Artwork

Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Why Cyber Extortion Payments Should Be Illegal

1:10:29
 
Share
 

Manage episode 468473674 series 3648340
Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Ever wonder what would happen if paying cyber ransom demands was flat-out illegal?

In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that.

Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation.

We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax.

We dig into the controversial issue of banning ransomware payments, asking if companies should be forced to fend off attackers without cutting that check.

Real-world experiences and high-profile cases reveal the dangers of flawed decryption keys, repeated attacks, and the temptation to rely on quick fixes instead of building stronger defenses.

Ross’ entrepreneurial insights show why cybersecurity investments might be a better bet than gambling on a criminal’s word.

We also explore how government incentives and cyber insurance could reshape security strategies, pushing organizations to harden their defenses rather than pay their way out of trouble.

The parallels between cybersecurity and healthcare come into focus, highlighting why threat visibility and information sharing are so crucial.

Throughout the episode, we touch on the often-overlooked risks in operational technology and celebrate the growing influence of Chief Information Security Officers.

Their leadership—and the rise of trusted information-sharing networks—could spell a more secure future.

But it’s a team effort: everyone from executives to engineers plays a role in making it happen.

Join us for an engaging discussion that blends humor, entrepreneurship, and real talk about the crossroads of innovation and cybersecurity.

Tune in to Cyber After Hours to see how these stories and perspectives might just shape the way we tackle cyber threats moving forward.

Thank you for watching / listening!
Connect with us on LinkedIn:
- Evan: https://www.linkedin.com/in/evanmorgan/
- Paul: https://www.linkedin.com/in/pm01/

  continue reading

29 episodes

Artwork
iconShare
 
Manage episode 468473674 series 3648340
Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Ever wonder what would happen if paying cyber ransom demands was flat-out illegal?

In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that.

Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation.

We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax.

We dig into the controversial issue of banning ransomware payments, asking if companies should be forced to fend off attackers without cutting that check.

Real-world experiences and high-profile cases reveal the dangers of flawed decryption keys, repeated attacks, and the temptation to rely on quick fixes instead of building stronger defenses.

Ross’ entrepreneurial insights show why cybersecurity investments might be a better bet than gambling on a criminal’s word.

We also explore how government incentives and cyber insurance could reshape security strategies, pushing organizations to harden their defenses rather than pay their way out of trouble.

The parallels between cybersecurity and healthcare come into focus, highlighting why threat visibility and information sharing are so crucial.

Throughout the episode, we touch on the often-overlooked risks in operational technology and celebrate the growing influence of Chief Information Security Officers.

Their leadership—and the rise of trusted information-sharing networks—could spell a more secure future.

But it’s a team effort: everyone from executives to engineers plays a role in making it happen.

Join us for an engaging discussion that blends humor, entrepreneurship, and real talk about the crossroads of innovation and cybersecurity.

Tune in to Cyber After Hours to see how these stories and perspectives might just shape the way we tackle cyber threats moving forward.

Thank you for watching / listening!
Connect with us on LinkedIn:
- Evan: https://www.linkedin.com/in/evanmorgan/
- Paul: https://www.linkedin.com/in/pm01/

