The New York Information Security Meetup

PODCAST · technology

The New York Information Security Meetup

Interviews with cyber security professionals

  1. 67

    LLM Kiddies: The New Script Kiddies? A Veteran SOC Analyst's Take on AI's Security Revolution

    From SOC analyst to AI innovator: How Dylan Williams navigates the intersection of cybersecurity and artificial intelligence, revealing why he believes we're entering the age of 'LLM Kiddies' and what it means for the future of security operations. Synopsis: In this engaging conversation, cybersecurity expert Dylan Williams discusses his journey from traditional security operations to AI innovation, sharing invaluable insights on the transformation of cybersecurity through AI and LLMs. He explores the promises and pitfalls of AI in security operations, the emergence of AI-powered threats, and practical considerations for implementing AI in security workflows. Timeline: 0:00 - Introduction and welcome 0:35 - Dylan's background in security operations and blue teaming 2:00 - Transition from traditional security to AI/LLM specialization 3:44 - Early career journey and entering cybersecurity 4:14 - Discussion on curiosity in cybersecurity careers 5:46 - Modern learning resources and certification value 8:37 - Current state of AI adoption in cybersecurity 13:56 - Analysis of Microsoft Copilot and AI integration challenges 16:17 - AI as a junior analyst concept 20:32 - Discussion of current LLM limitations 24:44 - Analysis of SOC automation using AI agents 27:41 - Framework for evaluating AI implementation in security 30:24 - Importance of explainable AI in security 32:19 - Vendor integration of AI capabilities 35:18 - Discussion of adversarial use of AI 41:11 - Risks of AI monoculture in security tools 43:35 - Cost implications of AI in security operations 46:21 - Concerns about over-reliance on AI tools 51:08 - Data privacy concerns with public LLMs 54:33 - Closing thoughts and future projects 57:16 - Conclusion

  2. 66

    Investing in Cybersecurity: The ROI Dilemma | Jamison Nesbitt

    In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure. Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also highlighting the need for organizations to be proactive in their cybersecurity measures. In this conversation, David Raviv and Jamison discuss the complexities of data privacy regulations like GDPR, the challenges of balancing airline costs with regulatory compliance, and the importance of cybersecurity investment. They explore the role of AI in cybersecurity, emphasizing the need for responsible use and the human element in innovation. The discussion also highlights the significance of engaging with cybersecurity events and communities to foster collaboration and awareness in critical infrastructure sectors. Chapters 00:00 Introduction and Background 03:06 The Importance of Events in Cybersecurity 05:46 Content is King: The Secret Sauce of Successful Events 09:09 C-Level Perspectives on Cybersecurity 11:56 Emerging Trends in Aviation Security 14:53 Ransomware and Supply Chain Challenges 17:44 The Role of Regulation in Cybersecurity 21:05 Accountability and Innovation in Critical Infrastructure 27:29 Navigating GDPR and Data Privacy 29:37 The Balancing Act of Airline Costs and Regulations 32:21 Cybersecurity Investment and ROI Challenges 35:46 Innovation in Cybersecurity: The Human Element 40:15 AI in Cybersecurity: Opportunities and Risks 48:43 Engaging with Cybersecurity Events and Communities

  3. 65

    The Future of Enterprise IT: AI, Machine Learning, and Digital Transformation with William Brinson

    Join us in this engaging episode as we sit down with William Brinson to explore his fascinating journey in enterprise architecture, IT, and cybersecurity. Discover how his experiences from Pizza Hut to enterprise IT shaped his unique approach to technology. Dive deep into the transformative potential of AI and machine learning in modern business, uncovering practical insights on AI adoption, digital twins, and the future of digital assets. William shares invaluable advice for business owners on leveraging AI for efficiency, profitability, and staying competitive in an ever-evolving digital landscape. 00:00 Introduction and Guest Welcome 00:29 Journey into IT and Early Career 02:34 Enterprise IT and Business Processes 05:38 AI and Machine Learning in Business 09:01 Digital Transformation and Future Vision 16:09 Practical AI Applications for Businesses 26:09 Implementing AI for Immediate Impact 29:04 Harnessing AI for Marketing Automation 30:31 The Risks of AI Monoculture 31:24 The Influence of Social Media Algorithms 35:19 AI in Education and Workforce 42:27 The Future of Human-AI Interaction 48:06 AI in Business Strategy and Implementation 52:58 Conclusion and Final Thoughts

  4. 64

    Exploring Decentralization, AI, and Societal Structures: A Conversation with James Haft

    In this episode, James discusses the merits and vision behind decentralized societies and their contrast to centralized systems historically and in modern times. He shares his journey into the philosophy of decentralization, inspired by science fiction literature and particularly Neil Stevenson's 'Snow Crash'. The discussion delves into various societal institutions like education, religion, and government, highlighting how they have centralised control over time and how this affects individual freedom and choice. James also discusses the impacts of centralization on global economic disparity, exemplified by issues in the third world, and the potential of blockchain and decentralized technologies to redistribute power and wealth. The conversation also touches on AI, universal basic income, and personal freedoms in a decentralized context. 00:00 Introduction and Greetings 00:05 The Evolution of Decentralized Societies 01:00 Influence of Science Fiction on Decentralization 02:34 Historical Shift to Centralization 03:18 The Role of Institutions in Centralization 04:18 Critique of Centralized Systems 06:48 The Impact of Centralization on Global Issues 07:03 Decentralization and Blockchain Technology 11:06 Debate on Decentralization vs. Centralization 12:58 The Importance of Choice and Freedom 14:34 Challenges and Perspectives on Decentralization 15:48 The Role of Trust and Verification 16:57 Criticism of Legal and Financial Systems 18:49 Global Perspective on Systemic Flaws 29:53 Bitcoin and the Concept of Value 32:44 Decentralization as Freedom of Speech 36:01 Debunking Terrorism Funding Myths 37:47 AI Development Costs and Monetization 38:52 Economic Inequality and Investment Barriers 41:55 Decentralization and Universal Basic Income 47:40 The Future of Transactions and Bitcoin 54:46 AI's Role in Society and Potential Risks 01:01:04 Decentralized Systems and Global Power 01:03:25 Conclusion and Future Conversations #Decentralization, #Blockchain, #Bitcoin, #AI, #CentralizedPower, #FinancialFreedom, #Cryptocurrency, #SocialChange, #Democracy, #DigitalRights, #FreedomOfChoice, #Governance, #Metaverse, #Innovation, #DataPrivacy, #MonetaryPolicy, #GlobalEconomy, #TechnologicalChange, #SmartContracts, #DecentralizedAI

  5. 63

    Sky-High Stakes: Inside Aviation's Cyber Battleground

    From ransomware attacks that ground flights to nation-state threats lurking in the shadows, the aviation industry faces unprecedented cybersecurity challenges. Join me for a conversation with Jamison Nesbitt, founder of the Cyber Senate, as they pull back the curtain on how aviation security leaders are working tirelessly to keep our skies safe while balancing innovation, regulation, and the constant push for cheaper tickets. Discover why collaboration and human ingenuity remain our best defense in an increasingly complex digital battleground. 00:00 Introduction with David Raviv and Jamison Nesbitt 03:27 The Secret Behind Successful Industry Events 09:51 Inside Aviation's Complex Security Web: Current Threats 16:46 When Things Go Wrong: Learning from the CrowdStrike Incident 23:00 Regulation vs Innovation: Finding the Right Balance 31:53 Following the Money: The Economics of Aviation Security 37:15 AI in Aviation: Promise and Peril 44:48 The Human Element: Unsung Heroes of Aviation Security 51:02 What's Next: Upcoming Events and Industry Outlook #AviationSecurity #Cybersecurity #CriticalInfrastructure #Innovation #TechTalks #Aviation #Security

  6. 62

    From Tank Commander to AI Innovator

    From commanding tanks to revolutionizing customer feedback through AI, Guy Nirpaz's entrepreneurial journey shows how sometimes the best innovations come from questioning the status quo. Learn how his company Perspective AI is transforming the way businesses understand their stakeholders by replacing impersonal surveys with AI-powered conversations that achieve 90% completion rates and uncover insights that traditional methods miss. 00:00 Introduction & Background Early passions: coding, basketball, guitar. Military service as tank commander. Learning to manage people in challenging conditions. 03:04 Early Career Journey Joined IBM as Sales Engineer. Moved to Mercury as architect. Became VP Engineering at GigaSpaces. Notable colleagues included Elastic founder Shai Banon. 08:14 Entrepreneurial Mindset Discussion of nonconformist thinking. Importance of learning from failure. Building self-confidence through challenges. 22:57 Perspective AI Origin Story Problem: Limitations of traditional surveys. Solution: AI-powered conversations. Achievement: 90% completion rates. 34:41 How Perspective AI Works Natural conversation approach. Adaptive questioning. Real-time insights generation. No fixed questions like traditional surveys. 47:23 Target Users & Success Stories Startups to growth companies. Product teams. Marketing teams. Case study: Podcast doubling audience in 6 months. 54:49 Closing Thoughts Future of AI and human interaction. How to get started with Perspective AI. Contact information and next steps. #Entrepreneurship #AI #CustomerFeedback #StartupStory

