Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore:
CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics.
Career Insights: Matthew shares his journey, from running startups to advising new ventures, and how he balances multiple roles (CPO, podcast host, advisor, and family man).
Leadership & Communication: Why CISOs need to speak the language of business to earn a seat at the boardroom table.
Practical Tips: Advice on avoiding burnout, building a mentorship network, and leveraging your personal brand in cybersecurity.
Free Cyber Risk Analysis: Visit CyberSaint.io to benchmark your organization’s cyber risk against industry peers.
Connect with Matthew: Find him on LinkedIn Matthew Alderman or X @Maldermania
Listen to Matthew’s Podcast: Check out Business Security Weekly at securityweekly.com/BSW.
Chapters
00:00 Reconnecting and Reflecting on Podcasting Journey
02:19 Balancing Multiple Roles and Responsibilities
05:44 The Importance of Personal Well-being
07:53 Career Goals and Retirement Aspirations
10:31 Integrating Consulting and Podcasting
11:55 The Value of Mentorship in Professional Growth
15:02 Building Trust and Reputation in Networking
16:39 Leveraging Podcasting for Career Opportunities
18:20 Innovations in Cyber Risk Management
23:07 Integrating Risk and Control Data
25:30 The Importance of Risk Quantification
28:33 Communicating Cyber Risk to the Board
30:41 CISO's Role in Business Strategy
33:03 Free Cyber Risk Analysis Offering
36:20 Customizing Risk Models
39:58 Real-Time Risk Monitoring
42:24 Targeting Public Companies for Cyber Risk Solutions
45:14 Closing Thoughts and Future Directions
Subscribe for more cybersecurity insights, leadership tips, and industry trends! Drop your thoughts in the comments below—how do you approach cyber risk in your organization?
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
In this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptability shaped his path to leadership in incident response and ransomware negotiation. Packed with insights on cybersecurity careers, leadership mentality, and the future of satellite warfare, this conversation is a must-listen for aspiring security professionals and military transitioners. Connect with Ricoh at firstresponder.us or on Instagram
@rico_danielson_. Subscribe for more inspiring stories!
00:00 - Introduction to Ricoh Danielson
02:17 - Military Background and Special Forces Transition
06:40 - Career Pivot to IT and Cybersecurity
16:58 - Leadership Lessons in Cyber
35:40 - Digital Forensics and Ransomware Insights
47:56 - How to Connect with Ricoh
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Joe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you’re a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned lessons from getting his ‘bun toasted’ by a CISO to mastering the efficiency mindset CEOs crave. Packed with stories—like Joe’s two-minute security slam dunk and Peter’s factory efficiency analogy—this episode is your cheat code to leadership success. Subscribe for more raw, unfiltered insights!
Chapters
00:00 Authenticity in Podcasting
01:55 Launching an E-Learning Series
05:01 Bridging the Gap: Technical to Leadership
10:06 Communicating with Executives
13:45 Efficiency in Leadership
19:05 The Value of Time in Business
22:57 Navigating Security Tools and Budget Constraints
27:03 Embracing Leadership and Asking for Help
E-Learning Series Links:
https://youtu.be/E8sZEMWHRHM
https://www.youtube.com/watch?v=fYmCzpcg9gw
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Struggling to secure AI in 2025? Join Joe and Invary CEO Jason Rogers as they unpack NSA-licensed tech, zero trust frameworks, and the future of cybersecurity. From satellite security to battling advanced threats, discover how Invary’s cutting-edge solutions are reshaping the industry. Plus, hear Jason’s startup journey and Joe’s wild ride balancing a newborn with a PhD. Subscribe now for the latest cyber trends—don’t miss this!
Chapters
00:00 Navigating Parenthood and Professional Life
02:53 The Startup Mentality: Decision-Making and Adaptability
06:13 Blending Technical Skills with Sales
08:58 Background and Journey into Cybersecurity
12:10 Establishing a Security Culture in Organizations
14:51 Collaborating with Government Entities
17:47 Understanding NSA Licensed Technology
23:06 Understanding Application and Server Security
25:01 Exploring Zero Trust Frameworks
28:57 Bridging Government and Private Sector Security
31:27 The Role of Security Professionals
33:55 Innovations in Cybersecurity Technology
38:05 Invariance in Security Systems
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
In this episode, we dive into the critical world of security data strategy with experts Aqsa Taylor and Justin Borland, authors of the upcoming book Applied Security Data Strategy: A Leader’s Guide. Justin, a veteran of the Equifax breach, shares firsthand lessons from one of the biggest security incidents in history, while Aqsa explores her journey from electrical engineering to cloud security and the role of governance in data management. Together, they unpack the challenges of handling massive security data, the power of real-time analytics, and how Abstract Security’s platform transforms data strategy with deduplication, normalization, and tiered storage. Perfect for CIOs, CSOs, and security pros looking to future-proof their organizations. Subscribe for more cybersecurity insights!
