Look for any podcast host, guest or anyone
Showing episodes and shows of

CyberTheory

Shows

Cybersecurity UnpluggedCybersecurity UnpluggedGenerative AI’s Impact on Cybersecurity MarketersDan Verton currently serves as the Director of Content Marketing at Uptycs, taking us through a deep dive into generative AI's role in reshaping cybersecurity marketing.2023-10-0343 minCybersecurity UnpluggedCybersecurity UnpluggedB2B Cybersecurity Leads: What’s the Best Method for Acquisition?Shaina Lanchin Zarrin is the Head of the Digital Department at the pioneering B2B marketing powerhouse - Xtra-mile, an Israeli-based marketing agency that specializes in lead generation for B2B technology and cybersecurity vendors.2023-09-1936 minCybersecurity UnpluggedCybersecurity UnpluggedContent Syndication as a Foundational Element of Lead GenerationFreya Ward, Global Sales Director for Headley Media, joins us for a deep dive into content syndication as a foundational element of lead generation.2023-08-2227 minCybersecurity UnpluggedCybersecurity UnpluggedCISO Community Management From the Vendor PerspectiveThis episode of Cybersecurity (Marketing) Unplugged features Dan DeSantis, Director or CISO Advisory in Cisco's Security Organization.2023-07-0524 minCybersecurity UnpluggedCybersecurity UnpluggedIsraeli Cybersecurity Investing...Or Should We Call It Company Building?Bobi Gilburd is the Chief Innovation Officer at Team8. Having served in the IDF's elite unit 8200 as a colonel for over 26 years, Bobi brings extensive cybersecurity knowledge and strategic acumen to his role at Team8. Leading the unit's research and cloud divisions, Bobi developed an innate understanding to the myriad of attack vectors across the global cyber landscape.2023-04-2519 minCybersecurity UnpluggedCybersecurity UnpluggedOT Security Marketing: Insights From the Plant FloorKamil Karmali has over 15 years of experience in cross-functional team leadership, global sales leadership, talent development & executive consulting in OT cybersecurity services.  He is currently the Sr. Global Manager of OT Cybersecurity Consulting Services with Rockwell Automation, a leading global industrial automation company founded way back in 1903. 2023-04-0423 minCybersecurity UnpluggedCybersecurity UnpluggedPart 2: Your Leads Suck, My Sales Rep Told Me So!Kevin Flint's mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he's spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.2023-03-0726 minCybersecurity UnpluggedCybersecurity UnpluggedPart 1: Your Leads Suck, My Sales Rep Told Me So!Kevin Flint’s mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he’s spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.2023-02-2827 minCybersecurity UnpluggedCybersecurity UnpluggedWebinars 3.0: The Cybersecurity Marketer's ChecklistMary Owen is the VP of marketing and demand generation at KnowBe4, who joins us today to discuss where webinars fit in with her content marketing and demand generation strategy.2023-02-2038 minCybersecurity UnpluggedCybersecurity UnpluggedThe Linux KernelCraig Box is the vice president of open source and community at ARMO. He is responsible for ARMO's open source Kubernetes security platform called Kubescape and for managing all relationships with the developer and open source community.2023-01-0435 minCybersecurity UnpluggedCybersecurity UnpluggedAre We Doomed?Patricia Muoio is a partner at SineWave Ventures in NYC, an early stage venture capital firm dedicated to helping new technology companies grow across the commercial and public sectors. 2022-12-2828 minCybersecurity UnpluggedCybersecurity UnpluggedProtecting Neutral NetworksTito Sestito is the co-founder and CEO of HiddenLayer, a cybersecurity startup in the business of preventing adversarial machine learning attacks. In this episode, Sestito is joined by John Kindervag, who we all know as the 'father of Zero Trust' and a friend to HiddenLayer. 2022-12-2133 minCybersecurity UnpluggedCybersecurity UnpluggedPlayers in the Crypto Space David serves as the Chief Insurance Officer for leading insurtech, Embroker. In this role, David is responsible for providing the strategic direction and leadership for the performance of Embroker’s insurance operations which include underwriting, claims, and other functions. David is an active member of the International Association of Privacy Professionals (IAPP) and holds designations as a Certified Information Privacy Professional (CIPP/US), a Certified Information Privacy Manager (CIPM) and is a Fellow of Information Privacy (FIP).    2022-12-1429 minCybersecurity UnpluggedCybersecurity UnpluggedSecuring The SaaS LayerGalit Lubetzky Sharon is the co-founder and chief technical officer of Wing Security and a retired colonel in the IDF, elite to A200 unit, the equivalent of our NSA. In this episode of Cybersecurity Unplugged, Lubetzky discusses Wing Security's inventory of SaaS applications that are being used, its relationship to the CISO and more.2022-12-0733 minCybersecurity UnpluggedCybersecurity UnpluggedThe CISO and The CyberattackSteve Stone is the vice president of Rubrik Zero Labs, which is a new cybersecurity research team that Stone leads. In this episode of Cybersecurity Unplugged, Stone breaks down The State of Data Security Report, how the CISO job level is affected by cyberattacks and more.2022-11-3036 minCybersecurity UnpluggedCybersecurity UnpluggedProtection in The PlatformStan Golubchik is the founder and CEO of ContraForce, a company whose mission is to simplify security tools. In this episode of Cybersecurity Unplugged, Golubchik weighs in on how their platform works in the cyberattack world and protecting smaller companies and more.2022-11-2330 minCybersecurity UnpluggedCybersecurity UnpluggedMachine Learning and AI: Where do we go?Liran Paul Hason is the co-founder and CEO of Aporia, a full stack machine learning observability platform used by Fortune 500 companies and data science teams around the world. In this episode of Cybersecurity Unplugged, Hason weighs in on the current state of AI and ML in cybersecurity and the most interesting and promising applications for these technologies right now.2022-11-1625 minCybersecurity UnpluggedCybersecurity UnpluggedIsolating Control SystemsJoe Weiss is the managing partner at Applied Control Systems, providing strategic consulting to optimize and secure control systems used in industry, manufacturing, transportation, building controls and defense. In this episode of Cybersecurity Unplugged, Weiss also discusses what control systems consist of, the