  7. 61

    From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense

    Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts

  8. 60

    From Code to Boardroom: A Cybersecurity Veteran's Guide to Trust, AI, and the Future of Defense

    Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. In this captivating discussion, veteran cybersecurity executive Joe Schorr shares invaluable insights from his journey from hands-on penetration tester to high-level strategic advisor. The conversation explores the rapidly evolving cybersecurity landscape, particularly focusing on the impact of AI, the challenges of building trust in vendor relationships, and the future of risk quantification in cybersecurity. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts #CyberLeadership #SecurityStrategy #AIinCybersecurity #CyberTrust #InfoSec #CISO #CyberRisk #SecuritySales #TrustedAdvisor #CyberDefense #RiskQuantification #CyberInnovation #SecurityVendors #CyberTransformation #FutureOfCyber

  9. 59

    The Battle for Secure Communications: A Deep Dive into Mobile Security and Cyber Threats with Gregg Smith

    From CEO of cybersecurity pioneers to safeguarding the nation’s most critical communications, Gregg Smith shares his unique journey from mobile technology to cyber defense. Discover why, despite years of innovation, secure communication remains an unsolved puzzle—and how the race between security and interception is shaping the future of global cybersecurity. In this conversation, Gregg Smith shares his journey from the mobile industry to becoming a leader in cybersecurity. He discusses the critical intersection of mobility and cybersecurity, the ongoing challenges in securing mobile communications, and the importance of secure communication applications. Gregg emphasizes the need for enhanced security measures for executives and the complexities of implementing zero trust solutions in organizations. He also highlights the workforce shortage in cybersecurity and the importance of training the next generation of professionals. The conversation concludes with insights on community involvement and the role of nonprofits in advancing cybersecurity efforts. Chapters 00:00 Introduction to Cybersecurity Journey 02:46 The Intersection of Mobility and Cybersecurity 05:48 Challenges in Mobile Communication Security 09:07 The State of Secure Communication Apps 12:13 Enhancing Communication Security for Executives 14:58 Government Communication Security Practices 18:02 The Complexity of Cybersecurity Solutions 21:11 Implementing Zero Trust in Organizations 23:57 Protecting Critical Infrastructure 26:46 The Workforce Shortage in Cybersecurity 30:00 Training the Next Generation of Cybersecurity Professionals 32:50 Community Involvement and Philanthropy in Cybersecurity 36:12 The Role of Nonprofits in Cybersecurity 39:07 Advice for Small Vendors Seeking Government Contracts 41:57 Conclusion and Future Outlook

  10. 58

    Hacking for Good: Inside the World of a Top Microsoft Security Researcher

    Summary In this conversation, Dr. Nestori Sinema discusses his extensive academic background and ongoing pursuit of knowledge in the field of cybersecurity. He shares insights on the importance of formal education versus certifications, the life of a vulnerability researcher, and the role of AI in cybersecurity. The conversation also touches on collaboration within the research community and offers advice for those looking to start a career in ethical hacking. Takeaways Continuous learning is essential in cybersecurity. Formal education provides a foundation, but certifications validate skills. Persistence is key to completing a PhD. AI can enhance vulnerability research but also introduces new challenges. Collaboration among researchers is vital for knowledge sharing. Ethical considerations are crucial in cybersecurity practices. Bug bounty programs can be lucrative for researchers. Networking at conferences can lead to valuable connections. Documenting findings helps others learn and replicate successes. The cybersecurity field is constantly evolving, requiring adaptability. Timeline: 00:00 - 03:44: Introduction and Dr. Syynimaa's educational background 03:45 - 06:24: Discussion on the drive behind pursuing multiple degrees and PhDs 06:25 - 09:57: Explanation of Microsoft's Most Valuable Researcher (MVR) designation 09:58 - 13:54: Insights into the process of finding vulnerabilities in software 13:55 - 18:47: Detailed explanation of how researchers manipulate software inputs to find bugs 18:48 - 22:31: Discussion on the potential role of AI in vulnerability research 22:32 - 28:26: The challenges of measuring success in security research 28:27 - 33:05: Bug bounty programs and the economics of vulnerability research 33:06 - 38:42: The ethics of hacking and the importance of responsible disclosure 38:43 - 43:14: Dr. Syynimaa's experience as a CIO managing large infrastructure 43:15 - 48:15: The collaborative nature of the security research community 48:16 - 55:00: Discussion on bug bounty payouts and full-time vulnerability hunting 55:01 - 59:26: Advice for aspiring security researchers and available resources 59:27 - 1:04:26: The balance between ethical hacking and black market vulnerability sales 1:04:27 - 1:07:17: Closing thoughts and contact information

  11. 57

    AI and Cybersecurity: A Double-Edged Sword

    In this conversation, Lemon Williams shares his journey from a failed career in trading to becoming a prominent figure in cybersecurity. He discusses the evolution of cybersecurity, the importance of understanding risk, and the role of emotional intelligence in decision-making. Williams emphasizes the significance of critical infrastructure and the challenges posed by legacy systems. He also explores the impact of AI and IoT on cybersecurity, advocating for a return to basic security principles while navigating the complexities of modern technology. Takeaways Lemon transitioned from trading to IT due to a lack of success in finance. Cybersecurity emerged as a critical field post-9/11, reshaping industry standards. Understanding risk is essential in both trading and cybersecurity. Emotional intelligence plays a crucial role in cybersecurity decision-making. Finding purpose in cybersecurity can stem from early experiences and contributions. Critical infrastructure is vital for national security and daily life. Legacy systems pose significant challenges to modern cybersecurity efforts. The future of operational technology is evolving with new security demands. AI presents both opportunities and threats in the cybersecurity landscape. Returning to basic security principles is essential in addressing new challenges. Chapters 00:00 From Trading to Cybersecurity: A Journey Unplanned 04:57 Understanding Risk: Lessons from Commodity Trading 09:49 The Evolution of Cybersecurity: A Growing Necessity 14:42 Critical Infrastructure: The Backbone of Society 19:33 Legacy Systems and Modern Challenges 24:43 The Impact of AI on Cybersecurity 29:29 Navigating the Internet of Things and Security 34:30 The Future of Cybersecurity: Balancing Innovation and Risk

  12. 56

    From Resumes to Pitch Decks: Crafting Compelling Stories for Career and Startup Success

    Scott Nichols, a certified master resume writer turned pitch deck expert, shares his journey from the construction industry to helping job seekers and startups tell their stories effectively. In this insightful podcast, Scott reveals the secrets behind creating standout resumes and pitch decks, discussing the similarities between the two and offering valuable advice for both job seekers and startup founders. Learn about the art of strategic storytelling, the importance of personal branding, and how to capture the attention of recruiters and investors in today's competitive landscape. 00:00 Scott Nichols' Journey to Founding Velocity 02:51 The Evolution of Resume Writing 06:05 The Impact of AI on Resumes 08:58 Networking vs. Online Applications 11:47 The Resume Writing Competition 14:50 Transitioning to Pitch Decks 17:45 Crafting an Effective Pitch Deck 21:03 The Role of Team Dynamics in Startups 24:06 Navigating Complex Ideas in Pitch Decks 26:49 The Importance of Personal Branding 29:58 Onboarding and Working with Clients 32:58 Preparing for Pitch Presentations 35:58 Future of Pitch Writing and Certifications

  13. 55

    Navigating Cybersecurity and Leadership with Gene Yoo

    Dive into an engaging conversation with Gene Yoo, CEO and founder of ReSecurity, as he shares his unique journey from IT professional to cybersecurity leader. Discover how his diverse career path, lessons from high-profile breaches, and a commitment to understanding business needs have shaped his approach to building a successful company. Explore the balance between technology and human-centric leadership, the impact of AI in cybersecurity, and practical advice for protecting organizations in an ever-evolving threat landscape. Whether you're a seasoned professional or new to the field, Gene's insights offer valuable perspectives on the intersection of business, technology, and security. Chapters 00:00 Journey to Founding Re-Security 04:54 The Importance of Interpersonal Skills in Cybersecurity 10:09 Navigating the Cybersecurity Landscape Post 9/11 15:11 The Role of National Security in Cybersecurity 20:04 Building Company Culture and Trust 25:06 Transitioning from IT to Executive Leadership 29:58 The Future of Cybersecurity and AI 35:06 Understanding Threats and Risk Management 39:53 The Human Element in Cybersecurity 44:51 Regulatory Pressures and Compliance in Cybersecurity

  14. 54

    From Linux to Cybersecurity: Navigating the Tech Maze with Bill Totman

    In this engaging conversation, David Raviv interviews Bill Totman, a seasoned cybersecurity professional. They discuss Bill's journey from early Linux days to becoming a sales engineer in the cybersecurity field. The conversation covers various aspects of the tech industry, including product development, sales strategies, and the challenges of staying ahead in a rapidly evolving field. Bill shares insightful anecdotes from his career, discussing the intricacies of network security, the importance of building relationships in sales, and the potential impact of AI on the industry. Timeline: 00:00 - Introduction and Bill's early career in technology 05:00 - Transition to cybersecurity and early experiences 15:00 - Discussion on the evolution of network security 25:00 - Sales engineering experiences and challenges 40:00 - Insights on product development and customer relationships 55:00 - Exploration of emerging technologies in cybersecurity 01:15 - Closing thoughts on AI and the future of sales engineering 01:30 - Conclusion #Cybersecurity #SalesEngineering #TechIndustry #NetworkSecurity #AI #ProductDevelopment #Linux #CareerJourney #TechnologyTrends #CustomerRelationships

  15. 53

    Discover how Europe's trillion-dollar tech gap is reshaping global innovation and what it means for the future of AI and cloud computing.

