Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading

1
From Data to Dignity: How Tech Powers Transformation at Atlanta Mission
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06Guest Introduction James Barrell is the Chief Information Officer at Atlanta Mission, the largest and oldest homeless services provider in the Southeast. His career spans insurance, consulting, and corporate CRM systems before he transitioned to the nonprofit world in search of greater purpose and family balance. At Atlanta Mission, James has led a…
…
continue reading

1
Building a Threat-Informed Cyber Strategy in Fintech with Kyle Draisey
50:10
50:10
Play later
Play later
Lists
Like
Liked
50:10Guest Introduction Kyle Draisey serves as the Chief Information Security Officer and Head of Cybersecurity at Sagent, a leading fintech company specializing in mortgage servicing technology. With a military and intelligence background, Kyle has navigated high-stakes environments from tactical SIGINT missions in Iraq to cybersecurity leadership role…
…
continue reading

1
Balancing Compliance and Cloud Strategy in Finance with Jean-Philippe Gerbi
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Guest Introduction Jean-Philippe Gerbi is the Chief Information Officer at Metropolitan Commercial Bank, where he oversees technology strategy in a highly regulated and security-sensitive environment. With deep experience in building scalable and secure infrastructures for financial institutions, Gerbi takes a pragmatic and risk-aware approach to d…
…
continue reading

1
Driving the Future: Rivian’s Gerard Dwyer on Smarter Systems and Bold Innovation
1:11:25
1:11:25
Play later
Play later
Lists
Like
Liked
1:11:25Guest Introduction Gerard Dwyer serves as the Chief Information Officer at Rivian, a pioneering electric vehicle company reshaping automotive technology. With a global background that spans from Ireland to Silicon Valley, Gerard’s career journey includes executive roles at Google, Waymo, and Swisscom, as well as impactful work in South Africa durin…
…
continue reading

1
How Technology Quietly Powers Hospitality – With Stephen Ferraguti
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43Guest Introduction Stephen Ferraguti serves as Director of Information Technology at Hansen Properties, a historic and hospitality-rich organization that operates Normandy Farm Hotel, Blue Bell Country Club, and the Farmer’s Daughter restaurant in Pennsylvania. With a background rooted in both tech and customer service, Stephen focuses on the often…
…
continue reading

1
AI, Ransomware & Real-World Resilience in Healthcare with Ted Williamson
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Guest Introduction Ted Williamson serves as the Chief Information Officer at Common Ground, a Michigan-based nonprofit organization specializing in crisis intervention and mental health services. He brings decades of experience across healthcare, enterprise IT, and consulting. He spent 15 years at Microsoft, where he led global consulting engagemen…
…
continue reading

1
Building Trust, Not Turnover: Jason Frame's Guide to Public Sector IT
39:21
39:21
Play later
Play later
Lists
Like
Liked
39:21In This Episode Jason Frame begins by outlining the expansive responsibilities of the Southern Nevada Health District, from inspecting restaurants and regulating ambulances to delivering immunizations and managing public health labs. As the lead technology officer, Jason's team not only enabled operations during the COVID-19 crisis but also moderni…
…
continue reading

1
Balancing Innovation and Security in Higher Education with Carol Smith
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11In This Episode Carol Smith shares how her three-decade journey at DePauw University has been shaped by the powerful community of IT professionals in higher education. She reflects on the challenges of managing a lean IT team while delivering services at the same standard as large universities. By leveraging partnerships like the HESS Consortium an…
…
continue reading

1
Quantifying Cyber Risk: A CISO’s Path to Boardroom Credibility
42:58
42:58
Play later
Play later
Lists
Like
Liked
42:58In This Episode Silvano Silva details how Nevro is using high-frequency spinal stimulation to offer life-changing relief for chronic pain sufferers—especially those with type 2 diabetes. He explains how the implantable device communicates via Bluetooth with a mobile app and cloud infrastructure, creating a highly personalized AI-driven therapy mode…
…
continue reading

1
AI vs. Invoice Fraud: Inside AppZen’s Security Strategy with Chris Bollerud
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17In This Episode Chris Bollerud shares how AppZen tackles fraud in expense and invoice processes using AI-driven automation. From scanning 100% of expense reports to matching invoices against purchase orders and flagging anomalous vendor behavior, AppZen is transforming how financial compliance is handled in enterprises of all sizes. Chris explains …
…
continue reading

