CYBER CONNECT PODCAST

PODCAST · business

CYBER CONNECT PODCAST

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance.SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect🗓️ NEW EPISODES available every week📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You#InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology

  1. 104

    From military to cyber, from poverty to protected: Real stories, real impact

    Behind every firewall is a human being. Behind every policy is a story. We recently hit the road and attended the National Cyber Security Show (NCSS 2026) in Birmingham, we stopped looking at screens and started looking at people. In Part 2 of our NCSS Special Edition Series, Jay and Warren sit down with four extraordinary voices who are redefining what cybersecurity really means - and who it's really for. From a 21-year military career to the frontline of security culture. From digitally excluded children to the IT teams burning out to protect 30,000 UK schools. These are the stories the industry doesn't put on its keynote slides. 🔥 WHAT YOU'LL DISCOVER (The Unfiltered Truth): - 📉 The Frontline Reality Check: Raw market insights from the trenches. What is paralyzing leaders today, emerging trends, and why the future of defense is human-centric resilience. - 🛑 The Silent Burnout Epidemic: The extreme mental health toll on the exhausted, under-resourced IT teams tasked with defending the UK's 30,000 schools. - 🧸 The True Cost of Digital Poverty: The intersection of cybersecurity and child safety, proving why true digital defense means nothing if it leaves the digitally excluded behind. - 🚫 Toxic Culture vs. Human Defense: Why spending millions on AI and firewalls completely fails if your workplace is paralyzed by a culture of blame. - 🔮 The AI Threat & The Human Solution: As global threat actors weaponize AI, discover why your absolute ultimate defense will always be human connection. - 🚀 Breaking the "Coder-Only" Myth: The untapped, non-technical career pathways and why empathetic relationship builders are exactly what the market is starving for. 🔹 Liz Murray - Chief of Staff, SASIG Events Following a successful 21-year military career, Liz moved into the private sector in 2018. Despite having initially said “not a bank and not Cybersecurity.” her first role was in cyber at HSBC. Liz subsequently held impactful roles in financial services, cyber-vendor and retail enterprise organisations, deepening her cross-sector expertise in education, leadership behaviours, and humanfactorsled security. Liz now serves as Chief of Staff for the Security Awareness and Special Interest Group (the SASIG), driving resilience and risk discussions across cybersecurity best practice, mental health and wellbeing, cyberincident preparedness, safeguarding vulnerable people online, diversity and inclusion, and STEM career development. 🎁Learn More: https://www.thesasig.com/ 🔹 Michael Tarbard (Every Child Online) – CEO & Founder tackling digital poverty head-on. Michael's giving refurbished devices and online safety support to disadvantaged children and young people across the UK—while building national partnerships that connect families to education and opportunity. His challenge to transformation leaders? If your strategy doesn't reach the digitally excluded, you're building for a shrinking market. 🎁Learn More: Https://everychildonline.co.uk 🔹 Dolores Ruzafa - International Security Advisor - Xygeni Passionate about People, with nearly 40 years in the IT world - starting with Seagate, then Dell, Symantec, Kiuwan, Testrail, Ranorex, Preemptive and now the very best Xygeni. The one thing that she has seen constant is People – Dolores reminds us that “We all need the human touch” - and that is her strength. Dolores listens and connects so that you can share your concerns and together find a solution. 🎁Learn More: https://xygeni.io/ 🔹 Michael Coffer With over a decade of experience, Michael is a trusted strategic partner helping organizations drive security innovation and navigate emerging threats. While he and his team at Heimdal work relentlessly to keep threat actors out of enterprise environments, Michael’s primary mission is defending the UK Education Sector. He champions the critically under-resourced and under-staffed IT teams tasked with protecting the next generation across 30,000 schools.

  2. 103

    50 years of truth: The harsh realities of the cyber frontline

    If you work in tech, information and cyber security, there is a very good chance you are exhausted right now. You spend your weeks fighting invisible threats, fighting for budgets, and drowning in an endless sea of "next-gen" vendor pitches. When you are stuck in that grind, it is incredibly easy to lose sight of the point. If you’ve ever walked a trade show, you know exactly how loud the buzzwords and aggressive sales pitches can get. But every so often, you sit down with someone who cuts straight through the BS and completely grounds you. Recorded live from the floor of the National Cyber Security Show (NCSS) in Birmingham, the team sat down with industry legend Martin Smith MBE to celebrate a monumental legacy: 50 years on the frontline, the 22-year evolution of SASIG and their massive 1,000 Webinars. The National Cyber Security Show (NCSS) provides the absolute perfect backdrop for this conversation. As the lines between physical security and digital risk completely vanish, our industry cannot survive in silos. We desperately need these live, in-person spaces that facilitate physical and digital convergence - a room where defenders, vendors, and leaders can actually listen, learn, teach and exchange the raw ideas needed to outpace modern threats. 🔥 WHAT YOU'LL DISCOVER: 🌐 The NCSS Spotlight: Our thoughts on the National Cyber Security Show, the innovations showcased, and why these events are vital for industry unity. 🚨 Listening to the Frontline: A deep dive into the real-world frustrations and successes shared by security leaders in the SASIG and SECURE ecosystems. 🛡️ 50 Years in Tech and Cyber Security: The harsh realities, biggest shifts, and raw lessons from Martin’s half-century career fighting cybercrime and defending the industry. 🏛️ The SASIG History: How a bold idea in 2004 evolved into a subscription-free powerhouse of 12,000+ professionals across 4,500+ organisations. 🎯 Vision, Mission & Purpose: The blueprint for building a true "CISO safe space" where the frontline can share threat intelligence without commercial distraction under the Chatham House Rule. 🎙️ 1,000 Webinars: Celebrating the massive milestone of 1,000 live sessions and what it takes to consistently deliver unfiltered truth to the community. 🌐 The IT/OT Convergence: Why the barrier between physical and digital worlds has collapsed, and how live events like NCSS help us defend the hyper-connected landscape. 🤝 True Vendor Partnership: Moving past transactional sales pitches to build genuine "trust networks" between vendors and defenders. 🚀 Upcoming Opportunities & Exclusive Announcement: Make sure to listen to the stream to learn exactly what is coming up next in the partnership between SASIG and SECURE, and how you can get involved! 👇 The Challenge: What is the biggest "unspoken truth" in cybersecurity? Drop it in the comments! 🔹 Martin Smith MBE: With nearly 50 years’ experience in the security and crime prevention industries, Martin Smith is a highly respected personality in the cyber world. In 2004, he founded The Security Awareness Special Interest Group (SASIG) as a subscription-free networking forum. Its 11,000+ membership represents 4,500+ organisations drawn from CISOs, CTOs, and their staff. Martin is a Fellow of The Security Institute. In 2017, he received a lifetime achievement award, and in 2024, a Commendation from the City of London Police Commissioner and the National Police Chiefs’ Council for his lifetime’s work in combatting cybercrime. 🏢 About SASIG: We are the SASIG, a subscription-free thought-leadership forum for cyber professionals across all industries. Established by Martin Smith MBE, we have developed a supportive community to become a true ‘CISO safe space’. Becoming a member unlocks exclusive, free benefits including live webinars, in-person events, and the flagship Big SASIG conference. Every event follows the Chatham House Rule, ensuring open, honest discussion free from commercial distraction.

  3. 102

    Building resilient trust QueChip, critical infrastructure and the future of secure devices

    The encryption key is officially dead. Are we wasting billions on "Post-Quantum" security while hackers walk right through the physical backdoor? And why are manufacturers actively leaving our digital world - from EVs to the National Grid -exposed by design just to save 50p? 🏆 $10,000 BOUNTY CHALLENGE: We’re challenging the world’s best hackers to break the QueChip. Do you have what it takes? 👉 REGISTER FOR THE QUEHACKATHON HERE: https://sqe.io/quehackathon/ Jay Adamson and Warren Atkinson are joined by Hamid Pishdadian and Mike Goodwin from SQE to have the exact conversation the industry is trying to dodge. We are cutting the corporate BS to expose an uncomfortable truth: you simply cannot software-patch your way out of a hardware crisis. Hamid and Mike aren't here to pitch another tool -they’re here to show us a physical microchip that mathematically kills the encryption key for good. Whether you are a CISO exhausted by "security theatre," a hacker looking for a real challenge, or a professional trapped by biased hiring algorithms, this is the reality check you need. 🔥 WHAT YOU'LL DISCOVER: - 🚨 The 50p Death Trap: Why tech companies are leaving medical devices and smart cities completely exposed to hackers, just to save 50p on a microchip. - 🕵️ The Quantum Scam: Why the industry is selling expensive "future-proof" software patches that don't actually work, and how fixing the hardware kills the threat completely. - 🔑 Killing the Encryption Key: How 35 years of engineering has led to a silicon chip that proves we no longer need hackable encryption keys to stay safe. - 🏛️ Fake Safety Laws: Why the UK's ban on default passwords is just "security theatre" that won't actually stop a real nation-state attack. - 🤖 Stopping Rogue AI: How to prevent advanced AI from faking machine identities and physically hijacking factories, cars, and power grids. - 📱 True Digital Ownership: How a new physical wallet stops crypto phishing dead in its tracks and ends our forced reliance on middlemen like banks and cloud servers. - 💼 The Broken Hiring Machine: Why the cyber industry is bleeding £20,000+ per hire while brilliant tech professionals get ghosted by biased HR algorithms. - 💰 The $10,000 Hackathon: Why SQE is ignoring corporate marketing and challenging the world's best developers to break their tech for a live cash bounty. 🔹 Hamid Pishdadian: Hamid is the visionary engineer behind the QueChip. Leveraging decades of physical engineering, he built a blockchain into the silicon itself, mathematically proving we no longer need to transmit encryption keys to be secure. 🔹 Mike Goodwin: Mike is driving the commercial integration of the QueChip. He bridges the gap between complex engineering and real-world applications, directly challenging the software-patch addiction of the modern tech world. 🎁 Break the Chip. Claim the Bounty: We are dropping the official REGISTRATION LINK to enter the $10,000 QueHackathon in the comments section below! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cybersecurity accessible to everyone. 🚀 Stop fighting a rigged system! We’ve partnered with SQE.io to drop something massive. Use code WTFISQUANTUM below to claim your spot before our network takes them all: 10 Companies: 90 days of free Enterprise access to consolidate hiring. 200 Professionals: 90 days of free Premium access to bypass gatekeepers. ✅ Claim Your Early Access Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to help us tear down the gatekeepers.

  4. 101

    You don't "look the part" Neurodiversity, AI and surviving tech

    Stop using 'cultural fit' as an excuse to hire the same people over and over again. When every person in your tech team thinks exactly the same, you haven't built a defence—you've built a massive, predictable blind spot. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, Kayla Vondy -a leader operating at the high-stakes intersection of government policy and cybersecurity- exposes why the industry’s obsession with 'standardised' talent is a national security risk. We are stripping away the red tape to look at the raw realities of 2026 public sector tech, from the 'Immigration Tax' to the danger of neurotypical-only threat modelling. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Bureaucratic Blind Spot: Why neurotypical-only teams are fundamentally incapable of effective threat modelling against non-linear attackers. - 🚨 The Immigration Tax: The silent, exhausting pressure of proving your worth in UK tech while navigating unwritten cultural rules and visa dynamics. - 🎭 The Weaponisation of 'Cultural Fit': How HR terminology is actively used as a gatekeeper to keep diverse, brilliant minds out of the room. - 🤖 AI for the Social Contract: Building 'human-first resilience' for vulnerable citizens who rely on government systems every day. - 📍 DTX Special- Purpose to Practice: How to move beyond policy checkboxes to actual citizen-facing delivery in 2026. - ⚡ The Risk Paradox: How neurodivergent leaders bridge the gap between 'fail fast' tech culture and 'never fail' government bureaucracy. - 🛒 Procurement Red Flags: The one question every government buyer must ask vendors to stop procuring 'exclusionary' tech. - 🛠️ The 2026 Playbook: Which 'unwritten rule' of government tech must be deleted to make the industry work for everyone. 🔹 Kayla Vondy - Kayla is an AI Project Manager at the Liverpool City Region Combined Authority, where she works across AI, cybersecurity, and public sector delivery. She brings deep expertise from the tech and cyber fields alongside her lived experience as a neurodiverse woman. A regular speaker on responsible AI and digital inclusion, Kayla is dedicated to building inclusive, resilient systems that work for real people. 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is the biggest outdated hiring 'rule' or corporate standard in tech that needs to be permanently retired? Name it in the comments below! ✅ Join the Ecosystem, use code ‘LOOKTHEPART’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  5. 100

    The Human Mind & The Machine (Neurodiversity, Silent AI Failures, Career Pivots, and Mentorship)

    The industry is obsessed with building artificial minds, but we are fundamentally failing the human ones. Forcing your most brilliant people to mask who they are just to fit a corporate mold isn't 'professionalism' -it's the fastest way to kill innovation. Welcome to a special DTX Edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning Data Scientist and TechJumpstart Hub Founder Wendy Amexo disrupts the narrative on what it truly takes to build trustworthy technology. We are stripping away the vendor hype to focus on the 'human operating system,' exploring how a career pivot from Law to Data Science can sharpen your technical lens and why ADHD is a secret weapon for solving the industry's most complex problems. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The 'Squiggly' Advantage: How a background in Law provides a superior holistic lens for AI regulation and governance. - 🕵️ Silent AI Failures: What every founder gets wrong about AI mistakes and why 'silent failures' should terrify your board. - 💻 The DevSecAI Framework: A deep dive into the infinity loop: Build, Scan, Fix, Scan Again -the only way to survive LLM deployment. - 🚨 The ADHD Tax: The unseen emotional and financial toll of navigating a tech industry built for neurotypical minds. - 📍 DTX Special - Sensory Survival: Practical strategies for neurodivergent professionals to successfully navigate overwhelming, high-pressure environments like DTX. - 🏛️ The Seat at the Table: Why diverse cognitive profiles are vital in the physical rooms where the future of tech is decided. - 👻 The Hyperfocus Trap: How to protect neurodivergent talent from their own drive rather than exploiting it for short-term gains. - 💰 Tearing Down the Gates: Wendy’s mission with TechJumpstart Hub CIC to empower women and underserved communities in the North-East. 🔹 Wendy Amexo - Wendy is an award-winning Data Scientist, Data & Analytics Manager at one of the world's largest FMCG brands, and the Founder of TechJumpstart Hub CIC. She brings a unique, holistic lens to tech, connecting raw technology to regulation and strategic value. Wendy is a regular speaker on responsible AI and digital inclusion, dedicated to building inclusive, resilient systems. 🎁Learn More About TechJumpStart Here: https://techjumpstarthub.co.uk/ 📅 Join us at DTX Manchester on 29th and 30th April. Register for your FREE ticket here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: What is your 'squiggly' superpower? Have you pivoted from a non-tech background, or are you navigating tech as a neurodivergent professional? ✅ Join the Ecosystem, use code ‘TECHJUMP’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  6. 99

