And Security For All

PODCAST · business

And Security For All

Cyber security is not only important to everyone, it is critical to the future of every American. Each show details specific points in history and provides guidance and insights of both a technical and societal nature to help you understand and address cyber security issues more effectively. Our approach makes the often misunderstood and highly technical jargon of cyber security advisories, and popular media digestible for anyone that listens.brbr Anyone that leverages or uses internet and cyber related services, which in today’s world is basically everyone, stands to benefit from the show. You’ll gain insight into the reality of the space around cyber security and learn more details and truths on what is actually necessary to operate and be more secure at both the business and personal levels in an ever-changing technology space. We can help you truly understand a vast technology space and be better prepared in a dynamic technology ecosystem.

  1. 174

    AI Ethics and Governance: Building Trustworthy Systems

    In this episode of #AndSecurityForAll, Kim Hakim sits down with Tony North, Director of Technology Support for the City of Seattle, to discuss the growing importance of AI ethics and governance in today’s cybersecurity landscape.From AI bias and data privacy to trust, transparency, and real-world failures like Delta Airlines and Amazon’s AI recruiting challenges, this conversation breaks down what organizations need to know as AI rapidly transforms the industry. Tony also shares insights into AI governance roles, support teams on the front lines, and why cybersecurity professionals must stay ahead of emerging technologies like quantum computing.🎙️ Topics include:AI ethics & governanceBuilding trustworthy AI systemsData privacy and biasAI support and security operationsReal-world AI failures and lessons learnedThe rise of AI officers and governance teamsPreparing for the future of AI & cybersecurityAs AI adoption continues to accelerate across every industry, understanding how to balance innovation with accountability has never been more important. This episode offers practical insights for cybersecurity leaders, IT teams, and anyone navigating the rapidly evolving world of AI-driven technology

  2. 173

    Quantum Is Coming: What It Means for Cybersecurity Today

    Quantum computing is no longer science fiction—it’s on the horizon, and it could redefine cybersecurity as we know it.In this episode of And Security For All, host Kim Hakim sits down with Jonathan Kimmitt to break down quantum computing in simple, practical terms. From understanding what quantum actually is to why security professionals are paying attention, this conversation cuts through the noise and focuses on what matters most today.You’ll learn:What quantum computing is (without the complex math) Why it’s faster—and why that matters The real risks to encryption and data security What organizations should be doing now to prepare Whether quantum is hype, risk, or opportunity While large-scale quantum threats may still be years away, the implications for data protection, encryption, and long-term risk are very real.🎧 If you work in cybersecurity, IT leadership, or simply want to understand what’s coming next—this episode is your starting point.

  3. 172

    Apps APIs and DDoS Threat Trends

    Cyber attacks are faster, smarter, and more scalable than ever.In this episode of #AndSecurityForAll, guest host Steve Winterfeld, Advisory CISO, sits down with Kim Gomez, Director of Security Research, to break down key insights from Akamai’s latest State of the Internet Security Report.Together, they explore how today’s threat landscape is rapidly evolving—from surging API attacks and advanced DDoS tactics to the growing impact of AI on both attackers and defenders.Key topics include:Why APIs are now one of the fastest-growing attack surfaces (and what that means for your organization) The continued rise of DDoS attacks and how “turbo” botnets are changing the game How AI and automation are accelerating attack speed, scale, and sophistication The concept of “vibe coding” and how it’s lowering the barrier to entry for attackers Why visibility gaps across applications, APIs, and AI are creating new security risks The shift from large outages to performance degradation and business impact How attack motivations are evolving—from hacktivism to financial extortion and geopolitics What CISOs should be communicating to the board right now The importance of multi-layered defense strategies and real-world mitigation planning If you want to understand where cybersecurity is heading—and how to prepare—this episode delivers practical insights you can apply immediately.

  4. 171

    RSA Recap Beyond the Booths and Bourbon

    Fresh off RSA Conference 2026, Kim Hakim is joined by cybersecurity leader Ken Foster to break down what really mattered beyond the booths and bourbon 🥃This episode dives into the rapid acceleration of AI in cybersecurity—from powerful new models uncovering vulnerabilities at unprecedented speed to the real-world risks organizations are already facing. The conversation explores how AI is reshaping defense strategies, why “AI vs. AI” may soon become the norm, and what CISOs are actually doing about it. Kim and Ken also go deeper into the evolving value of major conferences, including what professionals are gaining beyond networking, and why in-person events still play a critical role in a fast-moving, AI-driven industry.You’ll hear insights on:The biggest AI takeaways from RSA—and why things are moving faster than expected The rise of agentic AI and what it means for security teams Real-world challenges with data quality, governance, and “shadow AI” Whether AI will replace jobs—or redefine them Why cybersecurity talent gaps may be more about process than people The future of conferences and where the real value lies This is a candid, practitioner-focused discussion on where cybersecurity is heading—and what leaders need to be thinking about right now.🎧 Tune in for a no-BS breakdown of AI, risk, and the future of the industry.

  5. 170

    From Weakest Link to Strongest Defense Through User Awareness

    If you think cybersecurity is just about tools and technology, think again.In this episode of And Security For All, host Kim Hakim sits down with Keith McMenamin, VP of IT at Visit Philadelphia, to break down why user awareness is still one of the most critical—and overlooked—components of cybersecurity today. As cyber threats evolve and AI-driven attacks become more sophisticated, even the most experienced users can be fooled. Keith shares real-world examples of modern phishing scams, explains how attackers exploit human behavior, and discusses why employees are both the biggest target and the greatest opportunity for defense.You’ll learn:Why phishing and social engineering are more convincing than everHow to move from security training to building a true security cultureThe importance of creating a no-blame environment where employees feel safe reporting mistakesWhy multi-factor authentication and awareness together stop most attacksHow organizations can turn users into a “human firewall”The growing risks of AI, deepfakes, and evolving cyber threatsThis conversation also explores how security leaders balance protection with productivity, why executive buy-in is critical, and how collaboration across the cybersecurity community is shaping the future of defense.Whether you’re a security leader, IT professional, or everyday user, this episode will change how you think about the human role in cybersecurity.🔐 Because in today’s threat landscape, hackers don’t just break in… they log in.

