All Episodes

Browse our complete archive of conversations with industry leaders.

From Cookies to Data Brokers: Paul Mander on the Future of Privacy
September 5, 2025

From Cookies to Data Brokers: Paul Mander on the Future of Privacy

What started as “better browsing experiences” has become a multi-billion-dollar data broker industry. Paul Mander joins to expose how your personal info gets collected, sold, and weaponized—and what can be done about it. 00:00 Intro – Data as the fuel of AI & advertising 01:00 Paul’s career path from telecom to adtech pioneer 02:30 BlueKai, cookies, and selling data to Google 05:00 The evolution of cookies: personalization vs. privacy 08:00 When anonymized data stopped being anonymous 11:00 GDPR and the shift in privacy awareness 15:00 Why the EU acted and the US lagged behind 20:00 CCPA, apathy, and the “I have nothing to hide” myth 23:00 Data brokers explained: from ZoomInfo to Spokeo 27:00 What kind of data is out there—and how it’s misused 31:00 Real-world harms: doxing, identity theft, even violence 35:00 How quickly your new address ends up online 41:00 Why it’s nearly impossible to scrub your own data 45:00 OptOut requests, obstacles, and shady broker tactics 52:00 How automation and AI fight back against brokers 59:00 Continuous scanning and removal at scale 01:05:00 Why employee data is the weakest corporate link 01:09:00 Playing offense against phishing & social engineering 01:15:00 Optery’s enterprise approach and proof-based removals 01:20:00 The future of privacy and empowering consumers 01:22:00 Closing thoughts & how to get started with Optery

Why This Cyber Industry Veteran Says AI Is Coming for Your Job (And How to Fight Back)
August 7, 2025

Why This Cyber Industry Veteran Says AI Is Coming for Your Job (And How to Fight Back)

Cybersecurity pioneer Kathie Miley shares shocking predictions about the future of ransomware, why AI recruiting is killing diversity in cybersecurity, and her battle to keep human expertise at the center of an increasingly automated industry. From the first cybersecurity company to today's AI-driven threats, get insider insights on building true cyber resilience. Join us for an eye-opening conversation with Kathie Miley, a cybersecurity industry pioneer who witnessed the evolution of information security from its earliest days. As someone who worked at the very first cybersecurity services company (before it was even called "cybersecurity"), Kathie brings a unique perspective on where the industry is heading—and it's not all good news. 0:00-5:00 - Introduction and Kathie's background 5:00-10:00 - Early career journey: Artist to cybersecurity pioneer 10:00-15:00 - Industry evolution: From information security to cybersecurity 15:00-22:00 - The cybersecurity talent crisis and hiring problems 22:00-30:00 - AI in cybersecurity: Benefits, risks, and ethical concerns 30:00-35:00 - Ransomware evolution: The coming physical threat wave 35:00-42:00 - Business resilience: Frameworks and real-world examples 42:00-47:00 - Personal resilience: Dealing with burnout in cyber leadership 47:00-50:00 - Final advice and where to connect with Kathie

From Off-Grid Homestead to Elite Cyber Threat Hunter
August 5, 2025

From Off-Grid Homestead to Elite Cyber Threat Hunter

Most cybersecurity professionals stumble into the field by accident. But Scott Scher? He deliberately chose to live off-grid for four years, completely disconnected from the digital world that was exploding around him in 2010-2014. No social media, no smartphones, just growing food and digging holes on a homestead. And that unconventional choice? It's exactly what made him one of the most sought-after cyber threat intelligence analysts in the industry today. Because while everyone else was getting lost in the noise of technology, Scott was learning something far more valuable - how to understand the human psychology behind every cyber attack. Today, he's going to reveal the counterintuitive strategies that elite threat hunters use to stay ahead of nation-state actors, criminal organizations, and the most sophisticated adversaries on the planet 00:00 Introduction and Greetings 00:07 Diverse Backgrounds in Cybersecurity 00:40 Scott's Journey to Cybersecurity 02:08 Living Off the Grid 03:52 Transition to Cybersecurity 04:46 Internship and Early Career 08:55 Graduate School and Intelligence Work 11:07 The Importance of Understanding Adversaries 12:17 The Role of Psychology in Cybersecurity 17:17 Attributes of a Good Threat Intel Analyst 21:03 Day in the Life of a Threat Intel Analyst 25:23 Incident Response and Attribution 31:55 Challenges and Adaptations in Cybersecurity 37:30 Building a World-Class CTI Team 40:19 Understanding Structured Analytic Techniques 40:37 The Importance of Collection and Processing 41:37 Challenges in Cyber Threat Intelligence 42:27 Shifting Focus to Outcomes 43:58 Proactive Action and Source Efficacy 46:45 Actionable Intelligence and Recommendations 49:22 Measuring Effectiveness and ROI 53:27 The Role of AI in CTI 01:02:05 Building Trust and Proving Value 01:08:57 Celebrating Successes and Collaboration 01:12:26 Conclusion and Contact Information

