Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Welcome to “Let’s Talk Attachments”, a podcast all about ATTACHMENT THEORY! My name is Jessica Da Silva and I’m a Licensed Marriage and Family Therapist & Attachment Coach helping you transform the way you experience love by teaching you the ins and outs of your attachment style in a practical and relatable way. Website: https://jessicadasilvacoaching.com/ Instagram: @thejessicadasilva Tiktok: @jessicadasilvacoaching Email: [email protected]
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
Greetings and Welcome to Powerful the Podcast. Powerful stands for (Powerful, Optimistic, Women ,Evolving, Relentlessly for Uplifting Lives). We are on a dedication mission to provide hope, education to our audience. The podcast will discuss powerful topics regarding unspoken/uncomfortable conversations that we shy away from discussing.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading
Welcome to "the Primal Question," a podcast by Mike Foster, where we explore the deep-seated questions that drive our lives. Have you ever wondered what seasoned counselors say in their sessions to help people like CEOs, Grammy-winning Hip-Hop Artists, Emmy-winning Actors, and Non-Profit World-Changers heal from their past and unlock their full potential? Now’s your chance to be a fly on the wall. After spending 20+ years coaching and counseling high-level leaders, Mike Foster is pulling bac ...
…
continue reading

1
Is Your Ego Impeding Your Career Fulfillment?
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights …
…
continue reading

1
Unspoken Security’s AJ Nash on Protecting Against AI Model Poisoning
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32In our latest episode of The Future of Threat Intelligence, recorded at RSA Conference 2025, AJ Nash, Founder & CEO, Unspoken Security, provides a sobering assessment of AI's transformation of cybersecurity. Rather than focusing solely on hype, AJ examines the double-edged nature of AI adoption: how it simultaneously empowers defenders while dramat…
…
continue reading

1
Digital Turbine's Vivek Menon on AI Acceleration vs Attack Expansion
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16The security industry's obsession with cutting-edge threats often overshadows a more pressing reality: the vast majority of organizations are still mastering basic AI implementation. Vivek Menon, CISO & Head of Data at Digital Turbine, brings his insights from the RSA expo floor to share why the agentic AI security rush may be premature, while high…
…
continue reading

1
How I Became a CISO in 90 Days: My Full Roadmap in 2025
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Can you land a CISO role without the title, the connections, or the years of "required" experience? Yes and I did it in 90 days. This isn’t luck. It’s strategy. In today's episode, I walk you through the exact roadmap I used to go from rejected applications and zero C-level experience to signing my first CISO contract. In this episode, you’ll learn…
…
continue reading

1
Bitcoin as Pristine Collateral: Risk Redefined. @PeoplesReserve with @CJKonstantinos
20:31
20:31
Play later
Play later
Lists
Like
Liked
20:31During the darkest days of the last bear market, 5 years ago, I met my friend and guest @CJKonstantinos at The Green Flash in Florida. This guy is the definition of OG by doubling down and starting @peoplesreserve. He's creating Bitcoin-backed financial products that are reshaping the way we think about money. Tomorrow we are both speaking at Bitco…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading

1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading

1
Inside the Mind of a CISO: What History Teaches Us About AI & Cybercrime
1:10:02
1:10:02
Play later
Play later
Lists
Like
Liked
1:10:02Do you know the first cyberattack in history happened in 1834? And what if the scariest part of AI isn't what it does - but what it makes us ignore? This isn’t science fiction. It’s real. And it’s already happening. In this keynote, I take you through the 200-year evolution of fraud - from wooden blocks to synthetic identities, how AI is making sca…
…
continue reading

1
From Cost Center to Growth Driver: The CFO’s Playbook for Cloud Security ROI
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36For years, security has been treated as a necessary evil - a budget line item that CFOs approve without truly understanding its business impact. But what if cloud security could be a revenue driver, an efficiency enabler, and a cost-saving powerhouse? In this episode, Dani Woolf sat down with Chris Thomas, Chief Revenue Officer at AlgoSec, to break…
…
continue reading

1
From Bitcoin to Boat Storage: Joey Rosati on Diversifying Investments
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26I've gotten to know Joey Rosati (@rosaticorp) over the last 3 years working alonside hime in the VC trenches of Druid Ventures. Let me tell you, the VC world is a funny place and there are gems if you know where to find them. Joey is one of them. He knows that behind every successful business, it's all about people. In today's epic episode, Joey jo…
…
continue reading

1
GigaOm’s Howard Holton on Why AI Will Be the OS of Security Work
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43The cybersecurity industry has witnessed numerous technology waves, but AI's integration at RSA 2025 signals something different from past hype cycles. Howard Holton, Chief Technology Officer at GigaOm, observed AI adoption across virtually every vendor booth, yet argues this represents genuine transformation rather than superficial marketing. His …
…
continue reading

1
Online Business Systems' Jeff Man on PCI 4.0's Impact
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31The cybersecurity industry has long operated on fear-based selling and vendor promises that rarely align with practical implementation needs. Jeff Man, Sr. Information Security Evangelist at Online Business Systems, brings a pragmatic perspective after years of navigating compliance requirements and advising organizations from Fortune 100 enterpris…
…
continue reading