Key Points Covered:
Introduction to Aqsa Taylor and Justin Borland, emphasizing their expertise and new book.
Justin’s Equifax experience as a compelling narrative hook.
Aqsa’s background and insights on governance and cloud security.
Abstract Security’s innovative approach to data strategy (deduplication, real-time analytics, etc.).
Target audience callout (CIOs, CSOs, security professionals) and a subscription prompt.
Why this description? It’s concise, highlights the episode’s value, and uses action-oriented language to engage viewers. It balances technical appeal with accessibility for a broad cybersecurity audience.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Summary
In this conversation, Joe and Aaron discuss Aaron's journey into cybersecurity, highlighting the importance of curiosity, perseverance, and continuous learning in the field. Aaron shares his early experiences with hacking, his transition into professional security roles, and the unique challenges of pen testing SaaS applications. The discussion emphasizes the need for passion and dedication in overcoming obstacles and achieving success in cybersecurity. In this conversation, Joe and Aaron discuss the importance of sharing knowledge in the field of SaaS security, highlighting how personal initiatives like blogging can lead to unexpected career opportunities. They delve into the challenges organizations face regarding SaaS application risks, the significance of inventory management, and the shared responsibility model in security. The discussion also emphasizes the need for awareness of misconfigurations and reassures listeners that coding skills are not a prerequisite for entering the SaaS security space.
Chapters
00:00 Introduction and Personal Background
08:27 Journey into Cybersecurity
17:00 Perseverance in Learning and Growth
20:49 Pen Testing SaaS Applications
26:51 The Power of Sharing Knowledge
29:06 Discovering New Opportunities in SaaS Security
32:45 Understanding SaaS Application Risks
35:32 The Importance of SaaS Inventory Management
38:43 Shared Responsibility in SaaS Security
41:51 Misconfigurations and Security Awareness
45:01 Navigating SaaS Security Without Coding Skills
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
We dive into the complex world of cybersecurity through the eyes of Jeremy from Intel 471, exploring his journey from journalism to cyber threat intelligence. The discussion encompasses the evolution of cybercrime, the significance of ransomware, and future trends impacting cybersecurity.
• Transition from journalism to cyber intelligence
• Engaging with threat actors in cyber forums
• Overview of Intel 471 and its mission
• Ransomware trends and their implications
• The intersection of nation-state actors and cybercrime
• Impact of law enforcement collaboration on cyber investigations
• Predictions for cybersecurity trends in 2025
• Importance of securing exposed attack surfaces
• Call to action for increased cyber resilience
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
This episode explores the challenges of making a meaningful impact in podcasting and cybersecurity amidst a sea of influencers and superficial content. The discussion highlights the importance of authenticity, technical expertise, and effective leadership in building a sustainable path forward in both fields.
• Importance of genuine value in podcasting
• Dangers of influencer-driven superficiality
• Navigating personal and professional growth
• Project management as a key leadership skill
• Managing burnout and team dynamics
• Balancing proactive and reactive responses to crises
Peter Ramadan shares insights on his growth in cybersecurity and offers advice on where to find additional resources and learning opportunities.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
This episode explores the intricate balance between career aspirations and parenthood, highlighting how remote work has transformed traditional workplace dynamics. The conversation touches on evolving priorities, the impact of AI on cybersecurity, and the challenges of pursuing advanced education while managing family responsibilities.
