To the Point Cybersecurity
A podcast series from Forcepoint
Join international security leaders and influencers changing the face of cyber across the globe for communities, businesses and governments of all sizes
Impact of emerging technologies on modern security efficacy like AI, quantum, 5G and more
New ways for businesses and governments to stay ahead of an ever-changing threat landscape
Innovative views on the role of the individual in helping to mitigate threats to business
Podcast
Latest Episodes
24 mins
The Evolving Cyber Threat Landscape in Healthcare: Insights from Fortified Health Security’s Russell Teague - Part I
Episode 332
August 11, 2025
42 mins
Pen Testing to Red Teaming: Greg Hatcher Explores Cyber Maturity and Defending Against AI Attacks
Episode 331
August 5, 2025
36 mins
Next-Gen Threats: Generative AI, Deepfakes, and Automated Cybersecurity Defense with Petko Stoyanov
Episode 330
June 17, 2025
26 mins
Inside Fintech Security: Erika Dean on Tackling AI Threats and Third-Party Risks - Part II
Episode 329
June 9, 2025
Podcast
All episodes

REPLAY: The Incredible Power of Stubborn Optimism with Sudhakar Ramakrishna
This week, we replay an episode with Sudhakar Ramakrishna, President and Chief Executive Officer of SolarWinds. He shares insights from his first year at the company, joining at a very dynamic time as news of the Sunburst attack first started making headlines.

Enhancing Cyber Defense with Adaptive Firewalls and Collective Intelligence with Philippe Humeau
In this episode, our hosts Rachael Lyon and Vince Spina welcome Philippe Humeau, CEO of CrowdSec, an expert in adaptive cybersecurity measures. Philippe brings to light the evolving challenges of managing IP reputations and the complexities cybercriminals face in influencing systems globally.

From Deep Fakes to Biometrics: Aaron Painter on the Evolution of Identity Verification
In today's discussion, hosts Vince Spina and Rachael Lyon are joined by Aaron Painter, CEO of Nametag, to delve into the evolving complexities of identity verification and cybersecurity. We'll explore the limitations of current Multi-Factor Authentication (MFA) solutions, with a spotlight on the high-profile MGM attack in 2023, where social engineering compromised IT help desks.

Navigating Borderless Networks and Data Security with Yasir Ali
This week, we revisit a conversation with In today's episode, we're diving into the nuances of modern data security with our special guest, Yasir Ali, CEO of Polymer. As networks become increasingly borderless, the challenges for data security are escalating.

Replay: Qubits and Pieces: Standardizing Post-Quantum Cryptography in the Face of Quantum Computing
This week, we revisit a conversation with Dustin Moody, a mathematician in the NIST Computer Security Division. He teaches us about the risks posed by quantum computers. He also shares updates on the status of NIST’s post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum computing.

Replay: Human vs. Super Suit: Exploring the AI-Human Relationship
For this week’s episode, we replay a talk with Casey Ellis, Founder and CTO of Bugcrowd and Co-Founder of The disclose.io Project, to explore the risks and rewards of exploring AI technology, including concerns around the ubiquitous ChatGPT chatbot.

Replay: The Cyberbalanced Diet with Javvad Malik
On this week's To The Point podcast episode, we replay a conversation with Javvad Malik, Security Awareness Advocate at KnowBe4. We cover an array of themes including the need to “protect the seams,” understanding where risks are moving, how small interventions can deliver quick security wins, understanding people in the cybersecurity equation and the importance of cybersecurity equation training, the AI debate, smishing attacks, and more!

REPLAY: Cyber is a Business Imperative with Ken Bible
For this replay episode, we revisit our sit down with Kenneth Bible, the Chief Information Security Officer (CISO) for the DHS Office of the Chief Information Officer (OCIO). He breaks down the National Cybersecurity Strategy Implementation Plan (NCSIP) introduced in July and provides great insights into how the plan was developed. The five key pillars of the plan, actioning each of the five elements, and the role government agencies have to play in executing against the plan and its 65 initiatives.

REPLAY: Nobody Wants to Fight, But Someone Needs to Know How
Andrew Borene, Executive Director at Flashpoint joins the podcast this week through a replay episode. He brings a wealth of insights on today’s state of international security affairs gleaned from his many years in the U.S. Intelligence community, and leading private sector intelligence teams.

REPLAY: Game On! Insider Risk vs. Security Culture with Dr. Maria Bada
For this week's episode, we replay a conversation with us is Dr. Maria Bada, Ph.D., a Lecturer in Cyberpsychology at Queen Mary University in London and a RISCS Fellow in cybercrime. Maria shares insights on the insider risk challenge through a human-centric lens and the criticality of educational awareness, transparency, and training (Note: check out AwareGo!) to better mitigate the threat. When 98% of organizations are vulnerable to insider risks, and the “accidental” insider is the one most often reported, empowering employees with tools and knowledge to understand and be aware of the threats can really make a positive impact.
About our Hosts

Rachael Lyon