  6. 169

    AI Is Going to Replace You… Or Is It?

    Artificial Intelligence is rapidly transforming the cybersecurity landscape — but is it something security leaders should fear, or a powerful tool they must learn to master? In this episode of And Security For All, host Kim Hakim sits down with Ron Bevans, CISO at BenefitHub, to explore how AI is reshaping both cyber threats and cyber defense. As attackers increasingly leverage automation and AI-driven tactics, security teams must evolve just as quickly to stay ahead. Ron shares practical insights on how organizations can embrace AI responsibly, empower employees to use it effectively, and build governance strategies that balance innovation with security. Rather than replacing cybersecurity professionals, AI has the potential to amplify human expertise, accelerate detection, and help teams focus on what matters most. 🎙️ In this episode we discuss: • How AI is changing the cyber threat landscape • Why organizations shouldn’t fear AI — but learn to leverage it • The importance of governance and responsible AI adoption • How CISOs can empower teams to safely use AI tools • Why human expertise is still essential in the age of AI This conversation offers valuable perspectives for CISOs, security leaders, IT professionals, and anyone navigating the intersection of AI and cybersecurity. Listen now to learn how security leaders can stay ahead of emerging threats while using AI as a strategic advantage.

  7. 168

    Cyber Resilience Over Cyber Perfection

    In this episode of And Security For All, host Kim Hakim sits down with Jonathan Kimmitt, CISO at Alias Cybersecurity, to discuss one of the most important shifts happening in cybersecurity today: the move from cyber protection to cyber resilience.While many organizations focus on deploying security tools and controls, Jonathan explains why perfect security is unrealistic and why modern organizations must instead focus on resilience — the ability to detect, respond to, and recover from cyber incidents quickly.Drawing on real-world incident response experiences, Jonathan shares practical insights into why many organizations still struggle with security despite major investments in tools. From overlooked vulnerabilities to unused monitoring systems, the conversation highlights how visibility, preparedness, and continuous testing are critical to defending against today’s evolving cyber threats.The discussion also explores:• Why cybersecurity perfection is impossible • The difference between cyber protection and cyber resilience • Why many companies have security tools but don’t use them effectively • The importance of visibility, logging, and monitoring in modern security programs • How penetration testing reveals real attack surfaces • Why organizations must practice incident response and tabletop exercises • The role of business continuity and disaster recovery planning • Real-world stories of how attackers exploit small overlooked vulnerabilitiesJonathan also shares actionable advice for security leaders, including how organizations can begin building resilience today by testing assumptions, practicing response scenarios, and strengthening communication during incidents.In an era where cyber incidents are no longer a matter of if but when, this conversation offers valuable guidance for CISOs, security teams, and business leaders looking to strengthen their cybersecurity strategy.

  8. 167

    LockBit Changed Everything and Locked Up Tells Why

    What really happens during a ransomware attack?In this powerful episode of And Security For All, host Kim Hakim sits down with Zach Lewis, CIO & CISO at the University of Health Sciences and Pharmacy in St. Louis, to break down the real-world story behind his new book Locked Up — a firsthand account of surviving a major ransomware incident.From negotiating with the notorious LockBit ransomware group to navigating board-level decisions about paying (or not paying) a ransom, Zach shares what most organizations never talk about publicly.🔐 In this episode, we cover:What actually happens during a ransomware attack (pre, during & post-breach)How ransomware groups like LockBit operate as “ransomware-as-a-service”Why some organizations pay — and what happens after they doDouble extortion & the evolving tactics of cybercriminalsAI-powered phishing, deepfakes, and the new threat landscapeHow boards are responding to growing cyber riskPractical advice for small and mid-sized organizations with limited security budgetsLessons learned from real breach recoveryWith ransomware, AI-driven attacks, and data extortion on the rise in 2026, this conversation is essential listening for CISOs, IT leaders, board members, business owners, and anyone responsible for protecting sensitive data.🎧 Whether you're in healthcare, education, finance, or enterprise security — this episode delivers actionable insight from someone who’s lived through it.

  9. 166

    Disrupt or Be Breached: The New Cyber Reality

    Cybersecurity isn’t slowing down — it’s accelerating. In this episode of And Security For All, host Kim Hakim is joined by Arun DeSouza, Managing Director at ProFortis Solutions and President of the ISSA Detroit Chapter, for a powerful conversation on emerging cyber trends, AI disruption, and the evolution of the modern CISO From supply chain risk and ransomware evolution to OT security, cloud vulnerabilities, regulatory accountability, and AI-powered threats, this episode explores the real-world challenges security leaders are navigating right now. Topics include:The rise of cyber resilience over pure preventionWhy supply chain risk is now bigger than ransomwareOT and critical infrastructure targetingThe API economy and expanding attack surfacesAI as both attacker and defenderDeepfakes, autonomous attacks, and data poisoningObservability vs visibility in modern security operationsThe revolutionary evolution of the CISO role Arun also shares practical strategies for embedding security into innovation lifecycles, building AI governance frameworks, and preparing organizations for the next wave of disruption. If you’re a CISO, security practitioner, board member, or technology leader, this episode delivers actionable insight on how to stay ahead in an era where innovation and risk move at warp speed.

  10. 165

    Welcome to the Runtime Era & the Rapid Shift in AppSec 📈

    In this episode of And Security For All, host Kim Hakim sits down with Jeff Williams, Founder and CTO of Contrast Security, for a deep dive into why application security is undergoing its most dramatic shift in decades.Jeff shares his journey from helping create the OWASP Top Ten to building one of the leading runtime application security platforms, and explains why traditional AppSec approaches are no longer keeping up with modern software development.🎙️ In this episode, we cover:Why 2026 is shaping up to be the year of runtime securityHow traditional AppSec tools create noise instead of clarityWhat runtime security reveals that static and perimeter tools cannotWhere AI truly helps in AppSec—and where the hype falls shortHow European regulatory changes are redefining software liabilityWhy security teams must prioritize context over volumeWhat developers, CISOs, and security leaders should focus on nextThis conversation breaks down complex topics like runtime protection, AI-driven remediation, regulatory pressure, and developer enablement into clear, practical insights for today’s security practitioners.Whether you’re a CISO, AppSec leader, developer, or security architect, this episode offers a forward-looking perspective on how application security is evolving—and what it takes to stay ahead.