1
Balancing Cool Tech with Real Strategy: What Every Security Leader Must Learn
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30In This Episode Matthew Mudry dives into his origin story, starting with a childhood fascination for dismantling and rebuilding computers and his entry into the tech world via Circuit City. He shares how a chance encounter with a bank executive launched his career and how pivotal mentorship moments at companies like Clayton and Castleton Commoditie…
…
continue reading

1
Why Collaboration Beats Competition in Cybersecurity with William Curtiss of Evanta
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34In This Episode: William Curtiss reflects on his evolution from engineering secure operating systems evaluated by the NSA to becoming an influential cybersecurity executive and peer group leader. As Co-Chair of Evanta’s CISO Governing Body, he explains how conferences foster collaboration in a field where everyone is facing the same threats—and why…
…
continue reading

1
Leading with Integrity and AI: Inside the Mind of a Credit Union CIO
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11Zac Streelman joins The Cyber Business Podcast at a pivotal moment in his career: day 15 as the new CIO of Allegacy Federal Credit Union. Despite being new to the role, Zac brings a deep and varied background that uniquely equips him to navigate Allegacy's transformation. From his early days building PCs with Cyrix 686 chips to roles in education, …
…
continue reading

1
Building Impactful Tech in the Nonprofit Sector with Kathryn Mattie
39:25
39:25
Play later
Play later
Lists
Like
Liked
39:25Kathryn shares how Brightpoint operates at scale with a team of nearly 950 staff supporting families in areas like mental health, early education, and child welfare. While funding comes largely from state and federal partnerships, Kathryn emphasizes the importance of both public and private collaborators—including AWS, a key supporter of Brightpoin…
…
continue reading

1
Why Cyber Teams Fail Without Process, Practice, and Pressure-Tested Leaders
24:47
24:47
Play later
Play later
Lists
Like
Liked
24:47Fred Clayton shares the story of how his career started not in a university, but through military service. After joining the Army to see the world, he was thrust into a technical role that would eventually evolve into a two-decade journey through networking, systems administration, cyber operations, and leadership. He became one of the early archit…
…
continue reading

1
Cybersecurity, Culture, and the Future of AI in Public Pensions with John Cahill
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04In This Episode John Cahill opens up about what it takes to manage the technology behind a massive public pension fund and the immense responsibility of delivering secure and seamless services to members who depend on monthly benefits. He shares the unique challenges of overseeing systems that handle both sensitive financial data and legislative up…
…
continue reading

1
Fighting AI with AI: Defending Against Tomorrow’s Threats Today
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In This Episode Anthony shares how an early brush with an APT shaped his entire security career. At the time, he was managing infrastructure for a global business when federal agents revealed that his organization had been compromised. That launched a one-year investigation that taught him more than any course ever could. The APT used subtle techni…
…
continue reading

1
The CISO Who Sees Around Corners: Rick Scot on AI, Fraud, and the Future of Security
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Rick Scot recounts his unexpected path to cybersecurity leadership, beginning with tech support at Disney and evolving into high-level roles at Bank of America and Bank of New York Mellon. He highlights how his passion for continuous learning and pattern recognition made data and threat intelligence natural fits, eventually landing him leadership r…
…
continue reading

1
Why Cyber Collaboration Is the Secret Weapon in Credit Unions with Sai Poguluru
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In This Episode Sai opens the conversation by offering insight into the scale and strategy behind YNCU’s cybersecurity posture—supporting 50,000+ members with just 300 employees. He explains how the credit union maintains the same core infrastructure as major banks while relying on collaboration, efficient vendor partnerships, and agile leadership …
…
continue reading

1
Why Cybersecurity Needs a Champion at the Board Level with Trent Johannesson
1:00:46
1:00:46
Play later
Play later
Lists
Like
Liked
1:00:46In This Episode Trent Johannesson brings a unique voice to cybersecurity—one shaped by decades of field experience and a determination to learn from the ground up. In this conversation, he explains how Phoenix Energy’s broad service portfolio led to hosting client data and prompted the need for internal reorganization, ultimately landing him in the…
…
continue reading

