
#AuditTuesday GRC Podcast
Every Tuesday we're sharing valuable content for you with the leading authorities in GRC, Compliance and Identity Security.
Episodes
74 episodes
#AuditTuesday GRC PodCast - AI Hacking featuring Alan Sugano and Shannon Noonan
In this dynamic #AuditTuesday webinar, cyber security expert Alan Sugano, President of ADS Consulting Group, we’ll dive into the escalating threat of AI-powered cyberattacks. He will be...
•
Season 3
•
Episode 15
•
45:11

Master PCI DSS 4.0 Compliance w/ Truvantis and YouAttest
Tune in for an engaging #AuditTuesday GRC podcast focused on mastering the complexities of PCI DSS 4.0. This live session, hosted by YouAttest, a premier identity governance solution, will feature Truvantis, a leading GRC consulting firm, shari...
•
Season 3
•
Episode 14
•
31:50

AI Governance - Ignorance is Not Bliss w/ Ashley Robinson and Allgress
Join us for an engaging #AuditTuesday webinar featuring renowned AI governance expert Ashley Robinson, hosted by YouAttest. This session will explore the critical elements of AI governance, addressing the risks, standards/frameworks/guidances, ...
•
Season 3
•
Episode 13
•
42:25

#AuditTuesday - Who’s Really Inside Your System? w/ #ThatAuditGuy RobertBerry
Join us for an engaging #AuditTuesday webinar featuring renowned auditor Robert Berry, #ThatAuditGuy, hosted by YouAttest.&nbs...
•
Season 3
•
Episode 12
•
46:40

CISO’s: Strengthening Supply Chain Security with Identity Governance and InvisiRisk
#AuditTuesday Presents: The CISO’s Playbook: Strengthening Security with Identity and Supply Chain GovernanceCISOs need robust strategies to secure their ecosystems and the supply chain and identities that make these supply chains secure...
•
Season 3
•
Episode 11
•
58:38

Starting An AI Project? Where Does GRC Fit In? With MyTech.Network's Robert Hilliker
As AI transforms industries, ensuring robust governance, risk, and compliance (GRC) is critical to building secure and ethical AI systems. In this dynamic #AuditTuesday GRC Podcast,welcomes Robert Hilliker, an AI project leader, to explore how ...
•
Season 3
•
Episode 10
•
48:56

#AuditTuesday: v-CISOs: Scaling Identity GRC for Security and Compliance w/ YouAttest and Allgress
With cyber threats escalating and compliance requirements tightening, organizations need flexible, expert-driven solutions to stay secure. Virtual CISOs (v-CISOs) are redefining governance, risk, and compliance (GRC) by delivering strategic exp...
•
Season 3
•
Episode 9
•
56:33

#AuditTuesday: Hey MSPs! Time to Get on Board w/ YouAttest Managed UARs!
MSPs – it's time to expand your security service offerings with a critical, high-demand compliance function: User Access Reviews (UARs).In this special edition of the #AuditTuesday GRC Podcast, Garret Grajek, CEO of YouAttest, sits down...
•
Season 3
•
Episode 8
•
45:17

#AuditTuesday: CISO Reality Check — Identity Risk w/ Larry Whiteside
As identity risk rises across enterprises, CISOs are being called to lead the charge in governance and access oversight. But are they equipped for the challenge?In this edition of the #AuditTuesday GRC podcast, we sit down with Larry Whi...
•
Season 3
•
Episode 7
•
44:52

#AuditTuesday - AI Governance and Model Risk Management w/ James Sayles
As artificial intelligence reshapes business, compliance, and security landscapes, organizations are under pressure to implement clear governance strategies. Yet, many lack a roadmap for ethical, secure, and compliant AI deployment.In t...
•
Season 3
•
Episode 6
•
44:18

MSPs and GRC (Governance Risk and Compliance) w/ Shannon Noonan and Daniel Morrison
Governance Risk and Compliance is a $45.6B market - a market the Managed Service Providers (MPSs) need to be in they want to grow.But GRC, the concept of helping enterprises obtain not only compliance but be able to show proper governanc...
•
Season 3
•
Episode 5
•
50:21

