Skip to content

podcasts

Real Conversations That Shape Cyber Resilience

The Readiverse brings together industry leaders, innovators, and cyber resilience experts to explore real-world challenges shaping today’s digital landscape. From executive perspectives to practical insights, each episode delivers thoughtful dialogue on resilience, innovation, and navigating evolving cyber threats.

STRIVE Podcasts

Video thumbnail
1.8.26 | Video

MCP 2.0 Explained: Securing AI Agents in the Enterprise

How do enterprises securely operationalize AI agents? We break down MCP 2.0—the evolving protocol shaping how AI models safely interact with enterprise systems.

AI ModelsMCPSecurity
Video thumbnail
1.6.26 | Video

Unified Resilience Meets Conversational AI with Ravit Jain

Unpack how conversational AI and unified cyber resilience are changing the way organizations interact with data and recover from cyber incidents. The discussion focuses on a core enterprise priority: trust—trust in AI, trust in data, and trust in recovery.

RecoveryCyber ResilienceAI
Video thumbnail
1.6.26 | Video

How to Operationalize Data Security at Scale — Ben Herzberg & Asif Dromi

Explore how modern, data-driven organizations can move fast without sacrificing security, privacy, or compliance.

Operational ComplianceAutomation
Video thumbnail
1.6.26 | Video

The Modernization Playbook for Cyber Readiness with Gilman Treantos

Learn what resilience leadership looks like in the real world—from career growth and community involvement to modern cyber recovery strategy.

LeadershipTrustCyber Recovery
Video thumbnail
1.6.26 | Video

Defining ResOps and the Next Era of Recovery Intelligence with Stephen Foskett

Discover how Resilience Operations (ResOps) are reshaping enterprise cyber recovery and business continuity. Dive into why traditional IT Ops metrics like RTO and RPO are no longer enough — and how new measures such as Mean Time to Clean Recovery are redefining what “good” looks like in modern cyber resilience.

ResOpsMTCRPerformance Metrics
Video thumbnail
1.6.26 | Video

The Human Side of Cyber Resilience with Dr. Jessica Barker

Listen to Dr. Jessica Barker, Co-CEO of Cygenta and a leading expert on the human and psychological aspects of cybersecurity. Explore why cyber resilience depends as much on people, culture, and behavior as it does on technology.

CybersecurityLeadership
Video thumbnail
10.21.25 | Video

How Data Security Needs to Change in the Age of AI

Vidya Shankaran sits down with Eldad Chai, CEO and co-founder of Satori, to explore how organizations can govern sensitive data faster, smarter, and more securely in the age of AI.

Data AccessAI SecurityCyber Resilience
Video thumbnail
9.25.25 | Video

Should Governments Ban Ransomware Payments

Explore the heated debate around banning ransomware payments in the UK and beyond.

RansomwareCyber RecoveryCyber Attacks
Video thumbnail
8.26.25 | Video

What is Agentic AI?

Explore agentic AI, the revolutionary technology that’s transforming how artificial intelligence operates in enterprise environments.

AI GovernanceRisk ManagementCybersecurity
Video thumbnail
7.9.25 | Video

What's Top of Mind for CISO's in 2025

Darren Thomson breaks down the top 6 priorities dominating CISO conversations in 2025, based on exclusive insights from security leaders across the industry.

Supply Chain SecurityIdentity SecurityComplianceAI Cybersecurity
Video thumbnail
5.14.25 | Video

What is Minimal Viable Company

Learn how to define the absolute minimum requirements to keep your business operational while recovering from catastrophic ransomware and other cyber incidents.

Cyber RecoveryIncident ResponseThreat Testing
Video thumbnail
3.12.25 | Video

Minding the Gap Between IT and Security

Darren Thomson sits down with renowned cybersecurity expert Jane Frankland to explore the technical, social, and organizational gaps that often exist between traditional IT infrastructure teams and security groups.

IT SecurityZero TrustCompliance
Video thumbnail
2.18.25 | Video

Building an Effective Cyber Recovery Plan

Delve into the critical aspects of cyber resilience and the importance of having a robust cyber recovery plan.

Air GapCleanroomRansomware RecoveryIncident Response
Video thumbnail
1.15.25 | Video

Cyber Recovery vs. Disaster Recovery: Essential Strategies for Modern Threats

Discover why traditional DR plans fall short against cyber threats like ransomware and learn how to develop robust, standalone cyber recovery plans to protect your business.

Disaster RecoveryCyber RecoveryImmutable Backups
Video thumbnail
11.7.24 | Video

Protecting Active Directory: Best Practices for Cyber Resilience

Discover why AD is often targeted by cybercriminals and learn essential strategies to protect your organization from cyberattacks.

MFAActive DirectoryCyber Attacks
Video thumbnail
9.25.24 | Video

A Real-Life Cyberattack: Investigating a Breach

Unravel a complex spear phishing attack that compromised a major corporation, offering listeners a rare glimpse into the mechanics of modern cyber threats and the resilience strategies employed to combat them.

Ransomware DeploymentMalwarePhishing

SHIFT Podcasts

Video thumbnail
SHIFT 2025 | Video

Protecting the AI Stack

Watch industry leaders break down one of the biggest challenges in modern enterprise technology: Protecting the AI stack and building true AI resiliency at scale.

Data LayersCloud-native AIAI Backup
Video thumbnail
SHIFT 2025 | Video

The CISO Paradox

Explore what it truly means to lead security in an age of personal accountability, where CISOs may be held legally responsible for cyber outcomes they don’t fully control.

LeadershipCompany CultureSecurity
Video thumbnail
SHIFT 2025 | Video

From Mishaps to Meltdown

Darren Thompson sits down with identity expert, Dan Conrad, to dive deep into one of the most overlooked yet mission-critical areas of cyber resilience: Active Directory (AD) and Entra ID recovery.

Active DirectoryCleanroomCyber Readiness
Video thumbnail
SHIFT 2025 | Video

The Phoenix Protocol

Break down  cyber resiliency strategies, AI workload readiness, disaster recovery fallacies, and cyberattack recovery at enterprise scale and rise from the ashes of a cyberattack.

CyberattacksData RecoveryCleanroom Recovery
Video thumbnail
SHIFT 2025 | Video

Establishing Minimum Viability

Deep dive into the true meaning of minimum viability—and why it has become the most important capability for business resilience today.

Minimum ViabilityCyber AttackLeadership
Video thumbnail
SHIFT 2025 | Video

Cyber-Storytelling Communicating Risk to the Boardroom

Break down how CISOs can effectively communicate cyber risk to the board, build trust, secure enterprise-wide accountability, and strengthen digital resilience

Cyber RiskReadiness & ResponseRisk Management
Video thumbnail
SHIFT 2025 | Video

Turning Compliance into Resilience

Learn why resilience—not checkbox compliance—is the true goal of modern regulations. Listen to real-world horror stories, ransomware events, and the hidden gaps between “green metrics” and actual recoverability.

ComplianceRansomwareRegulations
Video thumbnail
SHIFT 2025 | Video

Tooling up for Incident Response

Break down how organizations should tool up for modern incident response. Explore optimism bias in cybersecurity, the true meaning of resilience, why testing incident response plans matters more than writing them.

Incident ResponseMinimum ViabilityResOps