    Discover how Europe's trillion-dollar tech gap is reshaping global innovation and what it means for the future of AI and cloud computing. In this eye-opening episode, Fredrik Erixon , founder of the European Centre for International Political Economy, discusses the EU's significant underinvestment in cloud computing and AI technologies. He explores the reasons behind Europe's technological lag, the potential consequences for global competitiveness, and possible strategies for bridging the gap. Erixon offers unique insights into the challenges of implementing change in mature democracies and the importance of fostering innovation in a rapidly evolving technological landscape. Timeline: 00:00:00 - Introduction and Fredrik Erixon's background 00:09:00 - Discussion on technological change and its impact on society 00:20:00 - The challenges of implementing change in mature democracies 00:28:00 - Overview of the EU's trillion-dollar gap in ICT and cloud computing capacities 00:37:00 - The importance of AI adoption and its economic impact 00:45:00 - Cloud free trade approach and challenges for European cloud providers 00:52:00 - Future outlook and potential opportunities for European innovation 00:56:00 - Closing remarks and contact information

  16. 52

    From Spy to CISO: Navigating the Cybersecurity Leadership Landscape

    Discover how a former CIA operative transformed into a top-tier CISO, and learn the insider secrets to climbing the cybersecurity career ladder. In this enlightening podcast episode, host David Raviv interviews Ross Young, a seasoned cybersecurity expert with a fascinating background in intelligence agencies and corporate leadership. Ross shares his journey from the NSA and CIA to becoming a successful CISO, offering valuable insights into the evolving role of cybersecurity leaders. The conversation covers a wide range of topics, including the transition from government to private sector, the challenges of managing cybersecurity teams, and the importance of building relationships in the industry. Ross also discusses the ethical considerations for CISOs, the trend of virtual CISOs, and the potential impact of AI on the role. This episode is a must-listen for aspiring cybersecurity professionals and current leaders looking to enhance their skills and understanding of the field. Timelines: 0:00 - Introduction and background 7:24 - Transition from government to private sector 10:11 - Evolution from individual contributor to management 18:53 - The changing role of CISOs 29:26 - Enabling business through security 34:39 - Ethics and transparency in CISO roles 42:07 - Discussion on virtual CISOs 46:01 - The future of CISOs and AI 47:22 - Closing remarks and contact information

  17. 51

    Digital Armageddon: Unmasking the Cyber Security Crisis

    In this explosive podcast, cyber security expert Andy Jenkinson exposes the alarming vulnerabilities in our digital infrastructure, revealing how governments, tech giants, and cybercriminals are playing a dangerous game with our data and lives. Andy Jenkinson, a leading figure in cyber security, takes listeners on a chilling journey through the hidden dangers of our interconnected world. From NATO's cyber attack vulnerabilities to the shocking insecurities in critical infrastructure, Jenkinson unveils how digital certificates and DNS mismanagement are leaving us all exposed. He shares startling stories of government agencies, major corporations, and even nuclear facilities operating with gaping security holes. Jenkinson doesn't pull punches, calling out the complacency, incompetence, and sometimes willful ignorance of those tasked with protecting our digital assets. He exposes the conflicts of interest between tech giants, governments, and cybercriminals, painting a picture of a world where surveillance and profit often trump security. The conversation takes a sobering turn as Jenkinson discusses the implications of AI and quantum computing on cyber security, warning that we're repeating the same mistakes of prioritizing functionality over security. He leaves listeners with a stark message: our digital world is on fire, and unless we act now, the consequences could be catastrophic. Timelines: 00:00:00 - Introduction and background 00:07:10 - Explanation of digital certificates and PKI 00:26:33 - Discussion on DNS and internet security vulnerabilities 00:41:17 - Stories of government and corporate security failures 01:08:04 - Insights on surveillance and privacy issues 01:21:07 - The shift to cloud services and its security implications 01:25:10 - AI, quantum computing, and future cyber security challenges 01:33:53 - Closing remarks and contact information #cyber security #digital certificates #DNS #surveillance #AI #quantum computing #government agencies #tech giants #cybercrime #data privacy #critical infrastructure #insider trading #whistleblowing

  18. 50

    The AI Bubble: Separating Hype from Reality with Dr. Jeffrey Funk

    Is AI really revolutionizing industries, or are we in the midst of another tech bubble? Dr. Jeffrey Funk, a technology expert with decades of experience, shares his contrarian views on the current AI hype and what it means for the future of innovation. In this eye-opening conversation, Dr. Jeffrey Funk, author of the upcoming book "The Hype Handbook: How to Separate Technology's Promises from Its Commercial Realities," discusses the current state of AI and tech innovation. Drawing from his extensive experience in technology assessment, Dr. Funk challenges popular narratives about AI's impact and offers a sobering perspective on the gap between promises and reality in the tech world. From the evolution of his views on technology to insights on research, startups, and the future of AI, this episode provides a thought-provoking look at the tech landscape. Timeline: 00:00 - Introduction and Dr. Funk's background 05:30 - The evolution from tech optimist to skeptic 10:45 - Discussion on AI hype and reality 15:30 - Insights on startup valuations and VC funding 22:15 - The state of innovation and research 30:00 - AI's potential impact on jobs and productivity 38:45 - Challenges in AI development and implementation 45:30 - The role of regulation in AI 52:00 - Future directions for AI and tech innovation 58:45 - Discussion of Dr. Funk's upcoming book 01:09:18 - Conclusion

  19. 49

    From Army Comms to AI Threats: Dr. Georgianna Shea Decodes Cybersecurity's Critical Frontiers

    From military communications to defending against cyber warfare, Dr. Georgianna (George) Shea reveals how our digital world is both more connected and more vulnerable than we realize. Discover the intricate world of cybersecurity with Dr. Georgianna Shea, a cybersecurity expert with a fascinating journey from Army communications specialist to critical infrastructure protection. In this eye-opening episode, Dr. Shea delves into the complexities of protecting our interconnected world, from the vulnerabilities in medical devices to the potential risks of artificial intelligence. Episode Timeline: 00:00 - 02:30: Introduction and Dr. Shea's background 02:31 - 08:00: Military experience and transition to civilian life 08:01 - 15:30: Dr. Shea's academic journey 15:31 - 22:00: Critical infrastructure and cybersecurity 22:01 - 28:30: Cyber warfare and geopolitical conflicts 28:31 - 34:00: Software Bill of Materials (SBOM) and device security 34:01 - 38:30: Artificial Intelligence and cybersecurity 38:31 - 45:00: Government policies and cybersecurity progress 45:01 - 50:00: AI and privacy concerns 50:01 - 55:00: Compliance regulations and government role 55:01 - 60:00: Positive developments in cybersecurity 60:01 - 61:24: Closing remarks and contact information

  20. 48

    Accidental Tech Enthusiast to Cloud Solutions Expert: Kevin Sullivan

    Join us for an insightful conversation with Kevin Sullivan, a seasoned IT professional with over a decade of experience in cloud computing and IT infrastructure. Kevin shares his fascinating journey from a childhood computer mishap to becoming a leading expert in cloud solutions. Discover how businesses can leverage cloud technology to enhance security, productivity, and cost-effectiveness in today's rapidly evolving IT landscape.Kevin offers valuable insights on desktop-as-a-service, unified communications, disaster recovery, and the future of cloud computing. Learn about the challenges and opportunities in modern IT infrastructure, including the impact of remote work, the importance of user experience, and the critical role of security in cloud environments. Episode Highlights: 0:00 - 5:00: Kevin's Tech Journey Learn how a childhood computer mishap sparked Kevin's passion for technology. 5:01 - 10:00: The Evolution of IT Explore the transition from on-premises to cloud solutions and the changing IT landscape. 10:01 - 15:00: Desktop-as-a-Service Explained Understand the benefits and challenges of implementing DaaS in your organization. 15:01 - 20:00: The Importance of Unified Communications Discover how integrating communication tools can boost productivity and user experience. 20:01 - 25:00: Security in the Cloud Era Learn about the security implications of cloud adoption and best practices for protection. 25:01 - 30:00: Disaster Recovery and Business Continuity Explore why a solid recovery plan is crucial for modern businesses. 30:01 - 35:00: The Future of Cloud Computing Hear Kevin's predictions on upcoming trends and technologies in the cloud space. 35:01 - 40:00: Practical Tips for IT Decision Makers Get actionable advice on how to approach cloud adoption and optimization. 40:01 - 45:00: The Human Side of Technology Kevin shares how his background in music influences his approach to IT solutions. 45:01 - 50:00: Closing Thoughts and Resources Learn how to connect with Kevin and Evolve IP for further assistance with cloud solutions.

