Prabh Nair

Prabh Nair

Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou

  1. 2D AGO

    How AI Makes you the Ultimate Work Pro

    In this episode, Prabh and Anas break down the AI tools every professional must learn in 2025 — not to replace jobs, but to become impossible to replace. Instead of talking about AI in theory, we walk through real, practical workflows for self-branding, productivity, HR automation, data analysis, dashboards, and research, using tools that are either free or extremely cost-effective.Anas begins with the idea of building your own AI tool library, something every working professional needs today. From using ChatGPT and Gemini for email filtering, personal branding, and productivity, to using AI as a self-service engine for sales data, HR approvals, payment verification, and daily workflow automation — the conversation shows you exactly how AI can remove friction from your day.We also explore Gemini’s ability to read emails, extract sales numbers, approve leave, filter calendars, and even automate HR policy responses. Prabh discusses how tools like Gemini can remove dependency on internal teams by auto-generating GRC dashboards, compliance summaries, and analytical views.Then, Anas demonstrates the power of AI-enhanced data analysis — using Google Sheets formulas generated by natural language, conditional logic, automated highlights, and dashboard creation. He also introduces Gemini Gold Canvas for dynamic dashboards and backend integration, making real-time analytics accessible to non-technical users.The episode moves into research and content creation with NotebookLM, showing how AI can summarize documents, generate mind maps, create notes, and produce presentations from your source material. We explore Consensus AI for credible research papers, Gamma AI for designing impactful presentations, and Perplexity as the most powerful free research engine in India today — capable of generating full reports, visuals, code, and structured insights using multiple AI models together.Whether you're in HR, sales, GRC, IT, operations, cybersecurity, management or a student preparing for the future — this session gives you a full AI playbook to improve your self-branding, accelerate your work, reduce manual tasks, and build a professional edge in 2025.If you’ve been searching for AI tools for self-branding, AI tools for productivity, how to use Perplexity, how to use Gemini, how to automate HR, AI research tools, or AI tools for dashboards, this episode covers everything in one place — step by step.#AITools #Productivity #SelfBranding #GeminiAI #PerplexityAI #NotebookLM #AIForBusiness #AIAutomation #FutureOfWork #AIResearch #GammaAI #GoogleSheetsAI #GRC #CareerGrowth

    1h 6m
  2. 3D AGO

    How the U.S. Helped Build Ukraine’s Secret Cyber Shield – A Proactive Defense Story

    When we talk about the war in Ukraine, we often think about tanks, missiles and soldiers. But behind the physical conflict, another war was unfolding — a silent digital battle that changed global cybersecurity forever.In this video, we explore how U.S. Cyber Command and Ukrainian defenders created one of the most effective cyber shields ever seen. Before the invasion, Ukrainian teams started actively hunting inside their own networks, identifying threats early and strengthening their defenses. So when Russia launched its major cyber attacks, Ukraine recovered faster than anyone expected.But the real turning point came from the United States. U.S. Cyber Command didn’t keep the intelligence they found in Ukraine to themselves. They collected the digital fingerprints of every Russian malware sample and shared it instantly with the FBI, allied nations and private companies like Microsoft and Google.That meant a piece of Russian malware discovered in Kyiv on a Tuesday was already being blocked automatically in hospitals across the U.S., banks in London and government networks in Tokyo by Wednesday.This is the power of proactive cyber defense — when one country’s hunt becomes the world’s shield.This video breaks down:✔ How Ukraine prepared for cyber attacks✔ How U.S. Cyber Command transformed threat intelligence into global protection✔ Why shared defense changed the rules of cyber warfare✔ How partnerships can outperform even the strongest attackersThis is the unseen story of the war — a moment when cyber defense evolved, alliances strengthened and the U.S. played a critical role in stopping a major digital assault.Cyberwarfare https://www.youtube.com/watch?v=naCEvt2LMCM&t=2645sCyberwarfarehttps://www.youtube.com/watch?v=fCvGXEPQ_4E&t=1sHashtags:#CyberSecurity #USCyberCommand #UkraineWar #CyberDefense #RussianHackers #ThreatIntelligence #CyberWarfare #ProactiveDefense #NationalSecurity #InfoSec