Building Your Personal Brand in Cybersecurity: Ken Underhil
February 17, 2025

Building Your Personal Brand in Cybersecurity: Ken Underhil

In this conversation, Ken Underhill shares his journey in the cybersecurity field, discussing his unconventional career path, the importance of building a personal brand, and strategies for finding job opportunities. He emphasizes the value of community engagement and volunteering to gain experience and credibility, while also addressing the evolving landscape of cybersecurity education and training. Ken encourages listeners to take bold actions, leverage their unique skills, and actively seek out opportunities to grow in their careers. In this conversation, Ken Underhill and David Raviv discuss the critical importance of personal branding, networking, and the evolving landscape of cybersecurity, particularly in relation to AI. They emphasize the need for consistency in branding efforts, the value of building genuine relationships, and the balance between leveraging technology and maintaining human oversight in cybersecurity practices. The discussion also touches on the changing nature of resumes and the necessity for individuals to adapt to the digital age by creating content that resonates with their audience.

LLM Kiddies:  A Veteran SOC Analyst's Take on AI's Security
January 14, 2025

LLM Kiddies: A Veteran SOC Analyst's Take on AI's Security

From SOC analyst to AI innovator: How Dylan Williams navigates the intersection of cybersecurity and artificial intelligence, revealing why he believes we're entering the age of 'LLM Kiddies' and what it means for the future of security operations. In this engaging conversation, cybersecurity expert Dylan Williams discusses his journey from traditional security operations to AI innovation, sharing invaluable insights on the transformation of cybersecurity through AI and LLMs. He explores the promises and pitfalls of AI in security operations, the emergence of AI-powered threats, and practical considerations for implementing AI in security workflows. Timeline: 0:00 - Introduction and welcome 0:35 - Dylan's background in security operations and blue teaming 2:00 - Transition from traditional security to AI/LLM specialization 3:44 - Early career journey and entering cybersecurity 4:14 - Discussion on curiosity in cybersecurity careers 5:46 - Modern learning resources and certification value 8:37 - Current state of AI adoption in cybersecurity 13:56 - Analysis of Microsoft Copilot and AI integration challenges 16:17 - AI as a junior analyst concept 20:32 - Discussion of current LLM limitations 24:44 - Analysis of SOC automation using AI agents 27:41 - Framework for evaluating AI implementation in security 30:24 - Importance of explainable AI in security 32:19 - Vendor integration of AI capabilities 35:18 - Discussion of adversarial use of AI 41:11 - Risks of AI monoculture in security tools 43:35 - Cost implications of AI in security operations 46:21 - Concerns about over-reliance on AI tools 51:08 - Data privacy concerns with public LLMs 54:33 - Closing thoughts and future projects 57:16 - Conclusion

Investing in Cybersecurity: The ROI Dilemma
December 16, 2024

Investing in Cybersecurity: The ROI Dilemma

In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure. Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also highlighting the need for organizations to be proactive in their cybersecurity measures. In this conversation, David Raviv and Jamison discuss the complexities of data privacy regulations like GDPR, the challenges of balancing airline costs with regulatory compliance, and the importance of cybersecurity investment. T hey explore the role of AI in cybersecurity, emphasizing the need for responsible use and the human element in innovation. The discussion also highlights the significance of engaging with cybersecurity events and communities to foster collaboration and awareness in critical infrastructure sectors. Chapters 00:00 Introduction and Background 03:06 The Importance of Events in Cybersecurity 05:46 Content is King: The Secret Sauce of Successful Events 09:09 C-Level Perspectives on Cybersecurity 11:56 Emerging Trends in Aviation Security 14:53 Ransomware and Supply Chain Challenges 17:44 The Role of Regulation in Cybersecurity 21:05 Accountability and Innovation in Critical Infrastructure 27:29 Navigating GDPR and Data Privacy 29:37 The Balancing Act of Airline Costs and Regulations 32:21 Cybersecurity Investment and ROI Challenges 35:46 Innovation in Cybersecurity: The Human Element 40:15 AI in Cybersecurity: Opportunities and Risks 48:43 Engaging with Cybersecurity Events and Communities

AI in Enterprise: From IT to Intelligent Interns | William Brinson
December 10, 2024

AI in Enterprise: From IT to Intelligent Interns | William Brinson

Join us for an insightful conversation with William Brinson as we explore the fascinating journey from traditional IT roles to the forefront of AI and machine learning. William shares his unique career path, starting from sales and machine learning experiences at Pizza Hut to becoming an expert in enterprise architecture and AI. Discover the impact of AI on enterprise IT, from enhancing customer service to optimizing business processes, and learn about the future of AI in digitalization and business growth. Whether you're a business leader or tech enthusiast, this episode provides valuable insights into leveraging AI for innovation and efficiency. 00:00 Introduction and Guest Welcome 00:29 Journey into IT and Early Career 02:34 Enterprise Architecture and Business Approach 05:38 Transition to AI and Machine Learning 09:22 AI in Business and Real-World Applications 13:36 Future of AI and Digital Twins 16:09 Implementing AI in Your Business 26:09 Practical Steps to Leverage AI 29:04 Harnessing AI for Marketing Automation 30:31 The Risks of AI Monoculture 31:24 The Influence of Social Media Algorithms 35:19 AI in Education and Workforce 42:27 The Future of Human-AI Interaction 48:06 AI in Business Strategy and Implementation 52:58 Conclusion and Final Thoughts

The Future is Decentralized:  Past, Present, and Future of AI and Blockchain
December 9, 2024

The Future is Decentralized: Past, Present, and Future of AI and Blockchain

In this enlightening episode, join us as we dive deep into the concept of decentralized societies with James Haft, a visionary in blockchain and decentralization. Haft shares his journey from being an avid reader of science fiction to partnering with renowned author Neal Stephenson. We explore why humanity transitioned from decentralized to centralized systems, how centralization stifles individual freedom, and the potential of blockchain and AI to return power to the people. Hear James' thoughts on the limitations of current centralized institutions, the promise and perils of AI, and the nuanced concepts of choice and freedom in today's technological landscape. This episode is especially relevant to understanding the disruptive forces shaping the future of humanity. 00:00 Introduction and Greetings 00:05 The Evolution of Decentralized Societies 01:00 Influence of Science Fiction on Decentralization 02:34 Historical Shift to Centralization 03:18 The Role of Institutions in Centralization 04:18 Critique of Centralized Systems 06:34 Modern Issues with Centralization 07:03 The Rise of Blockchain and Decentralization 11:06 Debate on Decentralization vs. Centralization 12:58 The Importance of Choice and Freedom 14:34 Challenges and Perspectives on Decentralization 18:49 Economic and Social Implications 29:53 Bitcoin and the Concept of Value 32:40 Decentralization and Freedom of Speech 36:01 Debunking Terrorism Funding Myths 37:47 AI Development Costs and Monetization 38:52 Economic Inequality and Investment Barriers 41:55 Decentralization and Universal Basic Income 47:40 The Future of Transactions and Bitcoin 54:46 AI's Role in Society and Potential Risks 01:01:04 Decentralized Systems and Global Power 01:03:25 Closing Thoughts and Future Conversations

From commanding tanks to revolutionizing customer feedback through AI
November 21, 2024