1
Securing Generations: How Vector Blends History, Innovation, and Resilience
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57In This Episode Bryan Finney walks through the massive IT and business transformation he’s spearheading at Vector Security—an organization rooted in legacy infrastructure, complex acquisitions, and a fast-evolving physical security market. He breaks down how he unified siloed teams across two companies into “One IT,” introduced enterprise architect…
…
continue reading

1
AI, Fraud, and the Future of Finance with Gina Nichols of Nymbus
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38In This Episode Gina Nichols discusses the unique position Nymbus holds as a core banking provider for regional banks and credit unions, offering a full-service modern platform or modular “sidecar” systems. She describes how the company enables financial institutions to test new digital experiences without disrupting their legacy systems—giving the…
…
continue reading

1
Building the Future: How Paragon Films Uses Tech to Shrink Plastic Waste
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20In This Episode Kenny Mullican’s journey begins in software development but quickly takes off when his startup gets acquired by Connectix—the original makers of the QuickCam webcam. He soon transitions from California tech to remote work in Tulsa, working for Logitech and managing video tools long before Zoom was a household name. His early passion…
…
continue reading

1
Inside AeroVironment: Managing Global Cybersecurity for Uncrewed Defense Systems
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19In This Episode Jan Mast discusses his role leading global cybersecurity at AeroVironment, a defense contractor at the forefront of uncrewed aerial, ground, and now underwater systems. He explains how the company manages international data regulations and CMMC compliance through advanced Microsoft configurations, while continuing to expand its oper…
…
continue reading

1
Securing Mortgage Data in a 50-State Compliance Maze with Rohbair Jean
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01In this Episode Rohbair Jean sheds light on the unique challenges of securing a mortgage company operating across all 50 states, each with different regulatory requirements. He discusses how compliance often trails behind real-world threats, urging leaders not to treat frameworks like NIST or GLBA as finish lines but as baselines. His advice? Use c…
…
continue reading

1
M&A Without Mayhem: Cyber Lessons from CISO Frank DePaola
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In this Episode Frank shares how building a playbook for consistent M&A integration became critical—not just for operations, but for cybersecurity and regulatory alignment. He details his framework built on the Three Cs: Cybersecurity (identity, MFA, EDR, cloud visibility), Compliance (mapping tools across frameworks like ISO, NIST, and CMMC), and …
…
continue reading

1
Why Public Biotechs Back Better Cybersecurity with Anthony Morano
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12In this episode… Anthony Morano shares how he leveraged a background in finance and self-taught programming to become a hands-on IT and cybersecurity leader in biotech. Starting with annuity calculations in Excel and VB, Anthony moved from labor unions to life sciences, eventually earning leadership roles at some of the most regulated organizations…
…
continue reading

1
Wiring the Future: Tech-First Strategies in Modern Construction
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42In this episode… Jeff Cann shares how Encore Electric transformed from a $92 million specialty contractor into a technology-powered $400 million enterprise operating across five states. With hundreds of field technicians working on high-elevation and remote job sites, Encore had to solve massive connectivity and digital access issues—including rigg…
…
continue reading

1
Predicting Risk: How Jaron Jones is Transforming Utility Services with AI
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31In this Episode: Jaron Jones reveals how Elm stands apart by developing most of its operational software in-house—a rare feat in the utility services sector. By maintaining control over its tech stack, Elm can remain agile, secure, and innovative even with a system originally architected two decades ago. Jaron highlights how modernizing critical co…
…
continue reading

1
Why Cybersecurity in Academia Requires Mission-Driven Leadership
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39In this episode… Shane Wilson shares what makes the IT landscape in academia so distinct—and so difficult. At Centre College, 1,400 students bring over 3,500 personal devices onto the campus network. While most businesses can control their endpoints, higher education must prioritize openness and access. Shane explains how technologies like AI-based…
…
continue reading

1
Building Smarter Homes with Data: How French Brothers Homes Scales with Tech
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23In this episode… Thomas Berrington shares how his unconventional path from managing restaurants to becoming CIO of a major home builder reflects a broader trend: industries once lagging in tech are now actively seeking data-first leadership. At French Brothers Homes, building 200 homes annually demanded a shift from spreadsheets and manual input to…
…
continue reading