  continue reading

29 episodes

All episodes

×
 
Ever wonder if those dusty legacy systems you’ve been ignoring are one breach away from disaster? In Episode 29 of Cyber After Hours—titled “How to Secure Legacy Systems in a Modern World?”—co-hosts Evan Morgan and Paul Marco dig into the tough questions around outdated tech. They talk about everything from finding the right work-life balance (and when it’s time to ask for help) to why “if you’re not learning or earning, it might be time to quit.” Along the way, they highlight how hiring the right people can supercharge a team and how shifting to modern platforms—like SaaS—can help you ditch the security risks of old systems. They also take a deeper look at the cultural hurdles that keep organizations from truly moving forward, reminding us that staying stuck on aging infrastructure can be just as costly as making the leap to new solutions. With Windows 10 hitting end of support soon, risk management is no longer an option; it’s a necessity. Throughout the episode, you’ll hear practical advice on communicating real-world risks to business leaders, plus candid insights on how to continuously manage—and mitigate—those risks. Tune in, join the conversation, and learn why legacy systems may not be worth the gamble in today’s fast-paced cybersecurity landscape. After all, if you’re not evolving, you might just be standing in the path of the next big threat. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever felt like the pandemic was one massive, global disaster recovery test? You're not alone. In this episode of Cyber After Hours— Securing Remote Workforces: Lessons from the Pandemic —Paul and Evan are joined by their guest, John Vigeant, Chief Executive Officer (CEO) of Login VSI, to dive into how the world of cybersecurity (and office life itself!) changed almost overnight. Starting with candid chats about the emotional roller coaster of pandemic-era decision-making, they quickly explore how remote work permanently shifted the way we think about hiring, collaboration, and trust. From rapid-fire adoption of video conferencing and cloud tech, to navigating tricky trust issues and management pitfalls (spoiler: micromanaging didn't win anyone manager of the year), the duo reflects on why focusing on employee output—not just presence—became more important than ever. They also discuss how organizations struggled with cybersecurity investments, bouncing between overkill and bare-minimum approaches. And speaking of struggles, the episode highlights how essential flexibility, strategic team gatherings, and prioritizing employee well-being are for long-term loyalty and success. Whether you’re leading teams, navigating remote life, or securing your digital workspace, join Paul and Evan as they unpack valuable pandemic lessons with humor, honesty, and a dash of cyber wisdom. Pour a drink, settle in, and tune in to Cyber After Hours—where we turn tough lessons into valuable insights (and occasionally laugh at our own missteps). Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
C
Cyber After Hours
Cyber After Hours podcast artwork
 
Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really takes to implement Zero Trust. From the importance of saying “no” to avoid burnout, to the need for continuous authentication and behavioral analysis, they explore why this framework (not a product!) might be your best bet for securing sensitive data. They also dig into the nuts and bolts of Role-Based Access Control (RBAC), revealing how even the best intentions can go off track without clearly defined roles. The conversation covers everything from complex government environments to the everyday challenges of managing who should—and shouldn’t—be a domain admin. Ultimately, they challenge listeners to think critically about whether Zero Trust is just another buzzword or a genuine best practice that can reshape our approach to security. Tune in, join the conversation, and decide for yourself if Zero Trust is the future of cybersecurity or just the latest industry catchphrase. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours— Developing Cybersecurity Talent: Is Academia Keeping Up? —Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett's adventure of learning Python "just because," the conversation quickly turns to serious questions: Are certifications enough to bridge the gap between theory and practice? Can lifelong learning replace a degree? And how is AI changing the game for students and professionals alike? Paul and Evan explore the necessity for academia and industry collaboration, stressing why practical, hands-on skills often speak louder than diplomas. They also touch on ethical considerations—like how far is too far when padding your resume—and why mentorship and networking might be your greatest career accelerators. Whether you're a seasoned pro, fresh graduate, or just cybersecurity-curious, grab your favorite beverage and tune in. You'll laugh, learn, and maybe even reconsider your stance on degrees vs. experience. Join us for another insightful (and delightfully human) cybersecurity chat at Cyber After Hours—because staying relevant in cyber means never stopping the conversation. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to Evan’s quest to match his energy, this lively conversation touches on the power of root cause analysis, the value of operationalizing what you already have, and why you should think twice before piling on more tech. They also highlight why it’s critical to define your use cases first—because buying every buzzy product out there won’t help if you don’t have the right processes in place. Whether you’re looking to optimize your existing toolset, stretch your budget further, or spark innovation by bringing diverse voices to the table, this episode is packed with entertaining anecdotes and practical insights. Just remember, it’s all for conversation, not official consultation. Tune in, join the discussion, and find out how to balance what you’re spending with what you’re truly getting. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours— Security in the DevOps Era: Balancing Speed and Safety —Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid development can feel like walking a tightrope, the trio explores why effective communication, celebrating small victories, and strong leadership support are crucial in keeping teams motivated and secure. Josh offers practical insights on overcoming friction in application development, discusses how Infrastructure as Code (IaC) is shaking things up, and explains why smaller teams might just have the advantage when implementing strict security measures. Together, they unpack the “shift-left” trend, emphasizing how culture, context, and the right tools can bridge the gap between developers and security teams. Because, let's face it: security shouldn't slow innovation—it should enable it. Whether you're knee-deep in DevOps or just curious about building safer, faster development pipelines, join us for this honest (and sometimes hilarious) exploration into balancing speed with security. Tune in, grab your favorite drink, and enjoy the ride—because cybersecurity conversations should be human, engaging, and just a bit fun. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
C
Cyber After Hours
Cyber After Hours podcast artwork
 
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry can sometimes feel like code words for confusion. From the promise of next-gen firewalls to the realities of cloud adoption costs and Zero Trust implementations, this episode challenges the gap between marketing buzz and actual results. Evan and Paul don’t just highlight what’s overhyped; they also explore the critical thinking needed to extract genuine value from emerging trends. By the end, you’ll walk away with fresh ideas on how to manage email overload, a clearer perspective on what’s real versus what’s hype in cybersecurity, and a reminder that true innovation should solve actual problems—not just invent new acronyms. Tune in, join the conversation, and decide for yourself whether hype cycles are the spark that ignites progress or simply another tech distraction! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours— SOAR: Hype or Necessity? —Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber threats. They also debate the real-world applications of SOAR, sharing tips on how to vet and test implementations effectively, avoid hidden cloud costs, and leverage behavioral analysis alongside AI integration. Plus, they chat about the surprising trend of organizations shifting back to on-prem solutions, and why cybersecurity is becoming increasingly accessible even for smaller teams. Is SOAR just a fancy feature, or is it the cornerstone of modern cybersecurity operations? Listen in as Evan, Paul, and Josh blend humor, candid experiences, and practical advice for navigating the evolving landscape of security tools. Pour yourself a drink, hit play, and join us for a spirited debate—because cybersecurity conversations shouldn’t be dull. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours— Endpoint Security: Is It Really the First Line of Defense? —Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotlight as the new perimeter? The duo digs deep into why endpoint detection and response (EDR) tools, while critical, can't go it alone—and why defense-in-depth remains the gold standard for true cyber resilience. Beyond technical talk, Paul and Evan emphasize why collaboration beats competition in cybersecurity, highlighting how building a supportive network is essential not just for career growth, but for tackling the industry's biggest challenges. They also dive into why businesses must truly understand their unique risks before throwing money at shiny security tools. Whether you’re an entrepreneur navigating the wild world of cybersecurity or simply curious about protecting your business better, grab a beverage and join Paul and Evan for an honest, insightful, and occasionally humorous discussion about the realities of endpoint security. Tune in to Cyber After Hours—where security talk stays human, helpful, and just the right amount of fun. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours— Data Privacy vs. Cybersecurity: Where Do They Intersect? —Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led to consumer indifference—and why this needs to change. Steve sheds light on the blurry lines between data privacy and cybersecurity, highlighting why simply "checking the compliance box" isn't enough anymore. Together, they unpack critical questions: Are privacy regulations actually making a difference? Can organizations move from visibility to meaningful risk reduction? And why does innovation in security often lag behind the threats themselves? Along the way, they chat about how AI is shaking things up, why data integrity might soon overshadow confidentiality, and how ransomware underscores the importance of availability (because what's privacy worth if your data’s locked away?). Whether you're a cybersecurity pro or just privacy-curious, join us for an entertaining, eye-opening discussion on where security meets privacy—and why the future might be less about keeping secrets and more about building trustworthy communities. Grab a drink, settle in, and tune in to Cyber After Hours—because talking about privacy and security shouldn’t put you to sleep. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours— How to Prevent Security From Becoming the "Department of No" —we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get painted as the gatekeepers of “no.” They share how shifting the focus from risk avoidance to storytelling and context can make cybersecurity a business enabler instead of a blocker. We unpack real-world strategies for transforming security teams from risk-averse gatekeepers into innovative partners who say “yes”—strategically, of course! This episode is all about balancing caution with courage, technical skills with empathy, and leadership with collaboration. Whether you’re deep in the cybersecurity trenches or simply curious about building stronger, more positive security cultures, this episode offers humor, practical insights, and a fresh perspective on how to embrace the art of saying “yes.” Tune in, grab your favorite beverage, and join us for another engaging round at Cyber After Hours—because cybersecurity is best served with a side of humanity. Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the noise—think SOC automation, but with purpose. Then the real fun begins: quantum computing. We dig into its impact on encryption, national security, and risk prediction—asking the big questions like, Can quantum AI predict the exact day of a breach? Or better yet, can it prevent one? But it’s not all theory—we stay grounded in practical reality. Edward breaks down why a fully autonomous SOC is still out of reach, and why the smartest play today is using AI to amplify, not replace, human analysts. As Paul puts it, "The only limit right now is imagination." Add in a few good-natured jabs about flip-flops vs. snow boots, some big questions about nation-state surveillance, and a surprising Star Trek tangent on quantum entanglement, and you’ve got a wild, thoughtful, and surprisingly human take on where cyber defense is headed. If you’ve ever wondered how to future-proof your security program in the face of exponential tech growth, this is your episode. Thanks for watching and listening! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often dominated by flashy tools and jargon. With a nod to Simon Sinek’s “Golden Circle,” they highlight the value of digging into motives, not just methods. In a relaxed, bar-like setting where unscripted humor mixes with expert know-how, you’ll get a front-row seat to the personal stories, thought-provoking questions, and spirited debates that make cybersecurity a truly people-centric endeavor. Ready for a fresh take on the next wave of cybersecurity regulation—and the perspectives shaping it? Tune in to Cyber After Hours, grab your favorite beverage, and join the conversation. This is where technology meets humanity, one lively discussion at a time. Thank you for watching / listening! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
C
Cyber After Hours
Cyber After Hours podcast artwork
 
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity. Think biometrics, physical keys, and the cutting-edge world of quantum computing—all in one candid conversation. But we don’t stop at the theoretical: we dig into practical insights, like how password managers (hello, YubiKey) and multi-factor authentication are making waves in industries like healthcare. We also tackle the cultural hurdles of adopting new security tech—because let’s face it, not everyone is as excited about password changes as we are. And yes, there’s a lighthearted detour about decaf coffee (trust us, it’s worth the laugh). Tune in to find out why continuous innovation in digital security is crucial, what the future might hold for your organization’s authentication methods, and how a little bit of humor can keep you sane in the ever-evolving world of cybersecurity. Join us for this lively deep dive—you won’t want to miss it! Connect with us on LinkedIn: Evan: https://www.linkedin.com/in/evanmorgan/ Paul: https://www.linkedin.com/in/pm01/…
 
Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity. AI models like DeepSeek take center stage, offering both enticing efficiencies and equally potent threats to data integrity and privacy. We unravel how adversarial nations might exploit these innovations and discuss why there’s no room for shortcuts when security is on the line. Finally, we chart an exciting course into the realms of AI and quantum computing. Think AI agents, RAG models, and quantum superposition—tech frontiers that promise to reshape our daily lives and radically enhance how we identify and manage risk. Our chat brims with curiosity and awe, exploring the momentous possibilities that quantum breakthroughs may unlock. If you’re even remotely curious about the future of cybersecurity (or just love a good adventure story), this is one episode you won’t want to miss. Tune in now! Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play