• The €10 Influence Campaign: Inside the AI-Powered Market for Social Media Manipulation
    Feb 6 2026

    The NATO Strategic Communications Centre of Excellence's 2025 experiment reveals how AI has transformed social media bots from simple spammers into sophisticated actors capable of "psychological realism" and seamless integration into authentic human conversations. Researchers demonstrate that for as little as €10, manipulators can now generate mass-scale AI content and route funding through untraceable cryptocurrency exchanges to evade detection and purchase fake engagement across major platforms like X, TikTok, and Facebook. The episode explores the alarming shift from political spam to militarized narratives and explains why traditional detection methods are failing as synthetic actors move from broadcasting propaganda to embedding themselves within trusted community dialogues.

    www.compliancehub.wiki/social-media-manipulation-and-the-evolution-of-synthetic-influence-2025-analysis

    Sponsors:

    www.myprivacy.blog

    www.compliancehub.wiki

    https://digitaltwinrisk.health

    Show More Show Less
    17 mins
  • Northern Resilience: Countering Information Influence in the Nordic-Baltic Region
    Feb 5 2026

    This episode explores how Denmark, Estonia, Finland, Iceland, Latvia, Lithuania, Norway, and Sweden are mobilizing a "whole-of-society" defense to protect their democratic institutions from foreign information influence operations. We examine diverse regional strategies, ranging from Lithuania’s volunteer "elves" and Sweden’s Psychological Defence Agency to Finland’s comprehensive security model and strict legislative disruptive measures. Listen in to understand how these nations balance the protection of free speech with the necessity of countering hostile narratives through resilience, situational awareness, and international cooperation.

    www.compliancehub.wiki/countering-information-influence-operations-strategies-and-resilience-in-the-nordic-baltic-region

    Sponsors:

    https://www.myprivacy.blog

    https://pii.compliancehub.wiki

    Show More Show Less
    40 mins
  • The Sophistication Shift: Navigating the New Era of Industrialized AI Fraud
    Feb 4 2026
    The global fraud landscape is currently at a turning point known as the Sophistication Shift, where high-volume, "low-effort" scams are being replaced by fewer, sharper, and far more damaging attacks engineered with professionalized precision. Fraudsters have successfully industrialized deception by leveraging a "fraud production ecosystem" that pairs generative AI and deepfakes with autonomous fraud agents and telemetry tampering to bypass traditional verification systems. To counter these advanced networks, institutions are transitioning from static, document-based checks toward continuous, behavioral-driven assurance and unified compliance workbenches.

    www.scamwatchhq.com/identity-fraud-report-2025-2026-key-insights-and-analysis

    Sponsor: www.scamwatchhq.com www.cisomarketplace.com
    Show More Show Less
    13 mins
  • Navigating the Global AI Maze: From Binding Laws to Voluntary Guardrails
    Feb 3 2026

    Jurisdictions worldwide are developing AI governance policies that range from comprehensive "hard law" mandates like the EU’s AI Act to voluntary "soft law" frameworks favored by Singapore and the United Kingdom. While these approaches differ in legal enforceability and centralization, they coincide on core principles such as risk-based management and the establishment of dedicated safety institutes. The series also examines how existing privacy and intellectual property statutes serve as foundational baselines, driving new transparency requirements and shaping the legal environment through high-profile litigation like New York Times v. OpenAI

    www.compliancehub.wiki/global-ai-governance-comparative-analysis-of-legal-and-policy-frameworks

    Sponsors:

    https://airiskassess.com

    https://compliance.airiskassess.com

    https://cisomarketplace.services

    Show More Show Less
    15 mins
  • Africa’s Digital Frontier: A Story of Rights, Regulation, and Regional Convergence
    Feb 2 2026

    This podcast explores how African nations have transitioned from fragmented sectoral protections to comprehensive, rights-based data frameworks inspired by global standards like the EU GDPR. We delve into the pivotal role of regional instruments like the Malabo Convention and the rise of "enforcement maturity," where increasingly confident regulators are now holding both global tech giants and government departments accountable. Finally, we examine the strategic shift toward continental enforcement norms, AI governance, and the institutionalization of regulator-to-regulator learning to secure Africa's rapidly evolving digital economy.

    www.compliancehub.wiki/african-data-protection-frameworks-evolution-regulation-and-regional-convergence

    Sponsors:

    https://globalcompliancemap.com

    https://www.compliancehub.wiki

    Show More Show Less
    16 mins
  • The Frontline of Functionality: Swedish Businesses in Total Defence
    Jan 31 2026

    This podcast explores the "decisive role" Swedish businesses play in national resilience, ensuring that vital societal functions like energy, food distribution, and telecommunications continue to operate during armed conflict or severe crisis. We examine how companies prepare for the "two-week" continuity goal by mapping critical dependencies, implementing systematic cybersecurity measures—such as offline data backups—and training staff to recognize and resist malign information influence. Finally, the series details how public authorities and private enterprises coordinate through a "public-private collaboration" framework to manage complex threats, supply chain disruptions, and the mobilization of personnel for total defence duty.

    Sponsors:

    https://www.cisomarketplace.services

    https://www.compliancehub.wiki

    Show More Show Less
    16 mins
  • Beyond Fragmentation: Achieving Meta-Compliance with HSMS and L-FCF
    Jan 30 2026

    Organizations today are struggling with a rapidly growing system of overlapping European frameworks, such as NIS2, DORA, and the GDPR, which often results in duplication of work and high administrative burdens. By adopting a Harmonised Security Management System (HSMS) and the Layered Framework Control Fabric (L-FCF), these entities can implement a "meta-compliance" strategy where a single set of controls meets multiple legal and normative requirements simultaneously. This shift from "island solutions" to an integrated model significantly reduces audit overload while strengthening operational cyber resilience through a coordinated, organisation-wide management cycle.

    Sponsors:

    https://www.cisomarketplace.services

    https://compliancehub.wiki

    https://compliance.airiskassess.com

    https://eumapping.compliancehub.wiki

    https://baseline.compliancehub.wiki

    Show More Show Less
    18 mins
  • When Your AI Becomes the Breach: The Hidden Dangers of Agentic Skills
    Jan 27 2026

    We explore the rapid paradigm shift from passive chatbots to autonomous "agentic" AI, where new standards like the Model Context Protocol (MCP) grant systems the power to execute code and access sensitive files. Drawing on a massive empirical study of over 31,000 agent skills and real-world espionage campaigns like GTG-1002, we expose how attackers leverage "tool poisoning" and indirect prompt injection to hijack these agents for data exfiltration. Finally, we unpack essential defense strategies, including the NIST AI Risk Management Framework and the new OWASP Top 10 for Agentic Applications, to help organizations close the dangerous "consent gap" between user permissions and agent actions.

    • https://cisomarketplace.com/blog/agentic-desktop-agents-ai-local-file-access-security
    • https://cisomarketplace.com/blog/agentic-browser-revolution-ciso-guide-ai-attack-surface
    • https://cisomarketplace.com/blog/workflow-automation-blind-spot-zapier-n8n-power-automate-security
    • https://cisomarketplace.com/blog/ai-agent-security-crisis-mcp-vulnerabilities
    • https://cisomarketplace.com/blog/agent-skills-next-ai-attack-surface
    • https://breached.company/over-1-000-clawdbot-ai-agents-exposed-on-the-public-internet-a-security-wake-up-call-for-autonomous-ai-infrastructure/

    Sponsors:

    https://airiskassess.com

    https://compliance.airiskassess.com

    https://cloudassess.vibehack.dev

    https://vibehack.dev

    Show More Show Less
    30 mins