Resilient Cyber
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
Episodes
137 episodes
Resilient Cyber w/ Christina Liaghati - Navigating Threats to AI Systems
- For those that don't know you, can you tell us a bit about your background and your current role?- I know you help lead the ATLAS project for MITRE, what exactly is ATLAS and how did it come about?- The AI threat landscape is ...
•
24:58
Resilient Cyber w/ Steve Wilson - Securing the Adoption of GenAI & LLM's
In this episode we sit down with GenAI and Security Leader Steve Wilson to discuss securing the explosive adoption of GenAI and LLM's. Steve is the leader of the OWASP Top 10 for LLM's and the upcoming book The Developer's Playbook for LLM Secu...
•
28:40
Resilient Cyber w/ Snehal Antani - Building and Scaling a Security Startup
In this episode we sit down with the Founder/CEO of Horizon3.ai to discuss disrupting the Pen Testing and Offensive Security ecosystem, and building and scaling a security startup - from a founders perspective....
•
29:33
Resilient Cyber w/ Chloe Messdaghi - AI Security & the Threat Landscape
In this episode we sit down with Chloe Messdaghi, Head of Threat Intelligence at HiddenLayer, an AI Security startup focused on securing the quickly evolving AI security landscape. HiddenLayer was the 2023 RSAC Innovation Sandbox Winner and off...
•
20:43
Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust
- For those not familiar with you and ThreatLocker, can you tell us a bit about yourself and the ThreatLocker team?- When we look out at the endpoint protection landscape, what do you feel some of the most pressing threats and risks are...
•
24:58
Resilient Cyber w/ Travis McPeak - Securing Cloud-native Infrastructure
- For folks not familiar with you and your background, can you tell us a bit about that?- How about Resourcely, how did it come about and what problem did you set out to tackle?- Why do you think Cloud Misconfigurations are stil...
•
17:59
Resilient Cyber w/ Stuart Mitchell Cyber Talent, Recruiting & the Workforce
- First off, for folks now familiar with your background, can you tell us a bit about yourself?- You made the leap from working for a firm to founding your own talent and recruiting company. Can you tell us about that decisions and expe...
•
47:33
S6E22: Daniel Shechter - Application Detect & Response (ADR)
- For folks not familiar with you or the Miggo team, can you tell us a bit about your background?- How do you define ADR and why do you think we have seen the need for this new category of security tooling to come about?- Most o...
•
Season 6
•
Episode 22
•
23:44
S6E21: Christoph Kern - Dissecting Secure-by-Design
- First off, for those that don't know you or your work, would you mind telling us a bit about your background?- You recently published a paper titled "Secure-by-Design at Google" which got a lot of attention. Can you tell us about the ...
•
45:51
S6E20: Joe McCaffrey - Securing the Digital Arsenal of Democracy
- First off, for folks that don't know you, can you tell us a bit about your current role and background?- On that same note, can you tell the audience a bit about Anduril, the mission of the organization and some of the current initiat...
•
39:34
S6E19: Madison Oliver - Open Source & GitHub Advisory Database
- For those that don't know you or haven't come across you quite yet, can you tell us a bit about your background in tech/cyber and your role with GitHub?- What exactly is the GitHub Advisory Database and what is the mission of the team...
•
30:00
S6E18: Stephen Carter - VulnMgt Modernization & FedRAMP
- For those don't know your background or Nucleus Security, can you start by telling us a bit about both?- You have experience and a background in the Federal environment, and Nucleus recently achieved their FedRAMP authorization, can y...
•
31:20
S6E17: Jimmy Mesta - Kubernetes, Runtime and Supply Chains
- For those unfamiliar, please tell us a bit about your background, as well as about RAD Security. What do you all focus on and specialize in?- Your team recently was part of the RSAC Innovation Sandbox. Can you tell us a bit about that...
•
26:12
S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms
- You recently presented at Wiz's MisCONfigured at RSA, where you covered some of the most relevant cloud threats and risks, can you touch on what some of those are?- We know Wiz just announced a massive capital raise and there's been t...
•
Season 6
•
Episode 16
•
34:30
S6E14: Dr. Georgianna Shea: Cyber-Physical Resilience & Supply Chain Security
- For folks not familiar with it, can you tell us a bit about the report, its intent, and how it came about?- Some may be asking, what's the big deal, its just software. Can you help explain the pertinent risk we face with increasingly ...
•
28:23
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey
- First off, for folks not familiar with your background can you tell us a bit about your background from your journey in your earlier IT/Cyber and military time to eventually being a Founder and CEO?- What made you decide to take that ...
•
Season 6
•
Episode 13
•
35:41
S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge
Can you each tell us a bit about your background, before we dive in?For those not in the DoD or familiar with the term, what is a “Software Factory”?What is BESPIN?What is the current stat...
•
55:55
S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos
- First off, for folks that don't know you can you give them a brief overview of your background/organizations?- Josh, let's start with you. Can you explain some of what is going on with the drama around NVD and what happened that caugh...
•
Season 6
•
Episode 11
•
29:18
S6E10: Adam Bateman - Securing the Modern Identity Perimeter
- It is often now said that identity is the new perimeter, why do you think that phrase has taken hold and what does it mean to you? - How much do you think the complicated identity landscape plays a role, for example most organiza...
•
Season 6
•
Episode 10
•
32:07
S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom
- First off, you have an incredible background evolving from software engineer to management roles and ultimately a CISO for some of the industry leading organizations such as Siemen's and HP. I would love to hear about that journey and how you...
•
Season 6
•
Episode 9
•
38:03
S6E8: Erez Yalon - AppSec, Supply Chain and Security Research
- What are some of the most interesting developments in the world of software supply chain security (SSCS) in the last 12 months or so?- It's now been a couple of years since the major fall out of notable incidents such as SolarWinds an...
•
Season 6
•
Episode 8
•
47:17
S6E7 - Chinmayi Sharma & Jim Dempsey - Software Liability and Safe Harbor
- First off, for folks not familiar with your backgrounds, can you please each tell us a bit about yourselves?- Let's set the table a bit, what is software liability and what is driving the increased calls for it? For example the recent...
•
Season 6
•
Episode 7
•
50:06
S6E6 - Crystal Poenisch - Cybersecurity Product Marketing
- First, please tell us a bit about your background and how you got into the role you are now in your career? What drew you to the marketing side of cybersecurity?- I have to be honest, many in the cyber practitioner community often bem...
•
Season 6
•
Episode 6
•
20:11
S6E5 - Jeevan Singh - Scaling Application Security
- Let's start off by discussing everyone's favorite topic, vulnerability management. When it comes to AppSec, obviously there's been a big push to "shift security left" which comes with CI/CD pipelines, SAST, DAST, Secrets Scanning, IaC scannin...
•
Season 6
•
Episode 5
•
36:59