two-fold problem between IT and the CISO, differences in IT in a control system world and more. 2022-11-0231 minCybersecurity UnpluggedCybersecurity UnpluggedThe Middle of the WarChris Dougherty is a senior fellow for the defense program at the Center for New American Security. His primary area of research includes defense strategy, operational concepts, and force planning. In this episode of Cybersecurity Unplugged, Dougherty discusses imagining a future of preparedness to launch a conventional warfare attack as Russia has on Ukraine, his view on what we can expect moving forward, as China has taken a lead in the disinformation space, and more. 2022-10-2651 minCybersecurity UnpluggedCybersecurity UnpluggedA World to ExploreFred Cohen is the CEO of Management Analytics, an assessment and planning advisory services litigation support, angel investment company with a long pedigree in cybersecurity. In this episode of Cybersecurity Unplugged, we're exploring the world of cybersecurity.2022-10-1943 minCybersecurity UnpluggedCybersecurity UnpluggedDigging Ourselves Out of a HoleChris Miller, Ph.D. is an associate professor of International History at The Fletcher School at Tufts University. Miller is a doctor whose research has focused on Russian history, politics and economics. He is also the author of "Putinomincs: Power and Money in Resurgent Russian," and "We Shall Be Masters: Russian Pivots to East Asia from Peter The Great to Putin."2022-10-1226 minCybersecurity UnpluggedCybersecurity UnpluggedThe World of Kubernetes and Cloud ContainersDr. Nikki Robinson, a full-time security architect for IBM, is an expert in statistical data analysis, quantitative methods and risk management. In this episode of Cybersecurity Unplugged, Dr. Robinson also discusses application development of Kubernetes and cloud containers, how we get our hands around the software supply chain as it relates to cloud containers and more. 2022-10-0530 minCybersecurity UnpluggedCybersecurity UnpluggedExposing VulnerabilitiesAmit Shah is the director of product marketing at Dynatrace and one of the guys who discovered the Log4j vulnerability early on. This episode dives into vulnerabilities.2022-09-2822 minCybersecurity UnpluggedCybersecurity UnpluggedExploring The World of PasswordsAndrew Shikiar, executive director of FIDO Alliance, knows more about the password economy than anybody else in the industry. Shikiar has been around both the open system standards space and the promotion and marketing of Linux and Java with a focus on identity management for companies like Sun Microsystems, with an emphasis on developer mindsets and the most recent acceleration of streaming media.2022-09-2126 minCybersecurity UnpluggedCybersecurity UnpluggedThe Geopolitical Playing FieldWe're fortunate enough to host a couple of the industry's best and brightest: Richard Bird and Tom Kellermann. Bird and Kellermann join us today to discuss each battlefield and what they think we need to do to prevail and turn the race back. To this, Kellermann weighs in on education.2022-09-1424 minCybersecurity UnpluggedCybersecurity UnpluggedBehind Agency DoorsNicolas M. Chaillan is the first chief software officer for the United States Air Force and Space Force and a former special adviser for cloud security and DevSecOps at the Department of Defense within the Office of the Secretary of Defense. Chaillan was also the former special advisor for cybersecurity and chief architect for cyber.gov at the Department of Homeland Security. 2022-09-0740 minCybersecurity UnpluggedCybersecurity UnpluggedProtecting Industrial SecurityMark Cristiano, the commercial director of global business services for Rockwell Automation, has spent the last 30 years in IT and enterprise and manufacturing systems leadership, about 19 of which were spent with Rockwell Automation.2022-08-3136 minCybersecurity UnpluggedCybersecurity UnpluggedCybersecurity WorkflowWhen Seemplicity was established, Sirkis and his team went through a comprehensive ideation process: speaking with more than 70 CISOs in the U.S., Europe and in Isreal. It was clear that the security team felt that they had enough tools to identify weaknesses and vulnerabilities across the organization. To this, Sirkis weighs in on how Seemplicity is creating a new category in the market.2022-08-2425 minCybersecurity UnpluggedCybersecurity UnpluggedThe World of Threat Landscape VisibilityDavid Monnier, chief evangelist at Team Cymru provides extensive threat landscape visibility beyond the perimeter to help threat hunters and analysts improve their abilities to identify cyberattacks in advance in today's world of threat intelligence.2022-08-1725 minCybersecurity UnpluggedCybersecurity UnpluggedCOVID-19's Impact on Cybersecurity MarketingFrom a marketing point of view, events are about brand awareness and demand generation, pipeline acceleration, media relations and more, but COVID-19 had different plans for marketers. Netzer weighs in on how difficult it's gotten to rise above the noise after transitioning to digital. 2022-08-1028 minCybersecurity UnpluggedCybersecurity UnpluggedAre We Prepared?Victoria Beckman is the director of the Digital Crimes Unit (DCU) for the Americas at Microsoft. DCU is responsible for implementing strategies to disrupt cybercrime. In this episode of Cybersecurity Unplugged, Beckman discusses the downstream implications of countries dispersing and distributing operations and data assets, how Microsoft and the DCU unit are dealing with cyberattacks, and how preparation is key, on and off the battlefield.      2022-07-2032 minCybersecurity UnpluggedCybersecurity UnpluggedDay ZeroMoshe Zioni, VP of security research at Apiiro has been researching security for over 20 years in multiple industries. In this episode of Cybersecurity Unplugged, Zioni discusses the downstream dependencies on other open source programs that are called by API, how organizations can best mitigate future ransomware attacks, specifically around supply chain and open source, and the difference between private and public repositories, giving the eight-times the number of exposed secrets in private repositories.      2022-07-1335 minCybersecurity UnpluggedCybersecurity UnpluggedHunting The Bad GuysJonatan Khanashvili is a senior research lead at Hunters who spends every waking moment hunting bad actors in cyberspace. In this episode of Cybersecurity Unplugged, Khanashvili also discusses how Hunters is dealing with the big golden SAML attack and how the attack works, detection and hunting techniques used to find and identify the bad guys, a potential solution, and who is at risk of a SAML attack, even a cybersecurity expert.      