We Cover the Cyberspace.
…
continue reading
Cybernomics: Where we Uncover the Hidden Costs and Opportunities in Cybersecurity Cybersecurity isn’t just tech—it’s economics. Every decision you make has hidden financial implications: unseen risks, overlooked costs, and untapped opportunities. On Cybernomics, we cut through the noise to reveal the true economic impact of cybersecurity choices, empowering you to invest smarter, manage risk better, and drive stronger financial outcomes. Each episode features candid conversations with season ...
…
continue reading
The Society of American Military Engineers leads collaborative efforts to identify and resolve national security infrastructure-related challenges. Founded in 1920, SAME unites public and private sector individuals and organizations from across the architecture, engineering, construction, environmental and facility management, cyber security, project planning, contracting and acquisition, and related disciplines in support of national security. Headquartered in Alexandria, Va., SAME provides ...
…
continue reading
Editor of Post Magazine Marc Loftus interviews the industry's top professionals giving a window into the world of post production and filmmaking that is rarely seen
…
continue reading

1
Cybersecurity Recruiter/Founder talks Entrepreneurship, Startups, and the state of the Job Market.
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Josh Keeley is a Co-Founder of Trident Search, a cybersecurity recruiting agency specializing in early state cybersecurity startups. He talks about his journey as an entrepreneur, cybersecurity startups, and the current state of the job market.By RealTime Cyber
…
continue reading

1
Market Watch #3 - Will AI Replace Your Security Team? Hard Truths and Bold Predictions
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52AI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investment landscape reflects this shift, with 78% of venture capital reportedly flowing into AI companies despit…
…
continue reading

1
#43 - Securing Law Firms, Legal Data Security, AI, Job Security, FedRAMP - Dean Sapp, CISO @FileVine
46:26
46:26
Play later
Play later
Lists
Like
Liked
46:26Ever wonder what happens when centuries-old legal practices collide with cutting-edge technology? Dean Sapp, CISO at FileVine, pulls back the curtain on the digital transformation revolutionizing law firms worldwide. Beyond just modernizing paperwork, Dean reveals why attorneys have become prime targets for sophisticated hackers and nation-states. …
…
continue reading

1
Market Watch #2 - AI and the Future of Security Operations - Josh Bruyning and Richard Stiennon
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50In this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027. • SOC automation represents the most imme…
…
continue reading

1
#42 Is Cybersecurity a Technology Risk or a Business Risk? with Mark Nicholls, CEO @Information Security Group
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Mark Nicholls discusses how to integrate cybersecurity throughout the development lifecycle rather than treating it as an afterthought with pre-go-live penetration testing. He explains that embedding security into early design phases requires both leadership commitment and proper resource allocation to overcome the natural friction between IT and s…
…
continue reading

1
#41 Why Your Business Is More Vulnerable Than You Think - Corey White, CEO @Cyvatar
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39Cybersecurity doesn't have to be overwhelming or unaffordable for small and mid-sized businesses. Corey White, CEO at Cyvatar, explains how their platform provides right-sized, comprehensive security that serves as a business driver rather than just a cost center. • Most companies don't need to hire a full security team – outsourcing cybersecurity …
…
continue reading

1
Market Watch: When Markets Fall, Savvy Investors Go Shopping for Cybersecurity Companies, with Richard Stiennon
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31Market fluctuations cause cybersecurity stocks to drop 4-7%, creating buying opportunities for savvy investors despite fears surrounding Trump's new tariff policies. • Tariff impacts vary across cybersecurity companies—hardware manufacturers like Palo Alto and Fortinet face direct challenges with 54% tariffs on Chinese-made equipment • Current tari…
…
continue reading

1
Market Research #1 - Why Investors and Enterprises Should Invest in Israeli Cyber Companies
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44The extraordinary success of Israeli cybersecurity companies on the global stage represents a fascinating case study in how a small nation can dominate a critical technology sector. Despite having just 9 million citizens, Israel has become the world's second-largest hub for cybersecurity innovation, home to over 450 security startups that collectiv…
…
continue reading