  21. 47

    Unlock the Secrets of Microsoft Security with MVP Ru Campbell

    Are you ready to master Microsoft's complex security landscape? In this episode, we dive deep into the world of Microsoft security with MVP Ru Campbell. Discover how to leverage Microsoft's powerful tools, navigate the challenges of cloud security, and stay ahead of emerging threats. Whether you're an IT professional or a business owner, you'll gain valuable insights on maximizing your Microsoft investment and protecting your digital assets. Episode Highlights: 0:00 - 5:00: Ru's Journey into Microsoft Security Learn about Ru's path from IT manager to Microsoft security specialist and MVP. 5:01 - 10:00: The Microsoft Security Challenge Explore the complexities of securing Microsoft environments and the importance of conditional access. 10:01 - 15:00: Email Security and Third-Party Solutions Discover the evolving landscape of email security and how AI is transforming threat detection. 15:01 - 20:00: The Complexity of Microsoft Products Understand the security implications of feature-rich applications like Excel and Outlook. 20:01 - 25:00: Staying Up-to-Date with Microsoft Learn Ru's strategies for keeping current with Microsoft's rapidly evolving ecosystem. 25:01 - 30:00: Becoming a Microsoft MVP Get insights on the path to becoming a Microsoft MVP and contributing to the community. 30:01 - 35:00: Threatscape and Microsoft Security Services Explore how Threatscape helps organizations maximize their Microsoft security investments. 35:01 - 40:00: The Future of AI in Microsoft Security Hear Ru's thoughts on Microsoft Copilot and the role of AI in security solutions. Don't miss this opportunity to gain expert insights into Microsoft security. Hit play now and start your journey to a more secure Microsoft environment!

  22. 46

    From Philosophy to Cybersecurity: Yabing Wang's Journey to CISO Excellence

    From philosophy major to cybersecurity leader: Discover how Yabing Wang's unconventional journey and unique perspective are shaping the future of digital defense. Learn how embracing change, continuous learning, and a passion for people can lead to extraordinary success in the ever-evolving tech world. Join us for an inspiring conversation with Yabing Wang, a cybersecurity leader who transitioned from philosophy to tech. Learn how her diverse background shaped her approach to security, her insights on AI's impact, and her advice for aspiring professionals. Yabing shares her journey from individual contributor to CISO, discussing the challenges and triumphs along the way. Get valuable tips on continuous learning, adapting to new technologies, and the importance of passion and strengths in career choices. Timeline Synopsis: 0:00 - Introduction and Yabing's background in philosophy 5:30 - Transition to computer science and early career at Netscape 10:00 - Entry into cybersecurity and first CISO role 15:00 - Balancing technical knowledge with management skills 20:00 - Importance of continuous learning and staying informed 25:00 - Discussion on AI and its impact on cybersecurity 30:00 - Advice for young professionals entering the tech industry 35:00 - The value of mentorship and making an impact 40:00 - Closing thoughts and information on Yabing's book

  23. 45

    From Restaurants to Cybersecurity: A Journey of Adaptation and Expertise with Jim Tiller

    In this episode, David speaks with cybersecurity expert Jim Tiller about his fascinating career journey from aspiring restaurateur to seasoned security professional. The conversation touches on Jim's early exposure to cybersecurity, the evolution of the industry, and the challenges of adapting to new threats. Jim shares valuable insights on the importance of curiosity, hands-on learning, and the necessity of doing the 'boring' foundational work in cybersecurity. They also discuss the role of cyber insurance, the impact of complexity on security, and the importance of understanding and mitigating risks. The episode is rich with practical advice for newcomers and veterans alike in the cybersecurity field. 00:00 Introduction and Guest Welcome 00:06 Jim Taylor's Journey into Cybersecurity 00:40 Early Days in Technology and Security 04:36 The Evolution of Pen Testing 12:38 Human Element in Cybersecurity 18:10 Complexity and Security Challenges 22:37 Approaching Cybersecurity in Organizations 30:36 The Pitfalls of Sophisticated Security 31:08 Incremental Improvements and Measuring Success 32:04 The Importance of Basic Security Policies 32:36 Avoiding Premature Automation and Measurement 33:02 The Ecosystem Approach to Security 33:13 The Unseen Heroes of Security 33:50 The Reality of Security Investments 36:03 The Debt of Security Tools 42:03 Communicating Security Effectively 50:19 The Role of Cyber Insurance 57:41 The Never-Ending Security Projects 01:00:31 Conclusion and Contact Information

  24. 44

    Cybersecurity to Venture Capital: Insights from Adam Bixler

    Join David Raviv and Adam Bixler as they discuss Adam’s journey from early internet technologies and military service to cybersecurity startups and venture capital. Get insights into the evolving cybersecurity landscape, the future of AI, and essential security practices. Perfect for tech enthusiasts and entrepreneurs. Timelines: 00:00 - 05:00: Introduction David introduces Adam Bixler. Adam shares his early experiences at the University of Pittsburgh and involvement with early internet technologies. 05:01 - 10:00: Military Service Adam discusses his decision to join the Air Force through the ROTC program. Insights into how his military service shaped his career and provided unique opportunities. 10:01 - 15:00: Early Career in Technology Adam talks about his early roles in technology, including working on campus infrastructure and with a friend's web development firm. The impact of Pittsburgh’s rich history in ARPANET and cybersecurity on his career. 15:01 - 20:00: Transition to Venture Capital Adam’s journey from military service to venture-backed startups. Forming a team and raising venture capital for the first time in 2012. 20:01 - 25:00: Insights into Cybersecurity Evolution Adam shares his views on the major cybersecurity breaches from 2008 to 2013 and their impact on the industry. The significance of the Target breach in 2013 and its influence on cybersecurity awareness. 25:01 - 30:00: Current Trends in Cybersecurity Discussion on the influx of capital into cybersecurity in 2021 and the subsequent pullback in 2022. Challenges faced by startups in the crowded cybersecurity market. 30:01 - 35:00: Role of AI in Cybersecurity Adam’s perspective on AI technologies in cybersecurity. The potential and current limitations of AI in the industry. 35:01 - 40:00: Investment Strategies and Market Trends How Adam evaluates innovative technology and distinguishes it from enhancements to existing solutions. The importance of solving unique problems in the cybersecurity space. 40:01 - 45:00: Insurance and Managed Services The role of insurance in driving cybersecurity improvements. Pairing insurance with managed services to enhance security for SMBs. 45:01 - 50:00: Closing Thoughts Adam’s final thoughts on the future of cybersecurity and venture capital. How to connect with Adam and follow his work at Squadra Ventures. #Cybersecurity #VentureCapital #Innovation #Podcast #TechIndustry

  25. 43

    Take Back Control: Unveiling the Secrets of Data Privacy with Lawrence Gentilello

    Curious about who has your personal data and how to take it back? Tune in as Lawrence Gentilello, a privacy expert, explains the steps you can take to protect your information online.In this episode, David Raviv talks with Lawrence Gentilello, CEO and co-founder of Optery, about the importance of data privacy. Lawrence shares his journey from working at BlueKai, Oracle, and Accenture to starting Optery after experiencing identity theft. They discuss how data collection has evolved, the impact of privacy laws, and how Optery helps people remove their personal information from data brokers. 00:00:00 Introduction: David welcomes Lawrence Gentilello. 00:01:00 Lawrence's Background: His journey to founding Optery. 00:02:00 Identity Theft: Lawrence’s personal experience and how it inspired Optery. 00:03:00 Data Collection Evolution: How data collection has changed over time. 00:07:00 Privacy Laws: The role of laws like CCPA and GDPR. 00:09:00 Consumer Control: How Optery helps users control their data. 00:14:00 Practical Tips: Using temporary addresses and disposable emails. 00:22:00 Regulatory Compliance: Challenges with data brokers and state laws. 00:28:00 Opting Out: How Optery simplifies the opt-out process. 00:32:00 Data Breaches: The impact on personal information security. 00:45:00 Future of Privacy: Potential for federal privacy laws. 00:51:00 Sign-Up Process: How to use Optery and its benefits. 00:54:00 Conclusion: Final thoughts on protecting your personal data. This episode gives you practical advice on protecting your data and insights into the world of online privacy.