    Cybersecurity Culture: Why behaviour, diversity, and system design matter

    Are you tired of taking the blame for a broken system? Right now, 83% of tech professionals admit to bypassing corporate security controls… not because they are careless, but because they are exhausted and just trying to survive impossible workloads. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, award-winning cybersecurity executive and Founder of Seidea CIC, Stephanie Itimi, exposes the toxic culture of corporate security . We are turning off the vendor pitches to tackle the one vulnerability you cannot patch with software: human burnout. Why do companies spend billions on tools while treating human behavior like a software bug? What happens to your psychological safety when you are forced through 45-minute compliance videos just to be tricked and shamed by your own IT department ? Whether you are a SOC analyst exhausted by 2 a.m. wake-up calls , a professional trying to break through the industry's relentless gatekeeping , or a CISO trying to actually protect your team, this is the unfiltered reality check you need to hear. 🔥 WHAT YOU’LL DISCOVER: - The Burnout Crisis: Why smart people knowingly bypass controls, and how to shift security from a corporate "police function" into a business enabler . - The Training Trap: Why 45-minute phishing videos are just a tick-box exercise, and why micro-learning and role-play are the only things that actually work . - The "Shadow AI" Rebellion: Why blanket bans on AI push behavior to the "black market," and how employees are secretly feeding data into unapproved tools . - Ready for Digital Co-Workers?: We break down the terrifying leap from Generative AI to "Agentic AI," and why your culture isn't ready for AI agents executing tasks . - Shattering the Gatekeepers: Stephanie’s unfiltered advice on bypassing the "bro-culture" of tech, building your personal brand, and conquering imposter syndrome . - Diversity as a Tactical Defense: Why true representation isn't an HR issue—it's a hard, life-saving security imperative that stops global hackers . - Surviving Leadership: Why stepping into a CISO role is incredibly lonely, and the uncomfortable conversations leaders must have behind closed doors 🔹 About Stephanie Itimi: Stephanie is an award-winning cybersecurity executive, currently Director of Information Protection and Compliance at Age UK . Recognised by the World Economic Forum and NCSC , she is the author of Cybersecurity Culture. She is also the Founder of Seidea CIC, an organization that has trained and supported over 8,000 women from Black and Minority Ethnic backgrounds into cybersecurity and tech roles . 🎁 Learn More About Seidea CIC: https://www.seidea.org/ 📅 Join us at the Cyber Leaders’ Summit (London): https://www.cyber-leaderssummit.com/ 👇 The Challenge: Does your workplace reward secure behavior, or does the system make breaking the rules the easiest path to getting your job done? Let us know in the comments! 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. 🚀 Stop fighting a broken system! If you are tired of the gatekeeping, the endless tool fatigue, and the "spray and pray" job applications , we are opening early access to a private, enterprise-grade career and hiring platform inside the SECURE ecosystem . Hit the link below and use the private access code EMPOWER to bypass the waitlist! ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  7. 98

    The cyber sophistication paradox: £1M hacks, vibe coding, shadow AI and the SOC extinction

    Stop worrying about quantum computing. Right now, up to 10% of your enterprise devices are completely undetected, and your multi-million-pound security stack is likely failing silently in the background. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, 25-year industry veteran and ThreatAware CEO Jon Abbott exposes the "Cybersecurity Sophistication Paradox." We are stripping away the vendor hype to look at the terrifying realities of 2026 enterprise security. Why is the industry obsessed with buying shiny new EDR tools while completely incapable of deploying them? What happens when developers rely on AI "Vibe Coding" to build fragile infrastructure? And why are Level 1 and Level 2 SOC analysts facing a mass extinction event? If you are a CISO battling the boardroom or a tech professional trying to survive the AI shift, this is the wake-up call you cannot afford to miss. 🔥 WHAT YOU'LL DISCOVER: - 🧠 The Founder’s Journey: How Jon overcame severe dyslexia, left school at 16, and eventually co-founded two major tech companies. - 🚨 The Sophistication Paradox: Why security teams love solving exotic problems while ignoring the boring, foundational IT hygiene that actually stops breaches. - 🕵️ Anatomy of a Disaster: How attackers bypassed M&S enterprise security with a simple phone call, the JRL cyber attack and the McDonald's hiring app that secured 65M users with the password "123456". - 👻 Shadow AI & Blind Spots: Why relying on Microsoft InTune is a trap, and how employees using AI at home are bypassing your security entirely. - 💻 "Vibe Coding" & Acceptable Outages: How AI prompts are creating a culture where catastrophic network outages are treated as acceptable collateral damage. - 📉 The Extinction of the SOC Analyst: Why Level 1 and 2 roles will disappear in 5 years, and how to become the "10x Engineer" that survives the purge. - 💰 The Founder Masterclass - Raising & Scaling: How to successfully build, scale, and get executive buy-in for solving "unsexy" foundational tech problems during a brutal economic downturn. Here’s how to engage with VC’s and Investors proactively. 🔹 Jon Abbott - With over 25 years of experience in the technology industry, Jon believes passionately in revolutionising the way businesses stay in control in the ever-evolving Cyber Landscape. Jon has leads Teams in Developing Cutting-Edge Solutions to transform Asset & Security Tool Management for organisations across the globe….& brings a fresh perspective on Security that is very much centred around Breach Prevention & Process. Previously, he Co-Founded Priority One, where he saw the critical need for Real-Time, Agentless Security Control Monitoring & its these experiences that have made Jon a Cyber Generalist with broad Technical Knowledge & Strong Commercial Awareness and have inspired him to Design & Build New & Intuitive Solutions to fill this crucial gap in the market. At ThreatAware, he’s committed to providing Innovative Cyber Asset Management Solutions that empower organisations to proactively keep their Cyber Assets safe from attack. Offering a Single Source of Truth, their Solution eliminates the burden of Asset Monitoring for IT Teams, ensuring they can instantly, reliably and accurately discover and protect every Cyber Asset. 🎁Learn More About ThreatAware: https://threataware.com/ 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the one 'un-automatable' skill you are building right now to survive the shift?" 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

  8. 97

    The Architecture of Survival: The human side of cyber security and crisis leadership

    What happens when a digital hack threatens the physical safety of 80,000 people inside a stadium? We are no longer just fighting hackers over stolen emails - we are defending environments where a single computer failure can cause real-world panic and cost human lives. Welcome to a special Cyber Leaders’ Summit edition of the SECURE | CYBER CONNECT Podcast. Today, we are dismantling the "Illusion of Control" with Kam Karaji. As a globally recognised Director of Cyber Security & Risk Management and a former senior counter-terrorism commander, Kam bridges the gap between digital systems and extreme physical consequences. If you are exhausted by boardroom theatre, corporate buzzwords, and the constant anxiety that you are just one mistake away from a catastrophic failure, this is your reality check. Kam reveals why the multi-million-pound security industry is actually making us less safe, how "alert fatigue" is destroying the mental health of our analysts, and what surviving a stroke and Stage 3 cancer taught him about true human resilience. Whether you are a CEO managing a board, a tech professional fighting burnout, or simply someone fascinated by high-stakes crisis leadership, this episode will completely change how you view survival. 🔥 WHAT YOU'LL DISCOVER: 🤥 The Boardroom Lie & The Prevention Trap: Why spending millions on a "50-foot digital wall" actually makes your organization fundamentally less safe, and why CISOs are managing board anxiety instead of actual risk. 🩸 The "Where's Wally" Bloodbath: How vendors selling "more AI tools" are actively destroying the mental health of Tier 1 SOC analysts by drowning them in 10,000 meaningless alerts a day. 🏟️ When Hacks Turn Physical: We are no longer just protecting data. Who makes the call when shutting down a compromised digital system creates a physical panic in an 80,000-seat arena? 🧠 The Architecture of Survival: How surviving a stroke and Stage 3 cancer completely rewrote a former counter-terrorism commander's playbook for leading through a catastrophic corporate crisis. 🛑 The Hour-One Fracture: The single biggest difference between a leadership team that tears itself apart during hour one of a disaster, and one that executes a unified command. 🔄 The Final Mental Reboot: The exact psychological framework leaders must use to reboot their own minds after a catastrophic professional or physical failure. 📅 Inside the Cyber Leaders' Summit: Kam’s unfiltered, 60-second industry wake-up call on the collective delusions shared by executives, and the uncomfortable conversations leaders must initiate at this year's Summit. 🔹 Kam Karaji. He is Director of Cyber Security & Risk Management for the National Football League, responsible for protecting global, high-visibility operations and converged cyber-physical environments. A former senior counter-terrorism commander, he led in environments where decisions carry immediate, life-or-death stakes. Kam now speaks internationally on resilience, crisis leadership, and the human core of cyber security. His work bridges operational discipline with executive strategy in moments that demand composure 📅 Join us at the upcoming Cyber Leaders’ Summit on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👇 The Challenge: What is the most ridiculous, soul-crushing task or alert you’ve had to chase this week while your real work suffered? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity - It’s Free. ✅ Join Here, using code OGMEMBER: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  9. 96

    Integrity-First AI: From Automation to Accountability

    Searching for: "What is the difference between RPA and Agentic AI?", "Who is legally responsible when an autonomous agent goes rogue?", or "How do we move AI from a cool experiment to a trusted enterprise employee?" Stop scrolling. This is the reality check the industry has been avoiding. We aren't just talking about chatbots anymore. We are talking about Autonomous Agents that reason, plan, and execute complex business processes. But as we hand over the keys, one question remains: Is your AI acting with integrity, or is it a liability? Behind the polished keynotes lies a high-stakes transition. If an agent triggers a million-dollar error, who is actually accountable? Welcome to Episode 3 of the Integrity-First AI Series on the SECURE | CYBER CONNECT podcast. Jay, Warren and Chiru Bhavansikar (Chief AI Operating Officer at ARHASI) are joined by Manish Ballal & Sumit Wasuja to discuss “From Automation to Accountability”. Manish is a Senior Enterprise Technology Executive with over 15 years of experience in AI, Automation & Go-to-Market Strategy. A Founding Team Member of AWS Quick Automate, Amazon’s Agentic Automation Service, he has held senior roles at Automation Anywhere, Barclays & Infosys, building and scaling technology platforms across Financial Services, Healthcare & Life Sciences. Manish brings a rare combination of Product Depth & Commercial Acumen to the conversations defining the Future of AI within Enterprise. Sumit is a Principal Product Manager at AWS, focused on bringing Agentic AI into Real Enterprise Operations. He is the Founding Product Manager & Head of Product for Amazon Quick Automate, a service that helps organisations modernise complex business processes using AI Agents. Prior to this, Sumit has Led Large-Scale Enterprise Transformation Initiatives at both Amazon & Deloitte Consulting, helping Global Organisations redesign operations through Advanced Technology & Automation. 🎁 EXCLUSIVE OFFER: Learn more about Trust House: https://trusthouse.ai/ 🔥 WHAT YOU'LL DISCOVER: 🤖 The Agentic Evolution: What is Agentic AI, why RPA is dead and how "Agentic AI" actually reasons and plans under the hood. ⚖️ Integrity-First AI: Moving beyond the buzzwords to build a framework where decision provenance is non-negotiable. 🛠️ The 'Trust Layer': How AWS handles security guardrails and human-in-the-loop checkpoints in an autonomous world. 📉 The $1M Mistake: Who takes the fall when an AI fails? How to build audit trails that satisfy regulators and the board. 🔄 Multi-Agent Orchestration: Is it hype or reality? How agents are starting to collaborate and even debate each other. 🕵️ Cutting Through the 'Vaporware': The "Sales Lies" being told about AI right now and how to spot what's real. 🚀 AI Career Truths: The "un-automatable" skills needed to survive as a leader in the era of total automation. 🚨 Exclusive Announcement: Opportunity for you to join Chiru, Sumit, Manish, Jay and Warren in Manchester at the end of April. 📅 Join us at Digital Transformation Expo Manchester | 29th- 30th April, Manchester Central, Manchester. Digital Transformation Expo connects the people driving business change through technology. Get Your Free Tickets Here: https://forms.reg.buzz/dtx-manchester-2026/?utm_source=partners&utm_medium=referral&utm_campaign=26dtxmvisprom&utm_term=strategic&utm_content=secure_cyber_connect 👇 The Challenge: In a world of autonomous agents, what is the absolute worst thing that could go wrong on your watch? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join the Ecosystem, use code ‘OGMEMBER’ and bypass the waiting list: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform?pli=1

  10. 95

    The Fight To Protect Our Health Services: How NHS Trusts Are Rethinking Cyber Resilience

    A hospital’s heartbeat is no longer biological… it’s digital. When the network flatlines, the hospital stops breathing. The server room is now the most dangerous place in the building. Healthcare has been the #1 target for 15 years, costing an average of £8.4m per breach. But the real debt is paid in human life: 1,700 surgeries cancelled and permanent patient harm. "Stacking tools" is failing. We must move from compliance theater to Defensible Assurance. It’s time for operational control that protects lives, not just data. Welcome back to our new series: The Fight to Protect our Health Services, we expose the unspoken pressure NHS leaders carry and explore how to turn complex security expectations into defensible, operational control. We are joined by two powerhouse guests from Heimdal Security: Adam Pilton (Cyber Security Advisor | The Cyber Detective): Following 15 years in law enforcement, culminating as a Detective Sergeant leading Covert Operations and Cyber Crime. Since 2016, he has worked across cyber security roles, advising organisations, improving cyber maturity, and translating complex threats into clear guidance for leaders, end users, and global businesses. Frederik Seemann J. Razic is Head of Healthcare at Heimdal Security, where he works closely with NHS organisations and partners to strengthen cyber resilience across healthcare. Since mid-2022, Frederik has led the growth of Heimdal’s presence within the NHS from 3 to 30 NHS organisations, supporting them in improving endpoint security, automating patch and vulnerability management, and protecting critical clinical systems. His work focuses on helping NHS teams reduce operational complexity while maintaining strong security across increasingly demanding IT environments. 🔥 IN THIS EPISODE: • 🎥 Special Feature - Exclusive 2026 Keynote: A 20-minute live recording of Adam Pilton from the Convenzis stage, detailing how to move from "paper compliance" to measurable, defensible assurance. • 🚨 Beyond the IT Department: Why the recent £3.07m ICO fines and Synnovis leaks prove security is no longer a technical choice - it is a clinical and criminal liability. • 📋 Mastering CAF & DSPT: Pragmatic approaches to meeting the Cyber Assessment Framework without adding a single second of friction to a doctor’s shift. • 📈 The 3 to 30 Blueprint: Frederik Seemann reveals the exact 30-day strategy used to scale Heimdal’s footprint across 30 NHS Trusts. • ⚙️ Reducing Operational Burden: How to navigate ageing IT infrastructure and consolidate visibility to give IT teams their "operational oxygen" back. • 🌍 Global Lessons: What the NHS can learn from Denmark's healthcare transformation to engineer a more resilient, system-wide future. 🎁Learn More About HEIMDAL SECURITY: https://heimdalsecurity.com/request-a-demo 📹 Check out Heimdal’s upcoming Webinar series: https://heimdalsecurity.com/webinars 📅 Join us at the upcoming Convenzis Group: Digital Infrastructure & Security Events: https://www.convenzis.co.uk/events 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