• The shifting nature of work-life balance for parents
• The importance of remote work flexibility
• Experiences in the cybersecurity field and investigations
• The role of AI in cybersecurity and privacy concerns
• The challenges of returning to education with family commitments
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Cybersecurity enthusiasts and curious minds alike are in for a treat with our conversation featuring the esteemed David Holtzman, a cybersecurity virtuoso whose journey will both inspire and educate. Discover why the real mastery in cybersecurity transcends formal certifications, as David shares his formative experiences from high school to the present. His story emphasizes the critical role of curiosity and problem-solving skills, offering valuable insights for those venturing into this ever-evolving field. You'll gain a fresh perspective on what it truly takes to be an expert in cybersecurity as David and I explore the foundational knowledge and mindset essential for success.
Shift gears with us as we explore a captivating transition from the allure of traditional luxury sports cars to the groundbreaking innovation of Tesla vehicles. Our discourse navigates the shift in skills from mechanical to digital and unravels the challenges of maintaining vintage cars versus embracing new-age technology. Dive into the quirks of modern tech frustrations, such as dealing with printers, against a backdrop of fascinating anecdotes from my NSA experience. This segment paints a vivid picture of how technology has transformed both personal passions and professional landscapes over the decades.
Rounding out our conversation, we tackle the future of AI-driven cybersecurity and the pressing concerns around AI security and privacy. As we weave through the complex tapestry of intelligence work from the past to the potential of decentralized systems, we consider the implications of centralization and the innovations of web3. Witness the exciting possibilities of blockchain in enhancing network security, and reflect on the importance of interdisciplinary skills that prepare professionals for the unknowns of the tech world. This episode promises to enlighten, challenge, and inspire those seeking to understand the nuanced world of cybersecurity and technology's future.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
This episode delves into personal reflections on the year 2024, embracing both challenges and achievements while emphasizing the importance of setting and celebrating goals. Listeners are encouraged to envision their future selves and prepare for an impactful 2025 filled with hands-on learning and expert insights.
• Importance of self-reflection during year-end
• Goal setting as a tool for personal growth
• Celebrating small victories
• Envisioning your future self and goals
• Essential skills for aspiring professionals
• Commitment to hands-on mentorship in future episodes
• Introduction of expert guests in the upcoming year
• Perseverance and the realization of long-held dreams
• Encouragement to take a break and acknowledge achievements
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
What if balancing the demands of a thriving IT business with personal well-being was as simple as training for a triathlon? Join us for an enlightening conversation with Nathan Whittacre, co-founder of Stimulus Technologies, as he shares his transformative journey from a childhood obsession with video games on an Atari 800XL to launching a successful IT and cybersecurity firm. Nathan's story is a testament to the power of self-taught skills and the evolving landscape of technology; his insights offer a roadmap for aspiring tech entrepreneurs navigating their own paths.
Nathan opens up about the personal challenges of entrepreneurship, drawing parallels between the strategic planning required for endurance sports and business growth. He candidly recounts the early days of Stimulus Technologies, where neglecting self-care was a common pitfall, and shares practical strategies for maintaining mental well-being, like turning off work notifications and engaging in endurance sports. From the hilarious misstep of an illegal candy store to the gritty realities of juggling business decisions and personal health, Nathan's anecdotes provide both inspiration and cautionary tales for anyone building a business.
Listeners will gain valuable insights from Nathan's experiences, particularly in the balancing act of setting career goals alongside personal ambitions. He discusses the intricacies of training for an Ironman and how the calculated risks and strategic decisions made in sports mirror those in business. For those eager to connect with Nathan, he offers a unique opportunity: reach out to him on LinkedIn for a chance to receive a physical copy of his book, "The CEO's Digital Survival Guide." Whether you're an aspiring entrepreneur or a seasoned professional, this episode promises a wealth of knowledge on navigating both the digital and entrepreneurial landscapes.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Ever wondered how a military intelligence background could transform a career in cybersecurity? Meet Daniel Schechter, our guest who began his journey in the Israeli Defense Forces' elite Unit 8200, and now navigates the fast-paced world of IT security. Daniel’s story is one of transition and growth, illustrating how skills honed in intelligence work can be leveraged to tackle the challenges of modern cybersecurity. Through his personal anecdotes, Daniel offers a glimpse into the real-time, analytical capabilities that cyber technology brings to intelligence and how this shapes operations today.
For those curious about a cybersecurity career, this episode is a treasure trove of insights. We promise to take you through the steep learning curves and the passion required to thrive in this ever-evolving field. With stories that range from military parallels to reflections shared with my wife, who also works in computer security, we paint a vivid picture of the vast responsibilities and exhilarating potential within the cybersecurity landscape. It’s a field where continuous learning isn't just an asset; it’s a necessity.
