PODCAST · technology
Breach Ready Dialogues
by ColorTokens
The Breach Ready Dialogues is a podcast for security leaders navigating ransomware risk, lateral movement, and Zero Trust mandates in complex, hybrid environments. Each episode explores how enterprises can stop ransomware spread, control east-west traffic, and reduce blast radius through microsegmentation, breach containment, and real-time visibility, while getting more value from existing cybersecurity investments and integrations. From Zero Trust segmentation and regulatory pressure to OT, IoT, and legacy systems, these conversations focus on practical strategies to contain breaches, achieve
-
11
Episode 11: Keep OT Running During Cyberattacks
In this episode of Breach Ready Dialogues, Agnidipta Sarkar sits down with Kevin Kumpf, an experienced OT cybersecurity leader and consultant, to unpack what makes breaches in operational technology environments so different from traditional IT incidents.From industrial control systems and medical facilities to manufacturing plants and critical infrastructure, Kevin shares real-world lessons on why OT security is not just about data protection - it is about safety, availability, resilience, and keeping operations running.This is a must-watch conversation for CISOs, OT security leaders and anyone responsible for protecting critical infrastructure and industrial environments.Listen in to learn how organizations can become truly breach ready in the OT world.#OTsecurity #CriticalInfrastructure #BeBreachReady #Microsegmentation #CyberResilience #CISO #CybersecurityPodcast
-
10
Episode 10: Breach Readiness Lessons From a Former U.S. Secret Service Agent
What can CISOs and security leaders learn from the U.S. Secret Service?In this episode, Agnidipta Sarkar, Chief Evangelist at ColorTokens, speaks with Hazel Cerra, a former U.S. Secret Service leader and now Director of Digital Security Convergence at BlackCloak, about what executive protection teaches us about breach readiness, cyber resilience, and incident response planning.They discuss why organizations need to assume breach, how access control and microsegmentation help limit movement, why tabletop exercises build real muscle memory, and how simple, accessible incident response plans can make the difference when a cyber incident hits.In this episode, you’ll learnWhy prevention alone is no longer enoughWhat “zero fail” protection can teach cyber leadersHow microsegmentation helps reduce lateral movementWhy incident response plans must be simple and accessibleHow tabletop exercises prepare teams for real breachesWhy human behavior, social engineering, and offboarding gaps still cause failuresWhy executive protection now extends into digital lifeIf you are a CISO, security leader, board member, or cyber-aware executive, this conversation will help you think differently about how to prepare for the day a breach actually happens.#CyberSecurity #BreachReadiness #CyberResilience #ExecutiveProtection #IncidentResponse #ZeroTrust #Microsegmentation #HazelCerra
-
9
Episode 9: Breach Readiness in 2026 Is Urgent - A Practitioner’s Tale
In this episode of Breach Ready Dialogues, Agnidipta Sarkar, Chief Evangelist at ColorTokens, speaks with Sanjeev Mehrotra, Senior VP and Global Head of Cybersecurity and Risk Management at Tech Mahindra, about what actually happens when breaches hit and why breach readiness is becoming urgent in 2026.Drawing from real-world breach experience across industries, they discuss how organizations respond under pressure, why business continuity plans often fail in practice, and what separates teams that regain control from those that struggle for months.The conversation focuses on how leaders should think about material impact and minimum viable digital business, and why microsegmentation is emerging as a foundational capability to contain attacks, reduce blast radius, and keep critical operations running.They also cover zoning, supply chain exposure, OT environments, and how attackers are shifting tactics, including the rise of destructive attacks and AI-driven threats.#cybersecurity #bebreachready #zerotrust #otsecurity #microsegmentation
-
8
Episode 8: How to Be Breach Ready Against AI-Powered Cyberattacks
Cyberattacks are accelerating in the age of AI-powered threats, and prevention alone is no longer enough. The real question organizations must answer today is: Are you breach ready?In this episode of Breach Ready Dialogues, host Agnidipta Sarkar speaks with Jon Collins, VP of Engagement at GigaOm and former GCHQ security engineer, about how cybersecurity strategies must evolve as attackers adopt artificial intelligence and organizations face rapidly expanding attack surfaces.They discuss why traditional security architectures struggle against modern threats, how security tool sprawl increases operational complexity, and why enterprises must redesign their environments to reduce attack surfaces and contain breaches before they spread.Using the well-known Tom and Jerry security analogy, the conversation explores practical strategies to help organizations shift from endlessly chasing attackers to building resilient systems that limit blast radius and keep critical operations running even during a breach.If you are a CISO, security leader, or architect navigating AI-driven cyber risks, this discussion provides valuable insight into how breach readiness and resilient architecture can change the way organizations defend themselves.#CyberSecurity #CyberResilience #AICybersecurity #CyberDefense #ZeroTrust #BeBreachReady
-
7
Episode 7: If they Cant Reach It, They Can't Breach It.
