in

20 Best Cyber Warfare Podcasts of 2021

Are you wanting to learn more about cyber warfare? Well you’ve come to the right place. This is a curated list of the best cyber warfare podcasts of 2021.

We have selected these podcasts for a variety of reasons, but they are all well worth a listen. We tried to select a variety of podcasts across the spectrum from hosts with a wide breadth of experience.

We are always keen to hear your feedback, if we have missed a podcast, Linkedin us Threat.technology (Linkedin) and we will check it out!

Best Cyber Warfare Podcasts 2021

With thanks to ListenNotes, Crunchbase, SemRush and Ahrefs for providing the data to create and rank these podcasts.

Defence Connect Podcast Network

  • Publisher: Momentum Media
  • Total Episodes: 336

The Defence Connect Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynamic 360° platform that bridges the gap between the customer (Defence) and industry. We split our focus not just into the traditional sectors of Land (Army), Air (Air Force) and Sea (Navy), but into the six new Capability Streams: – Intelligence, Surveillance, Reconnaissance, Electronic Warfare and Cyber – Key Enablers – Air and Sea Lift – Maritime and Anti-Submarine Warfare – Strike and Air Combat – Land Combat and Amphibious Warfare As Defence moves to ensure the Force Structure Review and the First Principles Review: Creating One Defence plans are met, Australian industry involvement is critical for mission success. The Defence Connect Podcast Network will provide you and your business with valuable lessons, tips and insights into the industry, putting your company in the best position to take part in the increased Defence spending. We’ll cover every aspect of doing business in the defence industry, from the tender process to recruitment, success stories, access points to Defence, smart business strategies, and geopolitical insights. Subscribe to the Defence Connect network and be part of this exciting and innovative industry.

Cyber From The Start

  • Publisher: Center for Strategic and International Studies
  • Total Episodes: 13

The Cyber from the Start podcast unveils the roots of today’s cybersecurity policies for critical infrastructure, surveillance, espionage, warfare and privacy. James A. Lewis interviews the people who helped lay the foundations for these policies before cybersecurity gained the mass attention it has today.

Cyber Security Dispatch

  • Publisher: Andy Anderson & CSD Staff
  • Total Episodes: 42

Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.

The Deep Dive Radio Show and Nick’s Nerd News

  • Publisher: Nick Espinosa, Chief Security Fanatic
  • Total Episodes: 892

An expert in cybersecurity and network infrastructure, Nick Espinosa is a nationally recognized speaker, member of the Forbes Technology Council, TEDx Speaker, regular columnist for Forbes, award winning co-author of a bestselling book “Easy Prey”, on the Board of Advisors for Roosevelt University’s College of Arts and Sciences as well as their Center for Cyber and Information Security and also Bits N’ Bytes Cybersecurity Education, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. Nick has consulted with clients ranging from small businesses up to the Fortune 100 level. He founded Windy City Networks, Inc in 1998 at age 19 and was acquired by BSSi2 LLC in 2013 where he is their CIO. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched.

Five Eyes Connectivity

  • Publisher: Shephard Studio
  • Total Episodes: 8

Welcome to Shephard Studio’s special series on Five Eyes Connectivity, sponsored by our partner Viasat. Over three episodes, we will look at the changing face of modern warfare across the land, sea and air domains through the prism of three key technology areas – Satellite communications, Line-of-sight datalinks, and cybersecurity. We will hear from senior military leaders about the changing nature of today’s threats, and how unfettered access across the electromagnetic spectrum can no longer be taken for granted. We will find out about the vulnerabilities facing these critical technology areas, look at the work going on to protect military networks and hear how the private sector is stepping in to help. In particular, we will look at the Five Eyes grouping of countries – Australia, Canada, New Zealand, the UK and the US – and find out how prepared their militaries are when the connectivity they have become accustomed to is degraded or denied. And we will hear from our sponsor Viasat about how the private sector is stepping in to help militaries further develop these technology areas further.

.future

  • Publisher: Microsoft / Gimlet Creative
  • Total Episodes: 7

The future isn’t random. It’s the result of the choices that we make now. We’ll be talking about technologies and industries that will define the next decade and beyond. Join our host Cristina Quinn, a science and technology reporter, as she dives into everything from Minecraft to cyber warfare. You can wait for the future to happen to you or engage with it right now and ahead of the curve on .future— a branded podcast from Microsoft, produced in partnership with Gimlet Creative.

Cyber 30903 Podcast: Securing the path

  • Publisher: Doug St.Amand
  • Total Episodes: 1

Exploring all things cyber security with up close and personal takes from Government, Industry, and Education leaders in the field. Our goal is to bridge the gap between today’s environment with future leaders of Cyber warfare. Releasing monthly in depth interviews on all platforms. Presented by the Georgia Cyber Center and the AFCEA Augusta Fort Gordon chapter.