As the digital world shifts towards cloud-based solutions, we tackle the intricate challenges this brings to IT security. From understanding cloud security roles to enhancing product security with AI, our conversation uncovers the critical need for diverse expertise to manage these advances. We explore building collaborative relationships between developers and security teams, emphasizing the essential role of communication and mutual respect in addressing vulnerabilities. Whether you're a seasoned professional or a newcomer, this episode offers a comprehensive view of the cybersecurity realm's dynamic nature.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Ever wondered how to juggle building a personal brand, consulting, and family life all while staying sane? Join us as Colby DeRodeff, an expert in this very balancing act, shares his secrets for mastering time management and finding stability in uncertain times. We promise you'll come away with practical insights into handling economic challenges and utilizing AI's potential in cost reduction, tempered with a healthy dose of skepticism about its true impact.
Colby opens up about the pitfalls of regional content targeting and the quest for unbiased information in our digital age. Hear how a misadventure with algorithmic targeting in Tennessee left him questioning how location shapes our media consumption. Plus, we dive into a critical evaluation of AI language models and the misinformation risks they pose, urging listeners to maintain a skeptical eye amid the relentless digital noise.
In the world of startups and family life, Colby offers a candid account of navigating the ever-evolving responsibilities and challenges. From robust security measures and the temptation to cut corners in startups, to the personal dynamics of raising a family, his journey is filled with lessons on risk management and career goals. We also explore the high-stakes world of cloud security, discussing innovative data management strategies and the importance of prioritizing customer experiences over mere cost-cutting.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Anne Baker's journey from mechanical engineering to cybersecurity marketing is nothing short of inspiring. With a love for math inherited from her father, Anne began her career at Boeing before leveraging her engineering skills in various roles, eventually landing in the tech-forward world of cybersecurity marketing. We share our own unconventional paths, including a leap from criminal justice to cloud security engineering, while highlighting the diverse backgrounds that enrich this field. The demand for cybersecurity talent is growing rapidly, evidenced by unique career shifts like an opera singer becoming an application security engineer.
The discussion turns to the significant role soft skills play in cybersecurity, often overshadowed by the emphasis on technical prowess. Drawing from personal experiences, we underline the necessity of communication and conflict resolution skills, learned in high-pressure roles, to succeed in cybersecurity. It's crucial for candidates to balance technical expertise with the ability to foster teamwork and drive security initiatives through effective communication. Hiring for attitude and aptitude, not just technical skills, can lead to growth and stability in this fast-evolving industry.
Interdepartmental dynamics in cybersecurity bring their own set of challenges, from maintaining security protocols under developer pressure to the tension between IT and security teams. We explore how effective communication and emotional control are vital in fostering productive relationships across teams. Additionally, the conversation highlights the innovation of Adaptiva's OneSite platform in automating vulnerability management, helping simplify the patching process. To top it all off, we discuss a remarkable opportunity for aspiring cybersecurity professionals: scholarships for the Microsoft Fundamentals course in security, offered through a collaboration with Women in the Cloud. This inclusive initiative is a great starting point for anyone looking to enhance their cybersecurity knowledge and skills.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Brad's journey from sci-fi enthusiast to cybersecurity expert is an unconventional path filled with unexpected twists and valuable insights. Hear firsthand how his initial pursuit of engineering took a dramatic turn following 9/11, leading him to the military and into the Signal Corps, where his foundation in cybersecurity was forged. Discover how his experiences at SecureWorks highlight his dedication to diversifying the cybersecurity workforce by recruiting and training talent from varied backgrounds, making this field accessible to all with a passion for tech and a willingness to learn.
Step into the high-stakes environment of cybersecurity as Brad shares gripping tales from mission deployments where every second counts. Feel the adrenaline of operating in high-pressure situations and the critical role certifications play in carving out a successful career in this field. Brad sheds light on the diverse backgrounds of cybersecurity professionals, illustrating how police officers and others transitioned into this field, proving that aptitude and determination often outweigh traditional education in achieving success.