Breach Ready Dialogues Episode 7: Breach Readiness, Assumed Failure & Lateral Movement In this episode of Breach Ready Dialogues, Agnidipta Sarkar speaks with Sarah Armstrong, former Chief Security Advisor at Microsoft and author of Effective Crisis Management and Understand the Cyber Attacker Mindset. They explore breach readiness, assumed failure, lateral movement, credential misuse, and why most cybersecurity investments focus on the perimeter instead of protecting the core business. The conversation connects crisis management, cyber resilience, MITRE ATT&CK, Zero Trust, and microsegmentation to a simple principle: you cannot stop every attack, but you can control the impact. If you are a CISO, CIO, board member, or security leader looking to shift from perimeter defense to inside-out protection, this episode reframes how to think about material impact, crown jewels, and containment-first architecture. #CyberSecurity #BreachReadiness #ZeroTrust #CyberResilience #CrisisManagement #MITRE #CISO #RiskManagement
-
6
Episode 6: Breach Readiness is Foundational to Organizational Resilience
In Episode 6 of Breach Ready Dialogues, Agnidipta Sarkar speaks with Dr. Keri Pearlson, Principal Research Scientist at MIT Sloan, about why cyber resilience must go beyond protection and become a board-level priority.This conversation explores:• Organizational resilience vs. traditional cybersecurity• Balanced scorecards for cyber resilience• Board oversight and accountability• Tabletop exercises and resilience drills• Supply chain and vendor risk• Security culture vs. compliance training• Microsegmentation and operational continuityFrom resilience scorecards to building “resilience muscles” across people, processes, and technology, this episode challenges leaders to assume breach, measure material impact tolerance, and prepare for inevitable disruption.If you are focused on organizational resilience, board governance, digital transformation, or cyber risk strategy, this discussion will reshape how you think about breach readiness.
-
5
Episode 5: Cybersecurity in Transition: From Defense to Resilience
Cybersecurity isn’t just about stopping attacks anymore.It’s about surviving them.In our latest episode of Breach Ready Dialogues, Ira Winkler - former NSA analyst, multiple-times CISO, author, and one of the sharpest minds in cybersecurity talks about what really happens during breaches and why “perfect defense” is a myth.Key takeaways from the conversation:1. Nation-state attacks aren’t new. They’re just more patient.2. Many “headline breaches” aren’t technical masterpieces, they’re human failures.3. Attackers don’t need to hack you if they can hack your vendors.4. Logs, preparation, and communication before a breach matter more than tools after it.5. Cyber defense alone is no longer enough: resilience is the new requirement.It’s not “if” you’re breached, it’s whether your business can keep running when it happens.🎙️ Listen to Cybersecurity in Transition: From Defense to Resilience to hear why breach readiness, segmentation, and human awareness are now mission critical.If you’re responsible for security, operations, or risk, this episode is for you.#CyberSecurity #BreachReadiness #CyberResilience #CISO #RiskManagement #Podcast #zerotrust
-
4
Episode 4: Why Microsegmentation and Network Detection Are Critical for Breach Readiness
Modern attacks move fast, spread laterally, and exploit gaps across flat and complex environments. In this episode, we break down how microsegmentation and network detection and response work together to reduce breach impact and stop lateral movement. Our Chief Evangelist, Agnidipta Sarkar, is joined by Heath Mullins, former Forrester analyst and now Chief Evangelist at ExtraHop, for a candid discussion on how attack techniques are evolving and why detection alone is not enough. One key takeaway is clear: preventing every breach is unrealistic. What matters is how quickly you can detect malicious activity, contain the blast radius, and recover without disrupting the business. If you are a CISO, security leader, or architect responsible for protecting modern digital environments, this conversation will challenge how you think about Zero Trust, microsegmentation, network detection, and operational security. #ciso #podcast #techtalk #Cybersecurity #ZeroTrust #BreachReadiness #Microsegmentation #bebreachready
-
3
Episode 3: How Cyber Defense Has Evolved for OT Environments
In this episode of Breach Ready Dialogues, Agnidipta Sarkar, Chief Evangelist at ColorTokens, sits down with renowned cybersecurity analyst Richard Stiennon to unpack what really happens during a breach: the chaos, the scramble, and the hard truths organizations face. From recent attacks impacting JLR, Qantas, and Marks & Spencer to insights from RSA, Colonial Pipeline, and OT environments, Richard draws on 25 years of experience discussing breach readiness, zero trust, OT security gaps, supply-chain compromises, and why microsegmentation is becoming non-negotiable. If you want real-world lessons on cyber resilience from one of the industry’s top voices, this episode is a must-watch. For more resources, visit: https://colortokens.com/media-hub/ #BeBreachReady #CyberSecurity #Microsegmentation #ZeroTrust
-
2
Episode 2: Reduce Time to Breach Readiness from Months to Weeks
🎙️ The Breach Ready Dialogues return with a powerful discussion featuring Agnidipta Sarkar, our Chief Evangelist, and Guru Gurushankar, our SVP & GM, Healthcare & Life Sciences. They unpack one of the most urgent cybersecurity priorities today: reducing the time to achieve breach readiness from months to weeks. This episode breaks down how organizations can prevent breaches and contain spread with ColorTokens + CrowdStrike, including a compelling customer example where ColorTokens instantly visualized their network, triggering both excitement and relief. For more resources, visit: https://colortokens.com/media-hub/ #BeBreachReady #Microsegmentation #Cybersecurity #EDR #HealthcareSecurity
-
1
Episode 1: The Breach Ready Dialogues - EDR as a Microsegmentation Agent.
Introducing The Breach Ready Dialogues: a new webinar series where leaders unpack what it really means to be breach ready. Hosted by our Chief Evangelist Agnidipta Sarkar, this series features candid conversations decoding the strategies, tools, and practices that help organizations build resilience. In Episode 1, Agnidipta is joined by Harish Akali, CTO of ColorTokens, to explore how EDR can evolve into a microsegmentation agent, pushing Zero Trust from theory into practice. 👉 Can EDR go beyond detection to drive Zero Trust microsegmentation? 👉 What challenges and benefits should security leaders prepare for? 💡 Expect bold insights, actionable takeaways, and dialogues you won’t hear anywhere else. #BeBreachReady #Microsegmentation #Cybersecurity #EDR
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
The Breach Ready Dialogues is a podcast for security leaders navigating ransomware risk, lateral movement, and Zero Trust mandates in complex, hybrid environments. Each episode explores how enterprises can stop ransomware spread, control east-west traffic, and reduce blast radius through microsegmentation, breach containment, and real-time visibility, while getting more value from existing cybersecurity investments and integrations. From Zero Trust segmentation and regulatory pressure to OT, IoT, and legacy systems, these conversations focus on practical strategies to contain breaches, achieve
HOSTED BY
ColorTokens
CATEGORIES
Loading similar podcasts...