show episodes
 
Artwork

1
Cybernomics Radio

Bruyning Media

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Cybernomics: Where we Uncover the Hidden Costs and Opportunities in Cybersecurity Cybersecurity isn’t just tech—it’s economics. Every decision you make has hidden financial implications: unseen risks, overlooked costs, and untapped opportunities. On Cybernomics, we cut through the noise to reveal the true economic impact of cybersecurity choices, empowering you to invest smarter, manage risk better, and drive stronger financial outcomes. Each episode features candid conversations with season ...
  continue reading
 
Artwork

1
RealTiME Live!

Society of American Military Engineers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Society of American Military Engineers leads collaborative efforts to identify and resolve national security infrastructure-related challenges. Founded in 1920, SAME unites public and private sector individuals and organizations from across the architecture, engineering, construction, environmental and facility management, cyber security, project planning, contracting and acquisition, and related disciplines in support of national security. Headquartered in Alexandria, Va., SAME provides ...
  continue reading
 
Loading …
show series
 
AI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investment landscape reflects this shift, with 78% of venture capital reportedly flowing into AI companies despit…
  continue reading
 
Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide. Beyond just modernizing paperwork, Dean reveals why attorneys have become prime targets for sophisticated hackers and nation-states. …
  continue reading
 
In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027. • SOC automation represents the most imme…
  continue reading
 
Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires both leadership commitment and proper resource allocation to overcome the natural friction between IT and s…
  continue reading
 
Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than just a cost center. • Most companies don't need to hire a full security team – outsourcing cybersecurity …
  continue reading
 
Market fluctuations cause cybersecurity stocks to drop 4-7%, creating buying opportunities for savvy investors despite fears surrounding Trump's new tariff policies. • Tariff impacts vary across cybersecurity companies—hardware manufacturers like Palo Alto and Fortinet face direct challenges with 54% tariffs on Chinese-made equipment • Current tari…
  continue reading
 
The extraordinary success of Israeli cybersecurity companies on the global stage represents a fascinating case study in how a small nation can dominate a critical technology sector. Despite having just 9 million citizens, Israel has become the world's second-largest hub for cybersecurity innovation, home to over 450 security startups that collectiv…
  continue reading
 
Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagnosed using a medical device, Christian dedicated his career to ensuring these life-saving technologies rem…
  continue reading
 
We explore the emergence of a new AI-driven economy that's creating unprecedented opportunities for entrepreneurs and businesses of all sizes to compete at enterprise levels with minimal resources. • AI represents the most significant technological advancement since the wheel, democratizing powerful capabilities previously available only to large c…
  continue reading
 
Google makes a monumental $32 billion acquisition of cloud security leader Wiz, marking one of the largest cybersecurity acquisitions in history after previously attempting to purchase the company for $23 billion last year. • Wiz offers simple cloud security deployment that provides immediate visibility into cloud environments • Founded by a team t…
  continue reading
 
The cybersecurity industry is undergoing rapid consolidation as established companies expand their capabilities through strategic acquisitions rather than internal development. Three major acquisitions in March 2025 highlight key trends: the growing importance of securing operational technology, the central role of AI in data security, and the cont…
  continue reading
 
Dan Holland, Deputy CISO of Tampa General Hospital, joins us for a deep dive into a wide range of topics—from GRC and AI to vendor risk management and the unique cybersecurity challenges posed by hurricanes in Florida. We also explore his journey from cybersecurity entrepreneur to his current role at Tampa General.…
  continue reading
 
In this episode, we explore the intricate relationship between risk management and business objectives, specifically tailored for small and medium-sized businesses. Chad Boeckmann discusses strategies to elevate cybersecurity risk awareness among executive leadership, the role of cyber insurance, and the importance of bridging the gap between secur…
  continue reading
 
In this episode of Cybernomics, Josh Bruyning and Kyle Bhiro discuss the hidden costs associated with vulnerability management in cybersecurity. They explore the importance of understanding these costs, the role of AI in improving efficiency, and the necessity of human oversight in security operations. The conversation also touches on the concept o…
  continue reading
 