In the face of rapid AI integration, organizations encounter new hurdles with shadow IT and unsanctioned applications. Explore the intricate landscape of AI security threats and the pressing need for secure implementation, as Brad outlines the challenges posed by AI's rise. With over 92% of organizations facing data breaches from unauthorized apps, the urgency for robust security measures is palpable. Concluding with ways to connect with Brad and Morphysack, this episode promises a treasure trove of insights and a peek into future conversations on emerging AI threats.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Journey into the world of cybersecurity with Idan Plotnik, a true pioneer in the field, as he revisits the path that led him to become a leading figure in tech innovation. Starting with a childhood fascination for computers, Idan advanced to play a pivotal role in the Israeli cyber security unit, eventually founding Erato, which caught the eye of Microsoft. He shares insights from his tenure as General Manager for Software Engineering at #Microsoft and how his encounters with Satya Nadella ignited his passion to launch his first company in 2019. This episode unravels the stark differences between nimble startups and the often sluggish corporate giants, offering a compelling narrative for aspiring entrepreneurs and industry veterans alike.
Explore the sophisticated challenges of ensuring software and cloud security in today's fast-paced tech environments. With cloud platforms like AWS, Azure, and GCP enabling swift deployments, safeguarding software architecture before cloud deployment becomes crucial. Dive into the intricacies of Apiiro's ASPM platform, which revolutionizes the detection and management of code changes for enhanced security measures. The conversation expands into the realm of AI, highlighting emerging threats and innovative risk-management strategies employed by companies like Apiiro. This episode promises essential insights into balancing development speed with security needs, preparing listeners for the future trajectory of AI in software security.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
In this engaging conversation, Robert Vescio shares his unique journey from horticulture to cybersecurity, emphasizing the importance of economics in understanding cyber risk. The discussion highlights the value of learning from mistakes, the need for transparency in cyber risk management, and the cultural challenges within the cybersecurity field. Vescio advocates for a compassionate approach to cybersecurity, encouraging professionals to embrace failure as a learning opportunity. He also introduces X Analytics, a platform designed to simplify cyber risk management and provide organizations with a clear understanding of their cyber risk condition.
Chapters
00:00 Navigating the Conference Landscape
02:53 From Horticulture to Cybersecurity: A Unique Journey
06:09 The Importance of Economics in Cybersecurity
09:00 Learning Through Mistakes: A Personal Journey
12:05 The Culture of Mistakes in Cybersecurity
14:54 The Need for Transparency in Cyber Risk
18:06 The Role of Boldness in Career Growth
21:14 Embracing Failure: Lessons from NASA
24:00 Understanding Cyber Risk Management
26:58 The Impact of Cyber Incidents on Businesses
30:01 The Importance of Compassion in Cybersecurity
33:13 X Analytics: Simplifying Cyber Risk Management
#podcast #techsecurity #informationsecurity #cybersecurity #ai
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
A cybersecurity journey like no other awaits as we welcome a guest with a formidable background, shaped by their experiences in the Israeli military's elite 8200th unit. This exceptional career path led them from the rigors of military service to the academic halls of the Technion—Israel's very own MIT. We uncover how their military training instilled a unique blend of independence and early responsibility, setting the stage for their significant contributions to the tech world. The conversation flows seamlessly from past to present, as personal anecdotes bring a tangible sense of nostalgia, highlighting the timeless aspects of technology amidst its relentless evolution.
Our discussion takes a thrilling entrepreneurial turn as our guest shares their pioneering efforts in the realm of secure communication. From mobile graphics to R&D management, they recount their journey toward founding a company dedicated to privacy-focused smartphone solutions. The narrative of "Unplugged" unfolds—a venture born out of the pressing demand for secure, private devices. With the rise in privacy awareness and improved supply chain accessibility, our guest reveals how these factors have democratized innovation, allowing even small companies to make a mark in the hardware space.
The intricacies of mobile security and data privacy are laid bare as we compare Android and iPhone architectures. Our guest captivates us with their firsthand experience in a cybersecurity course, where Apple's preemptive patching contrasted sharply with a swift Android exploit. This conversation extends to the broader issues of data privacy, exploring how major tech companies manage user data and the monetization behind it. As we ponder the future of privacy and security in the digital age, our guest's insights illuminate the path forward, underscoring the multifaceted challenges and opportunities that lie ahead.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Ready to unlock the secrets of cryptography and cybersecurity from a seasoned expert? Join us as we welcome back Jeff Man for the riveting second part of his story, where he navigates a hectic schedule filled with speaking engagements at premier conferences like B-sides Edmonton and GurrCon. Jeff opens up about his efforts to achieve work-life balance and self-care, sharing plans for a rejuvenating two-week road trip and the enriching experience of spending quality time with his spouse. The episode is a treasure trove of insights into personal growth and the delicate dance of integrating professional and personal lives, especially in the wake of retirement and the COVID-19 lockdown.
