Afleveringen

  • In an enlightening episode of the BSM podcast, host Steven Bowcut dives deep with Cynthia Jenkins, CMO and Co-founder of Skillionaire Games by skillsgapp, into the innovative world of mobile gaming designed to bridge the gap between America's youth and the most in-demand career paths in fields like Advanced Manufacturing, Cyber/IT, Life Sciences, and Healthcare. This conversation unpacks the origin story of skillsgapp and Skillionaire Games, revealing a shared mission to engage and educate middle and high school students about critical and emerging industries through the medium of gaming.

    Jenkins highlights the strategic focus on industries like cybersecurity, underscoring the vital importance of raising awareness among younger generations about these lucrative and fulfilling career opportunities. The discussion around the games Cyber Watchdog and Hack Out Bl4ckout offers listeners a peek into how these games not only entertain but also impart essential skills and knowledge, aiming to inspire a new wave of professionals in the cybersecurity domain.

    The podcast delves into the balance of education and engagement in game development, providing insights into the creative and technical process from conception to launch. Jenkins shares compelling success stories and feedback from students and educators, painting a vivid picture of the impact skillsgapp is making on students' career trajectories, particularly in cybersecurity.

    Addressing the rapid technological advancements in cybersecurity, Jenkins explains how skillsgapp games remain at the forefront of industry trends to ensure relevancy and effectiveness. The conversation also tackles the critical issues of diversity and inclusion within tech, with Jenkins outlining skillsgapp's proactive measures to encourage participation from underrepresented groups in these burgeoning fields.

    Challenges in distinguishing educational games within a market dominated by entertainment-focused gaming are discussed, along with strategies to overcome these hurdles. Beyond cybersecurity, the podcast touches on skillsgapp's expansion into other critical industries and career paths, setting the stage for a broader impact on workforce development.

    For BSM listeners keen on supporting or getting involved with skillsgapp's mission, Jenkins provides actionable advice on how to contribute to this transformative educational endeavor.

    This episode not only sheds light on the powerful role of gamification in education and workforce development but also serves as a call to action for listeners to support initiatives that prepare the next generation for the challenges and opportunities of the future. Engaging, informative, and thought-provoking, this discussion is a must-listen for anyone interested in the intersection of technology, education, and career development.

  • Join us on this illuminating episode of the BSM Podcast, where we dive deep into cybersecurity with Rosario Mastrogiacomo, Vice President of Strategy and Solution Engineering at SPHERE Technology Solutions, a pioneering company at the forefront of Identity Hygiene. In this comprehensive discussion, Rosario sheds light on the inception and mission of SPHERE, illustrating how their innovative approach to cybersecurity is reshaping the landscape of identity management and access control.

    Listeners will gain invaluable insights into the essence of Identity Hygiene—what it means, why it's critical for modern businesses, and how SPHERE's unique methodology and the SPHEREboard platform are revolutionizing how companies clean up permissions and ownership to secure their digital environments. Rosario delves into the complex challenges businesses face in managing identities and access, providing expert advice on how to navigate these hurdles with SPHERE's tailored solutions.

    Discover the success stories highlighting the transformative impact of SPHERE's services on their clients' security and compliance postures. Rosario also casts a forward-looking view on the future of Identity Hygiene, discussing the evolving threats in the cybersecurity domain and how SPHERE is innovating to stay ahead of the curve.

    Finally, businesses seeking to enhance their cybersecurity measures will find Rosario's advice invaluable for achieving a proactive security posture in the digital age. Whether you're a business leader, IT professional, or just keen on cybersecurity, this episode offers a wealth of knowledge on the crucial role of Identity Hygiene in safeguarding your digital assets.

    Tune in to this episode of the BSM Podcast for a fascinating journey into the heart of cybersecurity innovation with SPHERE Technology Solutions and learn how to fortify your business against the ever-changing threats of the digital world.

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • In this insightful episode of the BSM Podcast, Ron Arden, the Executive Vice President, CTO, and COO of Fasoo, joins host Steven Bowcut to shed light on the often-overlooked realm of unstructured data security. Fasoo, a leader in unstructured data security and enterprise content platforms, brings innovative solutions to the table, ensuring secure and productive management of critical business information.

    Ron and Steven delve into the complex security challenges that unstructured data presents in today’s digital landscape. They explore the nuances of compliance and regulations, which are vital in safeguarding sensitive information. The discussion takes an exciting turn as Ron shares compelling case studies, demonstrating how Fasoo's strategies effectively mitigate risks and enhance data security.

    Furthermore, Ron offers a peek into the future trends in unstructured data security, equipping listeners with the knowledge to stay ahead in this dynamic field. His expert advice is a treasure trove for business owners seeking to fortify their data security frameworks.

    Don’t miss out on this episode! Dive into the conversation with Ron Arden and equip yourself with invaluable insights into managing and protecting your unstructured data. Click the link to listen now and embark on a journey towards mastering unstructured data security with the guidance of industry experts.

  • In Season 5, Episode 19 of the BSM podcast, host Steven Bowcut welcomes Jared Atkinson, the Chief Strategist at SpecterOps and the host of the "Detection Challenging Paradigms Podcast." The episode focuses on the dynamic and increasingly important topic of purple teaming within cybersecurity.

    Key Points Discussed

    - Evolution of Purple Teaming: Jared delves into the progression of purple teaming practices and their significance in the current threat landscape. He emphasizes how both defensive (blue team) and offensive (red team) strategies have melded to form a more comprehensive security approach.

    - Testing Landscape and Vendor Claims: The conversation touches on how the testing landscape has evolved, particularly considering vendor claims about the capabilities of their security solutions. Jared scrutinizes these claims and suggests a more measured approach to evaluating their efficacy.

    - Shortcomings in Purple Team Assessments: Jared enumerates the reasons why many purple team assessments don't reach their full potential. These shortcomings often stem from a lack of realistic testing scenarios or comprehensive coverage of possible attack vectors.

    - Role of New Frameworks: The introduction of new frameworks like Atomic Testing is highlighted as a game-changer in the field. Jared talks about how these frameworks can improve the precision and effectiveness of security assessments.

    - Building and Selecting Test Cases: The importance of building and selecting diverse and relevant test cases is discussed. Jared underlines the necessity for organizations to cover a wide range of attack techniques in their testing protocols.

    - Evolution of Attack Techniques: Examples of how attack techniques have evolved over time are provided, offering listeners insights into the adaptive nature of cyber threats.

    - Analyzing Malware Samples: Jared points to SpecterOps's 10-part blog series that offers a deep dive into the technical aspects of malware sample analysis, an essential skill for modern threat hunters.

    - Future of Purple Teaming: Finally, Jared presents his perspective on the direction purple teaming should take in the future. He stresses the need for continual adaptation and the adoption of forward-thinking strategies to stay ahead of threat actors.

    Conclusion

    The episode is informative for cybersecurity professionals looking to understand the current state and the progression of purple teaming. Jared Atkinson's expertise provides listeners with a detailed examination of the challenges and considerations essential to advancing the effectiveness of cybersecurity defenses through collaborative and realistic testing. The discussion not only sheds light on current practices but also charts a course for the future of purple teaming, making it a must-listen for those engaged in or interested in the strategic aspects of cybersecurity.

  • In an eye-opening episode of the BSM podcast (S5E18), Dr. Shaun McAlmont, CEO of NINJIO Cybersecurity Awareness Training, joins host Steven Bowcut to delve into the critical topic of cybersecurity. Dr. McAlmont shares NINJIO's innovative strategies for cybersecurity awareness training, designed to empower individuals and companies to protect themselves against ever-evolving digital threats.