  11. 94

    The Fight To Protect Our Health Services Zero Trust Everywhere & Deception Tech

    When we think of hospital heroes, we picture doctors and nurses, but there is an invisible frontline of cyber defenders working around the clock to keep every life-saving machine running. We are exploring how the latest breakthroughs in Zero Trust and deception technology are flipping the script on cyber threats, ensuring our healthcare professionals are never stopped from saving lives. Welcome to our new special-edition series: The Fight to Protect our Health Services. In partnership with Convenzis Group, we’re bringing you raw, frontline conversations live from Cybersecure 2026: The NHS Cyber Security Conference, featuring exclusive keynote insights and behind-the-scenes interviews with the leaders securing the future of digital healthcare. In this inaugural episode, we are joined by the inspiring Mike Culshaw, a true healthcare IT disruptor who has spent nearly two decades in the NHS trenches. From managing regional service desks to serving as Chief Technology Officer at Pennine Care NHS Foundation Trust, Mike understands the heavy reality of defending hospital networks from the inside out. Driven by his core belief that "Tech + Humans is where the magic happens," he earned the prestigious 2024 NHS Cyber Innovator Award for relentlessly challenging the legacy IT status quo. Today, as a Healthcare Solution Consultant and Security Specialist at Zscaler, Mike brings that invaluable frontline perspective to the broader industry, championing Zero Trust transformation to secure the cloud, empower clinical staff, and ensure our health services can safely and securely operate from anywhere. 🔥 IN THIS EPISODE: • 🎥 Exclusive 2026 Conference Insights: Groundbreaking takeaways and raw footage directly from the floor of the NHS Cyber Security Conference. • 🚨 The Evolving Cyber Landscape: The biggest challenges Zscaler is seeing on the frontlines today, how AI-driven ransomware is shifting, and what healthcare IT must do to stay ahead. • 🔒 Zero Trust Everywhere: From users to things, and data to AI - how the principle of least-privileged access is transforming NHS security and compliance. • 🪤 Deception Technology: A look at the "digital decoys" and traps being set to outsmart attackers and stop ransomware before it deploys. • 🛡️ The Invisible Shield: How IT teams are modernizing infrastructure so frontline workers can focus entirely on patient care. • 💙 The Human Element: Why protecting our health services means protecting the mental resilience and wellbeing of the cybersecurity professionals in the trenches. Zscaler operates the world’s largest security cloud, the Zscaler Zero Trust Exchange™. This platform is designed to replace traditional legacy network security, such as VPNs and firewalls, by securely connecting any user, device, or application over any network, regardless of location. The platform's architecture is built on the principle of least-privileged access, ensuring that users are only connected to the specific applications they need. For more info visit www.zscaler.com 📅 Join us at the upcoming Convenzis Group: Digital Infrastructure & Security Events: https://www.convenzis.co.uk/events 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

  12. 93

    Integrity-First AI: Cloud, Governance and Responsible Innovation

    Searching for answers to "Is AI going to replace software engineers?", "Who is legally accountable when an autonomous AI makes a mistake?", or "How do we stop the hidden Shadow AI epidemic?" Stop scrolling. This is the unfiltered reality check the tech industry has been avoiding. We are rushing to let Artificial Intelligence run our businesses, our infrastructure, and our daily lives. But who is actually accountable when the machine breaks? Behind the corporate PR statements and "AI Ethics" boards lies a chaotic reality. Burnt-out employees are secretly feeding sensitive data into unsanctioned "Shadow AI" tools. Tech giants are making brutal, hidden trade-offs between system performance and massive global energy consumption. And as models become highly complex "Black Boxes" that even their creators don't fully understand, the ultimate legal question is looming: When an AI hallucination causes a catastrophic financial disaster or an algorithm ruins a family's life, who goes to jail? Welcome to Episode 2 of the Integrity-First AI Series on the SECURE | CYBER CONNECT podcast. This week, hosts Jay Adamson, Warren Atkinson, and special guest co-host Chiru Bhavansikar bring you a massive reality check. We are joined by James Anderson, Cloud Instructor and former Senior Director of Enterprise Architecture at Sabre Corporation. With over 20 years of experience designing the massive, highly regulated cloud systems that power global travel, James bridges the gap between complex cloud architecture and urgent, real-world human consequences. Learn More about GDG Cloud Southlake: https://gdg.community.dev/gdg-cloud-southlake/ Chiru Bhavansikar, recognized as one of the most impactful Chief AI Officers of 2024, serves as the Chief AI Operating Officer at ARHASI, with over two decades of experience pioneering cloud platforms and advising giants like Google, Chiru helps enterprises cross the chasm from "cool AI experiments" to Trusted Autonomous Systems, ensuring that governance and accountability never break during the handoff between data models and human workflows. Learn More: https://arhasi.ai/ 🎁 EXCLUSIVE OFFER: Learn more about Trust House solution exclusively for our community members: https://trusthouse.ai/ 🔥 WHAT YOU'LL DISCOVER: • 🚨 The 'Shadow AI' Epidemic: Why your own employees are your biggest cybersecurity blind spot, and how to engineer multi-million-dollar cloud infrastructure to survive internal human sabotage. • ⬛ Governing the 'Black Box': Can we actually govern an AI model we don't fully understand? The biggest blind spots in measuring AI trustworthiness. • 🏗️ Trust Architecture & CI/CD: How to stop bolting "ethics" on at the end of a project, and instead bake Data Governance directly into your Infrastructure as Code (IaC) and fast-moving AI workflows. • ⚖️ The AI Liability Crisis: If an enterprise AI system fails, who takes the legal fall? The Vendor, the Developer, or the Chief AI Officer? • 🌍 The Carbon Footprint Trade-Off: The brutal choices Cloud Architects must make right now between building high-performance AI and preventing a global energy crisis. • 💔 Algorithmic Bias & The Human Toll: The psychological weight of managing AI governance, knowing a single failure could destroy a real person's livelihood. • ⚙️ Legacy Modernization Friction: The most common governance challenges organizations face when bridging legacy cloud systems with unpredictable new AI capabilities. • 🎭 Corporate 'Governance Washing': How to tell if a company is actually protecting consumers, or just faking AI safety to beat their competitors to market. • ✈️ The 'Invisible Concierge' & Zero-Touch Travel: Drawing on his Sabre expertise, James reveals the future of AI in travel - where the cloud instantly fixes flight delays, rebooks your connection, and adjusts your hotel while you are still 30,000 feet in the air.

  13. 92

    DFIR, Deepfake & Ransomware Crisis: The Fight to Protect Our Families & Businesses

    The barrier to entry for cyber criminals has officially collapsed. It no longer takes a technical genius to bankrupt your business or a sophisticated setup to steal your child’s identity. It takes a leaked password at 2:00 AM and just two photos from a public social media profile. In a world where "prevention" tools are failing, this is the brutal, uncensored reality of what actually happens after the hack. We are joined by Will Poole and Oli Fletcher, the Co-Founders of Strand Intelligence, a UK-based platform that is revolutionizing Digital Forensics and Incident Response. As the former Principal Cyber Investigation Officer for the ICO, Will has investigated the UK's most high-profile breaches, giving him a rare view into exactly what companies try to hide from regulators and why they always get caught. Together with Oli, they are fixing a broken industry where high-end forensics was previously a "luxury craft" reserved for billionaires. They are on a mission to ensure mid-sized businesses don't face an "Economic Death Sentence" when insurers refuse to pay, while simultaneously fighting the "Agentic AI" threats now targeting our families in their own homes. MORE INFO: if you're interested to know more about Strand, you can see the platform modules at https://strandintelligence.com/modules 🎁 EXCLUSIVE OFFER: Strand are offering a free Threat Intelligence Report - just get in contact here for a scan, to see CVEs, dark web references and leaked credentials https://strandintelligence.com/contact 🔥 WHAT YOU'LL DISCOVER: 💀 The 2:00 AM Panic: The single worst decision leadership teams make in the first hour of a hack (and why it dooms them for a month). 💸 The "Death Sentence": What actually happens to the bill when Cyber Insurance finds a loophole and refuses to pay the ransom? 📸 The "2-Photo" Rule: Why your "private" social media profile is no longer enough to stop AI identity theft of your children. Battling Deep Fakes. 🕵️‍♂️ Confessions of a Regulator: Will reveals what companies try to hide from the ICO during a breach and why they always get caught. 🤖 Shadow AI: Your employees are pasting company secrets into ChatGPT. Can you ever get that data back? (Spoiler: No). 📢 The AI Lie: How to cut through the noise of "Marketing AI" (that just writes summaries) vs. "Operational AI" (that actually stops a breach). 🏫 The "Silent Signal": How teachers can spot the subtle signs of "Algorithmic Grooming" in the classroom that parents almost always miss. 🎮 Roblox & Discord: How to teach a 10-year-old to spot a "Social Engineer" in a gaming lobby without ruining their fun. 👵 Grandparent Vishing: The "Safe Word" protocol every family must agree on tonight to stop AI voice scams cold. 📉 The Human Toll: Why the CISO tenure is shrinking and why this industry is so good at protecting data but so bad at protecting its people. 🧠 The "Human Moat": To the teenager asking "Why learn code if AI can do it?": The one future-proof skill a bot can never replicate. 👇 CHALLENGE In the comments below, we want to know: Does your family have a physical, non-tech "Safe Word" to verify identity against AI voice scams? If not, what is the one thing stopping you from setting that up tonight? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week.

  14. 91

    Scaling to $100M: From CISO to CEO to Investor (Pen Testing to CTEM)

    Most technical experts hit a ceiling at the C-suite, but very few understand the blueprint to transcend from protector to builder and investor. In an era where "check-the-box" compliance is dead, this episode reveals the exact strategies used to scale cybersecurity services to $100M+ and what global private equity firms are actually looking for in the "irresistible" security assets of 2026. We are thrilled to be joined by Mark Carney, a U.S. cyber pioneer who has successfully navigated the rare path from technical practitioner to high-stakes CEO and Investor. Mark currently serves as the CEO of Evolve Security, a leading tech-enabled offensive security solution that delivers Continuous Penetration Testing through an optimal blend of AI and human expertise. He is also the CEO and Founder of DURO Advisors, where he collaborates with Global 100 private equity firms - managing a minimum of $20B AUM- to inspect cybersecurity platform assets entering the market. Mark previously led Coalfire’s revenue growth past the $100M+ mark as COO/Executive VP. With experience leading nine M&A transactions and holding executive roles at industry giants like FireMon and FishNet Security (now Optiv), Mark’s insights are the definitive guide for scaling cybersecurity into a high-valuation enterprise asset. 🎁 Exclusive Access For Our Community Members: Evolve Security's NEW Continuous Penetration Testing (CPT) Offering, Powered by the new Darwin Attck 3.0 platform: https://www.evolvesecurity.com/platform What You’ll Discover 🚀 The $100M Blueprint: Tactical leadership lessons from scaling service firms to nine-figure revenues and leading 9 successful M&A integrations. 🎯 The "4T" Investor Framework: What $20B PE firms look for: Tam, Timing, Team, and Tech. 🛡️ From Pen Testing to CTEM: Why compliance-driven audits are dead and why Continuous Threat Exposure Management is the new driver of enterprise value. 🤖 AI & Autonomous Agents: A look at the future where AI agents manage ransomware negotiations and automated red teaming. 🧠 The "Blue-Collar" Mindset: Why a "nose-down" work ethic and a 2026 Personal Vision Board are Mark's secrets to peak performance. ⚖️ Healthy vs. Toxic Pressure: How to manage high-pressure leadership without the "toxic load" that breaks modern CISOs. 📈 The 12 Key KPIs: Beyond ARR - why metrics like NRR, GRR, and Utilization are the true measures of a platform's worth. 👇 CHALLENGE In the comments below, share ONE non-business goal you are laser-focused on for 2026. Whether it’s hitting a new fitness PR or mastering a hobby, we want to hear how you're fueling your energy outside the office? 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  15. 90

    Integrity-First AI: Precision Architecture for Real-World Trust

    Searching for answers to "Why does my AI model hallucinate?", "Who owns AI risk in the enterprise?", or "How can I secure my AI?". Stop scrolling. This is the blueprint you haven't found yet. In the 2026 rush to "move fast and break things," we’ve ignored the silent killers of AI adoption. The reality is brutal: Trust breaks operationally, not ethically. We are thrilled to launch the Integrity-First AI Series to expose the brutal truth: speed is common, but integrity is rare, and the "Trust Gap" in enterprise AI is operational, not ethical. Joined by our new co-host Chiru Bhavansikar, this isn't a theoretical debate. Today we deliver a masterclass in Precision Architecture for leaders who are tired of "Demo-Ware" and ready to build critical infrastructure that survives the real world. We’re excited to be joined by Sam Sawalhi is the CEO of JSOC IT and a "wartime general" for critical infrastructure, where he operates with the mindset that failure has real, physical consequences. Grounded in execution rather than theory, Sam specializes in designing high-stakes systems that hold up under pressure, ensuring that AI deployments treat "trust" as an architectural requirement- complete with clear ownership, scoped autonomy, and real-time observability- rather than a vague compliance checkbox. Learn More: https://www.jsocit.com/ Chiru Bhavansikar, recognized as one of the most impactful Chief AI Officers of 2024, serves as the Chief AI Operating Officer at ARHASI, where he is focused on "Actualising Success Through Precision Architecture". With over two decades of experience pioneering cloud platforms and advising giants like Google, Chiru helps enterprises cross the chasm from "cool AI experiments" to Trusted Autonomous Systems, ensuring that governance and accountability never break during the handoff between data models and human workflows. Learn More: http://arhasi.ai/ What You’ll Learn (The Operational Playbook) 🛑 The Real Trust Gap: Why AI trust breaks operationally, not ethically—usually at the fragile handoffs between data modelling, workflows, and human decision-making. 🏗️ Precision Architecture: How to treat AI like Critical Infrastructure with defined failure paths, rollback mechanisms, and scoped autonomy. 💰 The Incentive Trap: Why organizations reward "Time-to-Demo" over "Time-to-Trust," and how to fix the broken incentives that lead to fragile code. 🔍 The "Black Box" Danger: Why Observability is the first thing to break (accuracy can drop from 95% to 60% unnoticed) and why you can't fix what you can't see. 📉 The Drift Trap: The massive risk of Model Drift, where systems anchor in past data (like 2019) to predict 2026 outcomes, silently destroying revenue. 🛡️ Surviving Executive Turnover: Sam’s strategy of "Radical Transparency"—how to document the "Why" to protect your architecture when new leadership tries to tear it down. 👑 The Authority Crisis: The hardest question for leaders: When the AI is wrong, who owns it, and who has the authority to override it?. 👇The Challenge: In the comments below, answer this: If your AI agent creates a financial loss or reputational damage tomorrow, can you name the specific HUMAN who is accountable? (If not, you don't have an AI system; you have a gambling problem) 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos

  16. 89

    Cybersecurity: Small Teams, Big Impact. How to Reward, Retain & Recognise Your Team?