1
#40 Securing the Machines That Keep Us Alive: A Conversation with Christian Espinosa
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Christian Espinosa, founder of Blue Goat Cyber, reveals the critical vulnerabilities in medical devices and how his company is working to secure the technology that keeps patients alive. After surviving a near-fatal health crisis that was diagnosed using a medical device, Christian dedicated his career to ensuring these life-saving technologies rem…
…
continue reading

1
#39 How to Leverage AI and Save your Job with Jenna Gardner
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58We explore the emergence of a new AI-driven economy that's creating unprecedented opportunities for entrepreneurs and businesses of all sizes to compete at enterprise levels with minimal resources. • AI represents the most significant technological advancement since the wheel, democratizing powerful capabilities previously available only to large c…
…
continue reading

1
#38 - Google's $32B Cloud Security Gamble with Richard Stiennon & Chad Boeckmann
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Google makes a monumental $32 billion acquisition of cloud security leader Wiz, marking one of the largest cybersecurity acquisitions in history after previously attempting to purchase the company for $23 billion last year. • Wiz offers simple cloud security deployment that provides immediate visibility into cloud environments • Founded by a team t…
…
continue reading

1
Cyber Acquisitions #1 - Armis x OTORIO, ForcePoint x GetVisibility, CyberGuru x Mantra SAS - Niche is King (Right Now)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47The cybersecurity industry is undergoing rapid consolidation as established companies expand their capabilities through strategic acquisitions rather than internal development. Three major acquisitions in March 2025 highlight key trends: the growing importance of securing operational technology, the central role of AI in data security, and the cont…
…
continue reading

1
CISO Hot Takes: GRC, AI & Vendor Relations in Healthcare
48:51
48:51
Play later
Play later
Lists
Like
Liked
48:51Dan Holland, Deputy CISO of Tampa General Hospital, joins us for a deep dive into a wide range of topics—from GRC and AI to vendor risk management and the unique cybersecurity challenges posed by hurricanes in Florida. We also explore his journey from cybersecurity entrepreneur to his current role at Tampa General.…
…
continue reading

1
#37 - The Hidden Costs of Scaling a Cyber Risk Program with Chad Boeckmann, CEO @TrustMAPP
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23In this episode, we explore the intricate relationship between risk management and business objectives, specifically tailored for small and medium-sized businesses. Chad Boeckmann discusses strategies to elevate cybersecurity risk awareness among executive leadership, the role of cyber insurance, and the importance of bridging the gap between secur…
…
continue reading

1
#36 The Hidden Costs of Vulnerability Management with Kyle Bhiro, CEO @Pensar
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58In this episode of Cybernomics, Josh Bruyning and Kyle Bhiro discuss the hidden costs associated with vulnerability management in cybersecurity. They explore the importance of understanding these costs, the role of AI in improving efficiency, and the necessity of human oversight in security operations. The conversation also touches on the concept o…
…
continue reading

1
#35 - The Hidden Costs of Regulating Cybersecurity and AI Privacy - Michael Nouguier, CISO @Richey May
1:02:04
1:02:04
Play later
Play later
Lists
Like
Liked
1:02:04On this episode of Cybernomics, Josh explores the Hidden Costs of Cybersecurity Regulations and conducts a cost-benefit analysis with Michael Nouguier, CISO at Richey May, and our guest co-host, Igor Volovich, former CISO at Invensys and Schneider Electric. Hidden Costs of Regulating Cybersecurity: Compliance costs (audits, certifications, and tech…
…
continue reading

1
#34 The Hidden Costs of Terminating a CISO - Greg Schaffer, Principal @vCISO Services
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26Greg and Josh pull back the curtain on the pitfalls and strategic voids left by frequent CISO transitions, which can leave companies vulnerable and scrambling for continuity. We shed light on the arduous onboarding process new CISOs face, taking months to assess existing security frameworks and the ripple effects this delay has on strategic initiat…
…
continue reading

