Rephonic
Artwork for The Security Strategist

The Security Strategist

EM360Tech
Cybersecurity
Supply Chain Risk Management
Cloud Detection and Response
Target
Solarwinds
Third-Party Risk Management
Apis
Ransomware
Chinese Electric Vehicles
Digital Risk Protection
Biometric Security
Data Breach
API Security
Artificial Intelligence
Data Resilience
Zero Trust
Neurodiversity
Continuous Threat Exposure Management
Compliance
Data Security

With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and... more

PublishesDailyEpisodes208Founded6 years ago
Number of ListenersCategories
BusinessTechnology

Listen to this Podcast

Artwork for The Security Strategist

Latest Episodes

Podcast: The Security Strategist

Host: Richard Stiennon, Chief Research Analyst at IT-Harvest

Guest: Nathan Rollings, CISO at Zafran

The cybersecurity enterprise space has been transforming for years, going beyond traditional vulnerability managem... more

Podcast series: The Security Strategist

Guest: Sam Woodcock, Senior Director of Solutions Architecture at 11:11 Systems

Host: Shubhangi Dua, Podcast Producer and B2B Tech Journalist at EM360Tech

In the recent episode of The Security Strategist pod... more

YouTube

Podcast series: The Security Strategist

Guest: Chip Witt, Principal Security Analyst at Radware

Host: Richard Stiennon, Chief Analyst Researcher at IT-Harvest

When attackers target modern enterprises, they don’t break in; they log in. This insight... more

YouTube

In an era where enterprise data sprawls across cloud platforms, collaboration tools, and SaaS environments, CISOs are under constant pressure to reduce risk without becoming the department that slows everything down. That tension sits at the heart of... more

YouTube

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap

Recent Guests

Ariel Zamir
Founder and CEO of Ray Security
Ray Security
Episode: How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business
William Wright
CEO of Closed Door Security, Scotland's most accredited hacker
Closed Door Security
Episode: Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience
Chester Wisniewski
Director and Global Field CISO at Sophos
Sophos
Episode: From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026
Nicole Jiang-Gibson
CEO, Co-founder of Fable Security
Fable Security
Episode: The Human Factor in Cybersecurity: Behavioural Interventions That Work
Doug Merritt
Chairman, CEO, and president of Aviatrix
Aviatrix
Episode: Are CISOs Blind to the Biggest Cloud Attack Surface?
Gadi Bashvitz
CEO of Bright Security
Bright Security
Episode: Securing AI-Driven Development in Modern Enterprises
Abhi Sharma
Co-founder and CEO of Relyance AI
Relyance AI
Episode: How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
Chris Pierson
Founder and CEO at BlackCloak
BlackCloak
Episode: How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
Raz Rotenberg
CEO at Fabrix Security
Fabrix Security
Episode: Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?

Host

Richard Stiennon
Host and industry analyst known for contributions in cybersecurity discussions and strategy.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#231
Belgium/Technology

Talking Points

Recent interactions between the hosts and their guests.

Are CISOs Blind to the Biggest Cloud Attack Surface?
Q: Can you give an example of how Aviatrix has helped clients bridge platform, networking, and security teams?
Across hundreds of accounts, Aviatrix has helped bring together cloud platform teams, networking teams, and security teams, often with a workflow that integrates Terraform and infrastructure as code to deploy a unified security fabric that spans multiple clouds and regions.
Are CISOs Blind to the Biggest Cloud Attack Surface?
Q: What are the three foundational technology layers that enable effective security in this environment?
The three core layers are identity for runtime control, endpoints for pervasive remediation, and network as the high-visibility layer that can enforce policy across distributed workloads.
Are CISOs Blind to the Biggest Cloud Attack Surface?
Q: What is the ultimate message you want to send to the audience today?
The core message is that in a cloud-first world with agentic AI and many workloads, there exists a huge, often overlooked attack surface across multiple regions and clouds, and organizations must focus on gaining broad visibility and remediation across all those workloads, regardless of whether they use Aviatrix.
How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
Q: Tell us what you're seeing in this realm of AI-enabled threats that target executives.
AI is amplifying traditional attacks by enabling rapid impersonation, deepfakes, and highly convincing scams, making it urgent to extend protection beyond the office to personal devices and home networks.
From Data to Insight: How Enterprises Are Making IoT Secure and Actionable
Q: How should enterprises handle regulatory compliance and lifecycle security for distributed IoT deployments?
Establish a central IoT platform as the system of record to manage firmware and software across devices, enable automated patching, implement strong lifecycle security (certificate-based authentication, network isolation, OTA updates), and treat IoT data as a strategic business asset rather than a mere device issue.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About The Security Strategist

What is The Security Strategist about and what kind of topics does it cover?

Expert insights into cybersecurity are a significant focus, typically addressing topics such as identity security, vulnerability management, and the implications of emerging technologies like AI within cybersecurity frameworks. Conversations often feature thought leaders and industry analysts discussing practical strategies to navigate the complexities of modern cyber threats. There's a unique emphasis on the intersection of technology and organizational strategy, making it particularly valuable for professionals seeking to enhance their cybersecurity posture or to understand the implications of new trends in the field.

Where can I find podcast stats for The Security Strategist?

Rephonic provides a wide range of podcast stats for The Security Strategist. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to The Security Strategist and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does The Security Strategist get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for The Security Strategist, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for The Security Strategist?

Rephonic provides comprehensive predictive audience data for The Security Strategist, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does The Security Strategist have?

To see how many followers or subscribers The Security Strategist has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to The Security Strategist?

These podcasts share a similar audience with The Security Strategist:

1. Defense in Depth

How many episodes of The Security Strategist are there?

The Security Strategist launched 6 years ago and published 208 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact The Security Strategist?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for The Security Strategist?

Rephonic pulls ratings and reviews for The Security Strategist from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for The Security Strategist?

Rephonic provides full transcripts for episodes of The Security Strategist. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on The Security Strategist?

Recent guests on The Security Strategist include:

1. Ariel Zamir
2. William Wright
3. Chester Wisniewski
4. Nicole Jiang-Gibson
5. Doug Merritt
6. Gadi Bashvitz
7. Abhi Sharma
8. Chris Pierson

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days