    To the Professionals: You only get noticed when things break. You’re the "Invisible Hero" keeping the world safe in total silence, until a headline makes you the villain. Is your career stuck in the "Silent Success" paradox? 🔓 To the Leaders: If you only recognize your team during a crisis, you aren't leading, you’re just reacting. Burnout is rising because your best people feel they only exist when there is a fire to put out. How do you inspire a team whose greatest successes are, by definition, silent? 📉 The "Invisible Hero" era is over. In this episode, Jay Adamson and Warren Atkinson take a sledgehammer to the status quo, joined by the inspiring Gary Hibberd for an unfiltered look at how we reward, recognise, and retain the talent that actually keeps the UK secure. 🔥 WHAT YOU’LL DISCOVER: -The 'Invisible Hero' Problem: Why the industry's "Silent Success" paradox is the leading cause of CISO Burnout and how to change the narrative. - Curing Expo Fatigue: Why traditional 8-hour sales pitches at massive trade shows are failing and how to find Authentic Networking that actually drives career growth. - The 'London Bubble' Reality: Why real business and innovation are migrating to regional hubs. We explore why the North West & Yorkshire is becoming a cornerstone for the UK's 2026 security strategy. - Imposter Syndrome & Career Barriers: Why brilliant SMEs rule themselves out of leadership roles. - Careers advice and guidance for breaking the "Technical Ceiling" at all levels. - Merit-Based Awards vs. Pay-to-Play: The exclusive reveal of the Real Cyber Conference & Awards 2026 an awards model where impact beats the size of your marketing budget. - Modern Leadership Culture: Practical advice for leaders on how to champion "Unsung Heroes" and build a resilient security culture before a breach happens. [EXCLUSIVE REVEAL] Real Cyber Evolved: The 2026 Vision Gary Hibberd pulls back the curtain on an event designed to excite, empower, and absolutely not be missed. This isn't just "another cyber conference." 🗓️ Date: Friday, 30th October 2026 🔗 Learn more & Enter: www.therealcyberawards.co.uk ⚠️ Deadline: The doors will be CLOSING on April 28th, so start your submission today. What to Expect: 1. A FULL DAY CONFERENCE: Inspiring speakers, immersive experiences, and incredible insights. 2. THE AWARDS: Honouring the individuals and organisations working tirelessly behind the scenes. 3. THE ATMOSPHERE: Exceptional food, exclusive networking, and moments that celebrate our incredible community in a powerful, meaningful way. 🚀 TAKE ACTION: Register, Nominate, Attend Whether you are a leader building a world-class culture, a business owner navigating the digital landscape, or a professional ready to step into the spotlight, Real Cyber 2026 is your stage. Don’t wait for others to notice your impact; we encourage you to nominate your team and perhaps yourself, especially if you are an individual contributor or solo expert who often works behind the scenes. Join us in York on October 30th to bridge the gap between hidden work and industry-wide recognition: register to attend, enter the awards, or nominate the people you know who deserve to be seen. 🔗 Claim your place & nominate now: www.therealcyberawards.co.uk 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos

  17. 88

    Stop being an “expert”. Start being a Leader

    I’ve Learnt Why Great Cyber Experts Make Terrible Leaders (& How to Fix It). Are you the smartest person in the room… but the one with the least influence? 🔓 If you are still speaking "Vulnerabilities" while the Board is speaking "Revenue," your expertise hasn’t just peaked, it’s become your cage. You have the certifications and a six-figure salary, but when the big decisions are made, are you actually at the table, or are you just "the tech guy" waiting in the hallway? 👇 CHALLENGE: Have you ever been "right" about a risk but ignored by the Board? Tell us the one barrier stopping you from reaching the C-Suite in the comments. 🚀 ESCAPE THE TECHNICAL TRAP (50% OFF) Stop guessing and start leading. Fast-track your move to the C-Suite with Tamlynn’s Executive Coaching packages. 🎟️ Use Code: cyberconnect (Valid until Feb 28th) 👉 Claim Your Discount: https://empowerauthenticcoaching.co.uk/coaching-packages We’re excited to be joined by Tamlynn Deacon (Executive Coach & Former Cyber Director) and Marius Poskus (Fintech CISO & AI Governance Expert) to discuss the brutal reality of Executive Warfare. We’re breaking down why technical mastery is your biggest "Kryptonite" and how to stop being a "fixer" so you can finally lead the business. 🔹 Tamlynn is a Certified Business Coach & Former Cyber Security Director who helps Technical Professionals transition into Executive Leadership roles. With over 15 years in Cyber, and over a decade leading IT & Cyber Security Teams, she understands the unique challenges cyber professionals face when moving from technical expertise to strategic leadership. She's also the Founder of Empower Authentic Coaching, where she empowers leaders to show up authentically and make a lasting impact. Learn More: https://empowerauthenticcoaching.co.uk/ 🔹 Marius is Chief Information Security Officer at a Leading Fintech Organisation. A Distinguished Cyber Security Leader & Board Advisor….& is Renowned for his Expertise within AI Governance & Secure Technology Adoption.His Strategic Insights have Empowered Organisations to Strengthen their Security Posture whilst Effectively Navigating the Complexities of AI Integration…..& Marius’s Commitment to Advancing the Cyber Security Landscape….& Advising Vendors on Developing Innovative Products that Meet Industry Demand, is what sets him apart from many of his Peers! Learn more: https://www.mpcybersecurity.co.uk/ 🔥 WHAT YOU’LL DISCOVER: The £120k Salary Trap: Why "more certs" won't break the mid-management ceiling. 📉 Superpower vs. Kryptonite: Identify the traits secretly sabotaging your influence. 🛡️ The Boardroom Dialect: 3 language shifts to turn "Risk" into "Business Value." 🗣️ Leading Agentic AI: Managing "Human & Digital" teams in the 2026 workforce. 🤖 Influence Without Authority: Getting the Board to ask YOU for advice. 🤝 Hiring for Culture: Why Marius passes on "10/10" technical CVs. 🚀 STEM Reality Check: Honest advice for parents in a deepfake-heavy world. 👨‍👩‍👧‍👦 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  18. 87

    Why boards ignore you and how to fix it?

    If you are the most knowledgeable person in the room but have the least influence, you are falling into the "IT Crowd" trap. We know the emotional toll of shouting into the void - carrying the weight of the company's risk while being dismissed as a "blocker" by the very people you are trying to protect. In this episode, we sit down with Jessica Figueras - a leader who sits on both sides of the boardroom table - to uncover why Boards still treat Cyber Security as a "tech problem" instead of a business risk, and exactly how to change that narrative. From "survival tactics" used in the charity sector to the single diagram that beats a 50-page risk report, this is a masterclass in executive influence. 🔹 Jessica Figueras is the Co-Founder of CxB – Cyber governance for Boards, a non-profit dedicated to strengthening Board oversight of cyber security. A veteran technology strategist, she previously served as Vice Chair of the UK Cyber Security Council, CEO of Pionen, and Chair of NCT (the UK’s largest charity for parents). She bridges the gap between Government, Civil Society, and the C-Suite. Learn more about CxB here: https://www.cxb.org.uk/ 🔥 IN THIS EPISODE: The Influence Gap: Why the "IT Crowd" stigma is still killing CISO careers in 2026 (and the one non-tech skill to break it). The AI Threat: How Boards must govern a workforce of "Human & Digital" identities in the age of Agentic AI and Deepfakes. Visual Influence: Why a simple diagram wins more budget than a 50-page risk report. Zero Budget Warfare: "Survival tactics" from the Charity Sector that every corporate CISO should adopt today. Governance vs. Management: How to stop the Board from just "checking boxes" and make them accountable for resilience. Social Impact: Why your security strategy must extend beyond the balance sheet to protect civil society. The "Summit Effect": Why closed-door peer networking is more valuable than any vendor event. Parental Warning: A critical reality check on the digital mistakes parents are making right now. Career Truths: What to tell a 16-year-old who thinks they aren't "smart enough" for a career in tech. 📅 Join us at the upcoming Cyber Leaders’ Summit: ✅ The first open to Leaders from the Financial Services sector on 28th January, Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-financial-services ✅ The second open to leaders across all industries we invite you to join us on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  19. 86

    No Budget, No Problem: How CISOs Lead, Win & Inspire in Cybersecurity

    Stop trying to buy security. Start building influence. If you think the reason you aren't getting budget is because the company "doesn't get it," you are part of the problem. Global CISO from a leading FinTech exposes the uncomfortable truth: technical leaders are failing in the C-Suite because they lack the soft skills to navigate rejection. We break down exactly how to secure high-growth Fintechs when the Board says "No Budget," and why your third-party risk spreadsheet is giving you a false sense of security. 🔹 Guillaume Ehny is the Chief Information Security Officer (CISO) at Kroo Bank, bringing over a decade of strategic experience to the high-stakes world of Fintech. Having secured rapid-growth companies like GoHenry and Cashflows, he specializes in aligning security with aggressive business goals without becoming a "blocker." He also serves as a Board Member for VigiTrust Global Advisory. 🔥 YOU'LL HEAR: - The "Soft Skills" Lie: Why highly technical leaders struggle to survive in the C-Suite and the specific leadership traits that actually drive career growth. - The "No Budget" Strategy: How to build a robust Fintech security program and demonstrate ROI when the Board denies your funding. - Compliance vs. Reality: Why checking regulatory boxes is not the same as being secure, and how to balance risk-based decision making with audit requirements. - Third-Party Risk Management (TPRM): 41% of breaches originate from vendors. We reveal why your current supply chain audit is failing to stop them. - Wasted Tech Spend: How to identify which security tools are draining your budget without reducing your risk exposure. - The "Summit Effect": Why closed-door peer networking shapes security strategy more than any vendor event or conference ever will. Perfect for: CISOs fighting for budget | Technical leaders transitioning to the Boardroom | Fintech professionals in high-growth startups | Risk managers handling third-party vendors 📅 Join us at the upcoming Cyber Leaders’ Summit: ✅ The first open to Leaders from the Financial Services sector on 28th January, Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-financial-services ✅ The second open to leaders across all industries we invite you to join us on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/@SECURECyberConnectCommunity/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  20. 85

    Quantum Security vs. Hackers: The Keyless Blockchain Solution Is Here

    Your identity system is vulnerable to deepfake attacks. Your passwords can be hacked. Your audit logs can be deleted. And quantum computers will break traditional encryption within the next decade. What if there's a way to eliminate all of these vulnerabilities at once? In this episode, Hamid Pishdadian and Mike Goodwin reveal how rethinking cybersecurity from scratch led to something the industry said was impossible: unbreakable identity, encryption without keys, and security that actually scales. They explain why the solutions everyone's investing in (Post-Quantum Cryptography, better passwords, more monitoring) are all optimizing a broken system instead of fixing it. 🔹 Hamid Mokhlis | CEO, Founder & Chief Architect, SQE: is an award-winning design engineer, inventor, and technology executive with over 35 years of experience and more than 20 U.S. and international patents across computer science, electrical engineering, robotics, AI, and advanced algorithm design. His career includes developing the genetic algorithm behind the industry-leading Taco 0013 circulator, inventing a breakthrough 3D camera system referenced by Fortune 100 companies, and serving as CTO for multiple technology firms while earning additional patents in high-energy power switching and energy-reduction systems. He is the longtime president of General Sensors, CTO of Growgenics, and a mechanical engineering graduate of the University of Rhode Island. 🔹 Mike | COO & CFO, SQE: is an accomplished finance and operations professional with experience in emerging technologies at EMC and in global financial analysis at Boston Consulting Group, specializing in financial planning, detailed analysis, and competitor intelligence. Most recently, as General Manager of Cultivation and Processing at Sanctuary Medicinals, he led a team of 100+, developing effective structures, standard operating procedures, and streamlined production strategies. He holds a Bachelor of Business Administration in Finance with a minor in Information Technology from the Isenberg School of Management at the University of Massachusetts Amherst.. 🔥 What You'll Discover: - Why deepfake attacks bypass traditional security systems—and how unforgeable digital identity (SQid) stops them permanently - How keyless "digital particle" encryption works and why it's fundamentally different from traditional password-based security - Why experts say Post-Quantum Cryptography won't solve the quantum threat- here's the real solution - How Zero Trust security finally scales without slowing down your team (the blockchain breakthrough that makes it practical) - Why SQE uses 16,000x less energy than competing platforms and what that means for sustainable security - How immutable audit logs (records that can't be deleted or changed) save compliance teams thousands of hours - Why regulatory compliance (HIPAA, GDPR, PCI-DSS) becomes automatic instead of manual audits - How to shift security from a cost burden into a competitive advantage for your business - What roboticists and AI engineers know about building secure systems that cybersecurity teams are missing - The practical first step: how to migrate to unforgeable identity without disrupting your current operations Perfect for CISOs, security architects, CFOs measuring security ROI, DevSecOps teams, compliance officers, and founders building defensible infrastructure. 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

  21. 84

    Uncomfortable truths about Cybersecurity, innovation, culture and careers

    The reality of working in Cybersecurity: Burnout, diversity, culture, innovation failures & what actually works. Five security leaders from the UK and Europe sat down to have the conversation the industry avoids: Why are our teams burning out? Why is diversity in cyber still a struggle? Why do innovation initiatives fail? What does leadership actually look like when you're managing real risk, real people, and real pressure? Recorded LIVE at the Cyber Leaders Summit in Belgium and Manchester. This isn't a panel. It's honest talk from people who've felt the frustration, seen the systemic challenges, and figured out what shifts things. 🔹 Thomas is an experienced security leader with deep expertise spanning cybersecurity operations, management, and strategy. He began his career as a penetration tester and, over the past 12+ years, has evolved into a security champion known for building innovative products, services, and high-performing teams that address real customer needs. Lear more: https://www.cytix.io/ 🔹 Bertilla Sinka is a CISO and Director of Quality & Digitiazation Leader at ATG Europe with over 15 years in the space sector. She has led programs in security, quality, and digital transformation, bringing a uniquely integrative perspective that connects technology, people, and process. Learn more: https://www.atg-europe.com/ 🔹 Bennet Morka, an Information Security Strategy & governance Leader- Mott MacDonald and Global Council for Responsible AI. Dedicated to helping early-career professionals actually survive this industry. His take on AI adoption risks is hitting different right now. What does mentorship look like when the field is under this much pressure? Learn more: https://www.mottmac.com/en-gb/ 🔹 Charmaine Sipin Tumalad, Global Information Security Risk & Compliance Manager at Bridgestone EMEA, who's redefining cyber leadership through 25+ years across financial and industrial sectors. With 15 years in senior roles leading cross-regional programmes across Europe, America, and Asia, she's certified in ISO27001, NIS2, CFE, and business continuity. Born in the Philippines, based in Brussels for 20+ years, this proud mother of two combines Catholic faith with professional rigour, passionately empowering women in STEM whilst balancing creativity, resilience, and unwavering integrity. Learn more: https://www.bridgestone-emea.com/ 🔹 Ifeanyi Molokwu is an experienced Senior Information Security and Risk Management professional with expertise in governance, compliance, and enterprise security risk. He focuses on strengthening organisational security maturity through effective risk-based decision making and a culture of security awareness. 🔥 YOU'LL HEAR: - Why burnout is a leadership problem, not a resilience problem - What diversity and inclusion actually require (not just hiring) - Where innovation fails in security programmes - The latest trends reshaping the industry - What it's really like working in cybersecurity right now - How leadership changes when you're managing people, not just risk - The uncomfortable gaps between what we say works and what actually works Perfect for: Security professionals tired of the noise | CISOs managing burnt-out teams | Early-career professionals wondering if this is sustainable | Leaders trying to build inclusive security cultures | Anyone asking: is this industry actually changing? 🚨 This is real conversation about real challenges. From the Cyber Leaders' Summits in Belgium and Manchester. 📅 Join us at the upcoign Cyber Leaders Summit: ✅ The first open to Laders from the Financial Services sector on 28th January, register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-financial-services ✅ The second open to leaders across all industries we invite you to join us on 21-22nd April in London. Register interest here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-london

  22. 83

    Cybersecurity professionals LIVE at the Digital Transformation Expo: Real People, Stories & Impact

    Why 73% of digital transformations FAIL and what the frontline leaders at DTX 2025 actually discovered about fixing it. Live from Digital Transformation Expo 2025, we caught up with industry leaders tackling the uncomfortable truths: real failures, real breaches, real team burnout and the strategies that actually work. Hear from: 🔹 Michael Tarbard (Every Child Online) – CEO & Founder tackling digital poverty head-on. Michael's giving refurbished devices and online safety support to disadvantaged children and young people across the UK—while building national partnerships that connect families to education and opportunity. His challenge to transformation leaders? If your strategy doesn't reach the digitally excluded, you're building for a shrinking market. Learn more: Https://everychildonline.co.uk 🔹 Gurps Khaira – 15+ years scaling transformation across Cyber, IT, Banking, Construction—from APAC to Europe to MENA. Why transformation programmes stall at execution. (Spoiler: it's never the technology.) Learn more: https://www.youtube.com/@gurpskhaira 🔹 Chijioke Okoye – Cyber Security professional recognised for risk management, compliance engineering, and security strategy. Chijioke leverages technical depth and practical leadership to deliver measurable improvements in organisational security posture—proving security can accelerate business instead of blocking it. 🔹 Tom Jackson (Rybec Group) – Ex-police investigator revealing why most organisations are failing ISO 27001, Cyber Essentials, and CAF compliance. How to achieve governance without the corporate bloat. Learn more: www.rybec.co.uk 🔹 Divine Uzodinma – Security ops on the frontline. What incident response actually looks like. Why mentoring the next generation is part of solving the cybersecurity skills gap. 🔹 Gospel Uche – Building AI partnerships in transformation without the hype. Real careers in tech, what's actually hiring and what actually pays. 🔥 What you'll ACTUALLY discover: The #1 reason transformations fail (and it's not what you think) Why compliance frameworks kill momentum—and how to fix it The digital divide: why digital poverty is your transformation blind spot Breaking into cybersecurity: real entry points, real salaries, real mentors The skills gap killing security teams—and how to fill it Turning compliance from cost centre to competitive advantage Perfect for: CIOs drowning in failed initiatives | Founders securing transformation funding | Security leaders building secure-by-design | HR scaling tech teams without burning people out | Career-changers looking for real entry points into cybersecurity | Compliance officers tired of being the blockers 🚨 Not your typical boardroom talk. These are leaders who've failed publicly, learned hard lessons, and delivered real outcomes. Frontline. Honest. No corporate fluff. Register for DTX 2026: https://dtxevents.io/ 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg/videos/videos 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  23. 82