Shared Signals - What They Mean for Authorization
Shared Signals - for those in the identity know - it’s a subject that time has come.Shared Signals refers to a standardized system where organizations can exchange real-time security information about users across different platforms.
•
Season 3
•
Episode 4
•
41:46

Reviewing Privileged Accounts - with Synoptek MSP
Privileged users are the source of most enterprise problems: from outsider attacks, insider threads and compliance - the focus usually involves admin accounts.These accounts have to be reviewed - and on a regular basis. How...
•
Season 3
•
Episode 3
•
45:39

EU's DORA and Identity Governance - with Ralph Menegatti from concedro
Huge regulatory changes face the EU nations and the companies that work w/ the EU: Digital Operational Resilience ACT (DORA). The Digital Operational Resilience Act (Regulation (EU) 2022/2554) solves an important problem in the EU...
•
Season 3
•
Episode 2
•
51:23

Automating AWS Entitlement Reviews - with CloudArmee
AWS is the premier cloud vendor - AWS is the basis of most enterprises cloud strategy. To help us understand the importance of AWS and AWS entitlements, YouAttest has partnered with CloudArmee, prominent AWS experts....
•
Season 3
•
Episode 1
•
31:48

CMMC 2.0 Ruling - What Does this Mean? With ShortArm Solutions
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (32 CFR) for the Cybersecurity Maturity Model Certification (CMMC) program. The program will require third-part...
•
Season 2
•
Episode 43
•
37:34

The Trump Administration and Cyber Regulations - Karen Klever, Mike Andrewes and Stacey Cameron
New administration - new attitude, regulations, priorities on cyber governance? No question.But what will it be? What about CISA?What about NIST?What about the SEC?What about CMMC?<...
•
Season 2
•
Episode 42
•
56:04

Okta “No Password Flaw” - What Is It? How to Secure? - Featuring Greg Kutzbach
Okta announced that they had a flaw in their authentication - where under “specific circumstances” a user could gain access w/o inputting the password associated with the account.How is this possible?What does this mean?...
•
Season 2
•
Episode 41
•
30:57

Mentoring the Next-Generation of Cyber Professionals - Featuring Ted Alben
You can’t talk about cyber security with a professional today without the conversation turning to the topic of the next generation.Namely our youth - with questions coming up,Are they ready for jobs in cyber security?A...
•
Season 2
•
Episode 40
•
14:57

CMMC 2.0 Final Ruling - What Does This Mean? Featuring Michael Andrewes, Yastis
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (the Final Rule) for the Cybersecurity Maturity Model Ceritficat (CMMC) program.The program will require third-party ...
•
Season 2
•
Episode 39
•
12:30

GRC Fatigue and What Can Be Done - Featuring Stacey Cameron
Practically all enterprises are under some sort of IT compliance and regulations. Holding any data that is classified as sensitive - puts the enterprise under the watchful eye of of the regulators.But with all this compliance and ...
•
Season 2
•
Episode 38
•
13:28

German Cyber Hacks and EU DORA - Featuring Ralf Mennegatti
Cyber Attacks are worldwide. Germany is not immune to these attacks. In fact Deutsche Bank in September 2024, stated that “Cyber-attacks alone cost the German economy an enormous 148 billion euros every year.”At the same time Germa...
•
Season 2
•
Episode 37
•
10:14

MSPs: Automate Your Identity Audits
This YouAttest podcast highlights the YouAttest offering for Identity security and compliance for managed service providers (MSPs.)Automating and simplifying user access reviews.
•
Season 2
•
Episode 36
•
12:03

HR-IAM Variance - Detecting Orphan Users and Privileges w/ YouAttest
HR systems for many enterprises is the identity store of record (ISoR). This is where identities are created, roles are assigned, and privileges are entitled. But these HR systems (HRS) are NOT enforcement points – they are the con...
•
Season 2
•
Episode 35
•
13:34

CMMC 2.0 Final Ruling Update - Yastis, Micahel Andrewes
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (the Final Rule) for the Cybersecurity Maturity Model Ceritficat (CMMC) program.The program will require third-party ...
•
Season 2
•
Episode 34
•
12:31