  11. 164

    Securing Intelligence: AI’s Impact on Cyber Risk

    In this episode of And Security For All, host Kim Hakim is joined by Jessica Couto, VP of Channels & Alliances at Harmonic Security, for an in-depth conversation on Securing Intelligence: AI’s Impact on Cyber Risk. Together, they explore how generative AI has rapidly shifted from a productivity tool to a new source of organizational risk—and why blocking AI outright is no longer a viable strategy. Jessica shares real-world insights on how employees are using AI both inside and outside corporate environments, the growing risks of data exposure, phishing, deepfakes, and shadow AI usage, and what security leaders must do to regain visibility and control. The discussion also covers how organizations can safely enable AI without sacrificing productivity, the evolving role of the CISO, the rise of fractional CISOs, and how security teams can communicate AI risk in business terms that resonate with leadership. Topics include:How AI is changing the cyber threat landscapeWhy blocking generative AI puts organizations at risk of falling behindData leakage, shadow AI, and employee behaviorDeepfakes, phishing, and AI-driven social engineeringAI governance, visibility, and policy challengesThe future of the CISO role and cybersecurity careers This episode is a must-listen for CISOs, security leaders, IT professionals, and anyone navigating the fast-changing intersection of AI, cyber risk, governance, and workforce impact.

  12. 163

    Inside The Lion’s Den: Part 2

    In this follow-up episode, guest host Jonathan Kimmitt sits down again with Matthew Maynard, Security Operations Specialist at BJC HealthCare and Dark Web Researcher, to take an even deeper dive into the inner workings of ransomware crews and the people behind them. Matthew takes listeners deeper into the “lion’s den,” revealing what he has learned from directly engaging with threat actors on the dark web—how they think, how they operate, and why the human element inside these criminal ecosystems matters more than most organizations realize. In this episode, they break down: What motivated Matthew to enter ransomware intelligence and begin infiltrating criminal groupsHow ransomware crews recruit, organize, and operate like legitimate businessesKey differences between the clear web and dark web, and common misconceptionsEssential OPSEC practices and how both researchers and criminals protect their identitiesHow personas are created and maintained when engaging directly with threat actorsHuman drivers of cybercrime—from financial incentive to desperation and coercionInsider risks, layoffs, and how human vulnerability contributes to modern breachesMajor intelligence wins and insights that help organizations make stronger security decisions This episode offers rare, firsthand insight into the techniques, mindset, and operational flow of active cybercriminals—paired with practical guidance for defenders. Whether you’re in security leadership, incident response, threat intel, or simply curious about the dark web, this conversation will challenge your assumptions and expand your understanding of today’s most dangerous threats. Listen now and hear why knowing your adversary is one of the most powerful defenses in cybersecurity.

  13. 162

    Inside The Lion’s Den: Infiltrating Ransomware Groups

    In this eye-opening episode of And Security For All, host Kim Hakim sits down with Matthew Maynard, Information Security Operations Specialist at BJC HealthCare and dark web researcher who has spent the last year doing the unthinkable—infiltrating active ransomware groups from the inside. Matthew shares how he entered closed cybercriminal communities, built trust, gathered intelligence, and passed critical findings to government agencies—all while maintaining a full-time role protecting one of the largest healthcare systems in the Midwest. His research provides a rare, real-time window into ransomware crews, their structure, their onboarding process, their business platforms, and the tactics they use to select, study, and strike their victims. What You’ll Learn in This Episode How ransomware groups actually operate behind closed doorsWhat “initial access brokers” are and why they’re the real first step in most attacksHow threat actors select targets, test stolen credentials, and prepare for exploitationWhy holidays and long weekends remain prime attack windowsWhat defenders consistently overlook—and the fixes that matter mostHow Matthew manages OPSEC, safety, and reporting while undercoverWhy MFA gaps, vendor access, phishing, and unpatched systems remain the top entry pointsThe surprising internal rules, ethics, and boundaries some threat groups enforceHow organizations should rethink backups, insurance, and negotiating ransom demands Matthew also discusses the psychological side of this work—the fear, the risk, and the personal motivation that keeps him in the fight. His insights provide actionable takeaways for CISOs, SOC teams, and anyone responsible for protecting an enterprise today. This is a rare interview with someone who has seen ransomware operations from the inside. It’s a conversation every cybersecurity leader should hear.

  14. 161

    SOTI Fraud & Abuse Report: Charting a Course Through AI’s Murky Waters

    In this episode of And Security For All, guest host Steve Winterfeld, Advisory CISO at Akamai Technologies, teams up with Tricia Howard, Security Evangelist and “Scrybe of Cybersecurity Magicks,” to unpack Akamai’s State of the Internet: Fraud & Abuse Report 2025. They explore how AI-driven bots are reshaping the landscape of digital fraud—surging over 300% in the past year—and what that means for businesses, defenders, and everyday users. From ad fraud and data scraping to compliance challenges and the ethics of AI, this conversation dives deep into the tension between innovation and exploitation in cybersecurity. Listen as Steve and Tricia discuss:The explosive growth of AI bots and their impact on digital operationsAd fraud, zero-click searches, and the dark economy of stolen dataWhy healthcare and commerce are prime targets for automated attacksThe evolving balance between compliance, risk, and real securityHow organizations can defend against this new wave of AI-powered fraud With insights from Akamai’s global research team, this episode offers a grounded look at how to navigate the rise of generative AI, protect brand integrity, and build trust in a rapidly changing threat environment.

