Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
The Detection at Scale Podcast is dedicated to helping security practitioners and their teams succeed at managing and responding to threats at a modern, cloud scale.
Hosted by Jack Naglieri, Founder and CTO at Panther, every episode is focused on actionable takeaways to help you get ahead of the curve and prepare for the trends and technologies shaping the future.
| Episode | Date |
|---|---|
|
Vjaceslavs Klimovs on Why 40% of Security Work Lacks Threat Models
|
Dec 09, 2025 |
|
GreenSky's Ken Bowles on Auditing Controls before They Silently Fail
|
Nov 25, 2025 |
|
FanDuel's Tyler Martin on the Bronze-Silver-Gold Path to Autonomous Security Triage
|
Nov 11, 2025 |
|
Live Oak Bank's George Werbacher on AI As SecOps' Single Pane of Glass
|
Oct 28, 2025 |
|
Ochsner Health's Andrew Casazza on When AI Becomes the Hammer Looking for Nails
|
Oct 14, 2025 |
|
Cisco Meraki's Stephen Gubenia on How to Crawl-Walk-Run to AI-Powered SecOps
|
Sep 23, 2025 |
|
Databricks' Dave Herrald on Building SOCs with Data Lakes & Focused AI Agents
|
Sep 04, 2025 |
|
Tines' Matt Muller on AI-Assisted Security Operations and Modernizing the SOC
|
Aug 21, 2025 |
|
Illumio's Erik Bloch on Getting Security Fundamentals Right Before Adding AI
|
Jul 15, 2025 |
|
SANS's John Hubbard on Future-Proofing SOC Analysts in the Age of AI
|
Jul 01, 2025 |
|
Airwallex's Elliot Colquhoun on Big Bet Security Investments That Pay Off
|
Jun 17, 2025 |
|
1Password's Jacob DePriest on Balancing Human Intuition and AI in Cybersecurity
|
Apr 22, 2025 |
|
Two Candlesticks' Matthew Martin on Leveraging AI for Resource-Constrained Security Operations
|
Apr 08, 2025 |
|
Pangea’s Oliver Friedrichs on Building Guardrails for the New AI Security Frontier
|
Mar 25, 2025 |
|
Panther's Matt Jezorek on Simplifying Security and Balancing Human Intuition with AI
|
Mar 11, 2025 |
|
Rabbit’s Matthew Domko on Using Engineering-First Security to Build Modern Detection Programs
|
Feb 25, 2025 |
|
Salesforce's Mor Levi on Transforming Security Operations with AI Agents
|
Feb 11, 2025 |
|
Outreach’s Brandon Kovitz on Balancing Human Intuition and AI in Cyber Defense
|
Nov 27, 2024 |
|
Rootly’s JJ Tang on Transforming Incident Management Culture
|
Nov 14, 2024 |
|
Grammarly’s Thijn Bukkems on Working Backwards from Response Strategies
|
Sep 24, 2024 |
|
CRED’s Saksham Tushar on Data Enrichment for Effective Threat Detection
|
Sep 04, 2024 |
|
Netflix’s Dan Cao and Brex’s Josh Liburdi on Balancing Big Platforms and Bespoke Tools
|
Aug 20, 2024 |
|
ThoughtSpot’s Alessio Faiella on Building Forward-Looking Security Programs
|
Aug 06, 2024 |
|
Sprinklr’s Roger Allen on Preventing Team Burnout in Cybersecurity
|
Jul 23, 2024 |
|
WP Engine’s Christopher Watkins on Cost-Effective Threat Hunting Strategies
|
Jul 09, 2024 |
|
Elastic’s Darren LaCasse on Cutting Alert Volumes in Half By Automating Responses
|
Jun 25, 2024 |
|
Check Point’s Daniel Wiley on Balancing Technology and Human Analytics in Cybersecurity
|
Jun 11, 2024 |
|
Inductive Automation’s Jason Waits on Building Scalable Security Programs Through Automation
|
May 28, 2024 |
|
Panther’s Jack Naglieri on Navigating the New Role of Detection Engineering in Cybersecurity (Special Episode)
|
May 21, 2024 |
|
The Duckbill Group’s Corey Quinn on What Billing Data Can Tell Us About AWS Security
|
May 14, 2024 |
|
LinkedIn’s Jeff Bollinger on the Role of Human Intuition in Addressing Security Challenges
|
May 07, 2024 |
|
Josh Liburdi on Brex's Innovative Approach to Data Quality in SecOps
|
Apr 23, 2024 |
|
SAP's Matthew Valites on Why He Is a Proponent of Detection as Code
|
Apr 09, 2024 |
|
Meta's Justin Anderson on How to Understand, Identify, and Execute Your Detection Strategy
|
Feb 27, 2024 |
|
Sony's Charles Anderson on How to Manage Detections and Risk Across a Global Company
|
Jan 23, 2024 |
|
Remitly’s Jason Craig on Building Better Strategies for Identity, Logging, and Threat Modeling
|
Jan 09, 2024 |
|
AppOmni’s Drew Gatchell on Creating Better Detection for SaaS Platforms
|
Dec 19, 2023 |
|
Block’s Emanueal Mulatu on Reducing Burnout, Fostering Engagement, and Increasing Productivity in Security
|
Dec 12, 2023 |
|
Google Cloud’s Anton Chuvakin on Decoupled SIEMs and the Future of Data Platforms and Security
|
Nov 28, 2023 |
|
Deloitte’s Dhruv Majumdar on How to Mature Your Detection and Response
|
Nov 14, 2023 |
|
Google’s Anton Chuvakin and Timothy Peacock on How to Take Your D&R Efforts from 0 to 1 — or 5, or 100
|
Jul 05, 2023 |
|
David Seidman of Robinhood Talks Tools, Strategies, & Advice for Improving Detections at Scale
|
Mar 21, 2023 |
|
Chris Witter on Leading D&R Teams for Both Cloud and Enterprise at Spotify
|
Feb 07, 2023 |
|
Kelly Jackson Higgins Discusses The Evolution of Cybersecurity
|
Jan 24, 2023 |
|
Michael Hanley of GitHub on Why Security Needs Engineering, and Vice Versa
|
Dec 13, 2022 |
|
Adeel Saeed on How to Move from A Reactive to a Proactive Threat Detection & Response Model
|
Oct 26, 2022 |
|
Chris Hodson of Contentful on How Modern Detection Teams Can Thrive in a Cloud-Based World
|
Oct 12, 2022 |
|
Thomas Owen of Grafana on Why Enabled Autonomy is the Future of Modern Security Teams
|
Sep 27, 2022 |
|
Mike Saxton of Booz Allen on Where Teams Start in Their Detection Journey and How Detection as Code is Bridging the Cybersecurity Skills Gap
|
Sep 13, 2022 |
|
Compass CISO JJ Agha on Relentless Iterations and What He Expects from a Modern SIEM
|
Aug 30, 2022 |
|
Discord’s Kathy Wang on Building and Managing Security Teams
|
Jul 28, 2022 |
|
Rapyd’s Nir Rothenberg on Lessons Learned Transitioning from On-Prem to Cloud
|
Jul 12, 2022 |
|
SC Magazine’s Joe Uchill on What It’s Like to be a Cybersecurity Reporter in 2022
|
Jun 27, 2022 |
|
Cedar’s CISO Aaron Zollman: Lessons From Building a Modern Security Team
|
Jun 13, 2022 |
|
Tines COO Thomas Kinsella: How to Remove the Barriers That Prevent Security Teams From Doing Their Best Work
|
Apr 26, 2022 |
|
Panther Labs’s Joren McReynolds: Developing Security Products that Can Scale
|
Mar 08, 2022 |
|
r2c’s Clint Gibler: How To Succeed in AppSec at Scale
|
Feb 08, 2022 |
|
Aston Martin’s Robin Smith: Advocating For Lean Security Programs
|
Feb 01, 2022 |
|
Snowflake’s Haider Dost and Daniel Wyleczuk-Stern: Why Querying Your Data Properly is Critical to Scaling Your Detection Program
|
Jan 25, 2022 |
|
Rumble’s Chris Kirsch: How Asset Discovery Can Help with Detection and Response
|
Dec 28, 2021 |
|
Cisco Secure‘s J. Wolfgang Goerlich: Rebuilding Trust in Security Tools
|
Dec 21, 2021 |
|
Netflix’s Srinath Kuruvadi: Securing The Cloud Footprint With an Adaptive, Agile, and People Leadership Approach
|
Dec 14, 2021 |
|
Dropbox‘s Matt Jezorek: The Value of Agility and Education For Scaling Security
|
Nov 02, 2021 |
|
Talkdesk‘s Miguel Viana: Risk Management In a Cloud Environment
|
Oct 19, 2021 |
|
Gusto’s Fredrick Lee: Why Trust Is Critical To Building a Scalable Security Team
|
Oct 12, 2021 |
|
OutSystems’s Gilbert Martin: How Using Tools Can Help Promote Strong Cloud Infrastructure Security
|
Oct 05, 2021 |
|
Snowflake’s Omer Singer: What Security Data Can Tell You About Detection and Response
|
Sep 28, 2021 |
|
ServiceTitan’s Cassio Goldschmidt: Navigating Security Team Roles
|
Sep 21, 2021 |
|
BlackLine’s Cynthia Moore: How to Build Scalable Security Teams
|
Sep 14, 2021 |
|
Sisense’s Ty Sbano: What Application and Product Security (Really) Is
|
Sep 07, 2021 |
|
High Tide Advisors‘s Brad LaPorte: Operational Readiness and EDR
|
Aug 31, 2021 |
|
Welcome to The Detection at Scale Podcast
|
Aug 23, 2021 |