From commanding tanks to revolutionizing customer feedback through AI

From commanding tanks to revolutionizing customer feedback through AI, Guy Nirpaz's entrepreneurial journey shows how sometimes the best innovations come from questioning the status quo. Learn how his company Perspective AI is transforming the way businesses understand their stakeholders by replacing impersonal surveys with AI-powered conversations that achieve 90% completion rates and uncover insights that traditional methods miss. 00:00 Introduction and Espresso Hour 00:36 Early Career and Military Service 02:13 Transition to Technology and IBM 03:20 Joining Mercury and Giga Spaces 04:53 Entrepreneurial Journey and Founding Tatango 05:41 Music and Entrepreneurship 12:49 Philosophy on Education and Failure 19:10 Challenges in Entrepreneurship 22:40 Current Venture: Perspective AI 31:56 The Problem with Traditional Surveys 32:38 The Annoyance of Constant Feedback Requests 33:51 The Evolution of Surveys: From Pen and Paper to AI 34:32 The Nuances of Customer Experience 36:18 Introducing Perspective: A New Way to Capture Feedback 37:02 How Perspective Works 38:31 The Magic Behind Perspective 42:20 Adapting to User Responses 52:50 The Future of AI in Feedback Collection 54:32 Conclusion and Final Thoughts #Entrepreneurship #AI #CustomerFeedback #StartupStory

From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense
November 14, 2024

From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense

Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts

From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense
December 10, 2024

From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense

Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. In this captivating discussion, veteran cybersecurity executive Joe Schorr shares invaluable insights from his journey from hands-on penetration tester to high-level strategic advisor. The conversation explores the rapidly evolving cybersecurity landscape, particularly focusing on the impact of AI, the challenges of building trust in vendor relationships, and the future of risk quantification in cybersecurity. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts #CyberLeadership #SecurityStrategy #AIinCybersecurity #CyberTrust #InfoSec #CISO #CyberRisk #SecuritySales #TrustedAdvisor #CyberDefense #RiskQuantification #CyberInnovation #SecurityVendors #CyberTransformation #FutureOfCyber

Securing Tomorrow: How One CEO is Revolutionizing Cybersecurity | Gregg Smith
October 29, 2024

Securing Tomorrow: How One CEO is Revolutionizing Cybersecurity | Gregg Smith

From CEO of cybersecurity pioneers to safeguarding the nation’s most critical communications, Gregg Smith shares his unique journey from mobile technology to cyber defense. Discover why, despite years of innovation, secure communication remains an unsolved puzzle—and how the race between security and interception is shaping the future of global cybersecurity. In this conversation, Gregg Smith shares his journey from the mobile industry to becoming a leader in cybersecurity. He discusses the critical intersection of mobility and cybersecurity, the ongoing challenges in securing mobile communications, and the importance of secure communication applications. Gregg emphasizes the need for enhanced security measures for executives and the complexities of implementing zero trust solutions in organizations. He also highlights the workforce shortage in cybersecurity and the importance of training the next generation of professionals. The conversation concludes with insights on community involvement and the role of nonprofits in advancing cybersecurity efforts. Chapters 00:00 Introduction to Cybersecurity Journey 02:46 The Intersection of Mobility and Cybersecurity 05:48 Challenges in Mobile Communication Security 09:07 The State of Secure Communication Apps 12:13 Enhancing Communication Security for Executives 14:58 Government Communication Security Practices 18:02 The Complexity of Cybersecurity Solutions 21:11 Implementing Zero Trust in Organizations 23:57 Protecting Critical Infrastructure 26:46 The Workforce Shortage in Cybersecurity 30:00 Training the Next Generation of Cybersecurity Professionals 32:50 Community Involvement and Philanthropy in Cybersecurity 36:12 The Role of Nonprofits in Cybersecurity 39:07 Advice for Small Vendors Seeking Government Contracts 41:57 Conclusion and Future Outlook

From IT Professional to Cybersecurity Leader: Gene Yoo
October 23, 2024

From IT Professional to Cybersecurity Leader: Gene Yoo

Join us as we uncover the secrets behind Gene Yoo's rise in the cybersecurity world and learn how his unique leadership approach is shaping the future of digital security In this episode of the podcast, listeners are introduced to Gene Yoo, the innovative CEO and founder of re-security. The conversation delves into Gene's transformative journey from an IT professional to a prominent figure in cybersecurity. Key moments in his career are highlighted, offering insights into how his leadership style and understanding of business needs have propelled re-security to prominence in the industry. This episode is a must-listen for anyone interested in cybersecurity and leadership dynamics. Chapters 00:00 Journey to Founding Re-Security 04:54 The Importance of Interpersonal Skills in Cybersecurity 10:09 Navigating the Cybersecurity Landscape Post 9/11 15:11 The Role of National Security in Cybersecurity 20:04 Building Company Culture and Trust 25:06 Transitioning from IT to Executive Leadership 29:58 The Future of Cybersecurity and AI 35:06 Understanding Threats and Risk Management 39:53 The Human Element in Cybersecurity 44:51 Regulatory Pressures and Compliance in Cybersecurity