1
Behind the Scenes of Election Security: CISO of AZ Sec of State
1:04:08
1:04:08
Play later
Play later
Lists
Like
Liked
1:04:08Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respo…
…
continue reading

1
#33 Unlocking ROI Through the Power of Authenticity, Mel Reyes, President and Founder @ISSA SoCal
24:47
24:47
Play later
Play later
Lists
Like
Liked
24:47Authenticity emerges as a vital theme in our latest episode, showcasing how being true to oneself can create more genuine connections in cybersecurity and beyond. Mel "Fireball" Reyes shares his personal journey of embracing authenticity and its significant impact on audience engagement, trust, and organizational culture. • Discussion on the need f…
…
continue reading

1
#32 SOC Burnout with Dan Spiner, General Manager for North America @Cyngular Security
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44This episode explores the transformative role of automation in cybersecurity through Cyngular Security's innovative approach. By focusing on Cloud Investigation and Response Automation (CIRA), we discuss how this technology alleviates alert fatigue, reduces burnout among analysts, and empowers teams to enhance their security efforts. • Cyngular Sec…
…
continue reading

1
#31 A Look back at Cybersecurity Investment in 2024 with Richard Stiennon, CEO and Co-Founder @IT-Harvest
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independ…
…
continue reading

1
#30 The Future of API Security with Randolph Barr, CISO @Cequence
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Unlock the secrets of API security with our esteemed guest, Randolph Barr, the new Chief Information Security Officer at Cequence Security. With a stellar career spanning companies like Zoom, Qualys, Cisco, and Webex, Randy is the perfect guide to navigate the complexities of the digital world. We explore the innovative strategies Sequence Security…
…
continue reading

1
#29 I Love Your Product, But I Can't Buy It - Ian Poynter, CEO @Kalahari Security
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01In this episode of Cybernomics (formerly Security Market Watch), host Josh Bruyning engages with Ian Poynter, founder of Kalahari Security, to explore the economics of cybersecurity. They discuss the challenges of selling security solutions, the importance of understanding business needs, and the inadequacy of mere sympathy in the face of security …
…
continue reading

1
The Evolution Of Visual Effects & The Promise Of A.I.
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34In this Post TV Podcast, Marc Loftus sits down with veteran VFX supervisor Paul Butterworth and Dell Technologies' Alex Timbs. Paul details his 25-plus-year career working with directors such as Ridley Scott and George Miller. His credits span several Marvel films, including Captain America: Civil War, Guardians of the Galaxy Volume 2 and Avengers …
…
continue reading

1
#28 From Village Roots to Silicon Valley, Revolutionizing API Security, Buchi Reddy, CEO and Founder @Levo Ai
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15Buchi Reddy, CEO and founder of Levo AI, shares his unique immigrant story and the journey that led him to start his own cybersecurity company. Levo AI focuses on API security and helps enterprises protect their digital footprint and applications using AI. Buchi discusses the challenges he faced as an immigrant and the importance of mentors and ski…
…
continue reading

1
#27 Startup Success in the Cyber World with Dov Yoran, CEO and Co-Founder @Command Zero
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Dov Yoran, co-founder and CEO of Command Zero, shares his journey in the cybersecurity industry and the mission of his company. The conversation covers topics such as the category Command Zero falls into, the problem they are solving, the challenges of being an entrepreneur, and the importance of teamwork. Dov emphasizes the need to keep driving fo…
…
continue reading

1
Operation CrytoRunner: The Scam Laundering Takedown Told by Secret Secret Agent
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
…
continue reading

1
#26 “75% of My Company was Built with AI,” Randy Blasik, Co-Founder and CTO @ComplianceAide
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24In this conversation, Josh Bruyning interviews Randy Blasik, the CTO and co-founder of ComplianceAide, about his journey as an AI bro and the use of generative AI in building his company. They discuss the power and potential of generative AI, the challenges of bringing a product like Compliance Aid to market, and the skepticism and misconceptions s…
…
continue reading