    Cybersecurity leaders LIVE at the International Cyber Expo: Behind the scenes, real life stories

    What are the biggest challenges facing cybersecurity leaders TODAY? Part 2 Live from ICE 2025, continues the conversation with industry leaders tackling the human side of security, the productivity crisis, and how organizations actually scale their security posture without burning out. In Part 2, hear from: 🔹 Tim Ward (Redflags) – Co-founder and CEO delivering secure behaviour change through next-generation security awareness. With 90% of cyber attacks starting with human error, Tim challenges the broken eLearning model. Traditional phish-test-train approaches fail because they're infrequent, boring, and punishing. Redflags uses proven behavioural and learning science to deliver drip-fed, ongoing awareness pushed directly to devices—with real-time, context-sensitive nudges that guide people to make secure decisions at the point of risk. Learn more: https://redflags.com 🔹 Lisa Ventura MBE FCIIS (AICSA – AI and Cyber Security Association) – Chief Executive and Founder, award-winning cyber security and AI specialist, neurodiversity advocate, and mental health champion. Lisa brings a human-centred approach to cybersecurity, addressing the psychological and neurodivergent aspects often overlooked. An MBE recipient for services to cyber security and diversity, Lisa has been recognized as one of the most influential women in tech. She's passionate about building inclusive cyber communities and ensuring the human element of security gets the attention it deserves. Learn more: https://www.aicsa.org.uk 🔹 Alex Malban (ZERODAI) – Co-Founder & CEO of the productivity platform transforming how security teams operate. Alex recognized that cyber security teams are drowning in manual tasks—losing time to busywork instead of strategic work. ZERODAI empowers both security teams and business users through Microsoft Teams integration, intelligent automation, and real-time reporting that gives leadership the insights they need to make better decisions. NCSC-aligned and G-Cloud approved, ZERODAI is changing the game for enterprises struggling with security productivity. Learn more: https://zerod.ai 🔹 Kieran Roberts (Fortifi Cyber) – Director with 15 years in offensive cyber security across all company sizes and industries. Kieran's talking about "The Pentest Trap"—the cycle that keeps SMEs spending money on penetration tests without actually improving their security posture. Fortifi Cyber takes a consultant-led, relationship-first approach: acting as a security partner rather than a transactional provider. The goal? Help organizations improve year-on-year without necessarily increasing their security budget. Learn more: https://www.forti.fi 🔹 Alison Norman & Jane Bashford-Hobbs (Amicus HR) - Alison, Founding Partner/Director, brings decades of Chief People Officer and HR Director experience from tech start-ups to scale-ups to global enterprises. Jane, HR Director with deep expertise in Cyber, Tech, and Professional Services, combines strategic thinking with no-nonsense pragmatism. Together they represent Amicus HR, a refreshingly different HR consultancy for start-ups, scale-ups, and SMEs. They understand the real challenge: building a culture and people strategy that attracts, retains, and empowers your team, without the corporate stuffiness that stifles growth. Learn more: https://www.amicushr.com 🔥 What you'll discover: • Why traditional security awareness training doesn't work (and what actually does) • The human psychology behind cyber attacks and how to defend it • How to build security awareness that sticks without boring your staff • The productivity crisis crushing security teams (and why it matters) • Why pentesting alone isn't enough- The Pentest Trap explained • How to scale security posture without scaling your budget • Building and retaining top security talent in a competitive market • People strategy that fuels growth in security start-ups and scale-ups • Creating neuroinclusive, psychologically safe security

  24. 81

    Cybersecurity experts LIVE at ICE: Challenges, insights and advice Part 1

    What are the biggest challenges facing cybersecurity leaders TODAY? Live from ICE 2025 with 7,543 attendees across 94 countries, we asked industry leaders the question everyone's asking: "What's REALLY breaking security teams right now?" The answers? Eye-opening. Honest. And packed with actionable strategies. In Part 1, hear from: 🔹 Chris Jefferson (ADVAI) – Co-Founder protecting AI and ML applications from exploitation. As AI security threats explode, ADVAI is the UK leader in AI assurance, helping organisations manage risk, compliance and trustworthiness while mitigating AI-specific security vulnerabilities. The future of security is AI security. http://www.advai.com 🔹 Katie Barnett (Toro Solutions) – Director of Cyber Security with 15+ years in IT and legal background. She's delivered CISO-level expertise across government contracts, global enterprises, and war zones (Iraq, Somalia, Ukraine). Her secret? Turning complex security chaos into simple, robust solutions that actually work. https://www.torosolutions.co.uk/ 🔹 Andrey Darenberg (RateYourCyber) – Founder with 12 years in cybersecurity, PhD in Finance, MBA from London Business School. He's disrupting enterprise GRC with AI-powered platforms built for SMEs—making £50k consultant fees obsolete. What he reveals about security maturity assessment will surprise you. https://rateyourcyber.com/ 🔹 Kelsey Smith & Joanne Morley (Dionach by Nomios) – Kelsey, Director of Sales, has scaled cybersecurity programmes for Fortune 500s, government bodies and healthcare with infectious energy. Joanne, CISMP Certified GRC specialist with 15+ years experience, partners with organisations to build security frameworks that actually align with business. Together they represent Dionach, an independent, CREST-approved global provider of information security solutions with 25 years delivering insight-led cyber security services. ISO 27001/9001 certified, trusted by 200+ public and private sector organisations worldwide. https://www.dionach.com/services/ 🔥 What you’ll discover: - Real frustrations and challenges throughout industry - The #1 reason scale-ups fail their first security audit (spoiler: it's not technical) - Why traditional GRC frameworks are leaving SMEs vulnerable - How AI is changing the cybersecurity game and who's winning - Real funding challenges scale-ups face (and how to overcome them) - The talent gap crushing security teams and how to fix it - Career paths into cybersecurity that actually pay (for students, career-changers, parents) - How to turn security from a cost centre into a business accelerator - Thoughts and insights on the Internationa Cyber Expo. what you missed and why you should attend the next. Register for 2026, here: https://www.internationalcyberexpo.com/ Perfect for: CISOs tired of doing more with less | Security leaders building high-performing teams | SMB founders securing their first enterprise deals | GRC professionals staying ahead of compliance | Career-changers entering infosec | Anyone building business-aligned security operations 🚨 This is NOT your typical cyber podcast. These are real conversations with people who've dealt with real breaches, real regulations, and real pressure from the board. 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform

  25. 80

    Nation-state hackers exposed | AI, APT tracing & predictive cyber defence

    Most cyber defences are waiting for an alert - by the time it rings, it’s often too late. What if you could trace the attack before it happens? In this episode, Drilon Balaj - founder of XY CYBER and creator of the MOLE predictive threat-intelligence platform – reveals how his team hunts nation-state adversaries, tracks advanced persistent threats (APTs), and applies AI and large language models to transform defence from reactive to proactive. Drilon’s global journey spans Kosovo, the U.S., Dubai and Israel - working with governments, start-ups and innovation ecosystems to train hundreds of future defenders and build cyber resilience from scratch. 🔥 What you’ll discover: The evolution of malware and how nation-state actors now operate at scale Why most defenders still play catch-up and how to flip the script Real-world insights into predictive cyber-defence: signals, false flags, and what “anticipating the breach” really means How AI & LLMs (large language models) are being weaponised and how they can empower defenders The stealth tactics of APT groups, and the subtle behaviours you can monitor before an attack Kosovo’s rise as a cyber power-centre, global partnerships and talent pipelines Why managing the external attack surface is now one of your most critical defences and how XY CYBER’s MOLE solution fits into that strategy Perfect for: CISOs, red/blue/purple teamers, intelligence professionals, product & security leaders, founders and anyone serious about turning cyber risk into business advantage. 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: / @securecyberconnectcommunity 🗓️ NEW EPISODES available every week. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  26. 79

    Cyber security operations 101: Software supply chain security, incident response & career tips

    Building elite Security Operations teams isn’t just about playbooks and malware detection - it’s about creating human-centric, resilient teams that move fast, think offensively, and protect what matters without burning out. In this episode, Nate Dunning - cybersecurity expert, Co-Founder of Ossprey Security, and champion of diversity in cyber - shares real-world strategies for spotting malicious packages, building SOC and IR teams from scratch, and attracting talent from non-traditional backgrounds. Nate has spent over a decade building Security Operations Centers and Incident Response teams, leading them through high-pressure incidents and complex cyber threats. He’s also deeply committed to mentoring the next generation of cybersecurity professionals, helping individuals from non-traditional backgrounds launch successful careers and bring fresh perspectives into the industry. Most recently, Nate has focused on securing software supply chains through Ossprey, tackling the growing threat of malicious open-source packages with cutting-edge detection, threat intelligence, and automation. 🔥 What You’ll Discover: - Why traditional scanning tools miss real threats and how to stop malicious dependencies - Lessons from building SOC and IR teams that actually scale - How to balance developer velocity with supply chain security - Core skills every security professional must cultivate beyond technical expertise - Why diversity of thought is critical and how to foster it - Nate’s journey from Security Ops to co-founding Ossprey Security - Insights from mentoring individuals from non-traditional backgrounds - How to create human-centric, sustainable, business-aligned security operations This episode is perfect for CISOs, SOC managers, incident responders, DevSecOps teams, security architects, aspiring cybersecurity professionals, and talent leaders — anyone building security operations that protect software supply chains while empowering their people and embracing inclusion. 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: / @securecyberconnectcommunity 🗓️ NEW EPISODES available every Sunday and Wednesday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  27. 78

    Why most CISOs never become CEOs — identity risk, deception and the cyber VC playbook

    Most security programmes don’t fail because the technology isn’t good enough, they fail because leaders overlook identity risk, lack adversarial thinking, and fail to elevate security from a technical function to a true business enabler. The era of perimeter defence is gone. Success now demands identity-centric security, deception-driven defence, and executive-level cyber leadership capable of anticipating attackers, not reacting to them. In this conversation, Andreas Andreu — 4× Award-Winning CISO, COO at Constella Intelligence, product inventor, federal law-enforcement technologist and venture advisor — reveals how elite CISOs evolve into strategic business leaders, capable of influencing boards, shaping market innovation, and building resilient identity-first security programmes. Andreas has spent over 30 years in technology and cybersecurity, leading global teams across federal, industrial, media and medical sectors. He has built and commercialised security products from zero-to-exit, authored The CISO Playbook, and advises leading venture capital firms on cyber innovation, market direction and investment strategy — giving him a uniquely comprehensive view of cyber defence, leadership, entrepreneurship and capital strategy. 🔥 What You’ll Discover: - Why identity risk is now the core battlefield in cybersecurity - How elite CISOs transition to CEO-level influence & strategy - Real-world deception engineering practices that outperform reactive defence - How chaos engineering strengthens cyber resilience & culture - The offensive mindset shifts required to stay ahead of modern attackers - What cyber VCs look for in founders, technology and security leadership - The critical skills future CISOs must develop to stay relevant in an AI-driven era - Perfect for CISOs, cyber leaders, founders, security architects, venture investors and anyone building business-aligned, intelligence-driven security leadership capable of operating at executive level — not just in the SOC. 🎁 Free Access to the 2025 Identity Breach Report and the latest insights and trends: https://constella.ai/2025-identity-breach-report/ ✅ Request a live demo of Constella’s platform and explore its capabilities. Alternatively reach out to Jay or Warren directly: https://constella.ai/request-a-demo/ 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: / @securecyberconnectcommunity 🗓️ NEW EPISODES available every Sunday and Wednesday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #Startup #VC #CISO #cyberconnect

  28. 77

    How to become a cybersecurity consultant | Careers, training, mentorship & Awareness 101

    Are you ready to launch or advance a career in cybersecurity? Becoming a successful cybersecurity consultant isn’t just about certifications-it’s about practical experience, mentorship, awareness and understanding real-world security challenges. In this Cyber Leaders’ Summit Special Edition, Nicholas Jackson, Global Director of Cyber Security Services at Bitdefender, Startup Advisor & Career Mentor shares actionable insights from over 13 years of experience in risk advisory, offensive security, and cyber operations. Nick has guided organisations across financial services, oil & gas, luxury retail, governments, and hospitality, helping them strengthen security postures, improve compliance, and implement real-world defenses. He has held key roles at PwC, NCC Group, and Bridewell, and is a frequent speaker at industry events on cyber strategy, regulatory challenges, and the future of offensive security. 🔥 What You’ll Learn in This Episode: - How to become a cybersecurity consultant and build a successful, high-impact career - A clear cybersecurity career roadmap and practical career pathways for beginners and professionals - The role of mentorship in accelerating growth and finding the right guidance - Key cyber awareness and hygiene practices for individuals, SMEs, and enterprise organisations - The difference between offensive and defensive security and why both are essential - Career lessons, challenges, and mistakes from Nick’s 13+ years in cybersecurity - Practical advice on balancing certifications, hands-on skills, and career development - How to foster a security-conscious culture across teams and organisations - Insights on emerging cybersecurity trends, balancing innovation with security, and navigating ethical and regulatory challenges 📅 Join us and Leaders from across the UK | 03 – 04 November 2025 The Cyber Leaders' Summit (CLS Manchester) is an exclusive, invite-only event held once a year in Manchester at the Kimpton Clocktower Hotel. bringing together senior cybersecurity leaders, decision-makers, and budget holders from across the North of the UK. ✅ Get your tickets for the Cyber Leader’s Summit here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-manchester 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday & Wednesday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing.