1
How Grove Is Making Web3 Infrastructure Usable, Scalable, and Secure
43:56
43:56
Play later
Play later
Lists
Like
Liked
43:56In this episode… In this episode of the Cyber Business Podcast, Matthew sits down with Fred Teumer to explore Grove’s role in Web3 and the transformative potential of the Pocket Network. Fred unpacks how their decentralized infrastructure allows developers to anonymously and securely access blockchain data—without relying on centralized cloud provi…
…
continue reading

1
Why Certificate Management Must Change — and How Sectigo Leads the Way
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47In This Episode Jason Scott reveals why automation isn't just a convenience — it's a necessity. As certificate lifespans shrink to 90 and even 47 days, manual management is becoming unsustainable. Jason explains how Sectigo’s innovations allow organizations to automatically manage certificates across diverse environments, ensuring resilience agains…
…
continue reading

1
The Power of Process: Create a Company That Runs Without You with Adi Klevit
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38In this episode… Building a company that runs smoothly without constant supervision is the dream of every business owner—but few achieve it. Adi Klevit reveals how documenting and implementing the right processes can transform a fast-growing company from chaotic to calm. She breaks down her eight-step system, starting with the leadership mindset ne…
…
continue reading

1
Defending Global Gaming: Mohegan’s Battle Plan for Cybersecurity
47:17
47:17
Play later
Play later
Lists
Like
Liked
47:17In This Episode Mark Rosa opens with an overview of Mohegan Gaming and Entertainment’s massive reach, from Connecticut to Korea. Despite global expansion, the organization remains deeply rooted in its tribal culture—the Spirit of Aquai—which emphasizes cooperation, respect, and community. This spirit doesn’t just guide guest services; it’s woven in…
…
continue reading

1
Building the Airport of the Future with ATL's CIO Chris Crist
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17In this episode… When most people think of an airport, they picture terminals and gates. Chris Crist sees a city with its own infrastructure, challenges, and tempo—one that runs 24/7 and can’t afford downtime. In this conversation, he walks us through the airport’s ambitious new fiber loop project, a $110M initiative designed to create redundancy a…
…
continue reading

1
Flying Secure: How Mesa Airlines is Reinventing Cybersecurity in Aviation
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26In this episode… David and Matthew share the internal evolution of Mesa Airlines' approach to technology and cybersecurity. With Mesa being a contract carrier for United Airlines, the IT team's role is pivotal to ensuring seamless operations in a high-demand, thin-margin industry. David discusses how his team has transitioned from being perceived a…
…
continue reading

1
Why Threat Hunting Is the Future of Cybersecurity Careers with Rich Bates
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35In this episode… Rich Bates dives into the reality of federal cybersecurity requirements, offering a grounded look at how CMMC and NIST 800-171 are reshaping government contracting. He shares how Zeiders navigates the “woolly mammoth” of compliance by focusing on policies that are both thorough and adaptable. Rather than bogging down in static docu…
…
continue reading

1
AI vs AI: Cyber Threats in the Age of Automation with Randall Jackson
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41In this episode… Randall Jackson shares his unconventional journey from desktop publishing in the late '80s to leading cybersecurity in a modern financial services firm. Starting out on early Macintosh systems and troubleshooting AppleTalk networks, Randall quickly became the go-to IT expert in his organization. After his role was outsourced, he tr…
…
continue reading

1
Human Centered Leadership: Building Better IT Teams with Nastaran Bisheban
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51In This Episode: Nastaran Bisheban shares how she leads VetStrategy’s IT team in supporting veterinary clinics across Canada. With responsibility for infrastructure, cybersecurity, service desks, digital platforms, and data analytics, her team ensures seamless support for clinics so veterinarians can focus on caring for animals. She explains VetStr…
…
continue reading