The Battle for Secure Communications: A Deep Dive into Mobile Security and Cyber Threats with Gre...
October 29, 2024

The Battle for Secure Communications: A Deep Dive into Mobile Security and Cyber Threats with Gre...

From CEO of cybersecurity pioneers to safeguarding the nation’s most critical communications, Gregg Smith shares his unique journey from mobile technology to cyber defense. Discover why, despite years of innovation, secure communication remains an unsolved puzzle—and how the race between security and interception is shaping the future of global cybersecurity. In this conversation, Gregg Smith shares his journey from the mobile industry to becoming a leader in cybersecurity. He discusses the critical intersection of mobility and cybersecurity, the ongoing challenges in securing mobile communications, and the importance of secure communication applications. Gregg emphasizes the need for enhanced security measures for executives and the complexities of implementing zero trust solutions in organizations. He also highlights the workforce shortage in cybersecurity and the importance of training the next generation of professionals. The conversation concludes with insights on community involvement and the role of nonprofits in advancing cybersecurity efforts. Chapters 00:00 Introduction to Cybersecurity Journey 02:46 The Intersection of Mobility and Cybersecurity 05:48 Challenges in Mobile Communication Security 09:07 The State of Secure Communication Apps 12:13 Enhancing Communication Security for Executives 14:58 Government Communication Security Practices 18:02 The Complexity of Cybersecurity Solutions 21:11 Implementing Zero Trust in Organizations 23:57 Protecting Critical Infrastructure 26:46 The Workforce Shortage in Cybersecurity 30:00 Training the Next Generation of Cybersecurity Professionals 32:50 Community Involvement and Philanthropy in Cybersecurity 36:12 The Role of Nonprofits in Cybersecurity 39:07 Advice for Small Vendors Seeking Government Contracts 41:57 Conclusion and Future Outlook

Hacking for Good: Inside the World of a Top Microsoft Security Researcher
October 6, 2024

Hacking for Good: Inside the World of a Top Microsoft Security Researcher

In this engaging podcast, David Raviv interviews Dr. Nestori Syynimaa, a leading security researcher at Microsoft and one of the company's Most Valuable Researchers (MVR). Dr. Syynimaa shares insights into his journey from CIO to PhD holder and top-tier vulnerability hunter. He discusses the intricacies of finding software vulnerabilities, the ethics of responsible disclosure, and the thriving ecosystem of bug bounty programs. The conversation offers a fascinating glimpse into the world of white hat hacking and the critical role researchers play in making the digital world more secure. Timeline: 00:00 - 03:44: Introduction and Dr. Syynimaa's educational background 03:45 - 06:24: Discussion on the drive behind pursuing multiple degrees and PhDs 06:25 - 09:57: Explanation of Microsoft's Most Valuable Researcher (MVR) designation 09:58 - 13:54: Insights into the process of finding vulnerabilities in software 13:55 - 18:47: Detailed explanation of how researchers manipulate software inputs to find bugs 18:48 - 22:31: Discussion on the potential role of AI in vulnerability research 22:32 - 28:26: The challenges of measuring success in security research 28:27 - 33:05: Bug bounty programs and the economics of vulnerability research 33:06 - 38:42: The ethics of hacking and the importance of responsible disclosure 38:43 - 43:14: Dr. Syynimaa's experience as a CIO managing large infrastructure 43:15 - 48:15: The collaborative nature of the security research community 48:16 - 55:00: Discussion on bug bounty payouts and full-time vulnerability hunting 55:01 - 59:26: Advice for aspiring security researchers and available resources 59:27 - 1:04:26: The balance between ethical hacking and black market vulnerability sales 1:04:27 - 1:07:17: Closing thoughts and contact information