Travel back to 1987 and explore the pivotal role Jeff played at the NSA in enhancing military communications security. We delve into his assignment on the manual crypto systems branch, where he utilized classic cryptographic techniques, including the cipher wheel, to improve the US Special Forces' communication methods. With detailed anecdotes, Jeff recounts how he tackled the challenge of creating a practical and secure solution that could be easily memorized by field operatives, shedding light on the evolution of cryptographic practices and their profound impact on military operations.
Our journey through the world of espionage and cybersecurity continues as Jeff shares captivating stories of government espionage, data collection, and the technological advancements that often remain hidden from the public eye. From Cold War tactics to modern data interception techniques, Jeff provides a comprehensive overview of the cyclical nature of intelligence work. Rounding out the episode, Jeff reflects on his transition from the NSA to the private sector, candidly discussing the ethical challenges and evolving landscape of cybersecurity. Don't miss this fascinating exploration of history, personal growth, and the ever-changing world of cybersecurity.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Feeling burnt out in the tech industry? Discover how to reclaim your work-life balance and enhance your professional journey with our latest episode featuring Tyler Robinson, a veteran in cybersecurity. Listen in as Tyler recounts his unconventional start in the 90s with phone phreaking, which eventually led him to manage his high school network and develop a dual interest in both offensive and defensive security. His story exemplifies the immense value of bringing diverse skill sets into the tech world, including business acumen, psychological insights, and project management expertise.
Ever wondered how to communicate complex technical details to non-technical audiences effectively? We highlight the importance of technical writing and soft skills in cybersecurity. By mastering these, you'll stand out in an industry that values the ability to translate technical jargon into strategic insights for executives. We also dive into the necessity of understanding business fundamentals like ROI and taxes, helping you bridge the gap between compliance and real business risks. Tyler shares valuable advice on creative thinking, the adversary mindset, and the importance of finding personal fulfillment in work to stave off burnout.
The tech sector is facing a shortage of experienced professionals, and Tyler provides a compelling case for robust mentorship and relationship-based hiring. Hear about the absurdity of traditional HR requirements, like a Kubernetes creator being turned down for not having enough experience with Kubernetes. Learn why bypassing these outdated processes in favor of direct connections within the community can lead to better hires and stronger teams. With a focus on unsung heroes in cybersecurity and the critical yet unrecognized roles that drive meaningful impact, this episode is a must-listen for anyone looking to make a genuine difference in the field.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Ever wondered how a psychology degree can lead to a cybersecurity career? Join us as Richard Cassidy reveals his remarkable journey from a teenage computer enthusiast to a leading expert in IT and cybersecurity. Richard shares intimate stories from his early days, including how he transitioned from psychology to an apprenticeship at a major American bank in London, where he started with simple tasks like replacing toner cartridges before quickly advancing into more complex roles in networking and firewall management. His career evolution over 26 years, culminating in a significant presence in the vendor space, underscores the importance of hands-on experience and continuous learning in this dynamic field.
In this episode, we'll uncover the vital aspects of data security and disaster recovery that every organization should prioritize. Richard delves into the limitations of traditional security methods and emphasizes the necessity for modern solutions like zero trust, immutability, and data observability, particularly those offered by Rubrik. Through compelling anecdotes, he highlights the dire consequences of relying on outdated systems, such as an obsolete tape backup setup, and advocates for cloud-based disaster recovery plans that ensure business continuity and quick recovery from ransomware attacks. This discussion serves as a crucial reminder that comprehensive data security strategies are non-negotiable in today's threat landscape.
