Cybernomics: The Economics of Cyber Security
Every week, Josh Bruyning peeks behind the curtains of businesses small and large to learn how they use technology to drive economic growth. He delivers straight-to-the-point insights for investors who aren’t tech experts but need to make big calls about tech, or businesses executives looking for fresh new ideas.
We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations.
Whether you’re budgeting for compliance, evaluating vendors, or planning your next investment, Cybernomics helps you make confident, high-impact choices without needing a computer science degree.
New episodes drop every Wednesday.
Follow us on LinkedIn and YouTube for bonus content and real-time updates.
Episodes
65 episodes
The Hiring Process Is Broken And We Have To Fix It
Ten months of job hunting can mess with your identity, even when you know you’re good at what you do. We sit down with Jennifer “Jen” T. Baca, a cybersecurity risk leader and single mom, to talk honestly about what it feels like to be qualified...
Security Appreciation, The Human Firewall, and The Future of AI
Most scams don’t start with “bad technology” they start with a perfectly normal human impulse to trust. Josh Brunning sits down with security speaker Robert Siciliano to get honest about why cybersecurity still doesn’t stick for everyday people...
Who's winning, the good guys or bad guys?
We dig into why security awareness fails even when the risks are obvious, and why the real challenge is human behavior rather than tools. Robert explains the “human blind spot” and how AI deepfakes and voice cloning make trust harder to manage ...
Why Security?
We talk with Robert Cicliano about why cybersecurity matters for people who do not work in security and why scams keep working even on smart, capable adults. We dig into how fraudsters build trust, why denial is so common, and why compliance-st...
Word on the Street - AI Security’s Rapid Gold Rush with Richard Stiennon
We reconnect with Richard Stiennon to chart how AI is rewriting cybersecurity, from the rise of 290 AI security vendors to SOC automation, investor momentum, and the criteria that separate tru...
Vendors, Stop Telling Me My Problem
In this clip, Karl Mosgofian breaks down why most vendor pitches lose buyers in the first minutes and how to fix it with a simple, direct first-meeting flow. We show how to valida...
Go-to-Market Strategies of a Veteran CIO
We explore how to sell to CIOs who are flooded with pitches yet hungry for real innovation, and how sellers can move from vague benefits to clear outcomes and CFO-ready cases. Carl Mosgofian shares how to frame differentiation, map to the stack...
AI Rapture, Hype, Faith, and Feedback Loops
We unpack how a failed “AI Rapture” spread from a viral prophecy to AI‑stamped pamphlets and sycophantic chatbots, and we trace the feedback loops that keep bad ideas alive. Along the way, we compare models, costs, and trade‑offs, and ask what ...
Influence, AI, and the Art of Building Meaningful Connections
Josh Bruyning welcomes Rafael Ramirez to discuss communicating AI concepts, building community in cybersecurity, and navigating the tech industry as an immigrant. Rafael has almost 30,000 followers on LinkedIn. The conversation reveals practica...
The Hidden Costs of Starting and Building a Cybersecurity Company
In this conversation, Joshua Bruyning engages with DataTribe Managing Directors Rob Ackerman and Leo Scott to explore the intricate dynamics of cybersecurity startups and venture capital. They discuss the essential qualities of successful found...
Old Meets New: The Hidden Costs of NOT Adopting AI
In this episode of Cybernomics, Al Kennickell joins me to discuss the importance of embracing AI in small and medium businesses, addressing common misconceptions and hesitations surroundin...
CISO vs BISO: Who's Really Running Security?
Charles Payne and Olivia Phillips join us to explore the evolving relationship between CISOs and BISOs, examining how business-focused security leadership is transforming cybersecurity from a technical function to a strategic business enabler.<...
Organizational Theory Meets Artificial Intelligence
We explore organizational theory applications to AI agents and examine the transformation of Security Operations Centers through artificial intelligence solutions.• Traditional organizational structures like military-style hierarchies a...
Is SaaS Dead? The Hidden Cost of AI Agentic Companies
Josh Bruyning and Richard Stiennon explore how AI agents are fundamentally changing the SaaS industry and traditional software models. They discuss the shift from feature-based to outcome-based solutions and why companies must adapt to survive....
Why New Companies Are Winning Against Old Giants: The Hidden Costs and Opportunities of AI
EU's complex regulatory environment creates both challenges and opportunities for businesses navigating data privacy, financial services, and healthcare regulations across member states. • Significant differences exist between EU-w...
The Hidden Side of Protecting Your Children Online
Marcus Peet, Senior Director of Information Security at PT Solutions, shares his unique perspective as both a cybersecurity expert and father of three on navigating the complex world of digital parenting. His "growth with guardrails" philosophy...
Word on The Street - Inside RSA's Vendor Mayhem
Kyle and I dive into the reality of the RSA Conference experience, exploring how the security industry's biggest event has transformed into a vendor-dominated spectacle with declining CISO attendance.• The conference atmosphere is overw...
Market Watch - Will AI Replace Your Security Team? Hard Truths and Bold Predictions
AI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investm...
The Hidden Costs of Securing Law Firms
Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide.Beyond just moderniz...
Market Watch - AI and the Future of Security Operations
In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold...
Is Cybersecurity a Technology Risk or a Business Risk
Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires b...
Why Your Business Is More Vulnerable Than You Think, The Hidden Costs of Not Knowing
Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than...
Market Watch: When Markets Fall, Savvy Investors Go Shopping for Cybersecurity Companies, with Richard Stiennon
Market fluctuations cause cybersecurity stocks to drop 4-7%, creating buying opportunities for savvy investors despite fears surrounding Trump's new tariff policies.• Tariff impacts vary across cybersecurity companies—hardware manufactu...
Market Research - Why Investors and Enterprises Should Invest in Israeli Cyber Companies
The extraordinary success of Israeli cybersecurity companies on the global stage represents a fascinating case study in how a small nation can dominate a critical technology sector. Despite having just 9 million citizens, Israel has become the ...
The Hidden Costs of Protecting Medical Devices and Data
Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagn...