Ahead of the Breach cover art

All Episodes

Ahead of the Breach — 51 episodes

#
Title
1

Gary Lobermier on Scaling Red Team Automation with AI to Run Hundreds of Real Attacks Daily

2

Zoom's Andy Grant on Offensive Intuition and Letting Hackers Hunt

3

Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting

4

T. Rowe Price's Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry

5

Citi's Ryan Hays Navigating Risk and Resilience at Scale

6

Microsoft's Tori Westerhoff on Offensive Security in the Age of AI

7

Nevada Air National Guard's Nikita Belikov on Real-World Cyber Defense at Scale

8

MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats

9

F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime

10

What Makes Hybrid Pentesting So Powerful?

11

GreyNoise’s Andrew Morris on Internet Background Noise as Data

12

How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?

13

Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There

14

Why is Continuous Pentesting a Must for Dynamic Environments?

15

Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence

16

How Do You Build an Offensive Security Program from Scratch?

17

Covert Entry: Tools, Tricks, and True Stories from the Field

18

What Should You Ask Before Choosing an Offensive Security Platform?

19

Phillip Wylie on How IoT Devices Become Corporate Network Entry Points

20

What Tools Do You Need for an Offensive Security Stack?

21

AccessIT Group’s Brett Price on Governance-Driven Cybersecurity

22

What Steps Should You Take to Build a Modern Pentesting Program?

23

Parthasarathi Chakraborty on Building Architectural Assurance Functions

24

What Are the Common Myths About Continuous Pentesting?

25

Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags

26

How Do You Prepare for the Future of Pentesting?

27

Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks

28

What’s Broken About Legacy Pentesting?

29

WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal

30

Why Continuous Pentesting Outperforms Bug Bounties

31

Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems

32

Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems

33

OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production

34

Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security

35

Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security

36

NerdWallet’s DK Koran on Building Proactive Security Through Red Teams

37

Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups

38

Eptura’s Sean Finley on Building Risk-Based Application Security Programs

39

Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities

40

N-able’s Keiran Smith on Building Better Security Through Development Experience

41

RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter

42

DigiCert’s Bindi Davé on Digital Trust in Cybersecurity

43

Collectors’ Arif Basha on Proactive Security and Attack Surface Management

44

Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture

45

Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities

46

MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing

47

Gong’s Jack Leidecker on Balancing Innovation and Security

48

Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security

49

Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface

50

Sprocket’s Pen Test Team on Bypassing Web Application Security

51

Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming