Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Cyber security is not only important to everyone, it is critical to the future of every American. Each show details specific points in history and provides guidance and insights of both a technical and societal nature to help you understand and address cyber security issues more effectively. Our approach makes the often misunderstood and highly technical jargon of cyber security advisories, and popular media digestible for anyone that listens.brbr Anyone that leverages or uses internet and cyber related services, which in today’s world is basically everyone, stands to benefit from the show. You’ll gain insight into the reality of the space around cyber security and learn more details and truths on what is actually necessary to operate and be more secure at both the business and personal levels in an ever-changing technology space. We can help you truly understand a vast technology space and be better prepared in a dynamic technology ecosystem.
| Episode | Date |
|---|---|
|
The Canvas Attack Proves Attackers Aren’t Slowing Down in 2026
|
May 14, 2026 |
|
AI Ethics and Governance: Building Trustworthy Systems
|
May 06, 2026 |
|
Quantum Is Coming: What It Means for Cybersecurity Today
|
Apr 28, 2026 |
|
Apps APIs and DDoS Threat Trends
|
Apr 22, 2026 |
|
RSA Recap Beyond the Booths and Bourbon
|
Apr 16, 2026 |
|
From Weakest Link to Strongest Defense Through User Awareness
|
Mar 19, 2026 |
|
AI Is Going to Replace You… Or Is It?
|
Mar 12, 2026 |
|
Cyber Resilience Over Cyber Perfection
|
Mar 04, 2026 |
|
LockBit Changed Everything and Locked Up Tells Why
|
Feb 26, 2026 |
|
Disrupt or Be Breached: The New Cyber Reality
|
Feb 17, 2026 |
|
Welcome to the Runtime Era & the Rapid Shift in AppSec 📈
|
Feb 10, 2026 |
|
Securing Intelligence: AI’s Impact on Cyber Risk
|
Jan 28, 2026 |
|
Inside The Lion’s Den: Part 2
|
Nov 25, 2025 |
|
Inside The Lion’s Den: Infiltrating Ransomware Groups
|
Nov 18, 2025 |
|
SOTI Fraud & Abuse Report: Charting a Course Through AI’s Murky Waters
|
Nov 12, 2025 |
|
The Current State of Cyber and AI in the Workforce
|
Nov 10, 2025 |
|
AWS Outage – Lessons in Digital Dependency
|
Oct 21, 2025 |
|
Workplace Culture & Leadership: Why Balance Beats Burnout
|
Oct 15, 2025 |
|
Kicking Off Cybersecurity Month: Why Awareness Still Matters
|
Oct 01, 2025 |
|
The Future of Identity: AI, Risk, and Real-Time Insights with Zluri
|
May 23, 2025 |
|
ENCORE: CISO’s with a Leadership Mindset
|
Apr 25, 2025 |
|
ENCORE: Old Threats, New Tactics: Understanding Today’s Cyberattack Landscape
|
Apr 04, 2025 |
|
Old Threats, New Tactics: Understanding Today’s Cyberattack Landscape
|
Mar 28, 2025 |
|
ENCORE: 2025 Cyber Trends: Expert Forecasts and Action Steps
|
Mar 21, 2025 |
|
ENCORE: Beyond Tech: Navigating a Cybersecurity Career
|
Mar 14, 2025 |
|
Beyond Tech: Navigating a Cybersecurity Career
|
Mar 07, 2025 |
|
ENCORE: Stronger Security Through Awareness & Engagement
|
Feb 28, 2025 |
|
Stronger Security Through Awareness & Engagement
|
Feb 21, 2025 |
|
ENCORE: AI in Cybersecurity: Evolution, Risk & Future Trends
|
Feb 14, 2025 |
|
ENCORE: CISO Showdown, Battle of the CISO’s
|
Feb 07, 2025 |
|
AI in Cybersecurity: Evolution, Risk & Future Trends
|
Jan 31, 2025 |
|
CISO Showdown, Battle of the CISO’s
|
Jan 24, 2025 |
|
2025 Cyber Trends: Expert Forecasts and Action Steps
|
Jan 17, 2025 |
|
ENCORE: Shaping the Future of Cyber Resilience
|
Jan 10, 2025 |
|