Cyber 30903 Podcast: Securing the path

  • Publisher: Doug St. Amand
  • Total Episodes: 1

Exploring all things cyber security with up close and personal takes from Government, Industry, and Education leaders in the field. Our goal is to bridge the gap between today’s environment with future leaders of Cyber warfare. Releasing monthly in depth interviews on all platforms. Presented by the Georgia Cyber Center and the AFCEA Augusta Fort Gordon chapter.

Science Sisters: Stories of Success in STEM

  • Publisher: Shenandoa Toote
  • Total Episodes: 8

Get inspiration, advice. Learn tips from like-minded minorities on similar journeys in Science, Technology, Engineering, and Mathematics. Eavesdrop as Shenandoa Toote (MS in Vision Science, Certified Coach) interviews women across the US. Find support, shortcuts. Optimize your focus. STEM fields come with challenges for everyone. Professional perspectives of colleagues just ahead of you in reaching goals are invaluable. Minority women, like Hidden Figures, have impacted STEM opportunities. Successful black scientists had community in competitive career paths. And you? Living with unexpected roadblocks: money issues, homesickness, men who believe women are not critical thinkers, lack of classroom skin color and gender diversity, when to use a resume vs a CV, knowing who is your advisor, mentor, or sponsor…these discussions equip you to make decisions, give you ideas for internships, research/laboratory or work experience, provide insights on career paths outside of academia (professorship/tenure) & industry, like corporate business. Info for students in high school/college beginning to plan for higher education, recent university graduates, or post-doctoral fellows. Get practical insights, suggestions, tricks. Celebrate black & women’s history months, international day of women & girls in science. Cell Biology Zoology Genetics Pharmacology Toxicology Ecology Drafting Physiology Civil Design Biochemistry Pathology Operations Astronomy Nuclear Surveying Statistics Physics Psychology Atmospheric Experimental Natural Conservation Immunology Veterinary Industrial Computational Manufacturing Mining Safety Medicine Military Meteorology Quantitative Applied Space Aerospace Marine Sustainable Agriculture Dairy Livestock Poultry Agronomy Horticulture Breeding Protection Integrated Pest Range Chemistry Environmental Wetlands Urban Forestry Pulp Fish Wildlands Communication Animation Video Effects AI Informatics Programming Vendor Certification Analyst Page Digital Modeling Warehousing Database Graphics Modeling Virtual Environments Simulation Telecommunications Networking LAN WAN Security Assurance Multimedia Webmaster Project Bioengineering Ceramic Biomolecular Structural Transportation Highway Hardware Laser Mechanics Mineral Architecture Petroleum Textile Construction Mechatronics Robotics Automation Laser Integrated Circuit Instrumentation Robotics Heating Ventilation Conditioning Refrigeration Solar Quality Wastewater Recycling Hazardous Plastics Welding Semiconductor Occupational Automotive Hydraulics Fluid Software Packaging Nanotechnology Structural Photo Radiation Radio Biophysics Botany Phytopathology Histology Developmental Embryology Bacteriology Virology Parasitology Mycology Entomology Behavior Ethology Wildlife Microbial Eukaryotic Genomics Endocrinology Reproductive Cardiovascular Exercise Vision Optics Oncology Cancer Molecular Biometry Bioinformatics Biomathematics Biotechnology Aquatic Limnology Systematics Epidemiology Neuroanatomy Neurosciences Algebra Functional Geometry Topology Financial Probability Airpower Art Naval Strategic Signal Geospatial Joint Media Cyber Warfare Combat Directed Energy Acoustics Observables Stealth Operational Undersea Warfare Ground Aircraft Armament Explosive Bomb Disposal Task Force Missile Munitions Ordinance Radar Communications Biopsychology Nutrition Interaction Sustainability Astrophysics Planetary Climatology Dynamics Inorganic Organic Polymer Geology Geochemistry Geophysics Seismology Paleontology Hydrology Petrology Oceanography Geosciences Atomic Particle Plasma Temperature Condensed Matter Acoustics Biotechnology Power Cognitive Psycholinguistics Comparative Social Psychometrics Cyber Forensics Counterterrorism Archeology Econometrics Geographic Cartography Aeronautics Aviation Cytotechnology Pharmaceutics Pharmacognosy Pharmacoeconomics Cosmetic Preventive Epidemiology Health Infectious Diseases Actuarial Computer Research Electronics Technologies CADD Soil Wood Water Child

The Fraud Technology Podcast: For Modern Fraud Fighters (Sponsored by Bouncer)

