officer at Blackhills Quantum Computing.
Blackhills Quantum Computing
Episode: Steve Hollands (BQCM): "The future of security is quantum-proof: Start preparing today!"
Ashish Rajan
Prominent figure in cloud security and host of the Cloud Security Podcast.
Kaizenteq
Episode: Ashish Rajan (Kaizenteq): "Data Sovereignty Will Define the Future of Cloud Security and Compliance"

Hosts

Irfan Santoe
Co-host and information security executive, emphasizing strategic insights and innovation in cybersecurity.
Jeroen Prinse
Co-host and transformational CISO, focused on leadership and security transformation within organizations.

Reviews

5.0 out of 5 stars from 16 ratings
  • Great

    Enjoyed my first episode with the lady at Uber: good atmosphere, great way to learn and great examples. Looking forward to more episodes!

    Apple Podcasts
    5
    JeroenWilliam
    Netherlands2 years ago
  • Leaders surrounded by leaders

    Great podcast and insightful pointers from the guests. Irfan is a leader following leaders.

    Apple Podcasts
    5
    Fracipo
    United Kingdom2 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the insightful discussions and leadership perspectives shared by guests, finding them valuable in shaping their own approaches in cybersecurity.
The podcast is noted for fostering a supportive atmosphere, allowing for an engaging exchange of ideas among experts, which resonates well with the audience.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#136
Netherlands/Technology

Talking Points

Recent interactions between the hosts and their guests.

Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People
Q: If I would like to mature my vulnerability management program, what first steps should I take?
Start with inventory and asset management, then assess your external perimeter for vulnerabilities, followed by prioritizing critical assets and defining roles and responsibilities for ongoing remediation.
Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People
Q: Can you elaborate on the key takeaways from the book?
The key takeaways include emphasizing the human factors in vulnerability management, prioritizing vulnerabilities beyond CVSS scores, and implementing a continuous process for remediation.
Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”
Q: Can you explain the unique cybersecurity challenges that come with securing critical infrastructure?
Dimitri elaborates on the dependency of society on critical infrastructure and how disruptions can lead to significant societal impact.
Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”
Q: What is driving you to do what you're doing and what you have done?
Dimitri shares his passion for technology, stating it started at a young age and has evolved through various roles in his career.
Sander Zwiebel (NN Group) on DORA: "The Final Countdown"
Q: What tips can you provide for organizations to successfully implement DORA?
Keep the implementation close to current processes, align with peers for best practices, and focus on critical functions.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About re:invent security

What is re:invent security about and what kind of topics does it cover?

This podcast presents an engaging exploration into the world of information security, featuring discussions with industry leaders who share their transformative experiences and strategies. The conversations often highlight practical applications and innovative approaches within cybersecurity, focusing on the evolving role of security leaders, the integration of human factors in security practices, and the necessity of aligning security initiatives with business goals. Each episode encourages listeners to reconsider their own practices in the field and to adopt a proactive mindset as they navigate the complexities of cybersecurity.

Where can I find podcast stats for re:invent security?

Rephonic provides a wide range of podcast stats for re:invent security. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to re:invent security and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does re:invent security get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for re:invent security, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for re:invent security?

Rephonic provides comprehensive predictive audience data for re:invent security, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does re:invent security have?

To see how many followers or subscribers re:invent security has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to re:invent security?

These podcasts share a similar audience with re:invent security:

1. Maarten van Rossem en Tom Jessen
2. NRC Onbehaarde Apen
3. NRC Haagse Zaken
4. De Stemming van Vullings en De Rooy
5. Betrouwbare Bronnen

How many episodes of re:invent security are there?

re:invent security launched 2 years ago and published 19 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact re:invent security?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for re:invent security?

Rephonic pulls ratings and reviews for re:invent security from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for re:invent security?

Rephonic provides full transcripts for episodes of re:invent security. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on re:invent security?

Recent guests on re:invent security include:

1. Sri Manda
2. Esther Schagen-van Luit
3. Carlo Schreurs
4. Dimitri van Zandvliet
5. Dr. Nikki Robinson
6. Bibi van den Berg
7. Sander Zwiebel
8. Steve Hollands

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days