  26. 42

    From Hacker to Hero: Unveiling the Mind of Cybersecurity Expert Robert Hansen

    Ever wondered how a top hacker visualizes and secures complex systems? Join us as Robert Hanson reveals his journey, groundbreaking techniques, and the future of AI in cybersecurity. Don't miss this deep dive into the mind of a true cybersecurity pioneer! In this engaging podcast episode, cybersecurity veteran Robert Hansen joins host David Raviv to explore the fascinating world of hacking, security, and the future of AI. With over 28 years in the field, Robert shares his journey from running hackers.org to developing groundbreaking security techniques and co-founding BitDiscovery. They delve into Robert's unique ability to visualize and reverse-engineer complex systems, the evolution of hacking methodologies, and the critical importance of economic friction in cybersecurity. The conversation takes a thought-provoking turn as they discuss the potential risks and ethical considerations of AI advancements, emphasizing the need for data sovereignty and robust security measures in an increasingly interconnected world. #Cybersecurity #Hacking #AI #TechInnovation #DataSecurity #Podcast #RobertHansen #CyberRisk #FutureTech #InfoSec #Technology #Innovation #Security #PodcastEpisode

  27. 41

    Navigating the Tech Frontier: Insights from a Channel and Cybersecurity Veteran

    In a world where technology evolves at lightning speed, how do industry leaders stay ahead? Tune in as John Mannion reveals the secrets to success in channel partnerships and cybersecurity, and learn why relationships still matter in our increasingly digital world Join host David Raviv as he sits down with John Mannion, a seasoned professional in the telecom and cybersecurity industries. In this insightful conversation, John shares his experiences navigating the evolving landscape of channel partnerships, discusses the challenges and opportunities in the cybersecurity market, and offers valuable insights on adapting to technological changes. From the importance of relationship-building to the impact of automation, this episode provides a comprehensive look at the current state and future of the tech industry.

  28. 40

    Cybersecurity Evolution and the Future of Data: A Deep Dive with Gio Pecora

    Join us as we explore the pivotal moments in cybersecurity with Gio Pecora, a visionary expert who has worked with NATO and the European Space Agency. Discover how Gio is tackling some of the biggest challenges in the tech industry today, from data gravity to the ethics of AI, and what the future holds for cybersecurity and data management. In this engaging podcast episode, we sit down with Gio Pecora, a cybersecurity expert with a rich background working with prestigious organizations such as NATO and the European Space Agency. The conversation delves into pivotal moments that shaped Gio's career and the broader cybersecurity landscape. Starting with his early experiences in government roles, Gio recounts the evolution of cybersecurity from the early 2000s to the present day, highlighting the shift towards threat intelligence and the importance of actionable intelligence. Gio shares insights into how AI is revolutionizing data management and cybersecurity. He discusses the challenges of data gravity and the need for sustainable tech solutions to manage the ever-increasing volume of data. The conversation also touches on the potential impacts of quantum computing on cybersecurity, exploring both the opportunities and the threats it presents. A significant portion of the discussion is dedicated to the ethics of AI, emphasizing the importance of developing unbiased AI models and the dangers of AI poisoning. Gio advocates for a more personalized approach to AI, where models are tailored to specific industries and needs, ensuring more reliable and actionable outputs. Gio's vision for the future is one of optimism. He believes that technology, when used wisely, can address some of the most pressing challenges facing society today. The conversation concludes with Gio's thoughts on the future of leadership in the tech industry, stressing the need for human intuition and creativity alongside technological advancements. Time stamps: This episode offers a deep dive into the current and future state of cybersecurity and data management, providing listeners with valuable insights from one of the industry's leading voices. 00:00 - 00:05 Introduction and Background. Gio Pecora's introduction and current focus areas. 00:06 - 01:00 Pivotal Moments in Cybersecurity. Key experiences and transformative projects Gio has worked on in cybersecurity. 01:01 - 04:25 Early Days and Evolution of Cybersecurity. Gio's journey from government roles to leading cybersecurity initiatives and the shift towards threat intelligence. 04:26 - 10:00 Actionable Intelligence in Cybersecurity. Importance of actionable intelligence and how it has shaped cybersecurity operations. 10:01 - 20:15 The Impact of AI on Data and Security. Discussion on AI's role in managing data gravity and enhancing cybersecurity measures. 20:16 - 35:45 Future of Data Storage and Sustainability. Innovations in data storage, reducing energy consumption, and sustainable tech solutions. 35:46 - 50:55 Quantum Computing and Cybersecurity. Potential impacts of quantum computing on cybersecurity and data management. 50:56 - 60:30 Ethics and AI in Tech Development. The ethical considerations and challenges in the development and deployment of AI technologies. 60:31 - 70:45 Vision for the Future. Gio's optimistic outlook on technology's role in solving big societal challenges and enhancing human potential.

  29. 39

    Dmitri Alperovitch - Navigating the Cybersecurity Landscape and Beyond

    What do a high school encryption startup, the founding of a cybersecurity giant, and the next Cold War have in common? Join us as Dmitri Alperovitch, co-founder of CrowdStrike, reveals the fascinating connections and critical insights that could redefine our approach to cybersecurity and national security. From thwarting nation-state hackers to predicting geopolitical conflicts, this is one conversation you can't afford to miss! Gain insights into his groundbreaking work and the future of cybersecurity in a rapidly evolving digital landscape. **Title:** From CrowdStrike to Global Security: A Conversation with Dmitri Alperovitch 00:00 - 00:03 Introduction: Dmitri Alperovitch's background and significant contributions to cybersecurity. 00:03 - 00:06 Early Beginnings: Dmitri's immigration journey and early entrepreneurial ventures in encryption software. 00:06 - 00:09 The Founding of CrowdStrike: Insights into the motivation and circumstances that led to the creation of CrowdStrike. 00:09 - 00:13 Success Factors: Discussion on the factors that propelled CrowdStrike to become a leading cybersecurity company. 00:13 - 00:18 Nation State Threats: Exploring the challenges of nation state cyber intrusions and the importance of attribution in cybersecurity. 00:18 - 00:22 Operational Challenges: Dmitri's experiences with high-profile cyber incidents, including Operation Aurora and the Sony Pictures hack. 00:22 - 00:26 Advanced Persistent Threats (APT): Understanding APTs and the shift from prevention to detection and response in cybersecurity. 00:26 - 00:29 Intellectual Property and Cybersecurity: The impact of cyber threats on intellectual property and the strategic importance of cybersecurity in protecting trade secrets. 00:29 - 00:32 Nation State Cyber Attacks: The complexities of nation state cyber operations and their implications for global security. 00:32 - 00:35 Public and Private Sector Collaboration: The role of private companies and government agencies in strengthening cybersecurity defenses. 00:35 - 00:38 Geopolitical Implications: The role of cybersecurity in geopolitical conflicts and the lessons learned from the Ukrainian conflict. 00:38 - 00:41 Economic Warfare: The economic strategies employed by nation states in cyber warfare and their impact on global markets. 00:41 - 00:44 Future of Cybersecurity: Predictions and recommendations for addressing emerging cybersecurity threats and challenges. 00:44 - 00:47 Technology Race: The importance of winning the technology race in AI, biotech, aerospace, and green energy to maintain national security. 00:47 - 00:50 China and the Cold War: Exploring the new Cold War with China and the strategic steps needed to safeguard national interests. 00:50 - 00:54 Call to Action: Encouraging individuals and companies to take proactive steps in cybersecurity and national security. 00:54 - 00:56 Conclusion: Information on how to obtain Dmitri's book "World on the Brink" and closing remarks.

  30. 38

    From MMO RPGs to Cybersecurity Mastery

    Dive into the fascinating journey of Kyle Kelly, a cybersecurity expert who turned his childhood obsession with video games into a thriving career. Discover the hidden connections between gaming and cybersecurity, the complexities of software supply chain security, and the future of tech innovations. 00:00 - 00:03 Introduction and Early Days: Kyle Kelly discusses his initial journey into cybersecurity through video games, specifically MMO RPGs, and how his interest in automating game functions led to a deeper understanding of systems and security. 00:03 - 00:06 Gaming Influence: Kyle shares insights on how video games influenced his cybersecurity skills, including his experiences with bot development and the darker side of gaming communities. 00:06 - 00:09 Parental Perspective on Gaming: The discussion shifts to the impact of gaming on children and how it can spark interest in technical fields. Kyle reflects on his personal journey and the generational differences in gaming habits. 00:09 - 00:13 Professional Gaming and Indie Development: The conversation explores the viability of professional gaming careers and the growth of indie game development, highlighting Kyle's thoughts on the evolution of the gaming industry. 00:15 - 00:18 Current Role and Projects: Kyle outlines his current roles, including his work as an executive consultant at BankSec, his involvement with Semgrup in software supply chain security, and his personal project, Crime Hacks. 00:18 - 00:22 Software Supply Chain Security: A deep dive into the issues surrounding software supply chain security, the use of open source code, and the vulnerabilities associated with it. Kyle explains the importance of being mindful of dependencies. 00:22 - 00:25 Malicious Dependencies: Kyle discusses the risks posed by malicious dependencies in software development and the need for better tools and practices to detect and mitigate these threats. 00:25 - 00:29 Responsibilities and Best Practices: The conversation covers who should be responsible for ensuring software security, the role of developers, and the importance of continuous monitoring and updating of dependencies. 00:29 - 00:34 Future of Software Development: Kyle predicts the future of software development, touching on the potential impact of AI and no-code solutions on the industry and the need for innovative security measures. 00:34 - 00:38 Case Studies and Real-World Examples: Kyle shares examples of recent security incidents related to software supply chain vulnerabilities, highlighting the real-world implications of these threats. 00:38 - 00:42 SBOM and Industry Policies: The discussion turns to the Software Bill of Materials (SBOM), its importance, and the challenges companies face in implementing and utilizing SBOM effectively. 00:42 - 00:46 Tools and Solutions: Kyle talks about various tools and solutions available for improving software security, including fuzzing and static code analysis, and the role these tools play in the development process. 00:46 - 00:49 Ethical Dilemmas in Security: The conversation delves into the ethical challenges faced by developers and organizations when dealing with security vulnerabilities and policy compliance. 00:49 - 00:55 The Role of No-Code Development: Kyle discusses the potential of no-code development platforms to enhance software security and efficiency, while also considering the risks associated with widespread adoption. 00:55 - 00:56 Closing Remarks: The interview concludes with Kyle sharing his contact information, encouraging listeners to connect with him on LinkedIn and subscribe to his newsletter, Crime Hacks. #Cybersecurity #GamingToTech #SupplyChainSecurity #OpenSourceRisks #FutureOfTech

  31. 37

    Unlocking Leadership Excellence: A Deep Dive with Justin McCorkle

    What does it take to become a truly exceptional leader? How can you transform your organization and achieve lasting success? Join me as Justin McCorkle shares his profound insights and personal journey, revealing the secrets to navigating challenges, fostering a thriving culture, and making a powerful impact. Don't miss this captivating conversation that could change the way you lead. In this episode of "Unscripted," David sits down with Justin McCorkle to uncover the secrets behind his successful career as a strategic security advisor and business coach. Justin shares his personal journey, from reading influential books like "10X is Easier than 2X" to making bold career moves that align with his unique strengths. Learn how he helps executive teams define strategy, create a strong organizational culture, and achieve long-term success. This episode is packed with valuable insights for anyone looking to improve their leadership skills, enhance their organizational effectiveness, and lead a more fulfilling professional life. 0:00 - Introduction and Justin's Background David introduces Justin McCorkle, highlighting his extensive experience and current role. Justin shares his journey and the impact of reading "10X is Easier than 2X." 1:00 - The Importance of Unique Contribution Justin discusses the importance of identifying what is uniquely you and how it has shaped his career path. 4:00 - Overcoming Implementation Challenges David and Justin delve into the common struggles people face when trying to implement self-help strategies and how to overcome them. 8:00 - Viewing Life as a Video Game Justin shares his philosophy on approaching life and career like a video game, emphasizing the importance of taking risks and learning from failures. 13:00 - Working with Executive Teams Justin explains his process of helping executive teams set and accomplish strategy, focusing on both system improvements and cultural development. 19:00 - Peer Accountability and Conflict Resolution Justin highlights the role of peer accountability in executive teams and shares a recent example of facilitating a difficult conversation to resolve internal conflicts. 24:00 - Ensuring Long-Term Impact David asks how Justin ensures that the impact of his sessions with clients continues beyond the initial engagement. Justin talks about the importance of regular follow-ups and peer accountability. 30:00 - Putting People First Justin emphasizes the importance of investing in people and building a positive organizational culture, especially in challenging economic times. 36:00 - Navigating the Gig Economy David and Justin discuss the impact of the gig economy on organizational culture and how employers can still foster strong relationships with their teams. 42:00 - Continuous Improvement and Growth Justin talks about the importance of continuous personal and professional growth and how leaders can keep evolving to better serve their organizations. 49:00 - Final Advice for Leaders Justin shares profound advice on being inwardly sound and others-focused, stressing the importance of human dignity in leadership. 52:00 - Conclusion and Contact Information David wraps up the episode, thanking Justin for his insights and sharing how listeners can contact Justin for further engagement.

  32. 36

    Inside the Mind of the Original Internet Godfather: Brett Johnson Unveils Cybercrime Secrets

    What drives a man to commit 39 felonies and become the 'Original Internet Godfather'? Join us as Brett Johnson reveals his journey from cybercrime mastermind to cybersecurity advocate, sharing insights that will change how you see the digital world. In this gripping episode of Unscripted, David Raviv interviews Brett Johnson, infamously known as the "Original Internet Godfather." Brett shares his journey from committing 39 felonies and running the first organized cybercrime community, ShadowCrew, to his transformative path toward becoming a cybersecurity expert. Through candid anecdotes, Brett discusses his troubled upbringing, the evolution of cybercrime, and the lessons he learned along the way. This conversation offers a rare glimpse into the mind of a former top cybercriminal and provides valuable insights for anyone interested in cybersecurity, crime prevention, and personal redemption.

  33. 35

    Mailroom to Cybersecurity Chief: Jason Lewkowicz's Unscripted Journey

    Can starting in the mailroom lead to becoming a top cybersecurity executive? Join us as Jason Lewkowicz shares his incredible journey from the bottom rung to Chief Services Officer at Optiv, revealing insights that redefine career success in the digital age In this episode of Unscripted, David Raviv sits down with Jason Lewkowicz, a senior cybersecurity professional at Optiv, to discuss his unconventional career path. Jason shares his story of starting in the mailroom at Anderson Consulting and rising to become Optiv’s Chief Services Officer. He discusses the evolution of cyber threats, the importance of continuous learning, and the challenges faced by organizations today. Jason also offers practical advice for those looking to enter the cybersecurity field, emphasizing the importance of perseverance, mentorship, and strategic career planning. This episode is a must-watch for anyone interested in cybersecurity, career growth, and leadership. 00:00 - 02:00: Introduction and Welcome David introduces Jason Lewkowicz, highlighting his role as a senior cybersecurity professional at Optiv. 02:01 - 07:00: Early Career and Mailroom Experience Jason shares his journey from starting in the mailroom at Anderson Consulting to moving into IT and cybersecurity. 07:01 - 14:00: Transition to IT and Security Jason discusses his transition from the mailroom to the IT department, and how he first became interested in cybersecurity during the Melissa virus incident. 14:01 - 20:00: Building a Career in Cybersecurity Jason explains how he progressed within Accenture, his role in creating the information security program, and the importance of mentorship. 20:01 - 27:00: Challenges and Growth at Cognizant Jason recounts his experience joining Cognizant as CISO during the Maze breach and the challenges of managing a large-scale incident during the pandemic. 27:01 - 33:00: Moving to Optiv and Strategic Leadership Jason talks about his move to Optiv, his role in consolidating services, and the importance of operational efficiency and client experience. 33:01 - 40:00: Advice for Aspiring Cybersecurity Professionals Jason offers advice on how to start a career in cybersecurity, emphasizing the value of project management and incident response roles. 40:01 - 46:00: Importance of Continuous Learning Jason discusses the need for continuous learning and how staying updated with the latest technologies and trends is crucial in cybersecurity. 46:01 - 53:00: The Role of Communication in Cybersecurity Jason highlights the importance of effective communication between CIOs and CISOs and how it impacts the success of cybersecurity programs. 53:01 - 59:00: Engaging with Clients and Providing Value Jason explains how Optiv works with clients to understand their needs, manage expectations, and deliver world-class cybersecurity services. 59:01 - End: Final Thoughts and Contact Information David and Jason wrap up the discussion, with Jason providing his contact information and encouraging viewers to connect with him on LinkedIn for further insights.