  • Publisher: Matt Vega & Will Megson
  • Total Episodes: 7

The Fraud Technology Podcast is the new digital fraud prevention podcast that was created for modern fraud fighters and is brought to you by Bouncer, a world leading fraud prevention technology company (www.GetBouncer.com).The Fraud Tech Podcast brings together world-class counter-fraud industry leaders, experts, technologies, best-in-class industry vendors, industry executives, chief technology officers, and fraud strategists to dive into the world of ecommerce fraud, digital payments (CNP) fraud, cyber-fraud, and the counter-fraud Intelligence fields. | We ask the hard questions to give modern fraud fighters the most up-to-date industry information, trends, cutting-edge tech, reviews, and the global impacts from the industry’s best and brightest. | The Fraud Technology Podcast was created by two counter-fraud technology leaders, Will Megson and Matt Vega. Matt Vega is a triple board-certified digital fraud strategy industry leader, a former joint U.S. Army Electronic Warfare + NSA-Signals Intelligence (SIGINT) specialist, has built some of the best fraud prevention strategies for multibillion dollar tech companies, and is now the Head of Fraud Strategy for a large world-class international payments company. https://www.linkedin.com/in/vegaintel/ | Will Megson is a former big-tech Product Manager, a former Fortune 500 Digital Counter-Fraud Product Manager, has built world-class counter-fraud technology frameworks, helped develop the fraud product management strategies at tech giants like Lyft, and is now the Co-Founder of Bouncer (GetBouncer.com), a best-in-class fraud prevention technology company that provides innovative solutions to screen + authenticate high-risk card not present transactions, while improving conversions, reducing friction, and while creating card present levels of security for card not present merchants + mobile apps: https://www.GetBouncer.com | https://www.linkedin.com/in/will-megson/ | Interested in joining our next episode? Email us at: [email protected]

Arkiv

  • Publisher: Lab Archiv
  • Total Episodes: 2

The third realm of distant fantasy, spurned by its government and people alike, enters a grim rave-state of factional warfare and ruin. Arose the Hyper Meta-Cybernetics, a new age of distant waves contained in a liquid void, bringing with it auditory technica ravaging a path of reconstruction in the third realm.

Pushkar Talks

  • Publisher: Pushkar Y
  • Total Episodes: 1

This channel will mostly be focusing on building our society strong, technology-wise, security-based and to brace ourselves for the upcoming cyber warfare or maybe war-fair.

Assemblage Point

  • Publisher: Assemblage Point
  • Total Episodes: 1

The assemblage point podcast is a show where we challenge our perception, explore alternative views and open the discussion. The hosts Didi Levy and Brennan Young cover topics like censorship, cyber warfare, tyranny, social media, screen exposure, natural health and many more. Every episode features a raw musical performance, catered to the episode. Some of the episodes feature interviews with exciting guests and always with a positive spin. We hope you enjoy and stay free.

Where’s my flying car?

  • Publisher: The Predictioneers
  • Total Episodes: 3

A leading journalist and a serial entrepreneur set out to explore their biases and preconceptions, and to find out just how much work it takes to filter the signal from the noise today. We’ll be exploring the near and mid term futures with leading thinkers in: Public Health Warfare Counter-Proliferation Politics Design Geopolitics Cyber Security Media Quantum Computing Sport Machine Learning Space

Pendulum Insight

  • Publisher: Pendulum Insight
  • Total Episodes: 20

Through our interviews with fascinating experts, we explore the convergence of trends in geopolitics, fintech & economics, cyberwarfare, open source intelligence, futurism, transhumanism, artificial intelligence, and more to help our audience thrive in the 21st century.

