meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Fraud and Identity [CISO Perspectives]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 18 November 2025

⏱️ 41 minutes

🧾️ Download transcript

Summary

Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks. Want more CISO Perspectives? Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.5

This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter,

0:23.1

building full-stack zero-trust networks from the ground up.

0:25.1

Trusted by security and network leaders everywhere,

0:28.0

meter delivers fast, secure by design,

0:30.5

and scalable connectivity

0:31.9

without the frustration, friction,

0:34.6

complexity, and cost

0:36.1

of managing an endless proliferation of vendors and tools.

0:40.3

Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular

0:46.3

in one integrated solution built for performance, resilience, and scale.

0:51.6

Go to meter.com slash CISOP today to learn more and book your demo.

0:57.5

That's M-E-T-E-R.com slash C-I-S-O-P.

1:08.5

Consider the following four individuals. A British fashion designer, an American rap artist,

1:16.5

a Filipino influencer, and an old security guy.

1:22.1

While there are many, many differences between these folks, there is one important

1:26.1

similarity that is relevant to this

1:27.9

discussion, and that is this. Each of these individuals is named Kim Jones. With in-person

1:36.5

interactions, the differences between these four Kim Joneses would be obvious. It would be as

1:41.9

difficult for Kim Jones the Filipino influencer to masquerade as Kim Jones the old security guy, as it would be for me to impersonate the rapper Little Kim.

1:52.0

Online, though, any of these individuals could at least begin the process of accessing data that is restricted to my personal use by honestly and truthfully

2:02.9

providing their names. This example illustrates one of the fundamental challenges with

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.