  15. 160

    The Current State of Cyber and AI in the Workforce

    In this episode of And Security For All, host Kim Hakim sits down with cybersecurity expert Ken Foster to explore how artificial intelligence is reshaping the modern workforce — and what that means for security professionals, organizations, and the future of work.From layoffs and talent shortages to the rise of agentic AI, Kim and Ken break down how automation, machine learning, and new attack surfaces are changing the cybersecurity landscape in real time. They discuss:How AI is transforming security operations and workforce dynamicsThe growing risk of over-automation and the loss of human oversightWhy data governance and validation are critical to AI successThe double-edged sword of AI in threat detection — and how bad actors are using it tooThe looming impact of quantum computing and what it means for encryption and defense strategiesThe importance of Zero Trust, segmentation, and continuous monitoring in today’s AI-driven worldKen also shares candid insights on hiring trends, upskilling the next generation of cybersecurity professionals, and how leaders can prepare for a workforce that increasingly depends on — and is challenged by — artificial intelligence.Whether you’re a CISO, IT leader, or security practitioner, this conversation offers practical perspective on where AI, automation, and human expertise intersect — and how to stay ahead in a rapidly evolving cyber landscape.

  16. 159

    AWS Outage – Lessons in Digital Dependency

    When Amazon Web Services (AWS) experienced a major outage, it wasn’t just a brief inconvenience—it exposed how dependent our digital world has become on a handful of cloud providers. From e-commerce and banking to communication tools, gaming platforms, and smart homes, the disruption highlighted the fragility of modern infrastructure and the need for true resilience.In this episode of Security for All, host Kim Hakim explores what really happened during the AWS outage and what it means for organizations, consumers, and cybersecurity professionals.Kim welcomes Tahjar Roamartinez, MBA, CISSP, ITIL, CEH—former U.S. Army officer and cybersecurity executive with extensive experience in IT governance, risk management, and cloud security. Together, they examine both the technical root causes and the broader business and societal impacts of the outage.Discussion Topics Include:The technical breakdown of the AWS outage and how a DNS failure rippled across industriesHow overreliance on a single cloud provider creates systemic riskThe importance of redundancy, resilience, and multi-cloud strategiesHow to prepare and respond using playbooks, tabletop exercises, and recovery planningThe growing digital dependency of individuals, families, and organizationsHow security leaders can balance innovation with risk managementLessons learned for CISOs, IT leaders, and business owners moving forwardTahjar and Kim also discuss how this event should serve as a wake-up call for every organization, regardless of size or budget. From small businesses to large enterprises, no one is immune from the ripple effects of an outage in today’s interconnected digital ecosystem.Listeners will gain practical insights into strengthening cyber resilience, building awareness, and preparing for future disruptions—because in cybersecurity, it’s not a question of if, but when.

  17. 158

    Workplace Culture & Leadership: Why Balance Beats Burnout

    In this episode of And Security For All, host Kim Hakim is joined by Eva Benn, Principal Security Program Manager, MSRC at Microsoft, keynote speaker, and one of the world’s Top 20 Women in Cybersecurity. Together, they dive deep into the realities of burnout in high-pressure industries — and how balance, empathy, and authenticity in leadership can change everything. Drawing from her own experience in cybersecurity and human behavior, Eva shares how burnout isn’t just a personal problem — it’s a security risk. They discuss how the human element remains the weakest link in cyber defense, and why emotional resilience and psychological regulation are as essential as technical skills. The conversation also explores gender balance and leadership energy, challenging the traditional “hustle harder” mindset. As they reflect on outdated workplace beliefs, the two discuss the importance of alignment: how working in tune with your authentic self prevents exhaustion and unlocks creativity. They also examine the double-edged nature of AI — a tool that can either amplify burnout or help professionals regain time and focus when used with intention. From redefining what success really looks like to cultivating workplaces where people can thrive, this episode is an honest, insightful, and empowering reminder that true leadership begins with balance — not burnout. If you’ve ever struggled with burnout, leadership fatigue, or the constant push to keep up in a hyper-digital world, this conversation will inspire you to slow down, realign, and find drive from a place of strength and humanity.

  18. 157

    Kicking Off Cybersecurity Month: Why Awareness Still Matters

    Cybersecurity Month is here, and we're kicking it off with a thought-provoking conversation that dives deep into why awareness remains one of the most powerful tools in our security arsenal.In this episode of And Security For All, host Kim Hakim is joined by Jonathan Kimmit, CISO at Alias Cybersecurity and former CISO at the University of Tulsa. Together, they explore the evolving role of cybersecurity awareness in a rapidly changing threat landscape. Jonathan shares insights from his years in leadership, including how foundational strategies can adapt to future challenges, how culture and communication influence security posture, and why staying vigilant is just as important today as ever before.Throughout the discussion, they tackle:Why awareness isn’t just a “check-the-box” exerciseHow organizational culture impacts cybersecurity effectivenessStrategies for engaging teams and leadership in meaningful awareness effortsWhat’s changing in the industry and what CISOs should anticipate in the coming yearListeners will walk away with practical takeaways and a renewed understanding of why awareness still matters—not only during Cybersecurity Month but year-round.

  19. 156

    The Future of Identity: AI, Risk, and Real-Time Insights with Zluri

    On this episode of And Security For All, guest host Omar Bedran from FutureCon CyberSecurity Events is chatting with Zluri Co-Founder & COO Sethu Meenakshisundaram about the future of identity in hashtag#Cybersecurity. From AI-driven access management to real-time risk insights, they explore how organizations can stay secure and compliant without slowing down. Don't miss this fast-paced conversation packed with practical advice, real-world examples, and a look ahead at what’s next for IAM.   Guest: Seth Meenakshisundaram Co-Founder and COO at Zluri  

  20. 155

    ENCORE: CISO’s with a Leadership Mindset

    On this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core. The discussion will surround how CISOs can cultivate a leadership mindset to inspire teams, manage risks, and deliver strategic value.