    6 min
  3. 4D AGO

    How to Prepare for ISSAP Certification

    In this podcast, Prabh Nair sits down with Aamir, who successfully cleared the ISSAP certification in his first attempt, to break down the real preparation journey behind one of the most challenging security architecture exams.Aamir shares his experience preparing for ISSAP with over 12 years of hands-on cybersecurity experience, explaining why ISSAP is not just a technical exam, but one that demands a security architect and enterprise mindset. He explains the revised ISAP structure, the four domains, and why Domain 3 (Infrastructure and System Security) carries the highest weightage and difficulty.The discussion covers how candidates should think while preparing for ISSAP, including the importance of defense-in-depth, secure-by-design, risk-based decision making, and understanding how security actually works inside large organizations. Aamir also explains why many candidates struggle with Domain 2 (Security Architecture Modeling) and how CISSP and CCSP concepts indirectly support ISAP preparation.We also discuss the ISSAP eligibility requirements, how the certification differs from CISSP and CCSP, the role of enterprise security architecture, IAM, federation, SSO, governance, and cloud architecture concepts that appear in the exam. Aamir shares honest insights about the lack of official resources, how he used books, CBK references, and practice techniques, and why patience and consistency matter more than shortcuts.Towards the end, the conversation moves into CISSP preparation strategy, where Aamir shares how understanding the ISC2 mindset, scenario-based questions, and architectural thinking helped him approach both ISSAP and CISSP with confidence.If you are planning to pursue ISSAP certification, security architecture roles, or want to understand what it really takes to clear advanced cybersecurity certifications, this episode gives you a realistic, experience-based roadmap.ISSAP Playlisthttps://www.youtube.com/playlist?list=PL0hT6hgexlYxZWJFIZbOqpkbKCT3u0ILeCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWv#issap #cissp #isc2

    50 min
  4. JAN 22

    Master IT Audit Walkthroughs — Real Case, Real Process, Real Learning

    Learn how to conduct an ITGC audit in this comprehensive video by Chinmay. Discover the ins and outs of ITGC auditing and how it works.This video is an eye-opener for every aspiring IT auditor.Forget theory—this is a real-world, step-by-step walkthrough of how audit control testing actually happens inside organizations.In this session, we go beyond certification talk and dive straight into practical auditing — from understanding a control to completing testing, writing workpapers, and preparing for review.🎯 What You’ll LearnHow to prepare for a walkthrough meeting like a professional auditorThe right questions to ask (and what to avoid)Managing discussions and taking notes effectivelyCapturing key process details and identifying critical control pointsWriting clear follow-up questionsCreating process flowcharts or outlines from your walkthroughDrafting a sample audit workpaper — with structure, evidence, and documentation best practicesThe sample documentation shared in this video is purely for educational purposes, showing you what every well-written audit workpaper should include. Every organization has its own format, but the fundamentals remain the same.This is the real day-in-the-life of an IT auditor — 8 AM to 5 PM.If you’ve ever wondered what auditors actually do beyond exams and checklists, this is your behind-the-scenes look.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWv#ITAuditWalkthrough#ControlTestingProcess#AuditWorkpaperExample#AuditDocumentation#AuditBestPractices#WalkthroughMeeting#AuditPreparation#InternalAuditTraining#CISAStudyGuide#ITGCTesting#AuditSampleDocs#AuditorLife#AuditInterviewPrep#InternalControlTesting#AuditWorkpaperWriting#ProcessWalkthrough#AuditEvidence#AuditFlowchart#RealWorldAudit#CISAPracticalSkills#AuditReviewProcess

    1h 24m
  5. JAN 21

    Prompt Injection Explained: The Most Dangerous AI Attack of 2025

    AI systems can now read websites, emails, documents, tickets, PDFs, and even trigger actions through plugins.That means one thing: if the AI can read it, someone can influence it.In this video, we go deep into the world of Prompt Injection, the fastest-growing attack on LLMs in 2025.Using insights from real research, real demos, and real enterprise failures, we explain how attackers hijack AI systems using hidden instructions, misleading content, and manipulated data — and how you can defend against it.This video is based on my full breakdown of LLM security failures and mitigations from LLM01: Prompt Injection. 00:00 - 00:45 – Introduction00:45 - 02:21 - Prompt Injection02:21 - 03:45 - Eg: Simple Analogy03:45 - 05:14 - Where Prompt Injection Shows Up05:14 - 05:35 - Typical Attackers Goals05:35 - 08:31 - Types of Prompt Injection08:31 - 09:56 - Eg: Direct Prompt Injection09:56 - 10:46 - Eg: Indirect Prompt Injection10:46 - 11:20 - Case Study-1 ChatGPT Plug-in Vulnerability (Direct Injection)11:20 - 12:32 - Not What You Sign For (Indirect Injection)12:32 - 13:14 - Why Prompt Injection is Dangerous13:14 - 14:13 - Key Risk Factors14:13 - 16:10 – Mitigation16:10 - 16:45 - CISO Lesson AI Practicalhttps://www.youtube.com/watch?v=XmbOUSX7IKc&list=PL0hT6hgexlYwHLdZR_oHvEKN_8IiAMBcU&pp=gAQBPractical Security Architecturehttps://www.youtube.com/watch?v=OhxAdrfHVs8&list=PL0hT6hgexlYwhCZaMSPd98vfYR-Aw9oWp&pp=gAQBGENAI Securityhttps://www.youtube.com/watch?v=aTJPKifa1VM&t=629s#PromptInjection#LLMSecurity#AISecurity#RAGSecurity#GenAISecurity#CyberSecurity#CISO#AIThreats#AIAttacks#TechExplained

    17 min
  6. JAN 20

    The CISO Mindset Shift: Approach Over Tools

    In this powerful episode, Yuval and Prabh break down what’s truly broken in cybersecurity today — our obsession with tools over thinking.If you’ve ever wondered why your security investments still fail to stop breaches, this conversation will change the way you look at risk, resilience, and leadership.💡 What You’ll LearnWhy understanding root causes matters more than chasing the latest toolsHow to balance business enablement and security without slowing growthThe evolution from EPP to EDR — and why detection timing mattersReal-world breakdown of secure browsing approaches (SWG, RBI, enterprise browsers)How to make security defensible and measurable through risk-based KPIsWhy AI security should be treated as part of your stack, not a separate domainHow to evaluate when to remove controls and rebalance your risk postureThe real meaning of continuous exposure management (CTEM) for CISOs in 2025🗣️ Key Discussion HighlightsSecurity must follow the business, not the other way around.Ask why before buying — not what’s trending.AI is just another vector in your stack — treat it like one.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWv#CyberSecurity #CISO #CyberResilience #SecurityStrategy #RiskManagement #CTEM #EDR #EPP #AISecurity #GRC #SecurityPodcast #RootCauseSecurity #SecOps

    59 min
  7. JAN 19

    Secure Coding in the Age of AI: What Devs Must Learn Now

    AI is changing how we code — and how attackers break systems.In this deep-dive conversation, Prabh and Mayank explore the new security challenges across frontend, backend, APIs, LLMs, supply chain, data pipelines, and infrastructure. From secure coding fundamentals to defending modern AI-driven systems, this episode is packed with real-world lessons developers and security teams can apply immediately.00:00 – 01:30 - Introduction, Guest welcome and his credentials 01:30 – 05:47 - Foundational Context and Core Premises05:47 – 08:30 - Importance of Secure AI coding08:30 – 09:50 - The Insecurity of LLM Outputs09:50 – 12:02 - Amplification of Attacks12:02 – 14:11 - Podcast Agenda14:11 – 21:25 - Front-end with example21:25 – 26:20 - Back-end26:20 – 31:10 – Database31:10 – 34:40 – Infrastructure34:40 – 37:04 – LLM and Prompt Injection37:04 – 39:33 - Output Filtering39:33 – 41:23 - Memory Attacks41:23 – 43:12 - Model Security43:12 – 54:24 - AI Supply Chain, Classics, and Future Threats54:24 – 57:40 - Incident prevention and always be ready57:40 – 01:03:40 – Typoglycemia01:03:40 – 01:09:40 - Due Diligence and Limited Visibility01:09:40 – 01:11:45 - Key challenges01:11:45 – 01:13:20 - Future Podcast Topic01:13:20 – 01:15:00 - End of the conversation by thanking Mayank Lau and looking forward to doing more Podcast.In this video, we break down everything developers and security teams must know about building secure systems in the age of AI. You’ll learn why AI-generated code isn’t automatically safe, how frontend vulnerabilities like XSS, SQL injection, sanitization failures, secrets exposure, and CORS issues still happen, and what it takes to design backend APIs that survive real attacks. We also go deep into LLM security — prompt injection, output manipulation, memory attacks, session poisoning, data theft, and how to secure agent pipelines the right way. You’ll understand the new AI supply chain risks, from unsafe data sources to third-party models, plus the importance of patching, hashing, and infrastructure monitoring for agentic systems. Finally, we discuss incident prevention and team mindset, covering MTTA/MTTR reduction, secure-team thinking, and why the right mindset protects you more than any tool.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWv#SecureCoding #AISecurity #LLMSecurity #PromptInjection #BackendSecurity #FrontendSecurity #APISecurity #DevSecOps #AIAttacks #SupplyChainSecurity #MLSecurity #AgenticSystems #DeveloperSecurity #CyberSecurity2025 #vibecoding

    1h 15m

Ratings & Reviews

5
out of 5
3 Ratings

About

Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou

You Might Also Like