ENCORE: Cyber-Consciousness: Navigating Risks with Awareness and Clarity
|
Jan 03, 2025 |
|
ENCORE: CISO’s with a Leadership Mindset
|
Dec 27, 2024 |
|
ENCORE Strengthening Security Through Data Classification and Governance
|
Dec 20, 2024 |
|
Cyber-Consciousness: Navigating Risks with Awareness and Clarity
|
Dec 13, 2024 |
|
CISO’s with a Leadership Mindset
|
Dec 06, 2024 |
|
Strengthening Security Through Data Classification and Governance
|
Nov 22, 2024 |
|
Now is the Time to Understand Gen AI Security
|
Nov 15, 2024 |
|
Exploring Shifts in Federal Cybersecurity
|
Nov 08, 2024 |
|
Shaping the Future of Cyber Resilience
|
Oct 25, 2024 |
|
Critical Threats & Trends: Election Cyber, Ransomware & AI
|
Oct 18, 2024 |
|
Digital Fortresses Under Siege: Application Architecture Threats
|
Oct 11, 2024 |
|
The Evolution of Cybercrime Cartels
|
Oct 04, 2024 |
|
Scraping the Surface: Web Scraping is Undermining Online Business
|
Sep 27, 2024 |
|
Redefining Security Strategy: BypassIT and the Return to Basics
|
Sep 20, 2024 |
|
A Deep Dive on Disinformation with Dave DeWalt
|
Sep 13, 2024 |
|
Stopping Cybercriminals, True Stories from the Trenches
|
Sep 06, 2024 |
|
Diverse Minds, Stronger Cybersecurity: A Thought Leader's View
|
Aug 23, 2024 |
|
Leveraging AI to Predict Threats and Assist SOC Analysts
|
Aug 16, 2024 |
|
Navigating HIPAA, Smart Engineering & IP Challenges in the AI Era
|
Aug 09, 2024 |
|
Ransomware Rising: Threatening Personal & Professional Security
|
Aug 02, 2024 |
|
When Updates Attack: Navigating Software Update Nightmares
|
Jul 26, 2024 |
|
Exploring AI Pentesting and B2B vs. B2C Pentesting
|
Jun 28, 2024 |
|
Deepfakes, Cyber-Terrorism, & Election Integrity
|
Jun 21, 2024 |
|
Top Discussions at Industry Conferences: RSA and Beyond
|
Jun 14, 2024 |
|
2024: Cybersecurity's Major Trends & Threat Dynamics
|
Jun 07, 2024 |
|
Current Cyber Threats & Strategic Defense Practices
|
May 31, 2024 |
|
Emotional Intelligence in CyberSecurity
|
May 24, 2024 |
|
Awareness & Action: Cybersecurity Training = Employee Empowerment
|
Apr 26, 2024 |
|
Ethical Hacking Unveiled – Decoding the Hacker Mindset
|
Apr 19, 2024 |
|
Leading by Example: Inspiring Women to Excel in Cybersecurity
|
Apr 12, 2024 |
|
Navigating the SEC's Cyber Materiality Reporting Guidelines
|
Apr 05, 2024 |
|
Live from the FutureCon St. Louis CyberSecurity Event!
|
Mar 29, 2024 |
|
Mental Health for CISOs & Cybersecurity Leaders
|
Mar 22, 2024 |
|
Is the Cybersecurity Industry Consolidating?
|
Mar 08, 2024 |
|
Building Resilient Teams & Navigating Third Party Vulnerabilities
|
Mar 01, 2024 |
|
Sending Out an SOS for Cybersecurity Essentials
|
Feb 23, 2024 |
|
Unraveling the Latest Targets and Tactics of Ransomware Threats
|
Jan 26, 2024 |
|
Exploring the Evolving Compliance Landscape and Potential Impacts
|
Jan 19, 2024 |
|
A Pentesters Playbook: Deep Dive into Offensive Security Tactics
|
Jan 12, 2024 |
|
The Psychology of Insider Threats
|
Jan 05, 2024 |
|
Encore Employee Exploitation: To Test or Not to Test?
|
Dec 29, 2023 |
|
What Is Cyber Burnout? How to Tell if it is Affecting You
|
Dec 01, 2023 |
|
The High Stakes of Innovation
|
Nov 17, 2023 |
|
SEC/SolarWinds: What Does this Mean for Cyber Professionals
|
Nov 10, 2023 |
|
An Interview with a Computer? Talking with ChatGPT
|
Nov 03, 2023 |
|
Learn About the Latest Breaches & Security Practices
|
Oct 27, 2023 |
|
Encore Understanding and Managing Neurodivergent Staff
|
Oct 06, 2023 |
|
Cybersecurity, Are Your Prepared?