  21. 154

    ENCORE: Old Threats, New Tactics: Understanding Today’s Cyberattack Landscape

    On this episode of And Security For All, Steve Winterfeld and Sean Flynn will share research from Akamai’s Defenders' Guide 2025. We are seeing a vast increase in cyberattacks with old threats resurfacing alongside new sophisticated tactics. Tune in to understand the ever-changing threatscape and get insights on practical solutions based on real-life examples we are seeing in the wild.     Steve Winterfeld I have served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom and Director of Incident Response and Threat Intelligence at Charles Schwab. Also have published a book on Cyber Warfare and hold CISSP, ITIL and PMP certifications.   Sean Flynn I work with companies to ensure Akamai’s Security Vision aligns with industry and customer needs. I advise some of the largest customers in Finance, Commerce, and Healthcare on security strategies for implementing application, network, enterprise, and cyber best practices. I also act as a lead trainer for web and security teams. Before that, I designed and deployed critical security capabilities for multiple industries. I have over 18 years of IT security experience working for networking and application security providers. I have extensive hands-on experience, helping protect customers from active attacks by state-sponsored actors, hacktivists, and cyber criminals.   

  22. 153

    Old Threats, New Tactics: Understanding Today’s Cyberattack Landscape

    On this episode of And Security For All, Steve Winterfeld and Sean Flynn will share research from Akamai’s Defenders' Guide 2025. We are seeing a vast increase in cyberattacks with old threats resurfacing alongside new sophisticated tactics. Tune in to understand the ever-changing threatscape and get insights on practical solutions based on real-life examples we are seeing in the wild.     Steve Winterfeld I have served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom and Director of Incident Response and Threat Intelligence at Charles Schwab. Also have published a book on Cyber Warfare and hold CISSP, ITIL and PMP certifications.   Sean Flynn I work with companies to ensure Akamai’s Security Vision aligns with industry and customer needs. I advise some of the largest customers in Finance, Commerce, and Healthcare on security strategies for implementing application, network, enterprise, and cyber best practices. I also act as a lead trainer for web and security teams. Before that, I designed and deployed critical security capabilities for multiple industries. I have over 18 years of IT security experience working for networking and application security providers. I have extensive hands-on experience, helping protect customers from active attacks by state-sponsored actors, hacktivists, and cyber criminals.  

  23. 152

    ENCORE: 2025 Cyber Trends: Expert Forecasts and Action Steps

    As we close out 2024, the cybersecurity landscape looms larger than ever. What cyber storms are brewing for 2025? Three cyber leaders from Akamai Technologies give us their predictions and what might happen—and counsel on what we can do about it. We’ll focus on the resurgence of DNS-based attacks, the evolution of DDoS tactics, emerging threats in the quantum and AI domains—and more. Today's Special Guests:                                                                                                  Tricia Howard                                                  Steve Winterfeld                       Mitch Mayne                                                Roger Barranco

  24. 151

    ENCORE: Beyond Tech: Navigating a Cybersecurity Career

    On this episode of And Security For All, host Kim Hakim has Richard Bird on the show to discuss navigating a Cybersecurity career beyond just the technology changes. Richard recently joined Singulr AI as their CISO, and has an extensive background as a six-time C-level executive in the corporate and start-up worlds. During our chat, Richard will be discussing his atypical trajectory career path and how changes in security have contributed to this. This will go beyond just technology advancements and explore the constantly evolving industry.    Guest: Richard Bird Richard William Bird is the Chief Security Officer for Singulr AI and a six-time C-level executive in the corporate and start-up worlds. His 30-year career journey has been diverse and unique, from a dozen years at JPMorgan Chase to delivering keynote presentations worldwide. Richard is internationally recognized for his expert insights, work, and views on AI security, data privacy, digital consumer rights, API security, and identity security. He is a highly sought-after speaker and moderator who addresses today's security problems with humor and clarity. Richard recently released his first book, Famous With 12 People: A Career Guide On How to Be an Internationally Recognized Expert In Something Nobody Cares About. It is a practical field guide on personal and professional branding, public speaking, and effective networking. He is a Senior Fellow with the CyberTheory Zero Trust Institute and an executive member of CyberEdBoard. He has been interviewed and quoted extensively by media outlets, including ISMG, the Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider, CNN, NBC Nightly News, Dark Reading, and TechRepublic.

  25. 150

    Beyond Tech: Navigating a Cybersecurity Career

    On this episode of And Security For All, host Kim Hakim has Richard Bird on the show to discuss navigating a Cybersecurity career beyond just the technology changes. Richard recently joined Singulr AI as their CISO, and has an extensive background as a six-time C-level executive in the corporate and start-up worlds. During our chat, Richard will be discussing his atypical trajectory career path and how changes in security have contributed to this. This will go beyond just technology advancements and explore the constantly evolving industry.    Guest: Richard Bird Richard William Bird is the Chief Security Officer for Singulr AI and a six-time C-level executive in the corporate and start-up worlds. His 30-year career journey has been diverse and unique, from a dozen years at JPMorgan Chase to delivering keynote presentations worldwide. Richard is internationally recognized for his expert insights, work, and views on AI security, data privacy, digital consumer rights, API security, and identity security. He is a highly sought-after speaker and moderator who addresses today's security problems with humor and clarity. Richard recently released his first book, Famous With 12 People: A Career Guide On How to Be an Internationally Recognized Expert In Something Nobody Cares About. It is a practical field guide on personal and professional branding, public speaking, and effective networking. He is a Senior Fellow with the CyberTheory Zero Trust Institute and an executive member of CyberEdBoard. He has been interviewed and quoted extensively by media outlets, including ISMG, the Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider, CNN, NBC Nightly News, Dark Reading, and TechRepublic.

  26. 149

    ENCORE: Stronger Security Through Awareness & Engagement

    On this episode of And Security For All, host Kim Hakim has Tera Ladner, Deputy Global CISO at Aflac, on the show to discuss how we can build stronger security through awareness and enagement. During their chat they will cover how programs in place are designed to engage users and build a safer community. Programs like CyberInspire focus on school age children and the senior community to target education for those most vulnerable.   Guest: Tera Ladner   I’m focused on building strong, proactive cybersecurity programs that protect organizations from today’s evolving threats while ensuring compliance and fostering a culture of security awareness. I work to ensure security strategies align with business goals while keeping things simple, yet effective. I am always looking for ways to make security a seamless part of business growth. I collaborate with teams across the organization to strengthen security and reduce risk, while staying ahead of emerging trends. I’m passionate about creating a security culture where everyone is aware, engaged, and protected—ultimately enabling the business to thrive. I am deeply committed to enabling a safer, more resilient community where younger members are inspired to be the next generation of cyber defenders.