1
Want to Lead in Cybersecurity? Follow These 5 Unspoken Rules
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34Leading in cybersecurity is like diving into the unknown. You need more than just the "rules of the land" – you need a whole new set of skills to navigate this "underwater" world. In this episode, we'll dive into: why your lack of people skills is holding you back (and it's not just for the leaders!), the #1 trait of an effective leader, why negoti…
…
continue reading

1
Why the vCISO Model Is More Than a Stopgap for Organizations Looking for Security Leadership
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32In this milestone 100th (and birthday!) episode of Audience 1st Podcast, Dani Woolf is joined by veteran cybersecurity leader David Doyle from DirectDefense for a brutally honest conversation about what’s broken in today’s security leadership models and how the rise of the vCISO is more than just a stopgap. Together, they unpack the myths, power dy…
…
continue reading

1
How Post-Quantum Computing (PQC) Will Save the Internet
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They…
…
continue reading

1
Trellix's John Fokker on Why Ransomware Groups Are Fragmenting
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51The criminal underground is experiencing its own version of startup disruption, with massive ransomware-as-a-service operations fragmenting into smaller, more agile groups that operate like independent businesses. John Fokker, Head of Threat Intelligence at Trellix, brings unique insights from monitoring hundreds of millions of global sensors, reve…
…
continue reading

1
Frost & Sullivan's Martin Naydenov on AI's Cybersecurity Trust Gap
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14In this special RSA episode of Future of Threat Intelligence, Martin Naydenov, Industry Principal of Cybersecurity at Frost & Sullivan, offers a sobering perspective on the disconnect between AI marketing and implementation. While the expo floor buzzes with "AI-enabled" security solutions, Martin cautions that many security teams remain reluctant t…
…
continue reading

1
The GTM Gauntlet in Cybersecurity: What We're Still Getting Wrong | Authenticated by Confide
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32In this special episode of Authenticated, Confide brings together a powerhouse panel of security operators, marketers, and founders to dissect the brutal realities of go-to-market in cybersecurity. From failed conference booth investments to relationship-first community building, this conversation goes deep on why most vendors still miss the mark, …
…
continue reading

1
Cyware’s Jawahar Sivasankaran on Automating Threat-Centric Operations
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53In this special RSA 2025 episode of The Future of Threat Intelligence, David speaks with Jawahar Sivasankaran, President of Cyware, about their partnership with Team Cymru to democratize threat intelligence. Jawahar outlines how their CTI program in a box approach enables organizations to implement comprehensive threat intelligence capabilities in …
…
continue reading
In this episode, we explore the hidden struggles behind avoidant attachment through a candid conversation with someone who’s lived it. We discuss: 🔹 Why he resisted change in past relationships — believing emotional distance was a strength 🔹 How self-protection became self-disconnection 🔹 The breakup that made him realize his avoidant patterns were…
…
continue reading

1
Cognitive Risk, Neurodivergence, and the Unspoken Realities of Security Leadership
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19In this episode of Audience 1st Podcast, Dani Woolf sits down with Val Popke to explore the unspoken human dimensions of cybersecurity leadership. Val, a veteran, assurance leader, and self-described “Wandering Cyber Vulva,” challenges the industry’s prevailing narratives around hiring, communication, inclusion, and resilience. The discussion goes …
…
continue reading

1
Security Awareness Training Sucks! Focus on Situational Awareness (Part 2)
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education. Instead of focusing on checkbox exe…
…
continue reading

1
Honest Advice to Lead in Cybersecurity in 2025 (HARSH TRUTH No One’s Telling You)
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Tired of the same old advice that isn't getting you anywhere in your cybersecurity career? Everyone says "get more technical skills," but what if that's only part of the story? If you're aiming for leadership roles like CISO, Security Director, or Head of GRC, or other security leadership roles, this episode is for you. In this episode, we dive int…
…
continue reading
In this personal episode, I take you behind the scenes of a recent dating experience that stirred up both growth and grief — and revealed just how far I’ve come on my attachment healing journey. As someone who used to operate from a fearful avoidant (leaning anxious) attachment style, I now move through dating with much more self-trust, clarity, an…
…
continue reading

1
A Deep Dive Into The Multi-Cloud Mess & How AlgoSec Connects the Dots
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48What does it really take to secure applications across a hybrid, multi-cloud environment? In this episode of Audience 1st, I sit down with Adolfo Lopez, Sales Engineer at AlgoSec, who brings a practitioner’s lens to the cloud security conversation. From his experience as a network engineer to helping organizations operationalize cloud security toda…
…
continue reading

1
Rapid7’s Lonnie Best on Measuring SOC Success Beyond Alert Closures
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In a world obsessed with cutting-edge security technology, Lonnie Best, Senior Manager of Detection & Response Services at Rapid7, makes a compelling case for mastering the fundamentals. After transitioning from craft beer journalism through nuclear security to cybersecurity, Lonnie witnessed the evolution of ransomware attacks from "spray and pray…
…
continue reading

1
7 Career Hacks That Put You in Top 1% (Most People Ignore These!)
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49Have you ever felt lost in your career, unsure if you're heading in the right direction, or if you're making the impact you're capable of? You can ask others for guidance, but only you can truly direct yourself. Managing your career is your job and your job only. No one else's. In this episode, we dive into the importance of betting on yourself and…
…
continue reading

1
Letting Go of Unavailable Love: Meghan’s Journey to Security (Client Stories)
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Today on the podcast, we’re joined by the lovely Meghan Gatto. Meghan went through the My Secure Self group coaching program this past summer with the goal of deepening her understanding of anxious attachment — and learning practical tools to break unhealthy relationship patterns. In this episode, we dive into: Breaking the cycle of anxious attach…
…
continue reading

1
Successful Cybersecurity Marketing with Qualitative Buyer Data and Brain Power
44:45
44:45
Play later
Play later
Lists
Like
Liked
44:45In this provocative and no-fluff episode of Keyboard Samurai, host, Wil Kluv, sits down with Dani Woolf and Ben Siegel to unpack what’s broken in how cybersecurity vendors go to market and how to fix it using real buyer data and a deeper understanding of human psychology. Dani and Ben, co-founders of CyberSynapse and veterans of cybersecurity GTM, …
…
continue reading

1
Security Awareness Training Sucks! Focus on Situational Awareness (Part 1)
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education. Instead of focusing on checkbox exe…
…
continue reading

1
5 AI Questions Every Smart Leader Asks (99% Don’t!)
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03Have you ever called customer service, only to realize you’re speaking to an AI—one that understands your frustration, adjusts its tone, and even convinces you to buy more? AI is getting scarily good at mimicking human-like conversations, emotions, and even decision-making. But here’s the kicker—it doesn’t feel anything. So, how do you know if your…
…
continue reading

1
Know Before You Go: The Empathy Codified Playbook for RSA Conference 2025
59:49
59:49
Play later
Play later
Lists
Like
Liked
59:49Most vendors won’t admit this, but we will: Your brand doesn’t have a messaging problem. It has a presence problem. And it’s why buyers leave RSA feeling numb, unseen, and unready to trust you. In this episode, Dani Woolf sits down with Zachary Hyde, someone she doesn’t always agree with, which makes this conversation one of the most honest and urg…
…
continue reading

1
Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. In this no-holds-barred conve…
…
continue reading

1
Salary Negotiation Masterclass: 9 Steps to Get a 6-Figure Salary!
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Feeling underpaid and undervalued? The truth is—YOU are your best salary negotiator. Studies show that professionals who negotiate their salary can increase their pay by an average of $5,000! In this episode, I’ll share 9 proven steps to help you negotiate your salary with confidence and secure the pay you truly deserve. You’ll Learn: The mindset s…
…
continue reading

1
Bitcoin = Home: The Mortgage Revolution No One Saw Coming with Josip Rupena of Milo
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Here’s a sentence I never thought I’d say: you can buy a house with your Bitcoin — without ever selling it. That’s the financial revolution Josip Rupena is building. He’s the founder and CEO of Milo, the fintech startup that’s already issued over $60 million in crypto mortgages — loans backed by your Bitcoin, not your bank account. And here’s the k…
…
continue reading

1
Crypto, AI Agents, and the Future of Decentralized Infrastructure with Chris “Jinx” Jenkins
17:32
17:32
Play later
Play later
Lists
Like
Liked
17:32My buddy Chris Jenkins just got back from ETHDenver, and he’s buzzing about the convergence of crypto and AI. He’s the head of operations at the Pocket Network Foundation, and right now, they’re gearing up for their biggest protocol upgrade ever: Shannon. What they’re doing is wild — opening up full permissionless access to decentralized data, from…
…
continue reading

1
What Cybersecurity Leaders Must Learn from OT Practitioners in Underserved Critical Infrastructure
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Audience 1st Podcast, Dani sits down with Kristin Demoranville, CEO of Anzen Sage and host of the Bites & Bytes podcast, to uncover the hidden vulnerabilities in one of the world’s most overlooked critical infrastructure sectors: food and agriculture. From insider threats in peanut processing to cyber attacks that disrupt egg sup…
…
continue reading
Ransomware gangs aren’t faceless shadows. Jon DiMaggio knows—he’s talked to them. In this episode, A.J. Nash sits down with the Chief Security Strategist at Analyst1 to pull back the curtain on the hidden world of cybercriminals. Jon shares how he builds detailed personas, infiltrates ransomware crews like LockBit, and navigates the psychological t…
…
continue reading

1
Silk Road to Satoshi: Digging Up Bitcoin’s Buried Past with Pete Rizzo
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03Pete Rizzo Thinks We're Losing Bitcoin's History. I'm Helping Him Fix That. Pete Rizzo’s been called Bitcoin’s historian — and after this conversation, you’ll understand why. He’s spent the past few years diving deep into the stories, people, and drama that built Bitcoin from nothing into a global force. We talk about that work — the threads, the a…
…
continue reading