    What you'll hear:

    Unique Cybersecurity Perspectives: Discover NINJIO's distinctive approach to making cybersecurity awareness engaging and impactful.

    Practical Strategies for Everyone: Learn practical tactics that consumers and families can immediately implement to safeguard their digital lives.

    Protocols for Protection: Gain insights into essential practices that businesses of any size can introduce to strengthen their cybersecurity armor.

    National Cybersecurity Month Initiatives: Find out how NINJIO celebrated with free access to cutting-edge training resources and what the future holds beyond the awareness month.

    Valuable Resources: Dr. McAlmont doesn't just leave you with advice; he points you to resources, communities, and support systems to keep your cybersecurity knowledge current.

    Whether you're an individual looking to protect your personal information or a company aiming to secure sensitive data, this episode is packed with wisdom that can be a game-changer for your online safety.

    Don't miss out on the chance to learn from a leading expert in the field. Click the link below to listen to the full Podcast and start building a culture of cybersecurity that can withstand the threats of tomorrow.

    Join us and take control of your digital security today!

  • In the latest thought-provoking episode of the BSM podcast, host Steven Bowcut welcomes a special guest, Luigi Lenguito, the co-founder and CEO of BforeAI, to delve into the transformative world of Predictive Security. Moving beyond the conventional frameworks of cybersecurity, which typically emphasize a reactive approach, Luigi brings to light an intriguing narrative centered around predictive cybersecurity.

    Throughout the discussion, Luigi highlights the pivotal role of Artificial Intelligence (AI) and machine learning in orchestrating predictive security measures. He illuminates the conversation by pinpointing the significant benefits this forward-thinking approach offers, such as preemptively identifying potential threats, optimizing response times, and significantly mitigating risks before they materialize.

    However, the efficacy of predictive security is not without its prerequisites. Luigi underscores the critical nature of data—both in terms of quality and quantity—in making precise predictions. He provides insights into the rigorous processes involved in maintaining data integrity and the vast volumes required to train robust, reliable predictive systems.

    Listeners will be treated to real-world applications as Luigi walks through several compelling case studies that demonstrate the remarkable success and potential of predictive security in action. The conversation doesn't just stop at present achievements; it propels forward, with Luigi sharing his visionary perspectives on the future landscapes of cybersecurity.

    Moreover, in his quest to make this technology accessible and understandable, Luigi imparts some practical, actionable advice for both individuals and organizations. These insights emphasize not only the importance of embracing this innovative approach but also guidance on how to navigate the complexities it might present.

    This episode is a must-listen for cybersecurity professionals, tech enthusiasts, and anyone keen on understanding how technological advancements like AI are relentlessly reshaping the way we protect digital landscapes.

  • In the most recent episode of the BSM podcast, Steven Bowcut delves deep into the cybersecurity landscape of cryptocurrencies with Dr. Aleksandr Zhuk, the CISO of sFOX.

    Summary

    Dr. Zhuk's insights shed light on the unique challenges and threats that digital currency platforms face, which are distinct from traditional digital technologies.

    One of the key topics discussed is the common belief in the infallibility of blockchain technology due to its decentralized nature and cryptographic backbone. Dr. Zhuk decodes this perception, highlighting where its strengths lie and pinpointing typical areas of vulnerability.

    For those in the DeFi community, this episode is especially enlightening, as Dr. Zhuk underscores emerging threats and potential attack vectors that often go unnoticed. The discussion culminates in his expert recommendations on precautions that DeFi platforms should adopt to enhance their security posture.

    Curious about the intricacies of cryptocurrency security? Dive into the full conversation and arm yourself with knowledge.

    About our Guest

    Dr. Aleksandr Zhuk is the Chief Information Security Officer at sFOX. He is also a founding faculty member, Adjunct Professor of Yeshiva University's Cybersecurity Program, and a contributor to FINTECH.TV. Before joining sFOX, Dr. Zhuk was an Information Security Architect at Axoni. In addition to his Ph.D., he holds a Master's Degree in Engineering from George Washington University.