  27. 148

    Stronger Security Through Awareness & Engagement

    On this episode of And Security For All, host Kim Hakim has Tera Ladner, Deputy Global CISO at Aflac, on the show to discuss how we can build stronger security through awareness and enagement. During their chat they will cover how programs in place are designed to engage users and build a safer community. Programs like CyberInspire focus on school age children and the senior community to target education for those most vulnerable.   Guest: Tera Ladner   I’m focused on building strong, proactive cybersecurity programs that protect organizations from today’s evolving threats while ensuring compliance and fostering a culture of security awareness. I work to ensure security strategies align with business goals while keeping things simple, yet effective. I am always looking for ways to make security a seamless part of business growth. I collaborate with teams across the organization to strengthen security and reduce risk, while staying ahead of emerging trends. I’m passionate about creating a security culture where everyone is aware, engaged, and protected—ultimately enabling the business to thrive. I am deeply committed to enabling a safer, more resilient community where younger members are inspired to be the next generation of cyber defenders.

  28. 147

    ENCORE: AI in Cybersecurity: Evolution, Risk & Future Trends

    On this episode of And Security For All, host Kim Hakim has Tony Anscombe, Chief Security Evangelist at ESET, on the show to discuss AI.  AI has transformed cybersecurity, from early detection systems to today’s generative models like DeepSeek. While it strengthens defenses, it also has limitations and is being weaponized by cybercriminals. Beyond security, AI is reshaping industries, from autonomous vehicles to healthcare, while raising concerns about job displacement. As it continues evolving, what challenges and opportunities lie ahead?     Guest: Tony Anscombe Dynamic, revenue-focused executive with over 20 years of international leadership experience in business development, partnerships and as a company spokesperson. Successfully led startups and served as part of executive teams for global, publicly-held companies. In-depth understanding of software, hardware, and mobile technology markets. Key areas of focus: security, privacy, compliance, financial services and child safety online. Contributor to the award winning cybersecurity blog - WeLiveSecurity.com - and guest author on Dark Reading.   Seasoned company spokesperson on an international scale including creating content and presenting at conferences and industry events and to key influencers such as broadcast, radio, online and print media and analysts.

  29. 146

    ENCORE: CISO Showdown, Battle of the CISO’s

    On this episode of And Security For All, guest host Jonathan Kimmitt has current Oklahoma CISO champion Chad Kliewer on to give you the champions insight into what a CISO really does. Describing what a CISO does can be difficult at best.  The CISO showdown was a simple concept that turned into an industry phenomenon and became a mainstay at conferences in Oklahoma. Tune in to find out why Chad is the current champion. Special Guests:  Jonathan Kimmitt and Chad Kliewer Jonathan Kimmitt - As a leader in Information Security across the academic sectors, I have developed an accomplished career driving the strategy and management of business transformation, technical migrations, IT data security, disaster recovery and technology planning. I’ve found my success has been achieved by combining hands-on expertise in information security management and cybersecurity to ensure the optimal performance of critical, enterprise-scale environments. I specialize in developing and implementing enterprise technology models, security architecture and best practices to maintain internal control; introducing security framework, tools and solutions to stimulate performance improvements; and aligning business requirements with information security processes. Recognized as a versatile leader, I excel at guiding cross-functional technology resources through critical projects, as well as influencing key stakeholders and decision makers on the adoption of new security framework and technical best practices to meet operational goals. I believe that technology is the foundation for a successful business. I take pride in directly contributing to the success of an organization by supporting the development and management of security tools and solutions and am committed to expanding my skills and knowledge so that I can continue to meet corporate and customer goals. Chad Kliewer is the Information Security Officer overseeing the cybersecurity and privacy programs for Pioneer Telephone Cooperative based in Kingfisher, OK. He has over 20 years experience in Information Technology with responsibilities ranging from PC Tech to CIO, most of that time being the primary person responsible for security including HIPAA and SOX compliance. While mostly in the healthcare field, Chad has also worked in banking, transportation, and currently in telecommunications. During his career, Chad has been outsourced, insourced, and resourced working with companies from 50 employees to more than 50,000 employees giving him insight to how things work in companies large and small and everywhere in between. Chad serves on several local event and non-profit advisory boards. He is currently serving as the Board Secretary for the InfraGard Oklahoma Members Alliance and maintains the Certified Information Systems Security Professional (CISSP) certification.

  30. 145

    AI in Cybersecurity: Evolution, Risk & Future Trends

    On this episode of And Security For All, host Kim Hakim has Tony Anscombe, Chief Security Evangelist at ESET, on the show to discuss AI.  AI has transformed cybersecurity, from early detection systems to today’s generative models like DeepSeek. While it strengthens defenses, it also has limitations and is being weaponized by cybercriminals. Beyond security, AI is reshaping industries, from autonomous vehicles to healthcare, while raising concerns about job displacement. As it continues evolving, what challenges and opportunities lie ahead?     Guest: Tony Anscombe Dynamic, revenue-focused executive with over 20 years of international leadership experience in business development, partnerships and as a company spokesperson. Successfully led startups and served as part of executive teams for global, publicly-held companies. In-depth understanding of software, hardware, and mobile technology markets. Key areas of focus: security, privacy, compliance, financial services and child safety online. Contributor to the award winning cybersecurity blog - WeLiveSecurity.com - and guest author on Dark Reading.   Seasoned company spokesperson on an international scale including creating content and presenting at conferences and industry events and to key influencers such as broadcast, radio, online and print media and analysts.  