2022-07-0624 minCybersecurity UnpluggedCybersecurity UnpluggedCryptocurrency BloodbathRichard Bird is the chief product officer for SecZetta. Bird is a multi time C level executive in both the corporate and startup worlds and is internationally recognized for his expert insights, work and views on cybersecurity data privacy, digital consumer rights and identity centric security. He's also a senior fellow with the CyberTheory Zero Trust Institute.2022-06-2932 minCybersecurity UnpluggedCybersecurity UnpluggedSeparating the Hype From the RealityPeter Bordow is the senior vice president, principal architect and head of quantum systems and emerging technology for information and cybersecurity at Wells Fargo Bank. Before Wells Fargo. Anything that Bordow tells us today is his personal opinion and not the opinion or official position of Wells Fargo Bank. In this episode of Cybersecurity Unplugged, Bordow discusses the quantum computing hype versus reality: His assessment of our quantum program's current state and more.  2022-06-2228 minCybersecurity UnpluggedCybersecurity UnpluggedThe Nature of Application CodeRui Ribeiro is the CEO and founder of Jscrambler, a bootstrap global business that serves over 43,000 customers worldwide. In this episode of Cybersecurity Unplugged, Ribeiro discusses marketing material in website and application code and how his product works to identify corrupt code, the nature of polymorphic and how Jscrambler deals with it, and how the ever expanding threat landscape impacts Jscrambler.  2022-06-1523 minCybersecurity UnpluggedCybersecurity UnpluggedA New CISO HandbookChaim Mazal, CISO at Kandji, is the market leader in Apple device management and security. In this episode of Cybersecurity Unplugged, Mazal discusses what Kandji does to help organizations have seamless ease of development across the global landscape, the risk framework where CISOs can identify and prioritize threats, and the kind of leverage that's required for meaningful change.        2022-06-0827 minCybersecurity UnpluggedCybersecurity UnpluggedSafety In The Cloud In this episode of Cybersecurity Unplugged, Gupta discusses how her outbound marketing messaging suggests that you've embedded the five principles of Zero Trust Security into your approach, the product that Rubrik built towards protecting and managing data, and how Rubrik provides value in Zero Trust, data security and what it takes to provide data resilience to enterprises. 2022-05-1828 minCybersecurity UnpluggedCybersecurity UnpluggedTrusting Our Global Supply ChainTim Danks is the founder and an advisor/consultant for Global Risk Perspectives with 35 years of global experience in the Technology industry. In this episode, Danks discusses additional steps we need to take in terms of understanding our entire supply chain and identifying: What needs to be done to protect our critical infrastructure? Which aspects of our supply chain are at risk?  2022-05-0526 minCybersecurity UnpluggedCybersecurity UnpluggedA Marketer's CompetitionDavid Bruce is the global security lead for product marketing and the mainframe software division for Broadcom. Bruce has been in and around the market for years and knows how today's world is unprecedented in terms of noise levels and competition. There isn't a market without some competition, but there's insight as to why many of today's marketing approaches aren't quite cutting it. 2022-04-2733 minCybersecurity UnpluggedCybersecurity UnpluggedExpanding Your Marketing ProcessAs creator of Think.Design.Cyber. and the idea behind systems thinking feeding design thinking, Kale explores the need for and use cases around systems and design thinking in cybersecurity marketing. Kale discusses telling your systems marketing story in terms of what it provides and what outcome it creates and more.   2022-04-2027 minCybersecurity UnpluggedCybersecurity UnpluggedReflecting on The SolarWinds AttackRoger Sels is VP Solutions, EMEA at BlackBerry, helping maximize cyber program value and impact. Today, Sels is back to revisit the digital world of SolarWinds and the global threat landscape, as well as BlackBerry's point of view.2022-03-3031 minCybersecurity UnpluggedCybersecurity UnpluggedChanging Data Quantification in Security InsuranceLynn Peachey serves as the director of business development, connecting clients and partners with cyber security solutions at Arete Incident Response, an insurance company and security insurance space. In this episode of Cybersecurity Unplugged, Peachey uses her experience in cyber insurance to weigh in on the changes in data quantification in the security insurance space in terms of responding to the current ransomware epidemic.2022-03-1624 minCybersecurity UnpluggedCybersecurity UnpluggedThe Double-Edged Sword: AIHany Abdel-Khalik is an associate professor at Purdue University in the School of Nuclear Engineering and uses his background and expertise to discuss patterns he’s seen in AI and the ability to automate things that humans understand very well, how AI is skyrocketing all over the world in cybersecurity, and cybersecurity as a science: Understanding the impact of attacks and the knowledge behind systems that are taking in false information.2022-03-0229 minCybersecurity UnpluggedCybersecurity UnpluggedFilling The Gaps in Cyber WarfareDr. Chase Cunningham, also known as the 'doctor of Zero Trust, is the current chief strategy officer at Ericom Software. In this episode of Cybersecurity Unplugged, Dr. Cunningham discusses getting a bigger and better view of the Zero Trust model in cyber warfare, his book, Cyber Warfare - Truth, Tactics and Strategies: How different things are used to crawl through the applications of artificial intelligence and machine learning for threat, and looking into the future of Zero Trust and turning up the heat in the market.      2022-03-0220 minCybersecurity UnpluggedCybersecurity UnpluggedA Medical Approach to CybersecurityDr. Darren Williams is the CEO and founder of BlackFog, Inc., as well as a leader in on-device data privacy. In this episode of Cybersecurity Unplugged, Dr. Williams discusses how BlackFog applies medical professionalism to cybersecurity, medicine and design drug therapy in cybersecurity ransomware: the lifecycle of disease, spreading and destroying it, and defining behavioral analytics to protect the people and their data from ransomware attacks.      2022-02-2326 minCybersecurity UnpluggedCybersecurity UnpluggedPutting The Brakes on Physical DataDavid Kruger is the VP of strategy and co-founder of Abiso and uses his knowledge to weigh in on data hardening and its impact on identity and access management. In this episode of Cybersecurity Unplugged, Kruger discusses military intelligence and Abiso: Creating a new tactical battlefield communication system, the concept of data ownership vs. the information of data, and the future of the software engineering community and the movement of the manufacturing process.      2022-02-1623 minCybersecurity UnpluggedCybersecurity UnpluggedCloud Security: With Challenges Comes SolutionsAvi Shua is the brilliant CEO and co-founder of Orca Security and leader of Instant-On Cloud Security. In this episode of Cybersecurity Unplugged, Shua discusses his idea of a Cloud Security solution: Asset and infrastructure visibility, Cloud Orchestration and how Orca Security mediates the problem of extra layers and confusion, and how using the solution helps to identify risk sensitive data and speeds up the process.      2022-02-0923 minCybersecurity UnpluggedCybersecurity UnpluggedImproving The Market With Higher SecurityJeff Williams is the co-founder and CTO of Contrast Security and the founder of the OWASPA foundation. In this episode of Cybersecurity Unplugged, Williams discusses how working from home impacts software development and security, the use of executive order: Zero Trust, security labels and creating visibility in the market, and company mandates and making the market more competitive by achieving a higher level of security.      2022-02-0226 minCybersecurity UnpluggedCybersecurity UnpluggedChallenges in Today's World of Cybersecurity MarketingRavi Patil is Director of Product Management and Strategy at Broadcom. In this episode of Cybersecurity Unplugged, Patil discusses the importance of effective messaging in marketing, breaking away from the norm when it comes to engaging with your customers, and the human experience in MIT.      2022-01-2625 minCybersecurity UnpluggedCybersecurity UnpluggedBrand Narratives and Awareness in CybersecurityKyle Flaherty is the SVP of global marketing for Cybereason and a tech executive who is known for launching high-profile technology startups with four successful exits. In today's episode of Cybersecurity Unplugged, Flaherty discusses: The impact of Cybereason's brand; Importance of brand campaign awareness Effective brand campaigns to focus on and why.  2022-01-1924 minCybersecurity UnpluggedCybersecurity UnpluggedThe Impact of Digital Transformation on BusinessPete Hanlon is the group chief technology officer for Moneypenny and has spent about 25 years in the IT and InfoSec business. In this episode of Cybersecurity Unplugged, Hanlon discusses: Digital transformation from a business impact point of view; The goal of digital transformation; Building a culture of change with digital transformation. 2022-01-1224 minCybersecurity UnpluggedCybersecurity UnpluggedHow to Approach the Reality of Remote Work Cali Yost is the leading authority on high performance work flexibility, a visionary workplace futurist, strategist, author and keynote speaker. In this episode of Cybersecurity Unplugged, Yost discusses: The security vulnerabilities that remote work has created; Remote work and its impact on productivity and social conventions; How the reintegration of the hybrid workforce is placing pressure on employees and causing resignations. 2022-01-0631 minCybersecurity UnpluggedCybersecurity UnpluggedThe Global Impact of Digital TransformationRudy Shoushany has wide experience in the information technology field, particularly in the financial sector with over 20 years of experience which gives him the ability to aid organizations. In this episode of Cybersecurity Unplugged, Shoushany discusses: How to tackle the global talent shortage; The differences in the UAE and the US's approach to digital transformation; How adopting a digital transformation strategy can solve the problems our world is facing. 2021-12-2925 minCybersecurity UnpluggedCybersecurity UnpluggedMeet the Guardians of Critical Infrastructure Redvers "Red" Curry is the chief marketing officer at vFortified, a leader in the IoT device identity space. vFortified uses a unique, intelligent, disconnected external receptor to instrument a device's electromagnetic footprint and then they process that telemetry in the cloud in real-time. In this episode of Cybersecurity Unplugged, Curry discusses: Threat detection for operational technology and how the vFortified product was developed; Merging of digital security and physical security to ensure the supply chain remains uninterrupted; How culture and time constrains the possibilities of technical innovation; The "why" behind vFortified's mission...2021-12-1525 minCybersecurity UnpluggedCybersecurity UnpluggedMaking Cybersecurity Marketing People CentricSherry Lowe is the distinguished chief marketing officer at Exabeam. She was also the former CMO at Expanse and served in a similar role at Druva and Splunk. In this episode of Cybersecurity Unplugged, Lowe discusses: Standing out in a market full of lookalikes; Not allowing a focus on metrics to run and ruin marketing efforts; Eliminating the competitive nature between sales and marketing. 2021-12-0823 minCybersecurity UnpluggedCybersecurity UnpluggedNo Pain, No Gain, Zero TrustDr. Chase Cunningham, aka the ‘Doctor of Zero Trust’, is a recipient of industry awards like the Most Influential People in Security, and is currently Ericom’s chief strategy officer. In this episode of Cybersecurity Unplugged, Dr. Cunningham discusses: How the Zero Trust strategy was developed and has existed for nearly 20 years now; How to deal with the discomfort of change while implementing Zero Trust; How best to utilize artificial intelligence and machine learning solutions in cybersecurity. 2021-12-0121 minCybersecurity UnpluggedCybersecurity UnpluggedZero Trust: Practice Makes Better Tony Scott is the chairman of the TonyScottGroup and a senior advisor for cybersecurity and policy at Squire Patton Boggs, a prominent international law firm. Until January of 2017, he was serving as the CIO within the Obama administration. In this episode of Cybersecurity Unplugged, Scott discusses: How sacrificing security for interoperability got us to where we are today; Taking an incremental approach to zero trust; Pervasive problems with poor cyber hygiene; The top legal issues facing software and cybersecurity companies. 