  • This week on BSM's podcast S5E15, we dive deep into the world of Attack Surface Management with Marc Gaffan, the visionary CEO of IONIX. The rapidly evolving digital landscape poses new challenges every day, and for businesses, it's not just about defense but smart prevention. What if there was a way to minimize the very space that attackers could target?

    Marc unravels the critical concept of 'attack surface reduction'. With a sea of tools and strategies available in the market, what sets IONIX's approach apart? Discover the revolutionary strides they have made in risk management, making them a standout in the world of cybersecurity.

    The conversation takes a sharp turn into dispelling myths. Is everything you've known about attack prevention true? Or are there misconceptions that might be hindering your business's security strategy?

    Being static in this dynamic threat environment is a risk in itself. The essence of being adaptive and forward-looking takes center stage, as Marc underscores its significance. But worry not; regardless of your business's size, there are actionable strategies to boost your defense game.

    Marc ends the episode with a gaze into his metaphorical crystal ball. How will the threat environment shape up in the future? Get Marc's intriguing perspective.

    Don't miss this insightful episode that merges expertise with actionable insights. Gear up to redefine your security approach!

  • Welcome to a brand new episode of the BSM Podcast that you definitely don't want to miss! We're thrilled to have had the privilege of hosting Bryan Grenon, Director of Critical Infrastructure for ADT Commercial's Enterprise Security Risk Group, and Chris Fowler, Director of Emerging Technologies at ADT Commerical, on our show. This week, they delve into the fascinating and increasingly essential world of physical security standards, workplace safety policies, innovative security technologies, and the revolutionary role of AI and IoT in the security sphere.

    Summary

    This episode presents a riveting discussion on how the U.S. Department of Homeland Security is integral to setting physical security standards for the nation's critical infrastructure. Bryan Grenon and Chris Fowler provide insight into the common missteps employers often make while creating workplace safety policies and how these can be rectified to foster a safer work environment.

    But that's not all; our guests give us an exclusive peek into the exciting, innovative technologies that ADT Commercial is currently exploring. Their work aims to set new industry standards in security, ensuring our homes, workplaces, and public spaces are safer and more secure than ever before.

    And as if that isn't intriguing enough, the conversation shifts towards the future – the impact of emerging technologies like AI and IoT on security applications in the workplace. Fowler and Grenon illustrate how these technologies are not just the next frontier in security but are actively revolutionizing the industry right now.

    This episode is packed with expert insights, thought-provoking discussions, and a vision of the future that will leave you eager to hit the play button. Listen in to stay ahead of the curve and understand why and how these advancements are crucial for the present and future of security. Don't miss out on this opportunity to learn from the leaders of one of the world's most innovative security companies, ADT Commercial.

    So, gear up for a riveting ride into the world of cutting-edge security technology!

  • Welcome to the thrilling Episode S5E13 of the Brilliance Security Magazine Podcast, where we take a deep dive into the world of technological innovation in security. In this episode, our host Steven Bowcut sits down with a true pioneer in the field—Dr. Maria Bell, the visionary Founder and CEO of Digital Twin Imaging. This episode titled "Technical Innovations Designed to Reduce Active Shooter Response Times" explores the cutting-edge solutions that DTI provides to expedite emergency responses. Dr. Bell unveils some of the primary strategies and advanced technologies that are revolutionizing the sector, particularly in the context of high-risk active shooter scenarios. Get ready to discover how the fusion of real-time data and artificial intelligence is set to redefine the future of emergency response.

    Summary

    In this informative episode, Dr. Bell elucidates the game-changing strategies and technologies that are making significant strides in shortening response times for active shooter incidents. She dives into how Digital Twin Imaging—her trailblazing company, leverages the power of real-time data and artificial intelligence to create, maintain, and integrate 3D models that help first responders navigate emergencies swiftly and effectively.

