Podcast Episodes
Back to Search
When AI Touches Everything: Operationalizing the Five Most Dangerous New Attack Techniques at RSAC 2026 | A Redefining CyberSecurity Podcast Conversation with Ed Skoudis, President of SANS Technology Institute and Founder & CEO of Counter Hack
Episode 604
Show Notes
For ten years, Ed Skoudis has curated one of the most anticipated sessions at RSA Conference: SANS' "Five Most Dangerous New Attack Techni…
20 hours ago
When Cyber Meets Physical: Building Executive and Employee Protection Programs That Actually Work | A Redefining CyberSecurity Podcast Conversation with Roland Cloutier, Principal of The Business Protection Group
Episode 603
⬥EPISODE NOTES⬥
The conversation that led to this episode started with a LinkedIn post -- and it quickly surfaced a challenge that security leaders a…
3 days, 2 hours ago
Adapting to the Speed of Risk: Why GRC Programs Must Move with the Business | A Brand Highlight Conversation with Steve Schlarman, Senior Director of Archer
Episode 602
Archer is redefining what it means to manage governance, risk, and compliance in an environment defined by constant change. Steve Schlarman, Senior D…
1 week, 2 days ago
Task by Task: The Workflows We're Handing to AI — One Decision at a Time | Lens Four by Sean Martin | Read by TAPE9
Episode 601
Nobody decided to build a human-optional workflow — they just kept making reasonable procurement decisions, task by task, until the human became opti…
1 week, 3 days ago
The 72-Minute Gap: What the Breaches, the Vendors, and the Messaging Are Actually Telling Us | Lens Four by Sean Martin | Read by TAPE9
Episode 600
Attackers are moving in 72 minutes. One CISO has already eliminated the entire SOC team. And the industry is spending a quarter of a trillion dollars…
2 weeks, 2 days ago
SOC Automation and the AI-Driven Future of Cybersecurity Defense | A Redefining CyberSecurity Podcast Conversation with Richard Stiennon, Chief Research Analyst of IT-Harvest
Episode 599
⬥EPISODE NOTES⬥
The security operations center has always been a battleground of volume, velocity, and human endurance. Analysts have long faced the …
2 weeks, 2 days ago
Speaking Security with a Business Accent: Why Being Right Isn't Enough If Nobody Listens | A Redefining CyberSecurity Podcast Conversation with Josh Mason
Episode 598
⬥EPISODE NOTES⬥
What happens when a cybersecurity professional knows exactly what's wrong but can't get anyone to act on it? It's a problem that affe…
2 weeks, 3 days ago
The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber
Episode 597
What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Produc…
3 weeks, 5 days ago
The New Identity Risk AI Agents Bring to the Enterprise | A Brand Highlight Conversation with Ido Shlomo, Co-Founder & CTO of Token Security
Episode 596
What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Securit…
1 month ago
KEVology: How Exploit Scores and Timelines Shape Real Security Decisions | A Brand Highlight Conversation with Tod Beardsley, Vice President of Security Research of runZero
Episode 595
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security …
1 month, 1 week ago