2021-11-1727 minCybersecurity UnpluggedCybersecurity UnpluggedSecurity Strategy for the BlockchainAri Redbord is the head of legal and government affairs at TRM Labs, the leading blockchain intelligence company in the industry. Prior to joining TRM, Redbord was the senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the US Treasury. In this episode of Cybersecurity Unplugged, Redbord discusses: Tacking down criminals by tracing the flow of funds from ransom payments; Threats in crypto and the blockchain; Modernizing laws regarding cybercrime. 2021-11-1028 minCybersecurity UnpluggedCybersecurity UnpluggedSecuring Healthcare SystemsDan Bowden is the CISO at Sentara Health, a 130-year-old health care provider with a team of 30,000 people delivering quality healthcare across 12 hospitals. In this episode of Cybersecurity Unplugged, Bowden discusses: Blockchain solutions in healthcare; The shift to telemedicine; Real risks around medical device security. 2021-11-0429 minCybersecurity UnpluggedCybersecurity UnpluggedEverything is HackableTed Harrington is the author of Hackable: How to do Application Security Right and the executive partner at Independent Security Evaluators. In this episode of Cybersecurity Unplugged, Harrington discusses: The dangers of connected medical devices and how he and his team have identified vulnerabilities in passive medical devices; How most organizations are doing it wrong and don’t understand how to secure software systems; The problem that inspired him to write Hackable; Vulnerabilities in the blockchain and how he discovered an active crypto robbery in progress. 2021-10-2728 minCybersecurity UnpluggedCybersecurity UnpluggedBuilding Brand Trust Through Contact and ExposureSam Curry is the chief security officer at Cybereason. He has devoted his career to empowering defenders in cyber conflict and fulfilling the promise of security enabling a safe, reliable, connected world. In this episode of Cybersecurity Unplugged, Curry discusses: Financing and building up an agile cybersecurity company; Improving company recognizability and trust by using commercial media, streaming and Cybereason's signature owl; How SMBs can increase visibility into indicators of compromise. 2021-10-2022 minCybersecurity UnpluggedCybersecurity UnpluggedSolving Digital IdentityJeremy Grant is the managing director of technology business strategy for Venable. Grant has been a major contributor to improving the privacy and security of sensitive online transactions as a senior executive advisor to the National Strategy for Trusted Identities in Cyberspace, which is part of the NIST identity management, authentication and proofing initiative. In this episode of Cybersecurity Unplugged, Grant discusses: How zero trust will affect the traditional landscape; Enabling open healthcare with security in mind; The increasing difficulty of doing identity proofing properly; The potential impact of recent executive orders on cybersecurity.  2021-10-0725 minCybersecurity UnpluggedCybersecurity UnpluggedConsequences of Identity Done WrongEve Maler is the distinguished CTO at ForgeRock. Previously, she was an identity solutions architect with PayPal and a technology director at Sun Microsystems where she co-founded and made major contributions to the SAML standard. In a previous life, she co-invented XML. In this episode of Cybersecurity Unplugged, Maler discusses: Creating an architecture for meaningful consent; Social sign-on, single sign-on and the battle between convenience and security; A real path to passwordless authentication; Decentralized identity and how well we are doing with identity proofing. 2021-09-3028 minCybersecurity UnpluggedCybersecurity UnpluggedChallenges of Cybersecurity Events MarketingDavid Elichman is the vice president of global events at Information Security Media Group (ISMG), where he leads a global team that manages to create and curate events that attract thousands of cybersecurity professionals around the world In this episode of Cybersecurity Unplugged, Elichman discusses:   Using relevant content and compelling speakers to drive engagement; The evolution of technology to keep pace with the rapid increase in virtual and hybrid events; Calculating costs when managing the production of complex hybrid events; The significance of building brand trust with your sponsors, audience and speakers.  2021-09-2224 minCybersecurity UnpluggedCybersecurity UnpluggedEmbracing Public-Private Partnership in CybersecurityDon Cox is the distinguished CISO at American Public Education, Inc. and former CISO at MEDNAX, a multi-billion dollar healthcare network with 8,000 employees. Cox also spent the majority of his prior career working for federal agencies in cybersecurity. He's had leadership experience at Ise, the Department of Energy, State Department, parts of Health and Human Resources, and the US Secret Service. In this episode of Cybersecurity Unplugged, Cox discusses: The possibilities for improving the government's cybersecurity posture through the Cybersecurity and Infrastructure Security Agency (CISA); Shifting our cybersecurity approach from a defensive...2021-09-1622 minCybersecurity UnpluggedCybersecurity UnpluggedDistilling Complexity Through Design ThinkingBrian Barnier is the distinguished director of analytics at ValueBridge Advisors. Barnier is also professor of operations finance and economics at the graduate level across several U.S. universities. He is the 2021 recipient of the Joseph J. Wasserman award. In this episode of Cybersecurity Unplugged, Barnier discusses: The coursework on applying critical and design thinking to cybersecurity that Barnier is developing for CyberEd.io; How cyber risk differs from other business continuity risks; The cybersecurity initiatives coming from Washington and predictions on their effectiveness. 