    Dr. Bell also highlights real-time data and AI's pivotal role in DTI's technology. She emphasizes how these digital tools not only streamline the process but also enhance accuracy and efficiency, effectively rewriting the narrative of traditional emergency response mechanisms.

    Furthermore, she underscores the profound benefits of integrating technology into emergency response procedures. She provides an enlightening perspective on how these advancements specifically come into play during active shooter scenarios, potentially saving countless lives by reducing critical response times.

    Whether you're a professional in the security field or simply someone passionate about the future of technology and its potential societal impacts, this episode is an essential listen. Be prepared to delve into the futuristic world of emergency response and explore the potential of technology to protect and preserve life.

    About our Guest

    Maria Bell, MD, MPH, MBA, is a dynamic and award-winning physician with a proven record of medical innovation and strategic leadership. She is the Founder and CEO of Digital Twin Imaging.

  • Welcome to a captivating new episode of the Brilliance Security Magazine Podcast. In this latest installment, our host Steven Bowcut has an enlightening conversation with cybersecurity expert, Melvin Ejiogu, the CEO and President of VeeMost Technologies. They embark on a deep dive into the ever-evolving world of cybersecurity, particularly focusing on the critical role Artificial Intelligence (AI) plays. This episode, titled "Cybersecurity in the AI Era: Combatting Modern Threats," is a treasure trove of insights you won't want to miss.

    Summary

    In this riveting episode, Melvin Ejiogu guides us through the labyrinth of modern cyber threats that businesses face today and the growing complexity of these threats. He offers a rare glimpse into the evolution of cyber threats over the years and underscores the urgent need for businesses to adopt strategic measures to keep these threats at bay.

    Our conversation takes a futuristic turn as Melvin shares his forward-thinking perspective on how AI is rapidly transforming data security and protection. He outlines his vision for AI's role in cybersecurity over the next five years, opening our eyes to the vast potential and challenges that lie ahead.

    But the episode isn't just about understanding the complexities of cybersecurity. It also provides practical help to businesses. Melvin offers actionable tips that businesses of all sizes can implement to strengthen their cybersecurity posture.

    This episode is a must-listen for anyone keen on understanding the cutting-edge intersection of AI and cybersecurity. Whether you're a small business owner, a tech enthusiast, or a corporate leader, you'll find plenty of valuable insights to help you navigate the intricate landscape of cybersecurity in the age of AI. Don't wait - click through to listen to this thought-provoking episode!

    About our Guest

    Melvin Ejiogu holds a bachelor’s degree in Business Administration with a specialty in Corporate Finance from the University of Akron in Ohio. He also holds several top-level certifications in the IT industry and has earned the prestigious Cisco Certified Internetwork Expert (CCIE) certification.

    With over 25 years in the technology industry, Melvin has successfully blended his business acumen with his technical expertise, finding innovative ways to use technology to transform businesses and solve business issues.

  • In this enlightening episode, host Steve Bowcut invites Daniel Barber, Co-founder of DataGrail, for a deep dive into the importance of data privacy and transparency in the digital age. Drawing from his wealth of experience, Daniel explores the critical role of respecting people's data in fostering enduring customer relationships and maintaining brand trust.

    Throughout the conversation, they unpack the steps organizations can take to bolster transparency around data collection. Daniel provides actionable tips for achieving compliance and sidestepping potential legal pitfalls, underlining that data transparency is not just about adhering to the regulations but also about building and sustaining customer trust.

    Using compelling case studies, Daniel elucidates how certain companies achieve significant success through their commitment to data transparency. These cases offer valuable insights for businesses aiming to uphold data privacy, foster customer trust, and ultimately succeed in the increasingly data-centric world.

    Whether you're a start-up founder, an executive in a multinational corporation, or just curious about the intersection of data privacy and trust, this episode is packed with invaluable insights. Tune in to understand how your organization can navigate the ever-evolving data privacy landscape while building stronger customer relationships.

  • Welcome to another exciting episode of the Brilliance Security Magazine Podcast! In this episode, our host Steve Bowcut takes a deep dive into the intricate world of identity security with none other than Alex Bovee, CEO and Co-Founder at ConductorOne.

    From theory to practice, Bovee shares his profound insights on how organizations can effectively implement zero-trust principles, fostering a more secure and resilient cyber environment. They delve into continuous access governance and the concept of complete identity visibility - key components in building a robust security infrastructure.

    Bovee also provides an overview of ConductorOne's unique features, particularly its automated access and just-in-time capabilities. These offerings, as Bovee explains, are instrumental in creating a seamless yet secure user experience, helping organizations to achieve an optimal balance between accessibility and security.

    But that's not all - Bovee also gives his predictions for the future of identity security, offering his expert perspective on the evolving landscape of cybersecurity and the challenges and opportunities it presents.

    Whether you're a seasoned cybersecurity professional or just keen to learn more about the world of digital security, this episode is an absolute must-listen. You won't want to miss Bovee's wealth of knowledge and the valuable insights he shares in this captivating conversation.

    So, tune in now to Episode 10 of Season 5 of the Brilliance Security Magazine Podcast. Get ready to unpack the complexities of identity security with Alex Bovee and ConductorOne.

    Remember, your security is only as strong as its weakest link. Let's strengthen those links together! Listen now!

  • In this exciting episode of Brilliance Security Magazine, host Steven Bowcut sits down with Nick Harrahill, the Director of Support at Spin.AI, a company that is transforming the way businesses approach security in the SaaS environment.

    The pair delve into the intricacies of the modern SaaS landscape and why it has become so crucial for enterprises to recognize and mitigate the security risks inherent within it. Nick provides invaluable insights from Spin.AI’s recent report, highlighting the prevalence and potential dangers of third-party SaaS applications and browser extensions, specifically in Google Workspace and Microsoft 365 environments.

    Additionally, Steven and Nick discuss practical strategies for businesses to evaluate the risk levels of the SaaS applications they are currently using and much more. They delve deep into the current state of SaaS security and explore innovative approaches to make your digital workspace safer and more secure.

    Whether you're a cybersecurity professional or just interested in the field, this conversation offers a wealth of information about the increasingly important topic of SaaS security.

    About our Guest

    Nick Harrahill is an experienced cybersecurity and business leader. His industry experience includes leading security teams at enterprise companies such as PayPal and eBay, as well as building programs, processes, and operations at cybersecurity start-ups. Nick has managed teams focused on vulnerability management, application security, third-party risk, insider threat, incident response, privacy, and various facets of security operations.

    Don't miss this episode if you want to stay informed about the latest trends and challenges in SaaS security. Listen in to understand how you can better protect your business in the dynamic and often challenging landscape of SaaS applications. Tune in today to expand your knowledge and stay ahead of the curve!

  • In this riveting episode of the Brilliance Security Magazine podcast, Steven Bowcut sits down with Bob Bregant, COO & Co-founder of OpsHelm, and Lee Brotherston, Founding Engineer at OpsHelm, to delve into the top three cloud security challenges faced by cybersecurity professionals today. Bob and Lee offer valuable insights into how OpsHelm is addressing these pressing concerns and provide expert advice on tackling them.

    Our guests highlight the magnitude of the problems associated with cloud misconfiguration and share best practices to mitigate these risks effectively. Listen in as they discuss real-world examples and solutions, equipping cybersecurity professionals with the knowledge they need to stay ahead of the curve in this ever-evolving industry.

    About our Guests

    Bob Bregant spent the last decade-plus growing from managing ticket queues to managing systems, organizational security initiatives, security teams, and clients. He has worked with startups, governments, non-profits, and the Fortune 50 — seeing the unique quirks and, more often, finding the common threads that seem to exist across organizations of all stripes.

    Lee Brotherston is a seasoned security leader with decades of experience at all levels of security and is the co-author of the hugely successful O'Reilly "Defensive Security Handbook." With a knack for security research, Lee is regularly invited to speak at security conferences like B-sides, BlackHat, and Defcon.

    Don't miss this enlightening conversation with industry leaders as they navigate the complex landscape of cybersecurity and empower listeners with actionable strategies to strengthen their defenses. Tune in to the Brilliance Security Magazine podcast now!

  • Welcome to Brilliance Security Magazine podcast, where we discuss the latest trends, challenges, and innovations in the cybersecurity industry. In this episode, host Steve Bowcut interviews Ben Chappell, CEO, and Roger Neal, Head of Products, at Apona Security. Apona Security is a leading provider of Software Composition Analysis (SCA) technology with patented analytics. The topic of the show is "How to Secure Your Supply Chain and Get Visibility Into Your Software Security," where Ben and Roger share their approach to software security and talk about how their platform is unique. The discussion dives into the importance of organizations prioritizing their security as a core part of their development process.

    During the podcast, Ben and Roger discuss the importance of securing the software supply chain, which has become a critical component of cybersecurity in recent years. They discuss the challenges organizations face and share their approach to mitigating cyber risks. They explain how Apona Security's platform helps organizations gain visibility into their software security by analyzing the software supply chain and identifying potential vulnerabilities.

    Ben and Roger emphasize that security should be a core part of the development process, not just an afterthought. They also highlight the importance of educating developers and engineers on secure coding practices to prevent security vulnerabilities in the software.

    Moreover, they explain how Apona Security's patented analytics technology sets them apart from other SCA vendors, providing a comprehensive view of the software supply chain and identifying all dependencies and vulnerabilities. They also discuss the importance of continuous monitoring and assessment of the software supply chain, as new vulnerabilities are discovered and patched regularly.

    The discussion highlights the need for proactive measures to protect against potential security threats and the role of technology in helping organizations achieve this goal.

    About our Guests

    Ben Chappell is an accomplished cybersecurity leader with a wealth of experience in the field. He currently serves as the CEO of Apona Security, where he leads a high-performing team with an OpEx business model, positioning the company as a leader in SCA (Software Composition Analysis) and SAST (Static Application Security Testing). Outside of the office, Ben is a devoted family man, husband, and father of two children. He serves as a head soccer coach in his community. With his extensive global leadership background and passion for innovation, Ben Chappell is poised to drive Apona Security to new heights in the cybersecurity industry.

    Roger Neal is the Head of Products at Apona Security, a leading provider of cybersecurity solutions. Roger has a strong background in both athletics and technology, having been a Division One athlete and earning his degree in Information Systems. After graduation, he shifted his focus to cybersecurity and has since become a seasoned professional in the field. In his current role, Roger is responsible for overseeing the development and execution of Apona's product strategy, ensuring that the company's solutions remain at the forefront of the industry. Through his leadership and expertise, Roger has helped Apona Security continue to deliver cutting-edge cybersecurity solutions to clients worldwide.

  • Welcome to S5E6 of the Brilliance Security Magazine Podcast, where we bring you interviews with top security professionals in the industry. In this episode, our host Steve Bowcut is joined by Eric Kedrosky, the CISO at Sonrai Security, to discuss the recent LastPass cyber attack. Eric and Steve dive into the details of how the attack was discovered, the root causes of the breach, and what lessons security professionals can take away from this event. Join us for this insightful conversation on the latest threat to our cybersecurity.

    About our Guest

    Over the last two decades, Eric Kedrosky has honed his knowledge of Security Program Development, Security Strategy, Security Assessment, Research & Policy Development, and Leadership Development. His passion for collaborating with customers and executives has made him a crucial member of the Sonrai Security team. Few people have the combination of technical and communication skills that have pushed him to the forefront of cloud security assessment and development. Eric graduated from Carleton University in Ottawa, Canada, with a Bachelor of Computer Systems Engineering.