  31. 144

    CISO Showdown, Battle of the CISO’s

    On this episode of And Security For All, guest host Jonathan Kimmitt has current Oklahoma CISO champion Chad Kliewer on to give you the champions insight into what a CISO really does. Describing what a CISO does can be difficult at best.  The CISO showdown was a simple concept that turned into an industry phenomenon and became a mainstay at conferences in Oklahoma. Tune in to find out why Chad is the current champion. Special Guests:  Jonathan Kimmitt and Chad Kliewer Jonathan Kimmitt - As a leader in Information Security across the academic sectors, I have developed an accomplished career driving the strategy and management of business transformation, technical migrations, IT data security, disaster recovery and technology planning. I’ve found my success has been achieved by combining hands-on expertise in information security management and cybersecurity to ensure the optimal performance of critical, enterprise-scale environments. I specialize in developing and implementing enterprise technology models, security architecture and best practices to maintain internal control; introducing security framework, tools and solutions to stimulate performance improvements; and aligning business requirements with information security processes. Recognized as a versatile leader, I excel at guiding cross-functional technology resources through critical projects, as well as influencing key stakeholders and decision makers on the adoption of new security framework and technical best practices to meet operational goals. I believe that technology is the foundation for a successful business. I take pride in directly contributing to the success of an organization by supporting the development and management of security tools and solutions and am committed to expanding my skills and knowledge so that I can continue to meet corporate and customer goals. Chad Kliewer is the Information Security Officer overseeing the cybersecurity and privacy programs for Pioneer Telephone Cooperative based in Kingfisher, OK. He has over 20 years experience in Information Technology with responsibilities ranging from PC Tech to CIO, most of that time being the primary person responsible for security including HIPAA and SOX compliance. While mostly in the healthcare field, Chad has also worked in banking, transportation, and currently in telecommunications. During his career, Chad has been outsourced, insourced, and resourced working with companies from 50 employees to more than 50,000 employees giving him insight to how things work in companies large and small and everywhere in between. Chad serves on several local event and non-profit advisory boards. He is currently serving as the Board Secretary for the InfraGard Oklahoma Members Alliance and maintains the Certified Information Systems Security Professional (CISSP) certification.    

  32. 143

    2025 Cyber Trends: Expert Forecasts and Action Steps

    As we close out 2024, the cybersecurity landscape looms larger than ever. What cyber storms are brewing for 2025? Three cyber leaders from Akamai Technologies give us their predictions and what might happen—and counsel on what we can do about it. We’ll focus on the resurgence of DNS-based attacks, the evolution of DDoS tactics, emerging threats in the quantum and AI domains—and more. Today's Special Guests:                                                                                                Tricia Howard                                                  Steve Winterfeld                     Mitch Mayne                                                Roger Barranco

  33. 142

    ENCORE: Shaping the Future of Cyber Resilience

    On this episode of And Security For All, host Kim Hakim brings Connie Matthews on the show to discuss cyber resiliency. During their conversation they will cover building resilient teams, positive leadership, staying proactive, and learning from past mistakes.

  34. 141

    ENCORE: Cyber-Consciousness: Navigating Risks with Awareness and Clarity

    On this episode of And Security For All, host Kim Hakim has Mark Sangster, VP and Chief of Strategy at Adlumin, on the show to discuss Cyber-Consciousness. During their discussion they will be covering how to align internal awareness with external risks to make thoughtful, context-driven business decisions.   Mark Sangster is the author of No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business. He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference. Mark has appeared on CNN News Hour to provide expert opinion on international cybercrime issues and is a go-to subject matter expert for leading publications and media outlets including the Wall Street Journal and Forbes when covering major data breach events.

  35. 140

    ENCORE: CISO’s with a Leadership Mindset

    On this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core. The discussion will surround how CISOs can cultivate a leadership mindset to inspire teams, manage risks, and deliver strategic value.   Gordon Rudd: Career Designer for CISOs, CIOs, & CTOs. Coaching technical people is my greatest passion. I founded Stone Creek Coaching to give back to the technical community I've been so fortunate to be a part of for 35 years. I help people discover their potential and become leaders in their technical communities. I've turned 35 years of experience in technology, cybersecurity, and building high-performance teams into a program that will put your squarely in charge of your career.  After working in all areas of technology; programming, systems engineering, network engineering, project management, enterprise architecture, information security, vendor management, risk management, and process improvement, I have a unique perspective on career designs for techies. I'm a results-oriented technology coach and mentor and coach. I founded the CISO Mentoring Project and remain an engaged mentor to many aspiring and active CISOs across the country. I have taught PDI (Professional Development Institute) courses for (ISC)2, helping cybersecurity leaders, create their Path to CISO and lead educational events, videos and content for (ISC)2 members. As a recognized expert, I am frequently sought after to speak at industry events on information security, GRC and enterprise risk management.   Jonathan Kimmitt: As a leader in Information Security across the academic sectors, I have developed an accomplished career driving the strategy and management of business transformation, technical migrations, IT data security, disaster recovery and technology planning. I’ve found my success has been achieved by combining hands-on expertise in information security management and cybersecurity to ensure the optimal performance of critical, enterprise-scale environments. I specialize in developing and implementing enterprise technology models, security architecture and best practices to maintain internal control; introducing security framework, tools and solutions to stimulate performance improvements; and aligning business requirements with information security processes. Recognized as a versatile leader, I excel at guiding cross-functional technology resources through critical projects, as well as influencing key stakeholders and decision makers on the adoption of new security framework and technical best practices to meet operational goals. I believe that technology is the foundation for a successful business. I take pride in directly contributing to the success of an organization by supporting the development and management of security tools and solutions and am committed to expanding my skills and knowledge so that I can continue to meet corporate and customer goals.

  36. 139

    ENCORE Strengthening Security Through Data Classification and Governance

    On this episode of And Security For All host Kim Hakim has Zach Lewis on the show to discuss data classification, governance, and AI.

  37. 138

    Cyber-Consciousness: Navigating Risks with Awareness and Clarity

    On this episode of And Security For All, host Kim Hakim has Mark Sangster, VP and Chief of Strategy at Adlumin, on the show to discuss Cyber-Consciousness. During their discussion they will be covering how to align internal awareness with external risks to make thoughtful, context-driven business decisions.