On this episode of Cybernomics, Josh explores the Hidden Costs of Cybersecurity Regulations and conducts a cost-benefit analysis with Michael Nouguier, CISO at Richey May, and our guest co-host, Igor Volovich, former CISO at Invensys and Schneider Electric. Hidden Costs of Regulating Cybersecurity: Compliance costs (audits, certifications, and tech…
  continue reading
 
Greg and Josh pull back the curtain on the pitfalls and strategic voids left by frequent CISO transitions, which can leave companies vulnerable and scrambling for continuity. We shed light on the arduous onboarding process new CISOs face, taking months to assess existing security frameworks and the ripple effects this delay has on strategic initiat…
  continue reading
 
Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respo…
  continue reading
 
Authenticity emerges as a vital theme in our latest episode, showcasing how being true to oneself can create more genuine connections in cybersecurity and beyond. Mel "Fireball" Reyes shares his personal journey of embracing authenticity and its significant impact on audience engagement, trust, and organizational culture. • Discussion on the need f…
  continue reading
 
This episode explores the transformative role of automation in cybersecurity through Cyngular Security's innovative approach. By focusing on Cloud Investigation and Response Automation (CIRA), we discuss how this technology alleviates alert fatigue, reduces burnout among analysts, and empowers teams to enhance their security efforts. • Cyngular Sec…
  continue reading
 
Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independ…
  continue reading
 
Unlock the secrets of API security with our esteemed guest, Randolph Barr, the new Chief Information Security Officer at Cequence Security. With a stellar career spanning companies like Zoom, Qualys, Cisco, and Webex, Randy is the perfect guide to navigate the complexities of the digital world. We explore the innovative strategies Sequence Security…
  continue reading
 
In this episode of Cybernomics (formerly Security Market Watch), host Josh Bruyning engages with Ian Poynter, founder of Kalahari Security, to explore the economics of cybersecurity. They discuss the challenges of selling security solutions, the importance of understanding business needs, and the inadequacy of mere sympathy in the face of security …
  continue reading
 
In this Post TV Podcast, Marc Loftus sits down with veteran VFX supervisor Paul Butterworth and Dell Technologies' Alex Timbs. Paul details his 25-plus-year career working with directors such as Ridley Scott and George Miller. His credits span several Marvel films, including Captain America: Civil War, Guardians of the Galaxy Volume 2 and Avengers …
  continue reading
 
Buchi Reddy, CEO and founder of Levo AI, shares his unique immigrant story and the journey that led him to start his own cybersecurity company. Levo AI focuses on API security and helps enterprises protect their digital footprint and applications using AI. Buchi discusses the challenges he faced as an immigrant and the importance of mentors and ski…
  continue reading
 
Dov Yoran, co-founder and CEO of Command Zero, shares his journey in the cybersecurity industry and the mission of his company. The conversation covers topics such as the category Command Zero falls into, the problem they are solving, the challenges of being an entrepreneur, and the importance of teamwork. Dov emphasizes the need to keep driving fo…
  continue reading
 
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
  continue reading
 
In this conversation, Josh Bruyning interviews Randy Blasik, the CTO and co-founder of ComplianceAide, about his journey as an AI bro and the use of generative AI in building his company. They discuss the power and potential of generative AI, the challenges of bringing a product like Compliance Aid to market, and the skepticism and misconceptions s…
  continue reading
 
What happens when 75% of Chief Information Security Officers contemplate leaving their jobs? In this compelling episode of Security Market Watch, we engage with Matt Webster, CEO and CISO at Cyvergence, to tackle this critical issue head-on. With his extensive background as a former CISO, Matt sheds light on the alarming turnover rates in the indus…
  continue reading
 
Join us as Tina unpacks the challenges and triumphs of transitioning from a service-based to a product-based business. From navigating the complexities of venture capital to balancing technical oversight with strategic planning, Tina's experiences offer invaluable lessons for aspiring entrepreneurs. She highlights the critical importance of a stron…
  continue reading
 
Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Beco…
  continue reading
 
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixe…
  continue reading
 
Discover the intriguing parallel worlds of cyber security and finance as we navigate through compelling discussions with our distinguished guest, Igor Volovich. Promising to equip you with a nuanced understanding of the convergence of risk and compliance, we catapult into the breach of SolarWinds and the ensuing SEC charges. With Igor's expert insi…
  continue reading
 