  34. 34

    Mastering the Cybersecurity Game: Insights from William Wallace

    In this podcast episode, cybersecurity expert William Wallace shared profound insights into the cybersecurity landscape and the demands of the profession. Emphasizing the importance of dedication and proactive learning, William explained that success in cybersecurity is not just about passing exams or achieving certifications; it involves a deep commitment to understanding and tackling complex security challenges. He highlighted the pivotal role of foundational IT experience, such as his own in help desk roles, which equipped him with essential problem-solving skills critical for cybersecurity tasks. William also touched on the evolving threats in the cybersecurity field, noting the increasing sophistication of attacks and the importance of staying ahead through continuous learning and adaptation. His journey from an early fascination with malware on old operating systems to leading sophisticated cybersecurity initiatives serves as a testament to the dynamic and demanding nature of the field, which requires constant innovation and a forward-thinking approach. Here’s a timeline of the key points discussed in the podcast with William Wallace: 00:00:09 - Introduction and initial questions about the viability of entering the cybersecurity field in 2024. 00:01:00 - William discusses the necessity of putting in substantial effort and starting in IT to build a foundational understanding necessary for a cybersecurity career. 00:04:00 - He elaborates on the additional steps required to excel in cybersecurity beyond basic certifications, highlighting the importance of practical experience and personal initiative. 00:10:12 - Discussion on the unique challenges posed by cybersecurity threats and the need for constant updating of skills due to the fast pace of technological change. 00:15:00 - William shares his personal motivation and early influences that led him to a career in cybersecurity. 00:20:15 - He stresses the importance of learning from community and competitive engagements like National Cyber League to hone skills. 00:25:22 - William talks about his role in leading security workshops and the supportive nature of the cybersecurity community. 00:30:19 - Emphasis on the significance of self-driven problem-solving skills and the limitations of traditional educational approaches in fostering these skills in cybersecurity. 00:35:19 - Discussion on the importance of real-world application of skills and the impact of automation and advanced cybersecurity measures in professional settings. 00:40:31 - William underscores the ongoing challenges in cybersecurity despite advancements, highlighting the persistent issues of social engineering and lack of adherence to best practices.

  35. 33

    Secure the Code: Unveiling the Hidden Ingredients of Software

    Ever wondered what's really inside the software you use? Marc Frankel sheds light on why knowing the 'ingredients' of your software is not just important, it's essential for security!" Join us on "Unscripted" for an insightful discussion with Marc Frankel , CEO and co-founder of Manifest, as we delve into the critical world of software transparency and security. Marc shares his journey from finance to pioneering software supply chain risk solutions, highlighting the vital need for Software Bill of Materials (SBOM). Discover how understanding the 'ingredients' of software can protect enterprises from vulnerabilities like Log4Shell and improve national cybersecurity posture. Learn why SBOMs are crucial, the impact of regulatory changes, and how companies can navigate these new requirements to ensure a safer digital future. #CyberSecurity #SoftwareTransparency #SBOM #DigitalSafety #UnscriptedPodcast

  36. 32

    Mastering the Cybersecurity Labyrinth: Laura Laura Whitt-Winyard Journey from Ground Zero to Global Leadership

    Ever wondered what it takes to rise to the top in the high-stakes world of cybersecurity? Tune in as Laura Whitt-Winyard reveals the challenges and triumphs of her career, and how she shaped the security landscapes of major corporations across the globe. In this episode of "Unscripted," where we dive deep with Laura Wittner, a seasoned cybersecurity expert whose career spans from the early uncertainties of the post-Y2K era to leading international security initiatives. Laura shares her unique insights and experiences, detailing her ascent from an enthusiastic beginner to a respected global Chief Information Security Officer (CISO). Discover how she navigated the complex world of cybersecurity, tackled gender norms in a predominantly male field, and managed to stay passionate amidst the industry's notorious burnout rates. Whether you're a budding professional or a seasoned expert, Laura's journey offers valuable lessons and inspiration for anyone interested in the dynamics of leadership and the evolution of cybersecurity practices. #CybersecurityLeadership #WomenInTech #CareerJourney #InfoSecInsights #TechLeadership XGsvFIdFdmkvoA6N7juA

  37. 31

    Breaking the Mold: A CISO's Take on Embracing Vendors and Transforming Cybersecurity Relationships

    Join us as Brent Deterding, a seasoned CISO with a unique perspective from his 19 years on the vendor side, dives deep into the dynamics of vendor relationships in cybersecurity. In this enlightening discussion, Brent shares his journey from operations to sales and finally to a CISO role, explaining how empathy and human connections can transform business interactions into successful partnerships. Discover why he loves being a CISO, how he handles vendor interactions differently, and why relationships still matter in the high-stakes world of cybersecurity. Brent challenges the traditional vendor-CISO dynamics and provides practical insights on cultivating meaningful connections that benefit both sides. Whether you’re a budding cybersecurity professional or a seasoned executive, this conversation offers valuable lessons on leadership, vendor management, and the human aspects of cybersecurity. #CyberSecurity #Leadership #VendorManagement #CISO

  38. 30

    Unscripted: Securing Success: A Recruiter's Insider Guide to Cybersecurity Careers

    In this insightful episode of "Unscripted," host David converses with Al Lerberg, a seasoned recruiter specializing in cybersecurity. The discussion begins with Al journey into the recruitment industry, emphasizing the pivotal moment in 2009 when cybersecurity was barely more than a buzzword. Albe's foresight to specialize in this nascent field propelled his career forward, enabling him to match skilled individuals with critical roles in defense, government, and Fortune 500 companies. As the conversation unfolds, Albe shares invaluable insights into the world of cybersecurity recruitment. He discusses the importance of specializing in a niche, the challenges of distinguishing oneself in a crowded market, and the intricate dynamics between recruiters, candidates, and companies. Al stresses the significance of understanding specific industry needs, speaking the language of cybersecurity, and the pivotal role recruiters play in bridging the gap between talented individuals and the organizations that need them. The episode also delves into the nuances of the recruitment process, offering a behind-the-scenes look at what companies seek in candidates and the common pitfalls that applicants should avoid. Al emphasizes the need for candidates to showcase their expertise and fit for a role, beyond just technical skills. The discussion highlights how the recruitment landscape has evolved, with the introduction of AI and machine learning, and offers predictions on future trends in cybersecurity employment. #CybersecurityCareers #RecruitmentInsights #SecuringSuccess #UnscriptedPodcast #CyberRecruiting #CareerAdvice #FutureOfWork

  39. 29

    From Geology to Cybersecurity: Navigating the Terrain of Digital Threats with Keith Zielenski

    In this episode of "Unscripted," David delves deep into the fascinating journey of Keith Zielenski from his roots in geology to the forefront of cybersecurity. Keith shares insightful tales from his transition at Booz Allen Hamilton, where a budding interest in data privacy and national security set the stage for his stellar career in information security. With a candid look at the challenges and triumphs encountered along the way, Keith provides a masterclass on building high-performing cybersecurity teams, embracing continuous learning, and the pivotal role of AI and machine learning in shaping the future of cybersecurity. His reflections on resilience, the importance of hands-on experience, and the evolving cyber threat landscape make this episode a must-listen for professionals and enthusiasts eager to fortify their digital defenses in an ever-changing world. #CybersecurityJourney #DigitalDefense #AIinCyber #ContinuousLearning #CyberLeadership #UnscriptedPodcast #KeithZalinski #InfoSecInsights #CyberResilience #TechTransitions

  40. 28

    Hacking His Way to Success: Jon Sternstein's Entrepreneurial Odyssey in Cybersecurity

    In this episode of "Unscripted," Jon Sternstein, cybersecurity entrepreneur and founder, takes us through his extraordinary journey from a curious observer of early internet vulnerabilities to the visionary leader of a pioneering cybersecurity firm. Jon shares the inspiration behind his leap into entrepreneurship, driven by a passion to make a meaningful impact on the cybersecurity landscape. He reflects on the evolution of cyber threats and defenses, emphasizing the constant yet crucial battle between innovation and foundational security practices. With insights into the challenges of starting and scaling a business, Jon offers invaluable advice on risk-taking, team building, and the importance of continuous learning. This episode is a treasure trove of wisdom for anyone interested in the intersection of technology, security, and entrepreneurship. Sure, here are the hashtags in a paragraph for easy copying: #CybersecurityJourney #TechEntrepreneurship #InnovationInSecurity #BuildingATechCompany #LeadershipInCyber #RiskAndResilience #StartupChallenges

  41. 27

    Unscripted: Breaking Barriers: Cassie Crossley's Path from Developer to Cybersecurity Leader

    Cassie Crossley shares her remarkable journey from a developer following in her father's footsteps to a pioneering leader in product and cybersecurity. With a career spanning roles in communications, leading development teams, and diving into the intricacies of IT and hardware, Cassie's transition into cybersecurity was both inevitable and impactful. Her work now focuses on the critical aspects of supply chain security, emphasizing the intersection of software and hardware with supplier and customer relationships. Cassie's story is a testament to facing challenges head-on, the importance of continuous learning, and the power of asking for the job you want, not just the job you have. #CassieCrossley #TechJourney #CybersecurityInsights #SupplyChainSecurity #WomenInTech #DeveloperToLeader #ProductSecurity #TechInnovation

  42. 26

    Unscripted: Mastering the Cyber Game: Ajay Sood's Journey Through the Ever-Evolving World of Cybersecurity