1
From Apparel to IT: Greg Tsirulnik’s Playbook for Growth and Resilience
1:05:06
1:05:06
Play later
Play later
Lists
Like
Liked
1:05:06In This Episode: Greg Tsirulnik discusses his unique role as CIO of Creative Home Ideas, a leading home textile company with operations in the U.S., China, Turkey, India, Pakistan, and more. From bedding and rugs to towels and curtains, the company produces and distributes both licensed and in-house brands found in major retailers like Costco, Walm…
…
continue reading

1
The Role of AI in Cybersecurity: Ethics, Trust, and Transparency with David Epperson
37:35
37:35
Play later
Play later
Lists
Like
Liked
37:35In this episode… David Epperson’s career has been anything but ordinary. After 20 years in the military and another two decades in federal cybersecurity, he transitioned into the private sector, bringing his expertise to H2O.ai, an AI company that emphasizes trust, accuracy, and security. David shares how H2O.ai differs from traditional AI companie…
…
continue reading

1
AI in Cybersecurity: How Companies Can Stay Ahead of Evolving Threats
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode… In this insightful conversation, Billy Spears discusses the intersection of AI and cybersecurity, emphasizing how companies need to embrace AI-driven solutions to detect and mitigate threats faster than ever. He shares how Teradata's AI Unlimited platform is helping organizations automate threat detection and analyze massive amount…
…
continue reading

1
Managing IT for the World’s Busiest Airport: A CIO’s Perspective
50:04
50:04
Play later
Play later
Lists
Like
Liked
50:04In this episode… Chris Crist’s career trajectory is a testament to how adaptability and continuous learning can pave the way for success in IT leadership. Raised in a large Hispanic family, Chris never envisioned himself in a high-profile technology role. It wasn’t until he joined the U.S. Air Force that he realized his potential. Initially enlisti…
…
continue reading

1
From IT Support to Business Strategy: The CIO’s Evolving Role in Law Firms
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56In This Episode: Legal firms handle some of the most sensitive client data, making them prime targets for cyber threats. Adrian Ciocan, CIO of Lerners LLP, has worked diligently to transform his firm’s security posture, moving from a reactive to a proactive approach. He discusses how cybersecurity is no longer just a technical issue—it’s a business…
…
continue reading

1
Beyond Security: Creating a Culture of Cyber Awareness
57:20
57:20
Play later
Play later
Lists
Like
Liked
57:20In this episode… Daniel Ford discusses the evolving landscape of cybersecurity in financial institutions and the importance of fostering a positive security culture. He shares how Jovia Financial Credit Union has integrated cybersecurity into its strategic planning, treating it as a top-tier business risk rather than an IT function alone. With a fo…
…
continue reading

1
How AI and Cybersecurity Are Shaping the Future of Financial IT
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43In This Episode... Matthew Connor sits down with Kevin Hall to discuss IT’s evolving role from a support function to a strategic driver of business growth. Kevin shares how Westconsin Credit Union has shifted IT beyond the traditional “fix-it” mindset, emphasizing business enablement, internal development, and cross-department collaboration. A key …
…
continue reading

1
Why SaaS Companies Fail—And How Apoorva Fixes Them
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09In this episode… Nagesh Anupindi shares his journey from data warehousing to founding Apoorva, a company focused on helping SaaS businesses stabilize, optimize, and grow. He discusses how bad data can break a business, the risks of hiring the wrong development teams, and why many companies turn to Apoorva when their software is in trouble. One of t…
…
continue reading

1
The Secrets of Scaling: Vladyslav Podoliako’s Entrepreneurial Playbook
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00In this episode… Vlad Podoliako shares his journey from an entry-level IT position to founding Belkins, a top B2B acquisition agency. He explains how Belkins grew into a multi-company ecosystem, solving critical business challenges like email deliverability through its product, Folderly. Vlad’s approach to entrepreneurship is rooted in solving prob…
…
continue reading

1
Balancing Security and Usability in IT: Lessons from Matt Huff
34:39
34:39
Play later
Play later
Lists
Like
Liked
34:39In This Episode Matt Huff shares his remarkable journey from factory work to becoming the CIO of Tanner LLC, one of the premier accounting firms in Utah. Matt discusses how Tanner has embraced cybersecurity as a core offering, providing services such as SOC 2 compliance, ISO 27001 audits, and penetration testing. He explains how his pragmatic appro…
…
continue reading