Ready for a crash course in cybersecurity? Grab your note-taking tools and join us for a riveting conversation with the esteemed Dr. Nikki Robinson, the trailblazing STSM and lead architect at IBM, and a Cybersecurity Influencer of the Year. Armed with a wealth of knowledge and insights, Dr. Robinson guides us through the labyrinth of vulnerability…
  continue reading
 
Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work o…
  continue reading
 
Are you ready to unravel the mysteries of cybersecurity and exploit prediction? We're joined by our esteemed guest, Jay Jacobs. Today's episode promises to be a thrilling ride into the world of data insecurity as we welcome the innovator behind the groundbreaking EPSS (exploit prediction scoring system). This ingenious machine learning model, launc…
  continue reading
 
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and inter…
  continue reading
 
Today's guest, Charles Payne, brings a unique perspective to cybersecurity with his background in finance, his current roles as CISO and CTO at Neptune Media, and his experiences as an angel investor. Charles shines a light on his transition from finance to cybersecurity, unraveling how his technical knowledge has given him a unique perspective on …
  continue reading
 
Get set for a mind-expanding journey as we navigate the intriguing world of AI and blockchain with our special guest, Jonathan Capriola, the innovative CEO and founder of AI Blockchain Ventures. Jonathan, a best-selling author, successful entrepreneur, and futurist, captivates with his unique perspective on the rapidly evolving world of technology.…
  continue reading
 
Dubbed the Oprah of Cybersecurity and the Cybersecurity Social Media Queen, Dana Mantilia joins us for an exhilarating journey into the world of cybersecurity. Starting from zero just four years ago, Dana has since built a notable presence on LinkedIn and YouTube with her accessible approach to educating the everyday person about cybersecurity. The…
  continue reading
 
Ready to get your mind blown by the intriguing world of policy orchestration? Gain a whole new perspective as we dissect this cutting-edge concept alongside Gerry Geble from Strata. Gerry introduces us to the fascinating world of identity query language (IDQL) - a revolutionary approach to defining access rules and policies. Come along on this invi…
  continue reading
 
Are you ready to unlock the secrets of API security? Today, we've got a thrilling dialogue with Ameya Talwalkar and Varun Kohli from Cequence, a cybersecurity firm that's been securing APIs for prominent financial institutions and Fortune 500 companies for nearly a decade. In a world where 80% of internet traffic is API-related, our conversation co…
  continue reading
 
In this podcast we look at the importance of version control and asset management in realtime workflows that use game engines and next-generation techniques. Dell Technology’s Alex Timbs and Andy Copeland join Perforce’s Jase Lindgren for a discussion with Post’s Marc Loftus.By Alex Timbs, Andy Copeland, and Jase Lindgren
  continue reading
 
Get ready for an enlightening exchange with seasoned industry expert, Richard Stiennon, as he uncovers the secrets behind his successful journey in the security ecosystem. Richard, the mastermind behind IT-Harvest, offers exclusive insights into the creation and operations of a data-driven analyst product that stands in contrast to Gartner as a bea…
  continue reading
 
We're thrilled to welcome Mark Dorsi, CISO at Netlify, to our show for a deep dive into the complexities of startup maturity and the vital role of security practice. Mark spills the secrets on transitioning startups from early stages to full maturity, and the different types of exits that companies can pursue. He offers his invaluable perspective o…
  continue reading
 
Are you ready to understand the vital role of disaster recovery planning and the importance of cybersecurity in today's digital age? Join hosts Maggie Dillon and Josh as they sit down with Jack Bensimon, who walks us through a disaster recovery manual in a way that's easy to grasp. Jack helps us understand the necessity of preparing for potential d…
  continue reading
 
We're throwing back the curtains to give you a real sense of our day-to-day experiences as experts in cybersecurity customer advocacy. Josh and Maggie, your hosts, are on a mission to transform the face of customer service in this field; striving to provide a white glove service that we're proud to call our own. What's more, we're not shy about sha…
  continue reading
 
Ever wondered how a seven-year-old entrepreneur becomes the CEO of multiple cybersecurity companies? Well, that's exactly what Tina Williams-Koroma did. A beacon of determination and innovation, she'll be sharing her incredible journey from her first business venture to the creation of TCecure and CyDeploy. To add to this, Tina recounts her invalua…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play