2021-09-0829 minCybersecurity UnpluggedCybersecurity UnpluggedUnfettered Digital Doors: Complacent or Complicit? Andy Jenkinson is the Group CEO of Cybersec Innovation Partners (CIP), the United Kingdom's PKI and cryptography governance and management team of experts. In this episode of Cybersecurity Unplugged, Jenkinson discusses: The correlation between the increase in website numbers over the last 20 years and the increase in cyber losses; Why governments building offensive security capabilities incentivized ignoring defensive security; How some of the biggest players in the industry are their own worst enemy when it comes to security; His thesis for how we can get out of the seemingly insurmountable web of...2021-08-1236 minCybersecurity UnpluggedCybersecurity UnpluggedPerplexing Problems: Security, Privacy, ComplexityRebecca Herold is CEO and co-founder of Privacy and Security Brainiacs. She's also a Ponemon Institute fellow and the CEO and founder of Rebecca Harold LLC, a cloud-based privacy and security firm. She is currently finishing her 20th published book on information security and privacy. In this episode of Cybersecurity Unplugged, Herold discusses: The gap in cybersecurity education and how to incorporate information and cybersecurity, as well as privacy, into public school curriculum; How to fully and successfully address privacy whether from the lens of compliance, governance or the intersection between the n...2021-08-0434 minCybersecurity UnpluggedCybersecurity UnpluggedArt of the Possible: Autonomous Real-time Patching David Brumley is the CEO of ForAllSecure, a cybersecurity company whose products are based on Mayhem, the amazing machine that David designed to autonomously and in real-time apply patching and continuous penetration testing. In this episode of Cybersecurity Unplugged, Brumley discusses: Software flaw detection and how Brumley developed Mayhem; Brumley's contract with the Pentagon to find coding flaws in operating systems and custom programs used by the US military; Legal barriers to autonomously fixing software bugs. 2021-07-2823 minCybersecurity UnpluggedCybersecurity UnpluggedAI and Big Data Wage the War on CybercrimeJoe Head is co-founder of INTRUSION, a cybersecurity company that approaches cyber defense from the inside out, leveraging real-time AI to kill cyberattacks before they become breaches.  In this episode of Cybersecurity Unplugged, Head discusses: The difference between trying to modify human behavior and implementing robust security; How INTRUSION's product, Shield, satisfies the principles of zero trust; How big data, historical reputation references and AI will win the war on cybercrime. 2021-07-2128 minCybersecurity UnpluggedCybersecurity UnpluggedCybersecurity Impacts on the Global EconomyKadee Russ specializes in open-economy macroeconomics and international trade policy. She is a professor of economics at the University of California, Davis and is affiliated with the National Bureau of Economic Research, serving as a faculty research associate for the NBER's International Trade and Investment program and as co-organizer of the International Trade and Macroeconomics workshops. In this episode of Cybersecurity Unplugged, Russ discusses: The correlation between cybersecurity and global economics; How AI is transforming international trade and the broadening range of supplies and services offered overseas; China's Belt and Road Initiative a...2021-07-1423 minCybersecurity UnpluggedCybersecurity UnpluggedSatisfying the Shortage in Cyber Warriors Rob Clyde is a senior board director of ISACA, the chairman of the board for White Cloud Security and an advisor to ShardSecure. Rob has a long history in cybersecurity education and training. ISACA's recent 2021 State of Cybersecurity Study reported that 61% of respondents say that cybersecurity teams are understaffed and 55% report that they have unfilled cybersecurity positions. Among other topics, Rob and Steve theorize about the best strategies to close the cybersecurity skills and talent gap, from training non-security employees to pivot in their career to educating children in K-12. 2021-07-0726 minCybersecurity UnpluggedCybersecurity UnpluggedPersonal Identity Wallet Back in PocketRichard Bird is the chief customer information officer for Ping Identity. Bird is a well-known, identity-centric security expert, a former CISO and CIO. In addition, Richard serves as the global head of identity for JPMorgan Chase's consumer businesses.  In this episode, Bird discusses: How deep do the application controls need to go if identity is the new perimeter; Personal identity wallets as a possible solution to the identity and credentials issue; SSO, multifactor and behavioral authentication; The balancing act of privacy and security. 2021-06-3031 minCybersecurity UnpluggedCybersecurity UnpluggedThe Venture Capitalist's View of Cybersecurity Roger Lang is the general partner of the venture capital fund known as BCP Blitz. Rogers is also the CEO and founder of Predicta.com, the leader in advanced AI market analytics and data science. In this episode of Cybersecurity Unplugged, Lang discusses: The venture capitalist's view on the state of cybersecurity; How economic issues are causing global ecological issues such as Chronic Wasting Disease; The comingling of security and economic issues and expectations for this White House; How cyber education is key to national cybersecurity. 2021-06-2329 minCybersecurity UnpluggedCybersecurity UnpluggedDigital Vaccine to Prevent Ransomware VirusTal Kollender is the CEO, co-founder and CISO of GYTPOL, a company whose product monitors and remediates risks caused by misconfigurations. GYTPOL changes the way organizations protect themselves by seeing their network through the eyes of a hacker. In this episode of Cybersecurity Unplugged, Tal Kollender discusses: The lessons learned from the Colonial Pipeline attack; How GYTPOL "thinks like a hacker" in order to prevent hacks; How misconfiguration is the largest attack vector and how to fix it; Marketing noise in the cybersecurity space. 2021-06-1620 minCybersecurity UnpluggedCybersecurity UnpluggedThe National Security Threat of NarcissismElisabeth Braw, is resident fellow at the American Enterprise Institute and a columnist at Foreign Policy Magazine. She also frequently writes op-eds for the Wall Street Journal, the Financial Times and Politico. In this episode of Cybersecurity Unplugged, Braw discusses: The Colonial Pipeline attack and our lack of preparedness; How to create more public awareness about responding to cyberattacks; The history of solar and our resource dependencies on China; How narcissism is a national security threat. 2021-06-0930 minCybersecurity UnpluggedCybersecurity UnpluggedCyber Insurance Questions? We've Got You CoveredLynn Peachey is an expert in cyber insurance, currently serving as the Director of Business Development at Arete Incident Response, a company in the cybersecurity insurance space. In this episode of Cybersecurity Unplugged, Peachey discusses: What cybersecurity insurance is and what it covers; What would have happened if Colonial Pipeline had been insured; Risks, rates and trends in the insurance industry. 2021-06-0330 minCybersecurity UnpluggedCybersecurity UnpluggedTeaching to Create, Not Consume TechnologyHeather Monthie, PhD is an accomplished cybersecurity professional, leader, author, podcaster and mentor. She has nearly 25 years experience in cybersecurity, computer science, IT, aviation and STEM education. She has served as a vice president, dean and Professor of IT and cybersecurity and has served in leadership positions in STEM and CTE education in K-12 and higher education. Dr. Monthie currently serves on the Board of Directors for the AZ Cyber Initiative, a non-profit dedicated to high school cybersecurity education.2021-05-2622 minCybersecurity UnpluggedCybersecurity UnpluggedEliminating the Threat of RansomwareJanine Darling is the founder and CEO of STASH, a data compromise and ransomware protection solution. She is an award-winning CXO and technical strategist who has held prominent leadership roles for commercial product and service companies of multiple genres. She has driven the expansion and profitability of many well-known global brands including Sony, Barnes & Noble, Everlast, Chanel, Mark, Nestle, Samsung and Starbucks. Her expertise in devising innovative business strategy and leveraging well considered risk to optimum outcome is well documented. Darling's commitment to transparency and trustworthiness is a constant; customers are always center stage.2021-05-1933 minCybersecurity UnpluggedCybersecurity UnpluggedHow 'Just Plain Old Ransomware' Took Down Colonial PipelineRichard Stiennon is the chief research analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,600+ vendors in the IT security industry. He has held leadership positions at PricewaterhouseCoopers, Webroot and Fortinet. Previously, he was a research VP at Gartner for their IT Security Research Practice and held CMO and CSO roles.2021-05-1433 minCybersecurity UnpluggedCybersecurity UnpluggedColonial Pipeline and Ransomware: The Kalashnikov of 2021Tom Kellermann is the head of cybersecurity strategy for VMware. Prior to this role, Kellermann was the chief cybersecurity officer for Carbon Black. Tom serves as the Wilson Center’s Global Fellow for Cybersecurity Policy and sits on the Technology Executive Council for CNBC. In this episode, Kellermann discusses: The vulnerability of U.S. energy infrastructure; The geopolitical motivations behind the Colonial Pipeline attack; What Colonial should do now to mitigate the damage. 2021-05-1121 minCybersecurity UnpluggedCybersecurity UnpluggedCreating Pathways for Women in TechSheryl Root is Program Director of Carnegie Mellon University's Silicon Valley MSc in Technology Ventures program and Sandy Carter is Vice President, Public Sector Partners and Programs at AWS. As two successful women in tech, Sandy and Sheryl recognize that there's a lot of work to be done to increase the number of women in tech, but they are nowhere near giving up. In this episode, Root and Carter discuss: How they each pivoted into their current careers; How to create pathways for women in tech; Collaboration and collective knowledge building in cybersecurity; And...2021-05-0639 minCybersecurity UnpluggedCybersecurity UnpluggedBuilding Top-Notch Talent in Cybersecurity Ibrahim "Abe" Baggili is an internationally recognized expert in cybersecurity and digital forensics. He is the founder and co-director of the University of New Haven’s Cyber Forensics Research and Education Group. In this episode, Dr. Baggili discusses: The cybersecurity talent gap and how to address it; What it takes to build top-notch talent and identify programs that promote excellence; How he became interested in digital forensics; And his advice for anyone who wants to get into the field of cybersecurity. 2021-04-2825 minCybersecurity UnpluggedCybersecurity UnpluggedHow Zero Trust Is Inverting the Way We Do CybersecurityAlthough the news of the growing attack surface continues to heighten, there has not been a necessary change in how we protect and defend. This what Kindervag has set out to change. In this episode, John Kindervag, the creator of zero trust, discusses: How to practically implement zero trust; Shifting focus from worrying about the attack surface to securing the "protect surface"; The future threat of quantum and the fear of falling behind; And the difference between digital and kinetic warfare.  2021-04-2126 minCybersecurity UnpluggedCybersecurity UnpluggedA Holistic Approach to Cybersecurity and ComplianceIncreasing compliance standards can be confusing and overwhelming but they also signal a recognition of the fact that one company's vulnerability affects us all in our interconnected digital world. In this episode, Mike Ferris and Mike Brooks of Abacode, a leading Managed Cybersecurity and Compliance Provider, discuss: The convergence of cybersecurity and compliance in the new category MCCP; How MSSPs can avoid getting attacked themselves; And the future of cybersecurity and compliance. 2021-04-1425 minCybersecurity UnpluggedCybersecurity UnpluggedImplementing Security at a National LevelHaving worked for both the White House and Huawei, Pudry explains that fear of Huawei is misdirected. Bad actors simply aren't asking permission from suppliers when hacking into their products. Andy Purdy is the Chief Security Officer for Huawei Technologies USA and former member of the White House staff. In this episode Purdy discusses: Expectations and challenges for the new administration; Holding our allies accountable and putting mutual trust agreements in place; His career path from lawyer to CSO; And how to implement cybersecurity best practices at a national level. 2021-04-0730 minCybersecurity UnpluggedCybersecurity UnpluggedRecognizing and Adapting to the New RealityThere's no doubt that our world has changed, but there's a sharp distinction between acquiescing to our new state as 'normal' and adapting to the threats of our new reality. In this episode, Morgan Wright, Chief Security Advisor at SentinelOne, discusses: The SolarWinds and Accellion breaches and attribution of the attacks; How to secure critical infrastructure and the failure of Congress to understand the technical issues; Adapting our environment to the new reality; And predictions and expectations for the future of cybersecurity. 2021-03-3126 minCybersecurity UnpluggedCybersecurity UnpluggedCyberspace: The Next DomainIt's no secret that there's a shortage of cybersecurity professionals with the skills needed to wage the war in cyberspace. In this episode of Cybersecurity Unplugged, Mika Devonshire, who works in digital forensics and incident response at S-RM discusses: Her career path moving from the liberal arts into cybersecurity; Attribution of the SolarWinds and other recent attacks; And her outlook on the field of modern digital forensics.2021-03-2423 minCybersecurity UnpluggedCybersecurity UnpluggedAttacks Accelerating Faster than 5GSpeed is the enemy of security and as 5G is widely adopted and internet speeds increase, the threat also increases. In this episode of Cybersecurity Unplugged, Dr. Rebecca Wynn discusses: The future of work-from-home; The impact of 5G on cybersecurity; The difficulties of securing the healthcare sector; And artificial intelligence and deep fakes.2021-03-1727 minCybersecurity UnpluggedCybersecurity UnpluggedA Pivotal Moment for CybersecurityThere's a cycle of intense action followed by complacency that comes with any major security incident including the recent SolarWinds breach. In this episode of Cybersecurity Unplugged, Anup Ghosh, CEO of Fidelis Cybersecurity, discusses: How to take advantage of this pivotal moment; How deception technology allows you to shape the attack surface of your network; The impending impact on cyber from 5G; And the possibility of government and private industry partnerships.2021-03-1023 minCybersecurity UnpluggedCybersecurity UnpluggedThe New Normal: Complexity and ResilienceWhen a digital device becomes our lifeline to the rest of the community and the world, we need to make sure that these digital lifeboats are secure. In this episode of Cybersecurity Unplugged, Christy Wyatt, CEO at Absolute, the leading company in endpoint resilience, discusses: How enterprises and educational institutions have adapted to the new normal; The importance of building security technology into the hardware of devices; The social impact of the pandemic; And the cybersecurity literacy and skills gap.2021-03-0319 minCybersecurity UnpluggedCybersecurity UnpluggedWho's Watching the Watchers?What happens when no one is watching the watchers, when the solution you're trusting for the security of your organization has security issues itself? In this episode of Cybersecurity Unplugged, Jeremy Rasmussen, CTO at Abacode, a Managed Cybersecurity and Compliance Provider (MCCP), discusses: Taking a holistic view of cybersecurity; The biggest gaps in cybersecurity education today; The best approach to zero trust; And what was the root cause of SolarWinds: the attackers or incompetence.2021-02-2425 minCybersecurity UnpluggedCybersecurity UnpluggedHubris Before the Havoc at SolarWindsPride comes before a fall. That was certainly the case with SolarWinds, who were warned by Ian Thornton-Trump of their security shortcomings back in 2017. In this episode of Cybersecurity Unplugged, Thornton-Trump, CISO at Cyjax and former security adviser to SolarWinds discusses: The history of SolarWinds and his warning to them; The current threat landscape and our biggest vulnerabilities today; And how best to incentivize proper cybersecurity hygiene.2021-02-1827 minCybersecurity UnpluggedCybersecurity UnpluggedStepping into a Digital First EconomyWe can't avoid it any longer, we're digital people living in a digital world. We have digital identities, make online purchases, work from remote offices and almost everything we do is conducted digitally. It's no wonder that the biggest challenges we face today are digital as well. In this episode of Cybersecurity Unplugged, Chuck Brooks, respected cybersecurity thought leader, influencer and technology evangelist, discusses: Possible attribution of the SolarWinds and Accellion hacks; Our national state of cybersecurity preparedness; And his long-term outlook for cybersecurity defense.2021-02-1019 minCybersecurity UnpluggedCybersecurity UnpluggedChasing the Unattainable Aim of SecurityHow is it that the adversary always seems to be advancing faster than we can possibly keep up and what is the best strategy in the unwinnable game of cybersecurity? In this episode with Gene Spafford, professor of computer science at Purdue University and executive director emeritus at the Purdue University Center for Education and Research in Information Assurance and Security, we discuss: Who and what could be behind the pileup of attacks on security vendors; How our democracy and freedom of speech allows for exploitation by the adversary; Why our current solutions seem to create more problems than...2021-02-0432 minCybersecurity UnpluggedCybersecurity UnpluggedMoving at the Speed of the FutureDeep fakes, 5G, AI-powered cyberattacks, technology is advancing at warp speed and security is struggling to keep up. In this episode with Sahir Hadayatullah, co-founder and CEO of Smokescreen Technologies, a market-leading deception technologies company, Hadayatullah discusses: How deception technology has brought honeypots into the 21st century; How deep fakes will make it impossible to tell a real person from a synthetic digital identity; The pros and cons of active defense and offensive security; And anticipating the dangers of AI-powered cyberattacks.2021-01-2918 minCybersecurity UnpluggedCybersecurity UnpluggedFrom the Information Age to the Age of MisinformationWe've quickly gone from the Information Age to the Age of Misinformation and all of us are struggling to keep pace with the speed of the digital world. In this episode of Cybersecurity Unplugged, Gabriel Friedlander, founder of Wizer, an educational platform with a mission to make basic security awareness training free for everyone and Chris Roberts, vCISO, researcher and hacker discuss: How the pandemic has shone a glaring light on where we are with security and supply chain deficiencies; How the average citizen can defend against cyber and propaganda attacks; And the need to take a step away...2021-01-2326 minCybersecurity UnpluggedCybersecurity UnpluggedPresidential Transition and the National Threat of CyberThe most inexpensive, highly destructive and highly deniable weapon known today is a cyberattack. In this episode with Gregory Touhill, current president of AppGate and formerly the federal government's first CISO, we discuss cybersecurity from a national security standpoint and how to securely approach the transition in administrations.2021-01-1524 minCybersecurity UnpluggedCybersecurity UnpluggedConfronting the Reality of the SolarWinds AttackThere's no doubt that the SolarWinds attack has wracked the cybersecurity community. In this episode with Roger Sels, Vice President Solutions, EMEA at BlackBerry, we discuss what really happened, the tricky question of attribution, lessons learned, and the state of cybersecurity defense today.2021-01-0828 min