    In a compelling episode of Unscripted, host David delves deep into the fascinating world of cybersecurity with Ajay Sood, a luminary in the field. With over two decades of experience, Ajay has not only witnessed the transformation of IT security but has also been at the forefront of it, choosing to be part of startups that later turned into giants. His journey, from the early days in Toronto working on internet-facing applications to becoming a leading figure in cybersecurity, is not just inspiring but also a testament to the evolving challenges and opportunities within the industry. Ajay shares invaluable insights into the mindset required to navigate the cybersecurity landscape, emphasizing the importance of embracing failure as an inevitable part of the game. His approach to selecting companies, focusing on technology, team, and timing, sheds light on what it takes to make informed decisions in a rapidly changing field. Moreover, Ajay's transition from a technical role to sales highlights the multifaceted nature of careers in cybersecurity, underpinning the significance of adaptability and continuous learning. Listeners will also find Ajay's perspectives on current cybersecurity trends enlightening. He discusses the shift in the industry towards more passive, user-focused technologies, such as XDR and advanced authentication methods, which promise to reshape the way organizations defend against cyber threats. Ajay's optimistic yet realistic outlook on the ongoing "cyber war" and the importance of time in today's digital age are thought-provoking, urging professionals to rethink traditional approaches to cybersecurity. #CyberSecurityInsights #TechLeadership #StartupSuccess #SecurityTrends #CareerEvolution #InnovativeDefense

  43. 25

    From Desert Roots to Digital Heights: Lisa Saurs Journey Through the Cybersecurity Landscape

    Dive into the remarkable journey of Lisa Saurs in this episode of "Unscripted," where she unveils the path that led her from the small town of Trona to the forefront of cybersecurity marketing. Growing up in a community where opportunities were scarce, Lisa's drive and determination saw her navigate through various industries, from her early days as a recruiter to becoming a digital marketing maven. Her story is one of constant learning, adaptation, and a relentless pursuit of her passions. With a keen focus on cybersecurity, Lisa shares insights on the importance of community involvement, the power of authenticity in marketing, and the evolving challenges within the tech world. Her journey is not just about career transformation but also about personal growth, from embracing change by moving to the Midwest to finding love and establishing a home. Lisa's narrative is a testament to the idea that with the right mindset and adaptability, one can navigate the complex landscape of tech and cybersecurity, making a significant impact while remaining true to oneself. Hashtags: #FromDesertToDigital #CybersecurityJourney #AuthenticMarketing #TechEvolution #CommunityPower

  44. 24

    Diving into Cybersecurity with Todd Inskeep: Tales from the Digital Trenches

    In this episode of "Unscripted," David catches up with cybersecurity guru Todd Inskeep for a chat that's as enlightening as it is engaging. Imagine sitting down with a friend who just happens to have cracked the code on keeping digital bad guys at bay. Todd kicks things off with a story you wouldn't believe – his cybersecurity adventure started with a nudge from his mom to get a summer job. Who knew that would lead to decoding secret messages at the Naval Research Labs, a stint at the NSA, and then, diving headfirst into the banking world's digital vaults? Todd breaks down the ever-evolving world of cyber protection, spills the beans on what really goes on in those boardroom meetings about digital defense, and why keeping up with the cyber Joneses is more crucial today than ever. It's not just tech talk; it's a heart-to-heart on why staying curious and ready to learn is your best armor in the digital age. Grab your headphones, and let's get the inside scoop from one of the sharpest minds in cybersecurity. #CyberSecCoffeeChat #ToddTellsAll #DigitalDeepDive #InfoSecStories #UnscriptedChats

  45. 23

    Harmonizing Cybersecurity: A Fusion of Music, Diversity, and Digital Defense with Peter Schawacker

    Dive into an enlightening episode of "Unscripted" with David and special guest Peter Schawacker, a seasoned cybersecurity veteran with a unique background in music and a rich, global life experience. Peter's journey from a musician to a leading figure in cybersecurity reveals the unexpected connections between artistic creativity and digital defense. This episode explores the vibrant intersections of cybersecurity, diversity, and human nature, shedding light on the importance of community, compassion, and collaboration in the tech world. Discover how Peter's passion for inclusion and mental health is shaping a more diverse and resilient cybersecurity community. Whether you're a cybersecurity professional or someone interested in the cultural dimensions of tech, this conversation offers profound insights into the challenges and opportunities of building a safer digital future together. #CybersecurityInsights #DiversityInTech #DigitalHarmony #InclusionInCyber #TechCommunity #MentalHealthAwareness #UnscriptedPodcast #CyberDefense #HumanizingTech #GlobalCyberCulture

  46. 22

    Navigating the Cyber Frontier: Insights from a Cybersecurity Veteran

    Join us in this thrilling episode of "Unscripted," where host David delves into the world of cybersecurity with the astute and experienced Danny Dimoski. From the early days of assembling computers to tackling national security projects with the Department of Defense, and now leading the charge in cyber operations, Danny's journey is nothing short of remarkable. Discover the evolution of cyber threats, the critical role of education in cybersecurity, and the cutting-edge strategies to fend off attacks in an ever-evolving digital landscape. Danny's insights shed light on the importance of both hands-on technical skills and strategic management in protecting digital assets against sophisticated threats. Whether you're a cybersecurity professional, a business leader, or simply keen on safeguarding your digital footprint, this episode is packed with valuable lessons and forward-thinking strategies from the frontline of cyber defense. #CyberSecurity #TechTales #DigitalDefense #CyberThreats #InnovationInSecurity #CareerInCyber #CyberOperations #LeadershipInTech #UnscriptedPodcast

  47. 21

    Unscripted: Navigating the Cybersecurity Maze with Aaron Aaron Birnbaum

    In this episode of "Unscripted," host David welcomes Aaron Birnbaum, a seasoned cybersecurity expert with an entrepreneurial spirit. Aaron takes us on a journey through his early fascination with technology, beginning with his first computer in 1984, leading to a career in sales, marketing, and ultimately founding CITM Services. A pivotal moment occurs in 2015 when a cybersecurity breach threatens his business, propelling Aaron into the cybersecurity field. Through his story, Aaron highlights the importance of passion, persistence, and continuous learning in navigating the challenges of cybersecurity and entrepreneurship. His approach to business, focusing on understanding the client's needs above all, showcases his dedication to ethical practices and relationship building in the professional world. #UnscriptedPodcast #Cybersecurity #Entrepreneurship #TechInnovation #BusinessEthics #ContinuousLearning

  48. 20

    Unscripted: Unlocking the Vault of Venture Capital: Pramod Gosavi

    In this episode of "Unscripted," join host David as he welcomes back Pramod Gosavi for a masterclass on venture capitalism, particularly in the realms of software and cybersecurity. With nearly a decade of experience, Pramod shares invaluable insights from the front lines of investment, from the art of deal sourcing to the nuances of nurturing a startup to success. Discover the critical role of founder-market fit, the unexpected impact of AI on cybersecurity, and why discipline in fundraising can make or break your venture. Whether you're an aspiring entrepreneur, a seasoned investor, or simply curious about the intricacies of venture capital, this episode promises unfiltered insights into the high-stakes world of startup funding. #VentureCapital #Cybersecurity #StartupFunding #AI #Entrepreneurship #BusinessInsights #InvestmentStrategies #UnscriptedConversations #PramodGossavi #TechStartups

  49. 19

    Navigating the Cyber Storm: Unpacking the Complex World of Cyber Insurance with David Anderson

    Dive into the dynamic world of cyber insurance with expert David Anderson in our latest episode of "Unscripted." Discover the crucial insights into how North America's unique challenges and opportunities shape the cyber insurance landscape, from geopolitical threats to litigious environments. Learn about the impacts of hard market conditions, the importance of cyber hygiene, and the intricacies of policy coverage including widespread event exclusions and the war exclusion clause. This episode is a must-listen for anyone looking to navigate the complexities of protecting digital assets in today's rapidly evolving cyber threat landscape. Join us for an enlightening discussion that arms you with the knowledge to secure your cyber future. #CyberInsurance #CyberSecurity #RansomwareRecovery #DataBreachPrevention #InsuranceTrends2024 #CyberRiskManagement #TechTrends #DavidAndersonInsights

  50. 18

    Unscripted Navigating the Cybersecurity Landscape with Ross Haleliuk

    In this enlightening episode of Unscripted, David delves into the cybersecurity world with Ross Haleliuk, an entrepreneur, author, and cybersecurity enthusiast. Ross shares his journey from e-commerce to cybersecurity, emphasizing the industry's passion-driven community and its potential for impactful innovation. He discusses the challenges and opportunities in cybersecurity, the importance of diverse perspectives for innovation, and the value of understanding the business side of the industry. Additionally, Ross introduces his book, "Cyber for Builders," aiming to guide those interested in creating cybersecurity solutions. #CybersecurityInnovation #Entrepreneurship #ProductDevelopment #HaleliukOnUnscripted #CyberForBuilders

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Interviews with cyber security professionals

HOSTED BY

David Raviv

CATEGORIES

URL copied to clipboard!