  38. 137

    CISO’s with a Leadership Mindset

    On this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core. The discussion will surround how CISOs can cultivate a leadership mindset to inspire teams, manage risks, and deliver strategic value.

  39. 136

    Strengthening Security Through Data Classification and Governance

    On this episode of And Security For All host Kim Hakim has Zach Lewis on the show to discuss data classification, governance, and AI.

  40. 135

    Now is the Time to Understand Gen AI Security

    Join Akamai's Steve Winterfeld (Advisory CISO) and Sean Flynn (Director of Security Strategy) as they explore the security risks associated with Gen AI/LLM. They will review the OWASP LLM Top 10 security issues and provide real world case studies of cyber incidents. As reliance on AI systems grows, understanding the potential impact of cybercriminals and hacktivists is essential.

  41. 134

    Exploring Shifts in Federal Cybersecurity

    On this episode of And Security For All, host Kim Hakim has Max Everett, CISO at Saw Industries, on the show to discuss shifts in federal Cybersecurity. This includes policy changes, budget constraints, supply chain risks and more.

  42. 133

    Shaping the Future of Cyber Resilience

    On this episode of And Security For All, host Kim Hakim brings Connie Matthews on the show to discuss cyber resiliency. During their conversation they will cover building resilient teams, positive leadership, staying proactive, and learning from past mistakes.

  43. 132

    Critical Threats & Trends: Election Cyber, Ransomware & AI

    On this episode of And Security For All, host Kim Hakim has Dan Lohrmann, Field CISO for Public Sector at Presidio, on the show. They will be covering current critical threats and trends. This includes election security, ransomware, and good vs. bad AI.

  44. 131

    Digital Fortresses Under Siege: Application Architecture Threats

    On this episode of And Security For All, guest host Steve Winterfeld, Advisory CISO at Akamai Technologies has on colleague Mitch Mayne, Director, Threat Intelligence and Cybersecurity Research, to discuss 'Digital Fortresses Under Siege: Threats to Modern Application Architectures'. They will share Akamai's latest threat research and provide an understanding of the potential impacts as companies' drive to digital modernization which is unintentionally expanding their attack surface - making them vulnerable to sophisticated threats such as API abuse and DDoS attacks. This session will also provide actionable insights into the potential impacts of these findings and offer practical recommendations for mitigating risks while navigating the complexities of compliance and innovation.

  45. 130

    The Evolution of Cybercrime Cartels

    On today's episode of And Security For All, host Kim Hakim has Tom Kellermann, Senior VP of Cyber Strategy at Contrast Security, and Derek Booth, Supervisory Special Agent at the U.S. Secret Service ATSAIC, on the show. They will be discussing the evolution of cybercrime cartels and cybersecurity conspiracies. Insight will also be provided around trends in e-fraud and novel cyberattacks, as well as shoxing, destructive attacks, cloud jacking, AI’s dark passenger, chronos attacks and more.

  46. 129

    Scraping the Surface: Web Scraping is Undermining Online Business

    On this episode of And Security For All, guest host Omar Bedran Has Sean Flynn, Director, Security Technology and Strategy at Akamai Technologies, on the show to discuss Akamai's latest report. In this episode, they dive into Akamai’s latest Web Scraping Report, which uncovers the hidden impact of web scrapers on businesses. From revenue loss and compromised data to brand damage, web scraping bots are more sophisticated than ever, employing advanced AI and headless browsers to evade detection. Join us for insights on the modern bot landscape and proactive ways to protect your business.

  47. 128

    Redefining Security Strategy: BypassIT and the Return to Basics

    On this episode of And Security For All, host Kim Hakim has Michael Manrod, CISO at Grand Canyon University, on the show to discuss how we can redefine CyberSecurity Strategies. During their chat they will cover topics including detection gaps in automation tools, new testing like BypassIT, and remembering our fundamentals.

  48. 127

    A Deep Dive on Disinformation with Dave DeWalt

    On this episode of And Security For All, Kim Hakim has Dave DeWalt, Founder and CEO of NightDragon and Former CEO of FireEye, McAfee and Documentum, on the show to take a deep dive into disinformation. During their chat, they will be covering election integrity, deepfakes, malicious tactics, and how to spot attacks before it is too late.

  49. 126

    Stopping Cybercriminals, True Stories from the Trenches

    On this episode of And Security For All, Jonathan Kimmitt, CISO at Alias Cybersecurity, is back to host the show with guest Douglas Lubahn, VP Customer Success at BlackFog. They will be chatting about stopping data exfiltration and ransomware plus sharing true Cybercrime stories. Tune in to find out how we can continue the fight against Cybercriminals.

  50. 125

    Diverse Minds, Stronger Cybersecurity: A Thought Leader's View

    On this episode of And Security For All, host Kim Hakim has Rick Doten return to the show to expand on a topic he has presented at a past FutureCon Conference, neurodivergent minds in they Cybersecurity field. Rick is the VP, Information Security at Centene Corporation and the CISO at Carolina Complete Health. Throughout his career he has been focusing on the intersection of neurodiversity and cybersecurity. During this show they will discuss the role of neurodiverse minds evolving over the next few years, how they can play a crucial part in the fight against cybercrime, and how to leverage strengths to address current and emerging cybersecurity threats.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Cyber security is not only important to everyone, it is critical to the future of every American. Each show details specific points in history and provides guidance and insights of both a technical and societal nature to help you understand and address cyber security issues more effectively. Our approach makes the often misunderstood and highly technical jargon of cyber security advisories, and popular media digestible for anyone that listens.brbr Anyone that leverages or uses internet and cyber related services, which in today’s world is basically everyone, stands to benefit from the show. You’ll gain insight into the reality of the space around cyber security and learn more details and truths on what is actually necessary to operate and be more secure at both the business and personal levels in an ever-changing technology space. We can help you truly understand a vast technology space and be better prepared in a dynamic technology ecosystem.

HOSTED BY

Kim Hakim

CATEGORIES

URL copied to clipboard!