  29. 76

    AI is not the Answer (Yet): Why cyber resilience starts with your incident response reality

    Is your cyber security strategy relying too much on AI? Real resilience starts with incident response, culture, and processes, not just tools. Chris Leppard and Josh Pribanic share actionable lessons from organisations across industries. Most organisations rush to AI in cyber security, hoping it will solve everything. The reality? AI alone won’t protect you when incident response, human oversight, and culture are missing. Real cyber resilience is built on people, processes, and preparation - the things that actually hold up under pressure. We’re joined by Chris Leppard, Head of Consultancy Services at DigitalXRAID Ltd, and Joshua T. Pribanic, President & Co-Founder of LastLine Cyber, who bring decades of experience guiding teams through complex cyber security challenges. Chris has over 30 years of hands-on experience across public and private sectors, leading SOCs, managing PCI DSS compliance for major clients including Visa Europe, and providing vCISO services. He combines deep technical expertise with strategic business insight, helping organisations turn cyber security strategy into real-world resilience. Josh co-founded LastLine Cyber to make cyber security actionable for small and mid-sized businesses. He has served as Chief Information Security Officer for multiple organisations, implementing best practices, cyber liability insurance, and fostering security-aware cultures where employees understand their role in protecting critical assets. 🔥 What You’ll Discover: - Why AI alone cannot deliver cyber resilience and common misconceptions to avoid - Operational weaknesses in SOCs that are often cultural, not just technical - How to balance tools, skills, and staffing without overloading teams - Lessons from tabletop exercises that reveal real gaps in incident response - How AI can enhance human decision-making rather than replace people - Why employee engagement and culture are the most critical parts of cyber security - Practical steps CISOs and IT leaders can implement immediately to strengthen security posture 🎁 To gain access to Free Incident Response Triaging & a range of resource provided by DigitalXRAID, follow the below link and quote SECURE. Alternatively reach out to Jay or Warren directly. ✅ Learn more here: https://hubs.la/Q03zgNxd0 🎯 Learn More: DigitalXRAID Ltd provides end-to-end cyber security consultancy and virtual CISO services. They help organizations of all sizes strengthen governance, risk management, and operational security while aligning technical solutions with strategic business goals. Learn more here: https://www.digitalxraid.com/?utm_campaign=18158228-2507%20Secure%20Cyber%20Connect%20-%20DigitalXRAID%20Website%20Tracking%20URL&utm_source=Secure%20Cyber%20Connect&utm_medium=campaigns LastLine Cyber focuses on making cyber security understandable and actionable for small and mid-sized businesses. Learn more here: https://lastlinecyber.co 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ JOIN THE COMMUNITY & LEARN MORE HERE https://linktr.ee/securecyberconnect 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday and Wednesday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #infosec #ai #technology #cyberconnect

  30. 75

    The fight to protect our water: Cyber Security & Critical Infrastructure

    How safe is the water you drink and what role does it play in the UK’s AI and tech future? Water systems aren’t just critical for daily life; they’re vital for powering AI centers and technological infrastructure. In this Cyber Leaders’ Summit Special Edition Episode, Matthew Greaves from Yorkshire Water shares how cyber security protects our most critical systems while supporting the UK’s position in the AI race. Water is essential, but it’s also a target. From cyber attacks to physical threats, the systems that deliver clean water are under constant pressure. Real resilience isn’t just about technology - it’s about skilled people, strong processes, and proactive leadership. We’re joined by Matthew Greaves, Head of Cyber & Protective Security at Yorkshire Water. Matthew leads efforts to safeguard the water supply from both cyber and physical threats, ensuring that when you turn on the tap, the water flows reliably and safely. His role spans Sec Ops, InfoSec, Cyber-Physical systems, people management, and electronic security. Matthew is passionate about nurturing grassroots cyber talent and serves as a Cyber Ambassador for NCSC’s CyberFirst program, as well as an advisor to Cyber Bradford. He brings practical insights on protecting critical infrastructure, developing the next generation of security professionals, and strengthening organisational resilience — all while ensuring the UK’s water systems can support AI centers and broader technological development. 🔥 What You’ll Discover: Why water systems are prime targets and the stakes behind cyber-physical security What protecting critical infrastructure looks like day-to-day How the threat landscape for utilities has evolved over the past five years Key differences between OT (Operational Technology) and IT security How to safeguard long-standing physical systems against modern digital threats The challenges of building cyber-physical talent pipelines Practical steps organisations and individuals can take to improve resilience Career advise and guidance Why water infrastructure is a foundational asset for AI centers and tech development Lessons from cross-industry leadership and collaboration at the Cyber Leadership Summit About Yorkshire Water: Yorkshire Water provides clean, safe, and reliable water across the region while maintaining resilience against cyber and physical threats. The organisation combines operational excellence with proactive security measures to protect one of the nation’s most critical infrastructures a foundation for supporting AI and technology initiatives. Learn more: https://www.yorkshirewater.com 📢ANNOUNCEMENTS📢 👋 Jay Adamson and Warren Atkinson thank you for joining us in the fight to make cyber security accessible to everyone. We encourage you to check out our Community and Growth Platform where you can access a wealth of Tools, Resource and Opportunity – It’s Free. ✅ Join Here: https://docs.google.com/forms/d/e/1FAIpQLSdiJ3kC2UDadnnLfP91u2K18XEiwV9n7J-l_-Dt8icUzP00bA/viewform 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday & Wednesday.

  31. 74

    AI Strategy 101 | Why 80% Of Projects Fail | Success & Leadership

    Most AI initiatives fail, not because the technology doesn’t work, but because organisations forget the one thing that drives real success: strategic leadership, governance and people. Skip the Big 4 consulting hype, endless meetings and inflated delivery estimates. Get practical AI strategies from leaders who have been driving transformation across public and private, giving you a genuine competitive advantage at no cost. In this conversation, Sherin Mathew, Founder & Chief AI Officer of AI Tech and Founder of Innovation X, reveals how leaders can turn AI from a risky experiment into measurable business impact, with practical strategies you can apply immediately. Sherin is a visionary technology leader with over 20 years of experience delivering AI-led transformation across government, enterprise, and regulated sectors. He has worked with Microsoft, IBM, NHS, MoD, and the ICO, building ethical, scalable AI systems. Recognized as a Data IQ Top 100 Data Leader, Sherin thrives at the intersection of strategy, product development, and public impact, leading teams to deliver open-source, sovereign AI applications in complex, high-security environments. 🔥 What You’ll Discover: Learn why most AI projects fail and how to avoid the hidden pitfalls Understand the critical role of a Chief AI Officer in scaling AI initiatives successfully Discover Sherin’s SIMPLE + SAFE + STRATEGIC + SUCCESSFUL AI360 Framework for aligning AI with business outcomes Explore practical steps for founders, executives, and teams starting their AI journey See how human-centered leadership and ethical governance drive lasting results Hear insights on AI’s real-world impact across industries, public sector, and society Perfect for: Business leaders, tech executives, founders, product managers, cybersecurity professionals, and anyone looking to implement AI strategically, safely, and successfully- not just as a tech experiment. 🎯 Learn more about InnovationX: https://www.innovationxuk.com/ 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/posts/secure-recruit_secure-cyber-connect-solutions-services-activity-7339197132299464704-qJgS?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAyFj1sBr8Iz1lprcBwB6a_fqCi4YdhIfB4 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday and Wednesday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #Artificialintelligence #transformation #business #innovation

  32. 73

    AI Ethics Exposed: Combating Scam 2.0 & Misinformation | Digital Transformation 101

    How can AI be used responsibly while protecting citizens from scams, misinformation, and ethical pitfalls? We’re privileged by Praveen Tomar, Head of Data Automation at Ofgem. With 23+ years in IT transformation, automation, and data strategy across Government and global organisations, Praveen has led large-scale AI and automation projects that enhance efficiency, public trust, and inclusivity. An award-winning thought leader, patent holder, and senior IEEE member, he brings unique insights on ethical AI, digital literacy, and citizen-centric security. 🔥 What You’ll Discover: In this episode, Praveen shares actionable guidance on: Balancing AI innovation with ethics and regulation in public services Combating Scam 2.0, deepfakes, and voice-cloning threats Building digital trust and literacy across communities Practical steps for organisations and individuals to safeguard against misinformation Lessons from his cross-sector journey from global consulting to UK civil service leadership Applying a human-plus-machine mindset to daily work and AI adoption Insights for cyber leaders, AI professionals, and anyone navigating AI-driven digital transformation Will you join us at Digital Transformation Expo | 1st-2nd October, Excel, London. DTX London is the intersection of technology, people, and operations – bringing together leaders in AI, Cyber, Data & Digital Technology to drive meaningful business transformation. ✅ Get your tickets for DTX London here: https://dtx-london-2025.reg.buzz/reg 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect: Pre-event cyber security podcast episodes, Live event interviews with tech, security leaders AND YOU! 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #dtx #culture #inclusion

  33. 72

    Cybersecurity: Career Paths, Inclusion & Lessons From Industry Leaders

    How can we build a more inclusive and diverse cybersecurity workforce while inspiring the next generation of tech professionals? We’re thrilled to welcome Beth Rosary and Valeria Santamato to the SECURE | CYBER CONNECT Podcast. Beth is a Technical Programme Manager and Head of Education at Women in Tech UK, and Founder of the Future FoundHER’s Podcast, amplifying women’s stories and shaping industry-community partnerships. Valeria is a Security Consultant at Accenture, bridging technical and non-technical domains. She has delivered strategic security solutions, embedding Security by Design into large IT programmes, and advocates for gender inclusion globally, receiving the European Cyber Women Award (CEFCYS) in 2022. She also leads workshops and university courses in Europe and Africa. In this fourth International Cyber Expo Special Edition Episodes, Beth and Valeria discuss their journeys, early tech engagement, and barriers women and minorities face in cybersecurity. They explore embedding inclusion into everyday culture, mentoring, building resilient, diverse teams, hybrid work, tokenism, and actionable steps to support underrepresented professionals. Whether you’re a cyber leader, diversity advocate, HR professional, or aspiring tech professional, this episode delivers strategies, insights, and inspiration to advance careers, foster inclusion, and shape the next generation of cybersecurity leaders. Don’t miss out on this special International Cyber Expo edition, tune in for insights that can change the future of cybersecurity! 🎧 We encourage you to check out the Future FoundHER’s Podcast. Available on Spotify: https://open.spotify.com/show/0lrv94OTbgDe9zKj9McJKf?si=74b50173d46d466e Also available on YouTube: ⁨@futurefoundHERs⁩ 🚀 Learn more about Women In Tech: https://women-in-tech.org 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 Discover the future of cybersecurity at the International Cyber Expo, happening 30th September to 1st October 2025 at Olympia London. Join global experts, explore the latest tech, and connect with leaders from over 85 countries - all under one roof. Register for free today: https://international-cyber-expo-2025.reg.buzz/secure-x-pod 🎯 Want to be heard at ICE? Join us for exclusive live recordings, quick interviews, and panel discussions! Learn more & register here: https://www.linkedin.com/posts/warren-atkinson_cybersecurity-internationalcyberexpo-ice2025-activity-7358391424943284224-16kx?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAyFj1sBr8Iz1lprcBwB6a_fqCi4YdhIfB4 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES: Twice a week 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #Cybersecurity #diversity #womenintech #cyberconnect #Internationalcyberexpo

  34. 71

    AI Won’t Save You: Why People, Culture & Inclusion Drive Transformation

    How can organisations succeed in digital transformation when technology alone isn’t enough? What if the key to lasting change isn’t AI, but people, culture, and inclusion? Join us for the third of four DTX Special Edition Episodes of the SECURE | CYBER CONNECT Podcast with Jay Adamson & Warren Atkinson, as we introduce Sophia Adhami, Executive Leader at Sage. With a career spanning Government, Cyber, and Product leadership, Sophia has led award-winning initiatives in Cyber Security Awareness, Insider Risk, and Inclusion, and now oversees the Office of the Chief Product Officer at a FTSE100 company. A long-term advocate for Diversity, Equity, and Inclusion, she has created networks and programmes supporting women and underrepresented groups into careers in Security and Technology across public and private sectors. 🔥 What You’ll Discover: Why digital transformation succeeds only when people and culture are prioritised over technology Lessons from building multidisciplinary teams that solve complex problems in AI-driven environments How to reskill and upskill teams for AI roles while balancing bravery and fluidity in leadership Strategies for embedding fearless communication and inclusive practices in day-to-day culture Insights on supporting women-led businesses, addressing investment inequality, and fostering responsible AI adoption How to leverage events like DTX London for peer-to-peer learning, inspiration, and driving bold actions in transformation Perfect for: Cyber leaders, IT and product professionals, change managers, diversity advocates, and anyone looking to drive human-centric digital transformation in their organisation. Will you join us at Digital Transformation Expo | 1st-2nd October, Excel, London. DTX London is the intersection of technology, people, and operations – bringing together leaders in AI, Cyber, Data & Digital Technology to drive meaningful business transformation. ✅ Get your tickets for DTX London here: https://dtx-london-2025.reg.buzz/reg 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect: Pre-event cyber security podcast episodes, Live event interviews with tech, security leaders AND YOU! 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #dtx #culture #inclusion

  35. 70

    Get Paid What You’re Worth: Promotions, Pay Raises & Confidence for Cyber & Tech Careers

    Are you truly getting paid what you’re worth, or is self-doubt silently holding your career back? Yota Trom is on a mission to transform how leaders see themselves, turning self-doubt into unstoppable confidence. Whether you’re a founder aiming to build a standout brand, a senior leader seeking an authentic leadership style, or a professional ready to step up in your career, Yota shows exactly how to make it happen from a place of true confidence and authenticity. A software engineer-turned-coach with experience at Amazon, Yahoo, and other top global companies, she offers an insider’s perspective on what it takes to succeed—and genuinely enjoy your work, at the highest levels. Yota is also the founder of Together in Tech, a human-focused tech community of over 5,000 members, a visiting lecturer and board member at UCL’s School of Management, and a UK delegate for the UN’s Commission on the Status of Women. From boardrooms to stages around the world, she has helped leaders at every level stop waiting to be recognised and start owning their true potential, with clients who have won awards, doubled salaries, and secured dream roles. In this third International Cyber Expo Special Edition Episodes, Yota shares practical strategies for cyber and tech professionals looking to advance their careers, secure promotions, negotiate pay rises, and build unshakable confidence. We discuss how to position yourself for recognition, avoid common career pitfalls, master negotiation, and develop leadership skills that prepare you for long-term growth. Yota also explores how attending industry events, such as the International Cyber Expo (ICE), can accelerate your career, create meaningful connections, and translate insights into real-world impact. Whether you’re an individual contributor, rising leader, or senior executive in tech or cyber security, this conversation delivers actionable advice, career growth insights, and confidence-building strategies you can apply immediately. 📢ANNOUNCEMENTS📢 🎁 As way of thanking you, our audience and community, we are thrilled to share a FREE downloadable copy of the Pay What I’m Worth Workbook, mentioned on the podcast. This will help you: - Understand if their achievements are enough for a promotion - Close any gaps that might stop them getting promoted - Figure out the perfect time to ask for a promotion ✅ Free-Guide Available Here: https://paywhatimworth.com We encourage you to connect with Yota: - LinkedIn: https://www.linkedin.com/in/yotatrom/ - Follow her channel on YouTube: https://www.youtube.com/@yotatrom 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More & Join Our Community Here: https://linktr.ee/securecyberconnect 📅 Discover the future of cybersecurity at the International Cyber Expo, happening 30th September to 1st October 2025 at Olympia London. Join global experts, explore the latest tech, and connect with leaders from over 85 countries - all under one roof. Register for free today: https://international-cyber-expo-2025.reg.buzz/secure-x-pod 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES: Twice a week 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #Cybersecurity #diversity #womenintech #cyberconnect #salary #careers

  36. 69

    Awareness, Culture & Human Risk: Cyber Security 101

    How do you shift organisational culture to make Cyber Security truly people-first? What if the most overlooked risk isn’t technology, but human behaviour? Join us for the second of four DTX Special Edition Episodes. We’re thrilled to introduce Charlie Sinclair, Head of Cyber Culture & Human Risk at Unilever. With two decades of experience delivering award-winning creative communications, employee engagement, and cultural change campaigns at global companies including Vodafone, O2, Aviva, and Unilever, Charlie has become a trailblazer in embedding secure, ethical behaviours and sustainable change across organisations. Known for testing boundaries and driving social movements within corporate environments, she shares practical strategies for influencing culture, managing human risk, and leading people-focused cyber initiatives. 🔥 What You’ll Discover: The evolution from traditional security awareness to strategic human risk management How culture-first campaigns can genuinely shift employee behaviour Lessons from creative initiatives that engage employees and drive change How champion networks can influence culture across organisations Measuring success beyond compliance tick-boxes How leaders can empathise with employees to improve security behaviours Strategies to navigate emerging risks, including AI-driven threats Making the most of events like DTX London for peer-to-peer learning Practical insights for strengthening cyber culture, embedding ethical behaviours, and inspiring human-centric change Perfect for: Cyber leaders, security awareness professionals, change managers, HR and engagement specialists, IT leaders, and anyone looking to reduce human risk and embed lasting culture change within their organisations. Will you join us at Digital Transformation Expo | 1st-2nd October, Excel, London. DTX London is the intersection of technology, people, and operations – bringing together leaders in AI, Cyber, Data & Digital Technology to drive meaningful business transformation. ✅ Get your tickets for DTX London here: https://dtx-london-2025.reg.buzz/reg 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect: Pre-event cyber security podcast episodes, Live event interviews with tech, security leaders AND YOU! 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #dtx #transformation #ai

  37. 68

    Why cybersecurity fails without humans: Culture, behaviour, diversity & leadership

    Why does cybersecurity fail without humans? What if the solution isn't more technology, but understanding psychology? Join us for the third of four: Cyber Leaders' Summit Special Edition Episodes. Meet Veerle Peeters, People-Powered Cybersecurity Strategist and founder of Cyb-HER-Strong, who's revolutionising human-centred cyber defence globally. With 18+ years transforming security cultures at PwC and Deloitte, Veerle's cracked the code: your people aren't your weakest link, they're your secret weapon. 🔥 What You'll Discover: Why smart people click dangerous links (and the mental shift that stops it) The storytelling technique that makes security training actually stick How to raise cyber-smart kids who spot deepfakes before adults The overlooked talent goldmine solving the cyber skills crisis Leadership strategies that make hackers give up before they start Perfect for: CISOs, tech leaders, parents, HR professionals, and anyone who's wondered why humans are cybersecurity's biggest challenge AND greatest opportunity. This isn't theory, it's battlefield-tested wisdom that will fundamentally change how you think about cybersecurity. Ready to turn human "weakness" into cyber strength? 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704/ 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect Pre-event cyber security podcast episodes Live event interviews with tech, security leaders AND YOU! 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform Join the Cyber Leaders’ from across the UK & Benelux | 22nd – 23rd September, Belgium The Cyber Leaders' Summit (CLS BNLX) is an exclusive, invite-only event held once a year in Brussels, bringing together senior cybersecurity leaders, decision-makers, and budget holders from across Belgium, Netherlands and Luxembourg. ✅ Get your tickets for the Cyber Leader’s Summit here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #diversity #culture #leadership

  38. 67

    Change is Constant: Secrets to Leading Cyber & Digital Transformation

    How do you turn chaos into clarity across multi-million-pound Cyber Security & Digital Transformation programmes? Join us for the first of four DTX Special Edition Episodes of the SECURE | CYBER CONNECT Podcast with Jay Adamson & Warren Atkinson, introducing Gurps Khaira, a global leader with 15+ years managing high-stakes change across Cyber, IT, Banking, and Construction. From APAC to Europe, MENA, and the USA, Gurps delivers action-packed transformation programmes and captivating keynote talks that combine insight, entertainment, and practical guidance. 🔥 What You’ll Discover: How to lead Cyber Security at scale across cultures, time zones, and multi-million-pound programmes Mindset shifts that make change stick—even when 70% of digital transformations fail Real-world lessons on resilience, accountability, and managing global risk How bodybuilding discipline shapes leadership under pressure Strategies for thriving under mental health pressures in high-stakes cyber roles Practical advice for aspiring leaders entering Cyber or Project Management Perfect for: CISO’s, IT & Cyber leaders, change managers, project managers, tech innovators, and anyone navigating high-stakes digital transformation. Don’t miss the chance to learn the secrets of leading change like a pro, subscribe and join the DTX Special Edition journey! Will you join us at Digital Transformation Expo | 1st-2nd October, Excel, London. DTX London is the intersection of technology, people, and operations – bringing together leaders in AI, Cyber, Data & Digital Technology to drive meaningful business transformation. ✅ Get your tickets for DTX London here: https://dtx-london-2025.reg.buzz/reg 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect: Pre-event cyber security podcast episodes, Live event interviews with tech, security leaders AND YOU! 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #dtx #transformation #ai

  39. 66

    How long will it take to close the cyber security gender gap, and will women catch up?

    We’re thrilled to welcome Iryna Volnytska, founder of SET University. Iryna is developing tech education in Ukraine through SET University, a non-profit institution established to educate tech leaders. She has 10+ years of experience in executive positions. Iryna is one of the few women leading cybersecurity transformation, and has co-founded two cybersecurity startups: SET Cyber Labs and IronCyber. In the second Special ICE Edition, Iryna shares insights on her personal journey and the challenges that shaped her views on cyber and leadership, Ukraine’s resilient cyber talent and launching SET University during conflict, and how rapid reskilling enables women and career-changers to step into critical cyber security roles. She explores the overlooked skills the global market often misses, why cyber should be treated as innovation not just defence, and how crisis-driven experience and diverse teams create scalable global solutions. Iryna also shares actionable guidance for building resilient, inclusive cyber teams, and strategies for individuals pivoting into cyber security careers. Whether you’re a cyber leader, diversity advocate, HR professional, or aspiring security professional, this episode delivers tangible strategies, real-world examples, and inspiration to strengthen security, foster inclusion, and lead with impact. Don’t miss out on this special International Cyber Expo edition, tune in for insights that can change the future of cybersecurity! 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 Discover the future of cybersecurity at the International Cyber Expo, happening 30th September to 1st October 2025 at Olympia London. Join global experts, explore the latest tech, and connect with leaders from over 85 countries - all under one roof. Register for free today: https://international-cyber-expo-2025.reg.buzz/secure-x-pod 🎯 Want to be heard at ICE? Join us for exclusive live recordings, quick interviews, and panel discussions! Learn more & register here: https://www.linkedin.com/posts/warren-atkinson_cybersecurity-internationalcyberexpo-ice2025-activity-7358391424943284224-16kx?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAyFj1sBr8Iz1lprcBwB6a_fqCi4YdhIfB4 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES: Twice a week 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #Cybersecurity #Technology #womenintech #cyberconnect #startup

  40. 65

    Resilient by Design: Motherhood, Leadership & Diversity | Global Cyber Security Insights

    How do you build resilience that goes beyond firewalls and zero trust? What if the most underestimated factor in cyber crisis recovery isn't technology—but authentic leadership? Join us for the second of four: Cyber Leaders' Summit Special Edition Episodes. Meet Charmaine Sipin Tumalad, Global Information Security Risk & Compliance Manager at Bridgestone EMEA, who's redefining cyber leadership through 25+ years across financial and industrial sectors. With 15 years in senior roles leading cross-regional programmes across Europe, America, and Asia, she's certified in ISO27001, NIS2, CFE, and business continuity. Born in the Philippines, based in Brussels for 20+ years, this proud mother of two combines Catholic faith with professional rigour, passionately empowering women in STEM whilst balancing creativity, resilience, and unwavering integrity. 🔥 What You'll Discover: Why "Resilient by Design" means people-first security cultures, not just technology The hidden factor that determines cyber crisis recovery (hint: it's not your incident response plan) Cross-cultural intelligence as a superpower for better security decisions and stronger teams Leadership insights: how motherhood transforms decision-making under pressure and builds authentic team dynamics Aligning ISO27001 and NIS2 with genuine resilience culture instead of tick-box compliance Trust-building secrets that turn reputation into currency for cyber leaders Balancing relentless security demands with employee wellbeing and authentic leadership Perfect for: Cyber leaders, working parents, diversity advocates, global security managers, and anyone building inclusive, resilient organisations. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704/ 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect 🎧 Pre-event cyber security podcast episodes 🎤 Live event interviews with tech, security leaders AND YOU! 🧠 Expert security panels & thought leadership. 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform Join the Cyber Leaders’ from across the UK & Benelux | 22nd – 23rd September, Belgium The Cyber Leaders' Summit (CLS BNLX) is an exclusive, invite-only event held once a year in Brussels, bringing together senior cybersecurity leaders, decision-makers, and budget holders from across Belgium, Netherlands and Luxembourg. ✅ Get your tickets for the Cyber Leader’s Summit here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #cybersecurity #cyberconnect #diversity #womenintech #leadership

  41. 64

    The Truth About Cyber Inclusion: How Training, Certification, Events & Community Are Changing Lives

    Think cyber security isn’t for everyone? Think again. Discover how inclusion and accessibility are transforming the industry and strengthening our digital defences. In this special ICE edition, we’re honoured to introduce Emma Philpott MBE is the CEO of IASME Consortium Ltd, the UK Government’s sole delivery partner for the Cyber Essentials scheme, providing accessible cyber security certification for organisations of all sizes and supply chains. Emma is also the Founder and Manager of IASME Community CIC, a not-for-profit dedicated to training and supporting unemployed neurodivergent adults into rewarding cyber security careers. Emma contributes her expertise to initiatives like the Diversity Enabled SOC and holds the prestigious FCISS designation, reflecting her leadership in fostering diversity and inclusion within the cyber security sector. In this session we explore the critical intersection of cyber security, accessibility, and workforce inclusion with Emma Philpott. We discuss practical strategies to implement effective cyber security controls, the impact of government-backed certification programs, and the importance of making cyber careers accessible to underrepresented groups. Emma shares powerful stories about neurodivergent training programs and community events that are transforming the cyber security landscape. This episode is a must-listen for anyone interested in advancing diversity, building resilient cyber defences, and driving real social impact through technology and talent development. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 Discover the future of cybersecurity at the International Cyber Expo, happening 30th September to 1st October 2025 at Olympia London. Join global experts, explore the latest tech, and connect with leaders from over 85 countries - all under one roof. Register for free today: https://international-cyber-expo-2025.reg.buzz/secure-x-pod 🎯 Want to be heard at ICE? Join us for exclusive live recordings, quick interviews, and panel discussions! Learn more & register here: https://www.linkedin.com/posts/warren-atkinson_cybersecurity-internationalcyberexpo-ice2025-activity-7358391424943284224-16kx?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAyFj1sBr8Iz1lprcBwB6a_fqCi4YdhIfB4 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #InternationalCyberExpo #Events #Inclusion #Accessibility

  42. 63

    Security-First Culture 101 | Leadership, Insider Threats, Data, Quantum Risks, IoT & OT Challenges

    How do you build a security-first culture, tackle insider threats, and secure the future of connected technology in a rapidly evolving cyber world? We’re thrilled to welcome Amir Vashkover, a seasoned cyber security leader with over 20 years of global experience across information security, compliance, and leadership. Currently Head of Data Security at Philips, Amir drives enterprise-wide strategies for digital transformation and secure GenAI adoption. A former Lieutenant Colonel with an MBA and BSc in Electrical & Computer Engineering, he has built and led global security programs, professional services teams, and strategic alliances. Amir also volunteers as a certified EMT with the Red Cross and balances his mission-driven work with triathlons, marathons, and long-distance motorbike rides. In this episode, Amir shares practical insights on embedding security into organizational culture, mitigating insider risks, navigating hybrid work challenges, and preparing for emerging threats in AI, IoT, OT, and quantum computing. We also explore leadership lessons, human resilience, and actionable advice for the next generation of cyber professionals. Whether you’re in cyber security, tech leadership, or organizational transformation, this episode delivers tangible strategies, real-world examples, and inspiration to strengthen security and lead with impact. Don't miss out on this special Cyber Leader’s Summit edition, tune in for insights that can change the future of cyber security! 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect 🎧 Pre-event cyber security podcast episodes 🎤 Live event interviews with tech, security leaders AND YOU! 🧠 Expert security panels & thought leadership. 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform Join the Cyber Leaders’ from across the UK & Benelux | 22nd – 23rd September, Belgium The Cyber Leaders' Summit (CLS BNLX) is an exclusive, invite-only event held once a year in Brussels, bringing together senior cybersecurity leaders, decision-makers, and budget holders from across Belgium, Netherlands and Luxembourg. ✅ Get your tickets for the Cyber Leader’s Summit here: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #Cybersecurity #Infosec #CISO #Quantum #OT #cyberconnect

  43. 62

    Cybersecurity, NHS & Leadership Lessons from the Frontlines

    What does it take to defend the NHS, lead through cyber crises, and shape global security? We are thrilled to welcome Mike Fell, a highly respected Security & Risk Management leader, trusted advisor to government and industry, and a driving force behind UK and international cyber resilience. He has protected over £600bn in revenue, led the teams defending the NHS in England from cyberattacks, and brokered international security regulation with the OECD to fight corruption and secure financial data flows. Mike has also pioneered cyber apprenticeships, championed innovative technical solutions to threats like SMS scams, and frequently represents the NHS on national TV and at global conferences. As host of The Cyber Sessions podcast, and a dedicated volunteer building cyber capacity worldwide, he continues to bridge divides and support innovation across the security profession. In this episode, Mike shares his leadership lessons from the frontlines of cyber incidents, how to build resilience in critical healthcare systems like the NHS, and why international collaboration is essential in today’s digital world. We also explore the human side of his journey, from geography student to national security leader, and the advice he gives to the next generation of cyber professionals. Whether you’re in cyber security, tech sales, recruitment, or leadership, this episode delivers actionable insights, relatable stories, and inspiration to help you tackle challenges in your own career. To hear more from Mike and the team at the NHS, we encourage you to check out their podcast: https://digital.nhs.uk/cyber-and-data-security/campaigns/cyber-sessions-podcasts 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect 🎧 Pre-event cyber security podcast episodes 🎤 Live event interviews with tech, security leaders AND YOU! 🧠 Expert security panels & thought leadership. 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform Get your tickets for: ✅ Cyber Leader’s Summit: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux ✅ International Cyber Expo: https://international-cyber-expo-2025.reg.buzz/secure-x-pod ✅ DTX London: https://www.dtxevents.io/ 📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #Cybersecurity #Infosec #NHS #Technology #CyberConnect

  44. 61

    Can technical controls really stop cyber attacks? Shocking truth revealed

    Are you confident your business is truly protected from cyber threats or waiting for a costly attack to teach the lesson? Protect your business with essential cybersecurity strategies every leader, IT manager, and security professional needs to know. When a ransomware attack brought a business to its knees, Robert Connor realised cyber security could no longer be “just IT’s job.” Now a CISSP-certified specialist and CREST Registered Penetration Tester, Robert is the founder of Cyber Sense, a UK Government-backed consultancy helping businesses secure networks, systems, and cloud environments. Through Cyber Essentials Plus, penetration testing, Microsoft 365 hardening, and phishing simulations, he turns reactive security into proactive protection, giving companies the tools to stay ahead of attackers before it’s too late. We break down actionable steps every business needs to take to reduce risk and survive the next major cyber threat. Learn how to integrate cyber security into strategic risk management, strengthen human defences through phishing simulations, and continuously improve technical assurance across IT infrastructure and cloud platforms. Whether you’re a business leader, IT manager, or part of the wider security ecosystem, this episode equips you with practical guidance to protect your business, your team, and even your family. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect 🎧 Pre-event cyber security podcast episodes 🎤 Live event interviews with tech, security leaders AND YOU! 🧠 Expert security panels & thought leadership. 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform?usp=header Get your tickets for: ✅ Cyber Leader’s Summit: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux ✅ International Cyber Expo: https://international-cyber-expo-2025.reg.buzz/secure-x-pod ✅ DTX London: https://www.dtxevents.io/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #Business #RiskManagement #CloudSecurity

  45. 60

    Blockchain encryption, AI & digital signatures: How to make contracts hacker-proof