|
Sep 22, 2023 |
|
Recent Attacks Adding to the Stresses of a CISO
|
Sep 15, 2023 |
|
Martial Arts & the Art of Cyber Security
|
Sep 08, 2023 |
|
Ransomware on the Move
|
Aug 25, 2023 |
|
Women in Security & the Future of AI
|
Aug 18, 2023 |
|
Finding a Job and Managing your Career
|
Aug 11, 2023 |
|
Cyber Fundamentals: A Necessity
|
Aug 04, 2023 |
|
The Art of Transparency: Managing Conflicting Expectations
|
Jul 28, 2023 |
|
When Families Aren’t Even Safe
|
Jul 21, 2023 |
|
Apps and API Security
|
Jul 07, 2023 |
|
Truths, Myths & Maybes with Merlin Namuth
|
Jun 30, 2023 |
|
AI Model and Data Governance in the Cloud
|
Jun 23, 2023 |
|
Encore Transforming Internet Security
|
Jun 09, 2023 |
|
Trade Secrets & Insider Threats
|
Jun 02, 2023 |
|
How Do You Perform Your Best in a Seemingly "No Fail" Mission?
|
May 19, 2023 |
|
OpenAI and its Impact on Cybersecurity
|
May 12, 2023 |
|
Continuing Expectations in 2023 on Privacy Regulations
|
May 05, 2023 |
|
The Importance of a Cybersecurity Training Program
|
Apr 21, 2023 |
|
Current 2023 CyberSecurity Events & Future Predictions
|
Apr 14, 2023 |
|
Recent Reports on DDoS & Large Attacks
|
Mar 24, 2023 |
|
Regulating Lawful Hacking by Police within Criminal Investigation
|
Mar 17, 2023 |
|
A Discussion with Phillip Wylie on Pentesting
|
Mar 10, 2023 |
|
Implementing Threat-Informed Defense in Cybersecurity Practices
|
Mar 03, 2023 |
|
The Transitional Role of a CISO
|
Feb 24, 2023 |
|
Social Engineering: Training The Human Firewall
|
Feb 17, 2023 |
|
Using Data Visualization to Effectively Communicate
|
Feb 10, 2023 |
|
A Discussion with an Award Winning Cybersecurity Speaker
|
Feb 03, 2023 |
|
Sooner or Later, Everything Old is New, Again
|
Jan 27, 2023 |
|
The Goal Post Shift for CISOs
|
Jan 13, 2023 |
|
Managing Your Data Security Posture
|
Jan 06, 2023 |
|
The Evolution of Cyber Threats
|
Dec 16, 2022 |
|
CISO and HR, a partnership of Security and People
|
Dec 09, 2022 |
|
Addressing the Cybersecurity Skills Shortage
|
Nov 18, 2022 |
|
Does Anyone Believe Phishing Attacks Can Be Solved?
|
Nov 11, 2022 |
|
Zero Days Should Not be a Fire Drill
|
Nov 04, 2022 |
|
Discussing the Role of a CISO
|
Oct 28, 2022 |
|
A Partnership with the General Counsel, The CISO’s Perspective
|
Oct 21, 2022 |
|
CyberSecurity Awareness Month, Airport Hacking, and Other Attacks
|
Oct 14, 2022 |
|
How to Transition your Organization to SSE
|
Oct 07, 2022 |
|
Project Zero Trust with George Finney
|
Sep 16, 2022 |
|
Discussing Critical Infrastructure Cybersecurity Defense in Depth
|
Sep 09, 2022 |
|
Encore: Constructing a Risk-Based Cybersecurity Program
|
Sep 02, 2022 |
|
Hiring, Retaining CyberSecurity Staff and the Skills Gap
|
Aug 26, 2022 |
|
Encore: Bad Assumptions We See in the Cyber Space
|
Aug 12, 2022 |
|
How to Find Solutions at CyberSecurity Events with Tim Savage
|
Jul 15, 2022 |
|
Using AI Allows Us to Focus on What Matters Most
|
Jul 08, 2022 |
|
Top Gun: Cyber School - Time to Rip the Band-Aid Off
|
Jun 24, 2022 |
|
Cyber Security: What Business Oriented Really Means
|
Jun 17, 2022 |
|
The Path to Cyber Security Skills with Chad Kliewer
|
Jun 03, 2022 |
|
Talking Zero Trust with Dr. Zero Trust - Chase Cunningham
|
May 27, 2022 |
|
Encore: The Human Element of CyberSecurity with Perry Carpenter
|
May 13, 2022 |
|
Groundhogs & Rainbows with Robert LaMagna-Reiter
|
Apr 29, 2022 |
|
Encore A Day in the Life of the Real Cyber World with Jonathan Kimmitt
|
Apr 22, 2022 |
|
Discussing Potential Russian Cyber Attacks with Morgan Wright
|
Mar 25, 2022 |
|
The Next Generation’s Impact on Security Programs
|
Mar 18, 2022 |
|
Bracing for Nation State Cyber Attacks with Matthew Rosenquist
|
Mar 11, 2022 |
|
Bracing for Nation State Cyber Attacks… Are We Ready?