Cyber Security Documentary

  • Publisher: Kyle Aitken
  • Total Episodes: 1

Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize in firewall management, but also web and email access. Eh, and work mainly in the network side to support security of various institutions. People always get it wrong when they think about security. And they talk about hacking and they use the word cyber, almost, but without fail, in the wrong context. Cyber security is in fact a very broad sweet of controls institutions put in place to make sure that they are not threatened, hacked or attacked, both from outside and inside the organization. In the 21st century, the main problem that most institutions have are not from outside their business, but from inside. The evidence is shown that the majority of data leakage, the majority of fraud and the majority of financial and reputational loss is, has occurred, not because some third party from outside the business has managed to get through the firewall, or manage to attack a pc, or managed to get into a server. More often it is because somebody from inside the business has made a mistake, allowing somebody else to gain access, or has deliberately gained access for their own nefarious purposes. My job is to do three things, one is to design the network to make sure that it is its least vulnerable, to any form of attack. Two is to identify when an object, or network has been attacked or hacked, or compromised in any way. And the third aspect is to prove what is commonly called the threat surface, em, for a vulnerability has been exposed. That is, yes we’ve been attacked. Yes, we’ve been exposed. What is the exposure. How much data are we due to lose? How much compromise has actually been reached, within our organization? These are the three main planks of any network security, within an organization. Interview 2 – Hello my names is eh, Jim. I am a security architect for a large financial organization. Em, my job involves looking not at where we are with our feet right now, in terms of the vulnerabilities and flaws that we have, in the cyber warfare that we have with people inside and outside the organization. I look at the threats that are coming in the next eighteen to twenty-four months. So my role is to understand the current position of the organization, the current threats that face us, the position the business is in, and the position the business wishes to be in, in up to 24 months away from us just now. And to make sure that technology and processes is in place to manage the threats that the business will face in that timeframe. And we do this across the globe. So we manage firewalls, we manage anti-virus, we manage, em, remote access into the organization. We manage, em, data leakage, so, data leaving the organization, wither it be accidentally or purposefully. But ultimately my role is to facilitate access into the organization, to allow it to conduct its business. And to do that in a way that is as responsible as possible, in terms of business activity and in terms of cost to the organization. So, items that we have been focusing on recently, relate to, the ability to have data leaving the organization, as I mentioned previously, that is a big topic. There is a, a program coming in from the European union, called GDPR, which relates to how we manage our customer information.

Cyber Warfare

  • Publisher: BCS, The Chartered Institute for IT
  • Total Episodes: 12

Cyber Warfare

POSC-3511 War and Peace

  • Publisher: Joachim K. Rennstich, Ph.D.
  • Total Episodes: 13

This class will introduce you to the basic approaches in international relations theory to study the nature, the issues and ideologies, as well as the dynamics of war and peace in the international system. In addition to the “ conventional” (i.e., state-based) forms of warfare, you will be introduced to “ unconventional” forms (i.e., involving other actors and tactics), such as terrorism and “ cyber- warfare,” as well as to the increasingly important area of ethnic conflicts and humanitarian interventions and peace operations.

GLOBAL IMPACT

  • Publisher: Archive
  • Total Episodes: 10

GLOBAL IMPACT, hosted by Dr. Frederick R. Lester, Chief Executive Officer of GLOBAL AFFAIRS MEDIA, will address strategic issues impacting the global community. Thought leadership will be provided that will elevate listeners’ awareness and understanding of complex global issues such as geopolitics of technology and resources, globalization & immigration policy, diplomacy & peace negotiations, global health crisis, political economy of the media, impact of technology on society, humanitarianism & foreign policy, genocide causes & prevention, human trafficking & sex trade, global justice & war crimes, fixing failed states, emerging markets, money laundering & illegal flight capital, privacy & electronic surveillance, information security & cyber-warfare, military privatization & defense technology, religion & statecraft, global arms trade, medical ethics, stem cell research & genetic engineering, race relations, nuclear weapons & nonproliferation, national security & terrorism, global poverty eradication and global warming & climate change. GLOBAL IMPACT encourages public discourse to devise and implement innovative strategies and solutions to global problems. Through public discourse on global issues and international affairs, we mobilize the intellectual capital, financial resources and political influence of technologically enabled social networks to impact sustainable change wherever needed around the world.

GLOBAL IMPACT

  • Publisher: Archive
  • Total Episodes: 17

GLOBAL IMPACT, hosted by Dr. Frederick R. Lester, Chief Executive Officer of GLOBAL AFFAIRS MEDIA, will address strategic issues impacting the global community. Thought leadership will be provided that will elevate listeners’ awareness and understanding of complex global issues such as geopolitics of technology and resources, globalization & immigration policy, diplomacy & peace negotiations, global health crisis, political economy of the media, impact of technology on society, humanitarianism & foreign policy, genocide causes & prevention, human trafficking & sex trade, global justice & war crimes, fixing failed states, emerging markets, money laundering & illegal flight capital, privacy & electronic surveillance, information security & cyber-warfare, military privatization & defense technology, religion & statecraft, global arms trade, medical ethics, stem cell research & genetic engineering, race relations, nuclear weapons & nonproliferation, national security & terrorism, global poverty eradication and global warming & climate change. GLOBAL IMPACT encourages public discourse to devise and implement innovative strategies and solutions to global problems. Through public discourse on global issues and international affairs, we mobilize the intellectual capital, financial resources and political influence of technologically enabled social networks to impact sustainable change wherever needed around the world.

Leave a Reply

Your email address will not be published. Required fields are marked *

20 Best Cybercrime Podcasts of 2021

20 Best Technical Security Podcasts of 2021