  • In this episode of Brilliance Security Magazine's podcast, host Steve Bowcut interviews Idan Wiener and Bogdan Kortnov of Illustria about the potential risks open-source libraries pose in the context of supply chain attacks. They discuss the current state of these threats and what organizations should be aware of when it comes to open-source libraries. Wiener and Kortnov give details regarding the vulnerabilities in the ecosystem, such as the recent discovery of a popular NPM package. The episode also covers topics such as possible ways to detect malicious activities and other methods for improving security in organizations. By the end of the episode, listeners will better understand open-source library threats and how to address them.

    About our Guests

    Idan Wiener, CEO at Illustria, has vast experience in both startup and corporate environments, with exposure to international markets. He served seven years as a Captain at the Israeli Naval Academy, leading soldiers, and officers in complex classified operations.

    With seven years of experience in development and information security, Bogdan Kortnov, CTO at Illustria, began his career as a Pentester before progressing to developing numerous secure systems. Eventually, he became an information security architect, guiding startups and information security firms on secure architecture and development practices.

    Don't miss this insightful discussion with Wiener and Kortnov of Illustria! This podcast is an essential resource for anyone interested in supply chain security or learning more about open-source libraries and their risks. Tune in to the Brilliance Security Magazine podcast today and stay informed.

  • As cybersecurity threats become more sophisticated, organizations must employ new measures to protect their networks, digital assets, and data. By understanding and implementing these concepts, you can help reduce your organization’s risk of a cyberattack. In this episode, cybersecurity expert Bikash Barai, Co-founder of FireCompass, explains how to manage your company’s external attack surface and perform continuous automated red teaming.

    Host Steven Bowcut and Bikash discuss the importance of external attack surface management and continuous testing of your defenses. Bikash explains the relationship between automated red teaming and attack surface management and offers advice about how organizations can prioritize the tsunami of vulnerabilities they face.

    About our Guest

    Bikash Barai is a serial cybersecurity entrepreneur. Before co-founding FireCompass, he founded iViZ, an automated application security testing company. He has graduate and post-graduate degrees from the Indian Institute of Technology (IIT) in computer science and architecture.

    He is passionate about AI, cognitive hacking, and attack simulation. He is credited for several innovations in the domain of IT Security and has multiple patents.

    Bikash is one of Fortune's 40-under-40 and has also received multiple other recognitions from UC Berkeley, Intel, Nasscom, Red Herring, TiE, & others.

    Outside of cyber security, Bikash is an amateur magician and painter. He is also passionate about mindfulness meditation, psychology, and philosophy.

    Listen to learn more about external attack surface management and continuous automated red teaming.

  • Medical devices are becoming increasingly interconnected and vulnerable to cyber-attacks. As a security professional, it's crucial that you understand the risks and how to safeguard these devices. This episode will provide an overview of the medical IoT landscape and critical considerations for protecting these devices.

    Listen in as Richard Staynings, Chief Security Strategist at Cylera and Steve Bowcut discuss what security professionals need to know about the ever-increasing threats against IoT devices in the medical environment. They cover the vulnerable devices, the information threat actors seek, the types of attacks they launch, and effective mitigation strategies.

    About our Guest

    Richard Staynings is a globally renowned thought leader, author, public speaker, and international luminary for healthcare cybersecurity. He has helped governments and private providers formulate long-term strategies and tactical action plans for improved cybersecurity and patient safety across the industry and the world. He has served on numerous working groups and boards.

    Richard serves as Chief Security Strategist for Cylera, a medical device, and Health-IoT security pioneer. He is also the author of Cyber Thoughts, a leading healthcare cybersecurity blog, and teaches postgraduate cybersecurity and health informatics courses at the University of Denver, University College.

    Take advantage of this informative discussion about medical and hospital IoT devices.