|
Mar 04, 2022 |
|
From the Mind of a Pentester with Andrew Lemon
|
Feb 25, 2022 |
|
A Discussion with the Creator of Zero Trust, John Kindervag
|
Feb 18, 2022 |
|
Keeping up with the Evolving World of Cyber Security
|
Feb 11, 2022 |
|
A Day in the Life of the Real Cyber World
|
Feb 04, 2022 |
|
Discussing the 5 Step Framework for New Skills in Tech
|
Jan 28, 2022 |
|
Allan Alford: Predictions for CyberSecurity in 2022
|
Jan 14, 2022 |
|
Deploying Zero Trust in the Real World
|
Jan 07, 2022 |
|
CyberSecurity Training with Ken Underhill #CYBERLIFE
|
Dec 10, 2021 |
|
Encore Threat Actors & Vulnerabilities : Discussing Recent Attacks
|
Nov 26, 2021 |
|
Cyber Mayday and the Day After with Dan Lohrmann
|
Nov 12, 2021 |
|
Threat Intelligence & The Current Geo-Political Environment
|
Oct 29, 2021 |
|
The Unreserved Chris Roberts: vCISO, Hacker, Devil's Advocate
|
Oct 08, 2021 |
|
What Elon Musk and SpaceX Can Teach Us About Cybersecurity
|
Oct 01, 2021 |
|
The Human API
|
Sep 24, 2021 |
|
Snowden: The Ultimate Insider Threat
|
Sep 17, 2021 |
|
Cyber Insurance Trends & the Rise of Cybercrime
|
Sep 10, 2021 |
|
Recapping Dallas Hybrid Event and Well Aware Insights
|
Sep 03, 2021 |
|
Why is Detecting BEC Attacks Such a Hard Problem?
|
Aug 27, 2021 |
|
Breaking into CyberSecurity
|
Aug 06, 2021 |
|
Women in CyberSecurity & Closing the Gap in STEM
|
Jul 23, 2021 |
|
Nation State Attacks & The Rise of Cybercrime
|
Jul 16, 2021 |
|
The Roadmap of Staying On Top of InfoSec Certification
|
Jul 02, 2021 |
|
Disinformation, Ransomware Prevention, Latest Headlines & More
|
Jun 25, 2021 |
|
The Cyber Vocabulary – One Name for Everything if We Plan to Win
|
Jun 11, 2021 |
|
Big Breaches: Cybersecurity Lessons for Everyone
|
May 21, 2021 |
|
The Attack on the Colonial Pipeline - What Now? What Next?
|
May 14, 2021 |
|
The Security Risks of Work From Home
|
May 07, 2021 |
|
How Lack of Emotional Intelligence Affects Cyber Professionals
|
Apr 30, 2021 |
|
Bridging the Gap Between Human Trafficking & Threat Intelligence
|
Apr 23, 2021 |
|
Don't Overlook the Fundamentals - Back to CyberSecurity Basics
|
Apr 16, 2021 |
|
How Nation States are Reshaping the CyberSecurity Landscape
|
Apr 02, 2021 |
|
SIEM Technologies and Other Ways to Avoid Employee Burnout
|
Mar 26, 2021 |
|
Adopting the Nine CyberSecurity Habits to Combat Cyberattacks
|
Mar 19, 2021 |
|
Training and CyberSecurity. How to Build Future Leaders
|
Mar 12, 2021 |
|
The Internet Shouts So Loudly, the CISO is Not Being Heard
|
Mar 05, 2021 |
|
The Human Element of Cybersecurity
|
Feb 26, 2021 |
|
Cyber Attack- Real life story from Victim to Super Hero
|
Feb 19, 2021 |
|
The Future of No Passwords
|
Feb 12, 2021 |
|
The Face of the Cybersecurity Industry.
|
Feb 05, 2021 |
|
Everything you need to know about the Internet of Things
|
Jan 29, 2021 |
|
And Security For All Premier Episode
|
Jan 22, 2021 |