1
#25 Cybersecurity Resilience with Matt Webster, CEO @Cyvergence
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07What happens when 75% of Chief Information Security Officers contemplate leaving their jobs? In this compelling episode of Security Market Watch, we engage with Matt Webster, CEO and CISO at Cyvergence, to tackle this critical issue head-on. With his extensive background as a former CISO, Matt sheds light on the alarming turnover rates in the indus…
…
continue reading

1
#24 Classroom Blues to Security Leadership, Tina Williams-Koroma, CEO and Co-Founder @CyDeploy
20:14
20:14
Play later
Play later
Lists
Like
Liked
20:14Join us as Tina unpacks the challenges and triumphs of transitioning from a service-based to a product-based business. From navigating the complexities of venture capital to balancing technical oversight with strategic planning, Tina's experiences offer invaluable lessons for aspiring entrepreneurs. She highlights the critical importance of a stron…
…
continue reading

1
CISO of Arizona Talks AI Threats, AI Policy, and His Journey to CISO
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Beco…
…
continue reading
Phillip Hinders is a Digital Forensics examiner for the State of Ohio. He supported cybersecurity incident response efforts for the State of Ohio before working as a digital forensics examiner supporting law enforcement, mainly conducting digital forensics with tools like Cellebrite and Grey Key.By RealTime Cyber
…
continue reading
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixe…
…
continue reading

1
Former NSA Contractor Talks Quantum Computing
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28By RealTime Cyber
…
continue reading

1
#23 Rethinking Compliance and Cyber Security with Igor Volovich, Cybersecurity Strategist @Qmulos
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Discover the intriguing parallel worlds of cyber security and finance as we navigate through compelling discussions with our distinguished guest, Igor Volovich. Promising to equip you with a nuanced understanding of the convergence of risk and compliance, we catapult into the breach of SolarWinds and the ensuing SEC charges. With Igor's expert insi…
…
continue reading

1
#22 What's New in Vulnerability Management with Dr. Nikki Robinson, Senior Manager @IBM
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Ready for a crash course in cybersecurity? Grab your note-taking tools and join us for a riveting conversation with the esteemed Dr. Nikki Robinson, the trailblazing STSM and lead architect at IBM, and a Cybersecurity Influencer of the Year. Armed with a wealth of knowledge and insights, Dr. Robinson guides us through the labyrinth of vulnerability…
…
continue reading

1
#21 AI and Human Interplay with Rich Owen, Retired
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work o…
…
continue reading

1
#20 EPSS and Security with Jay Jacobs, Founder @Empirical Security
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09Are you ready to unravel the mysteries of cybersecurity and exploit prediction? We're joined by our esteemed guest, Jay Jacobs. Today's episode promises to be a thrilling ride into the world of data insecurity as we welcome the innovator behind the groundbreaking EPSS (exploit prediction scoring system). This ingenious machine learning model, launc…
…
continue reading

1
The Space Domain & Electronic Battlefield; from Military to Startups
48:04
48:04
Play later
Play later
Lists
Like
Liked
48:04Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and inter…
…
continue reading

1
#19 Cyber Security, Investment, and DEI dynamics with Charles Payne, Angel Investor and CISO @Neptune Media
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24Today's guest, Charles Payne, brings a unique perspective to cybersecurity with his background in finance, his current roles as CISO and CTO at Neptune Media, and his experiences as an angel investor. Charles shines a light on his transition from finance to cybersecurity, unraveling how his technical knowledge has given him a unique perspective on …
…
continue reading

1
#18 The Future of AI and Blockchain with Futurist Jonathan Capriola, CEO @AI Blockchain Ventures
53:17
53:17
Play later
Play later
Lists
Like
Liked
53:17Get set for a mind-expanding journey as we navigate the intriguing world of AI and blockchain with our special guest, Jonathan Capriola, the innovative CEO and founder of AI Blockchain Ventures. Jonathan, a best-selling author, successful entrepreneur, and futurist, captivates with his unique perspective on the rapidly evolving world of technology.…
…
continue reading

1
#17 Cybersecurity Education and Online Safety with Dana Mantilia, CEO @Cyber Dana
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37Dubbed the Oprah of Cybersecurity and the Cybersecurity Social Media Queen, Dana Mantilia joins us for an exhilarating journey into the world of cybersecurity. Starting from zero just four years ago, Dana has since built a notable presence on LinkedIn and YouTube with her accessible approach to educating the everyday person about cybersecurity. The…
…
continue reading

1
#16 Demystifying Policy Orchestration with Gerry Geble, VP @Product Strata
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20Ready to get your mind blown by the intriguing world of policy orchestration? Gain a whole new perspective as we dissect this cutting-edge concept alongside Gerry Geble from Strata. Gerry introduces us to the fascinating world of identity query language (IDQL) - a revolutionary approach to defining access rules and policies. Come along on this invi…
…
continue reading

1
#15 Challenges of API Protection with Industry Ameya Talwalkar and Varun Kohli, CEO and @Cequence
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08Are you ready to unlock the secrets of API security? Today, we've got a thrilling dialogue with Ameya Talwalkar and Varun Kohli from Cequence, a cybersecurity firm that's been securing APIs for prominent financial institutions and Fortune 500 companies for nearly a decade. In a world where 80% of internet traffic is API-related, our conversation co…
…
continue reading

1
Version control and asset management in realtime workflows
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39In this podcast we look at the importance of version control and asset management in realtime workflows that use game engines and next-generation techniques. Dell Technology’s Alex Timbs and Andy Copeland join Perforce’s Jase Lindgren for a discussion with Post’s Marc Loftus.By Alex Timbs, Andy Copeland, and Jase Lindgren
…
continue reading

1
#14 Vendor Health Analysis with Richard Stiennon, Co-Founder and CEO @IT-Harvest
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03Get ready for an enlightening exchange with seasoned industry expert, Richard Stiennon, as he uncovers the secrets behind his successful journey in the security ecosystem. Richard, the mastermind behind IT-Harvest, offers exclusive insights into the creation and operations of a data-driven analyst product that stands in contrast to Gartner as a bea…
…
continue reading

1
#13 Navigating Startup Maturity and Security with Mark Dorsi, CISO @Netlify
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34We're thrilled to welcome Mark Dorsi, CISO at Netlify, to our show for a deep dive into the complexities of startup maturity and the vital role of security practice. Mark spills the secrets on transitioning startups from early stages to full maturity, and the different types of exits that companies can pursue. He offers his invaluable perspective o…
…
continue reading

1
#12 Understanding Disaster Response in the Financial Industry Ft. Jack Bensimon, Co-Founder @ArcStone Securities
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57Are you ready to understand the vital role of disaster recovery planning and the importance of cybersecurity in today's digital age? Join hosts Maggie Dillon and Josh as they sit down with Jack Bensimon, who walks us through a disaster recovery manual in a way that's easy to grasp. Jack helps us understand the necessity of preparing for potential d…
…
continue reading

1
#11 Cybersecurity Customer Advocacy and Investment Strategies with Josh and Maggie
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12We're throwing back the curtains to give you a real sense of our day-to-day experiences as experts in cybersecurity customer advocacy. Josh and Maggie, your hosts, are on a mission to transform the face of customer service in this field; striving to provide a white glove service that we're proud to call our own. What's more, we're not shy about sha…
…
continue reading

1
#10 Understanding Cybercrime Ft. Tina Williams-Koroma, CEO and Co-Founder @CyDeploy
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Ever wondered how a seven-year-old entrepreneur becomes the CEO of multiple cybersecurity companies? Well, that's exactly what Tina Williams-Koroma did. A beacon of determination and innovation, she'll be sharing her incredible journey from her first business venture to the creation of TCecure and CyDeploy. To add to this, Tina recounts her invalua…
…
continue reading