Join international security leaders and influencers changing the face of cyber across the globe for communities, businesses and governments of all sizes
Impact of emerging technologies on modern security efficacy like AI, quantum, 5G and more
New ways for businesses and governments to stay ahead of an ever-changing threat landscape
Innovative views on the role of the individual in helping to mitigate threats to business
Podcast
Latest Episodes
22 mins
How AI and Third-Party Risk Are Transforming Healthcare Cybersecurity with Ed Gaudet - Part I
Episode 339
October 1, 2025
42 mins
Breaking Down the Human Side of Advanced Cyber Attacks and Social Engineering With Margaret Cunningham - Part II
Episode 338
September 22, 2025
29 mins
Breaking Down the Human Side of Advanced Cyber Attacks and Social Engineering With Margaret Cunningham - Part I
Episode 337
September 16, 2025
48 mins
Closing Cybersecurity Blind Spots: Civic Engagement and Policy Innovations with Betsy Cooper
Episode 336
September 8, 2025
Podcast
All episodes

Decoys, Canaries... It's All Deception Technology to Me with Greg Edwards
Joining the podcast this week is Canauri founder and CTO, Greg Edwards. He gives us a deep dive view into deception technology including decoys, canaries, watcher files, deception technology defense, and how it helps organizations fare against ransomware attacks. We also discuss the growing ransomware problem and its recent designation by the White House as a “national security threat.”

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)
Joining us this week is Jonathan Knudsen, Head of Global Research for the CyRC, cybersecurity research center, at Synopsys Inc. To understand the vulnerability landscape in software, you have to first understand how software is made. Jonathan shares insights on software development and where vulnerabilities (or many, many vulnerabilities) can be integrated in the final product (although software is never really, final, is it?)

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 2 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Get Comfortable Being Uncomfortable – In Security and Your Professional Life
We’re excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For this part 1 discussion, we double-click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional learners and the awesome experience veterans bring to supporting the cyber mission.

Privacy: Keep People at the Center of It All With Mishi Choudhary (Part 2)
Joining the podcast for the part two discussion this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspective on the privacy discussion, including freedom of thought, the right to be forgotten, end-to-end encryption and protecting user data. She also discusses finding a middle ground between meeting customer privacy demands and complying with legal requirements, getting to a federal privacy regulation, and so much more!

Privacy: Keep People at the Center of It All (Part 1) with Mishi Choudhary
Joining the podcast this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspectives on the privacy discussion, including freedom of thought, the right to be forgotten, and end-to-end encryption for protecting user data. Plus, finding a middle ground between meeting customer privacy demands and complying with legal requirements, getting to federal privacy regulation, and so much more! You won’t want to miss what is a truly spirited and candid conversation – in two parts!

So Many Cyber Scams – With Names Like Pig Butchering With Jennifer Cook
Joining us this week is Jennifer Cook, Senior Director of Marketing at the National Cybersecurity Alliance and we discuss all the hot and trending online scams facing consumers today including the growing prevalence of romance scams ($1.3B in losses last year!), job seeker scams, tax fraud scams, sextortion, and the latest cyber scam making the rounds – pig butchering scams.

Tales of Frogs, Scorpions, and AI Machine Learning with Tony Dahbura
This week joining the podcast is Anton (Tony) Dahbura, executive director of the Johns Hopkins University Information Security Institute and co-director of the Johns Hopkins Institute of Assured Autonomy. We deep dive into the realm of AI Machine Learning technology and the exponential applications for it across every aspect of our lives.

CBOMs and Automating Compliance Problem Solving with Brian Hajost
Joining the podcast this week is Brian Hajost, the founder and COO of SteelCloud. Brian shares insights on his concept of a Compliance Bill of Materials (CBOMs). For those that have heard of Software Bill of Materials (SBOMs) it’s a similar concept.
About our Hosts

Rachael Lyon