    Forget cloud storage - blockchain encryption is rewriting the rules of data protection and exposing the gaps you didn’t know you had. In this episode of the SECURE | CYBER CONNECT Podcast, hosts Jay Adamson & Warren Atkinson are joined by Dr. Elena Mechik, CEO & Co-Founder of Inhubber, a Berlin-based SaaS platform pioneering AI-driven, blockchain-encrypted contract management. With a PhD in Earth Sciences & Economics and a career spanning sustainability, deep technology, and legal innovation, Dr. Mechik has helped governments, public institutions, and global enterprises lock down their most sensitive data. She’s led the development of blockchain-based encryption for digital contracts and signatures, creating solutions that are tamper-proof, legally bulletproof, and trusted worldwide. We explore how blockchain encryption goes beyond traditional security, locking down contracts end-to-end, closing hidden vulnerabilities, and enabling AI to spot risks buried deep in the fine print. From preventing hacks before they happen to ensuring airtight compliance, this conversation delivers the practical playbook for future-proofing your data. Whether you’re in cyber security, legal tech, or executive leadership, you’ll walk away with strategies you can act on immediately to protect what matters most. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect 🎧 Pre-event cyber security podcast episodes 🎤 Live event interviews with tech, security leaders AND YOU! 🧠 Expert security panels & thought leadership. 🎯 Want to be heard, register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform?usp=header Get your tickets for: ✅ Cyber Leader’s Summit: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux ✅ International Cyber Expo: https://international-cyber-expo-2025.reg.buzz/secure-x-pod ✅ DTX London: https://www.dtxevents.io/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #AI #DataProtection #Blockchain

  46. 59

    AI, cybersecurity: real use cases, hype, myths & what’s broken

    The cyber security AI hype is a LIE - until now. These experts expose what’s broken and show how AI is secretly saving lives and money. Don’t miss this! In this episode, we speak with John Daley and Jack Miller, the leaders behind HelmGuard AI. John Daley, CEO of HelmGuard AI, brings over eight years of cyber security experience across the US and EMEA regions. As a former executive at Palantir, he helped scale the company from a mid-stage private firm to an S&P 500 organization, contributing to significant cyber security projects in both public and private sectors. John founded HelmGuard AI to address gaps he observed between cyber security challenges and AI capabilities, aiming to deliver practical, enterprise-scale solutions from London. Jack Miller, HelmGuard AI’s CTO, is an AI engineer and researcher specializing in secure, robust AI systems. He has collaborated with top European institutions such as ETH Zürich, University of Cambridge, and University of Oxford. Jack graduated from the Australian National University, earning one of the country’s most prestigious undergraduate scholarships. His work includes publishing in leading AI research journals and developing a commercialized algorithm in quantum chemistry. Jack combines deep academic expertise with practical innovation to shape HelmGuard’s approach to AI-powered cyber defence. HelmGuard AI offers a context-driven approach to cyber defence, designed to adapt in real time to evolving threats across sectors like healthcare, finance, and operational technology. In this episode, we cut through the hype to explore real AI use cases in cyber security, debunk myths, and address current challenges. Topics include AI-powered supply chain risk management, real-time threat detection, autonomous incident response, and the evolving role of AI in securing critical infrastructure. We also discuss how AI-driven security playbooks and simulations are transforming preparedness, and share practical insights for CISOs, founders, and tech leaders navigating complex OT and IoT environments. This conversation delivers actionable knowledge to help professionals stay ahead in a rapidly changing cyber landscape. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 📅 We’re hitting the road to the UK & Europe’s biggest cyber security events & we want YOU on the mic. Expect: Pre-event cyber security podcast episodes, Live event interviews with tech, security leaders AND YOU! As well as expert security panels & thought leadership. 🎯 Want to be heard? register here: https://docs.google.com/forms/d/e/1FAIpQLScIGUCsjeO1YiiN0Cn3wXPi2MvXUu-jX6cTEBizl3e7DYMZuQ/viewform?usp=header Get your tickets for: ✅ Cyber Leader’s Summit: https://www.cyber-leaderssummit.com/cyber-leaders-summit-benelux ✅ International Cyber Expo: https://international-cyber-expo-2025.reg.buzz/secure-x-pod ✅ DTX London: https://www.dtxevents.io/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #AI #Podcast #artificialintelligence

  47. 58

    How info-stealers & session hijackers outsmart MFA | dark web + threat exposure management

    Think multi-factor authentication is foolproof? Think again. Watch how hackers are stealing your sessions and beating MFA at its own game and learn how to stop them before it’s too late. We’re joined by Nick Ascoli, Director of Product Strategy at Flare and expert threat researcher specializing in data leaks, reconnaissance, and detection engineering. Nick has extensive experience advising Fortune 1000 companies and designing solutions to complex cyber defence challenges. He’s a well-known voice in the cybersecurity community, contributing to open-source projects, hosting his own podcast Leakly Weekly, and speaking at major conferences including GrrCON, B-Sides, DEFCON Villages, and SANS. Together, we uncover how info-stealers and session hijackers are evolving to outsmart traditional multi-factor authentication (MFA) solutions, a growing threat that many organizations still underestimate. Nick breaks down the lifecycle of these attacks, the economics of the dark web fueling them, and why session hijacking is quickly becoming the preferred method for cybercriminals. We also discuss practical, underused defense tactics organizations can implement immediately to detect and respond faster - helping security teams protect sensitive data and stay ahead of emerging threats. This episode offers crucial insights for CISOs, cybersecurity professionals, and anyone invested in safeguarding digital infrastructure in an increasingly hostile cyber environment. We encourage you to check out Nick Podcast, Leakly Weekly: https://open.spotify.com/show/47IsIuKdTAEzmiWzAwb0Pq?si=b08cfafbd9ec4b3e To say thanks to our community members and audience, we’re excited to share Flare's Free Trial: https://try.flare.io/free-trial/?utm_campaign=14562612-Earned%20Media&utm_source=Media&utm_medium=Secure%20Podcast 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 🎯 If you’re a startup, scaleup, founder, or innovator in cyber security, check out the DataTribe Challenge & Cyber Innovation Day on 4th November. Learn more about the event and how to join the accelerator program below. Registration closes 12th September, learn more here: https://cid.datatribe.com/ 🚀 Check out the launch of SECURE | CYBER CONNECT LIVE, where we’re joined by our friends from @databricks & @arhasi: https://www.youtube.com/live/rPcDGcZnhis?si=D_X4lB6PFDMlAe1t 🤫 Followed by an exclusive, private session & the launch of - CYBER CONNECT F*K UPS edition, only available on the SECURE | CYBER CONNECT Community platform: https://smart-connect-cyber.mn.co/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #Hacking #MFA #DarkWeb

  48. 57

    Quantum cyber security crisis: what CEOs, Tech & Security Leaders must know

    Quantum computing is about to break everything you know about cyber security and your data could be next. Find out how to future-proof your business NOW before hackers do. We’re honoured to welcome Dr. Meera Sarma, CEO of Cystel, and Dr. Thomas Matteus, CTO of Cystel. Meera brings over 20 years of cybersecurity expertise, having worked with governments, public sector bodies, and private organizations on issues ranging from cyber terrorism and cyber warfare to hacking trends and quantum computing. She holds a PhD in Information Systems from Royal Holloway, University of London, and advises the UK Parliamentary Office of Science and Technology on cybersecurity and quantum topics. Thomas Matteus has more than 27 years of experience in strategic management and IT, including work with the German Military Police and defense research. He holds a PhD from Warwick University and certifications in quantum computing from MIT. As Cystel’s CTO, Thomas spearheads cutting-edge projects that develop quantum-ready cybersecurity strategies to help organizations anticipate and combat emerging threats. Cystel is a leader in quantum-ready cybersecurity innovation. With quantum computing advancing rapidly, threatening current encryption standards, Cystel develops practical solutions to prepare businesses for this looming challenge. Their mission is to build resilient security frameworks that protect digital infrastructure from future quantum attacks, fostering trust and stability in an evolving cyber landscape. In this episode, we explore the quantum cybersecurity crisis and what CEOs, technology leaders, and security professionals must know to stay ahead. Our guests share insights on quantum risks, hacker motivations, governance challenges, and actionable steps for managing quantum-related threats. Listeners will come away with expert guidance to future-proof their organizations and build a secure, quantum-ready cybersecurity posture. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 🎯 If you’re a startup, scaleup, founder, or innovator in cyber security, check out the DataTribe Challenge & Cyber Innovation Day on 4th November. Learn more about the event and how to join the accelerator program below. Registration closes 12th September, learn more here: https://cid.datatribe.com/ 🚀 Check out the launch of SECURE | CYBER CONNECT LIVE, where we’re joined by our friends from @databricks & @arhasi: https://www.youtube.com/live/rPcDGcZnhis?si=D_X4lB6PFDMlAe1t 🤫 Followed by an exclusive, private session & the launch of - CYBER CONNECT F*K UPS edition, only available on the SECURE | CYBER CONNECT Community platform: https://smart-connect-cyber.mn.co/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #Quantum #Security #Innovation

  49. 56

    Cyber security for small businesses, schools and children | Tips, advice, certification and careers

    Discover the real cyber security risks facing small businesses, schools, and young people today. We’re excited to be joined by Christopher Eastwood, a former British Army Combat Engineer and Regional Cyber Crime Unit officer with extensive experience investigating fraud, hacking, identity theft, and data breaches, and Alistair Kennedy, a 21-year police veteran who specialised in cyber-crime prevention and worked directly with businesses to strengthen their cyber defences. Together, they co-founded The Rybec Group, a trusted cyber security consultancy helping organisations implement essential protections like Cyber Essentials and ISO 27001 certification. In this episode, we dive deep into critical topics such as cyber-crime prevention for SMEs, AI-driven cyber threats targeting schools and children, and why compliance alone isn’t enough to secure your business. Alistair shares his passion for educating young people—especially those with neurodiverse challenges—on navigating digital risks, while Chris draws on his work with the National Crime Agency and multiple regional police forces to offer practical, battle-tested strategies. If you’re a business owner, IT professional, or educator looking for expert advice on cyber security awareness training, protecting small and medium enterprises from cyber attacks, and understanding the real impact of global cyber threats, this episode is a must-listen. Share it with your team, local schools, and community to build stronger cyber defences together. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 🎯 If you’re a startup, scaleup, founder, or innovator in cyber security, check out the DataTribe Challenge & Cyber Innovation Day on 4th November. Learn more about the event and how to join the accelerator program below. Registration closes 12th September, learn more here: https://cid.datatribe.com/ 🚀 Check out the launch of SECURE | CYBER CONNECT LIVE, where we’re joined by our friends from @databricks & @arhasi: https://www.youtube.com/live/rPcDGcZnhis?si=D_X4lB6PFDMlAe1t 🤫 Followed by an exclusive, private session & the launch of - CYBER CONNECT F*K UPS edition, only available on the SECURE | CYBER CONNECT Community platform: https://smart-connect-cyber.mn.co/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #cyberawareness #OnlineSafety #SmallBusiness

  50. 55

    From start-up to unicorn: The VC playbook for building billion-dollar cyber & AI companies

    From startup CTO to investor, Leo Scott helped launch billion-dollar cyber unicorn Dragos - now he’s sharing what founders need to build the next one. Leo Scott is the Managing Director at DataTribe, a unique startup foundry focused on cyber security, data science, and AI/ML. With over 30 years of experience as a three-time startup CTO turned investor, Leo brings deep technical knowledge and hands-on guidance to the companies he supports. Under his leadership, DataTribe helped launch Dragos, a now $1 billion operational technology cyber security “unicorn” that began as a small team working out of DataTribe’s foundry. Founded in 2016, DataTribe’s mission was bold: to bring Silicon Valley’s venture capital and company-building expertise to the Washington, DC region and combine it with the world’s most concentrated pool of cyber security talent. The firm’s hybrid model, part venture fund, part startup studio, and entirely hands-on-has since co-built 19 startups, including notable names like Strider Technologies and BlackCloak. Recently, DataTribe closed its third fund at $41 million, continuing its commitment to invest early in mission-driven founders tackling over-the-horizon problems. In this episode, Leo shares his insights on the evolving cyber security investment landscape, DataTribe’s “over-resourcing” approach, and the annual DataTribe Cyber Security Start-Up Challenge. Tune in to hear what kinds of startups they are looking for right now, how AI and deep tech are shaping the industry, and what’s next for DataTribe after closing their latest fund. 👋 Jay Adamson and Warren Atkinson welcome you to the SECURE | CYBER CONNECT Podcast, where we’re joined by Information and Cyber Security, Technology, and Talent Acquisition professionals who share their journeys, unique perspectives, and offer valuable advice and guidance. The SECURE | CYBER CONNECT Community & team offers tailored resources and strategic introductions to help you thrive in the evolving landscape of Corporate Governance, Information Security & Cyber Security, addressing Cultural, Technological & Talent Acquisition challenges. ✅ Learn More: https://linktr.ee/securecyberconnect 👥 JOIN THE COMMUNITY: https://smart-connect-cyber.mn.co/ 🔍 SOLUTIONS: https://www.linkedin.com/feed/update/urn:li:activity:7339197132299464704 📢ANNOUNCEMENTS📢 🎯 The DATATRIBE CHALLENGE | CYBER INNOVATION DAY: If you’re a startup, scaleup, founder, or innovator in cyber security- this is for you! Before you go to chasing millions to bankroll your cyber security dream, check out DataTribe Challenge. This November 4th will be the eighth time the Fulton, Maryland-based early-stage foundry has lined up leading investors and potential customers to help entrepreneurs honor their pitch. Learn how to take part in event, this year in Washington, DC – at the DataTribe website. Registration closes 12th September, learn more here: https://cid.datatribe.com/ 🚀 Check out the launch of SECURE | CYBER CONNECT LIVE, where we’re joined by our friends from @databricks & @arhasi: https://www.youtube.com/live/rPcDGcZnhis?si=D_X4lB6PFDMlAe1t 🤫 Followed by an exclusive, private session & the launch of - CYBER CONNECT F*K UPS edition, only available on the SECURE | CYBER CONNECT Community platform: https://smart-connect-cyber.mn.co/ 📺 WATCH MORE: www.youtube.com/@SECURECyberConnectCommunity 🗓️ NEW EPISODES available every Sunday. 🔔 We appreciate your support - Please SUBSCRIBE, LIKE and SHARE to encourage diverse and inclusive knowledge sharing. #CyberConnect #CyberSecurity #VC #Startup #Founder

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Welcome to the SECURE | CYBER CONNECT Podcast: Hosted by Jay Adamson & Warren Atkinson, joined by leaders in Information & Cyber Security, Technology & Talent Acquisition. From across Venture Capital, Private Equity, Public & Private sectors, Guests share their Personal Journeys, Diverse Perspectives, offering Advice & Guidance.SECURE | CYBER CONNECT Community, is an exclusive online community platform, providing a range of collaborative solutions for Technology, Information & Cyber Security Professionals at No-Cost. 👥 JOIN THE SECURE | CYBER CONNECT COMMUNITY: https://smart-connect-cyber.mn.co/ ✅ Learn More: https://linktr.ee/securecyberconnect🗓️ NEW EPISODES available every week📺 WATCH MORE: https://www.youtube.com/channel/UCRzUBDsLBZcCYFEVZNwYSqg 🔔Please SUBSCRIBE, LIKE and SHARE - Thank You#InformationSecurity #CyberSecurity #Recruitment #InfoSec #AI #Careers #Jobs #VC #StartUp #Technology

HOSTED BY

Jay Adamson & Warren Atkinson

CATEGORIES

URL copied to clipboard!