Lastly, we tackle the unique cybersecurity challenges faced by healthcare organizations, especially under financial constraints. Richard discusses the complexities of integrating multiple technologies and the critical need for robust recovery processes, including manual fallback plans that are rigorously tested. Drawing insights from the Rubrik Zero Labs report, he highlights the often-overlooked pitfalls and encourages connecting with like-minded professionals to share knowledge and best practices. Tune in to gain valuable perspectives on navigating cybersecurity in the healthcare sector and beyond, ensuring resilience against ever-evolving threats while focusing on customer needs.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
What if you could pivot from a career in intelligence analysis to becoming a cybersecurity expert, all by leveraging self-taught skills and open-source intelligence? Join us as Scott Small reveals his inspiring journey, transitioning from dealing with physical security threats to mastering cybersecurity. He shares the invaluable role of supportive hiring managers and highlights how programming in Python opened doors in the private sector, showcasing the diverse paths available in this dynamic field.
Creating your own opportunities is crucial in technical fields, and Scott emphasizes the power of initiative. From starting a blog to contributing to community repositories, he offers practical advice for building a robust portfolio. We also discuss the importance of networking, the impact of geopolitical events on cyber threats, and how storytelling bridges gaps within the security sector. Scott’s insights provide a roadmap for aspiring professionals eager to break into cybersecurity.
Artificial intelligence is revolutionizing cyber threat intelligence, but it comes with its own set of challenges. Scott and I delve into the complexities of AI-generated data, the necessity of rigorous validation, and the importance of frameworks like MITRE ATT&CK. We explore enhancing detection capabilities and the role of consistent practice in writing and data visualization for professional growth. Whether you’re a seasoned expert or just starting out, this episode is packed with actionable insights to help you navigate the evolving landscape of cybersecurity.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
What if the smallest oversight in software could have catastrophic consequences? Join us as we uncover the remarkable journey of Jake, a visionary engineer who has made significant strides in the tech industry. From his days at the University of Michigan to influential positions at Boeing, Amazon, and Google, Jake's story is a testament to the power of curiosity and relentless problem-solving. Discover how he pioneered Quay, the first private Docker registry, and positioned himself at the cutting edge of security and containerization.
Ever wondered about the stringent processes behind aviation software? Jake takes us through his meticulous work at Boeing, where creating safety-critical software is both a science and an art. He shares the rigorous testing and standards like DO-178B and MCDC that ensure the fail-safe operation of flight systems. Jake's insights illuminate how even the smallest IT services can have profound impacts on safety, offering a rare glimpse into the interconnected world of aviation technology and its regulations born from past tragedies.
As we wrap up, we venture into the realm of high availability software and evolving security technologies. Jake draws parallels from the aviation industry to illustrate the importance of redundancy and robust planning against failures. He discusses the benefits of unified authorization services and modern models, providing practical advice for handling software downtimes and authorization challenges in today's dynamic IT environments. Finally, listeners can learn how to connect with Jake and explore his current venture, Authzed, gaining further insights into innovative security solutions. This episode promises invaluable takeaways for tech enthusiasts and professionals alike.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
What if you could protect your organization's data as effortlessly as sending an email? Join us for an enlightening conversation with Matt Howard, a veteran IT professional whose career spans the dawn of the application service provider model to the forefront of open-source software and application security. Matt’s experience at tech conferences like DEFCON and Black Hat offers a firsthand look at the evolution of IT security. From his early days navigating the chaotic tech landscape to mastering the full technology stack, Matt’s journey reveals critical insights for anyone aspiring to excel in the field of IT.
Discover the future of data security architecture as Matt delves into the complexities of securing data within the finance industry and beyond. Learn how adopting a granular security architecture, similar to microservices in software development, can revolutionize secure data sharing across organizational boundaries. Through real-world applications, such as military alliances needing instantaneous and secure information exchange, Matt emphasizes the importance of dynamic, policy-driven access controls. His insights paint a picture of a more interconnected and securely collaborative world, one where data protection adapts to the demands of the moment.
Trace the historical milestones of data security with Matt, from the emergence of thin client computing to the rise of cloud services and microservices. Hear about key developments like Lotus Notes and the vital role of cryptography, as well as the modern-day necessity of encryption. Learn about Virtru’s innovative approach to simplifying data security with user-friendly encryption tools integrated into everyday platforms like Gmail and Outlook. Lastly, Matt introduces us to the Trusted Data Format (TDF) and the OpenTDF project, shedding light on how they provide granular security benefits and regulatory compliance. As we conclude, Matt shares the privacy-centric philosophy of Virtru’s founders and how you can connect with him for further insights.
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast