When Cybercrime Gets Personal

May Chen-Contino is the CEO of Unit 221B, a threat disruption company that delivers actionable intelligence to enterprises, law enforcement, and government agencies. Her background spans cybersecurity, fintech, and SaaS leadership at companies like PayPal and eBay, and she brings a distinctly mission-driven lens to the work, shaped equally by a career in business and a background as a Krav Maga instructor.
Past, Present, and Future of AI agents

The intersection of AI and cybersecurity is changing faster than anyone expected, and that pace is creating both incredible innovation and brand-new risks we’re only beginning to understand. From deepfake ads that fool even seasoned security professionals to autonomous agents capable of acting on our behalf, the threat landscape looks very different than it did even a year ago.
Hackers Are Winning with Evan Powell

Evan Powell has spent nearly 30 years in the cybersecurity world. He’s the founder and CEO of Deep Tempo, and a serial entrepreneur who’s helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he’s seen firsthand how enterprises try to shift the balance.
Before the Fraud Tsunami Hits with Ritesh Kotak

Ritesh Kotak is a cybersecurity analyst, an Ontario lawyer, and a tech innovator who’s worked with Fortune 500 companies and served in policing, where he helped start one of Canada’s first municipal cybercrime units. He’s got a BBA, MBA, and JD, all focused on privacy, cybercrime, and the way emerging tech impacts everyday life.
Hidden Dangers of AI in Cybersecurity with Aviad Hasnis

Whether you’re the CISO of a Fortune 500 company or you’re running a small team with Bob, the go-to tech person juggling 18 other tasks, this episode is packed with practical insights to help you avoid the next big cybersecurity headache. While AI might be reshaping the cybersecurity landscape, staying secure still comes down to thoughtful planning, human judgment, and making sure someone you trust has your back.
Why Everyone’s A Target with Gabrielle Hempel

Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap.
Empowering the Vulnerable with Sam Curry

In cybersecurity, we need to understand the mindset of hacking, which is not ethics. We also need to realize that even if we have cybersecurity experts get hacked, there is no reason to feel embarrassed or ashamed when it happens to us. In today’s show we’re going deep into the world of cybersecurity with one of the industry’s most seasoned experts, Sam Curry.
Ransomware, Phishing and Fraud with Bryce Austin

Cybersecurity isn’t just a concern for large corporations. It’s vital for businesses of all sizes. Bryce Austin is the CEO of TCE Strategy, a cybersecurity advisory firm. They provide vulnerability scans, penetration tests, fractional CISO services, and incident response services. He is also a professional speaker on ransomware. Bryce is the fractional CISO to many companies, including one on the S&P 500.
CISOs: The Ultimate Stress Test with Jill Knesek

With all the shifts in cybersecurity, it’s crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed at multiple levels and handle burnout amongst many other responsibilities. Today’s guest is Jill Knesek. Jill is the Chief Information Security Officer for Blackline, a company that does financial SaaS solutions.
Cybersecurity Training from Boring to Engaging with Howard Goodman

Building a security culture and staying ahead of modern threats has never been more important. Today’s guest is Howard Goodman, Senior Technical Director at Skybox Security. We discuss organizational challenges, best practices, and the future of cybersecurity.
5 Key Cybersecurity Elements with Kelly Hood
How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they’re redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today’s threats.
Digital Deception: What Lies Ahead with Perry Carpenter

Perry Carpenter is an award-winning author, podcaster, and speaker with over two decades in cybersecurity, focusing on how cyber criminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust, human-centric defenses against social engineering-based threats.
Rethinking Online Anonymity with Lance Cottrell

Lance Cottrell founded Anonymizer in 1995 and is an internationally recognized expert in cryptography, online privacy, and internet security. VPNs are often promoted as the cure-all to our internet needs. Let’s talk about some of those misconceptions.
AI: Double-Edged Sword for Cybersecurity with Vincent LaRocca

As consumers, we may realize the need to be vigilant by using two-factor authentication and password managers, but there are so many scams out there that can impersonate legitimate organizations, websites, and people. We really can’t let our guard down.
Cybersecurity for Everyday People with Greg Tomchick

Learning how to keep your business safe and protect your online data can be advantageous for your home and personal life as well. Your children and family can create awareness at school and with friends.
Hacker Tactics with John Hammond

The tech world is ever-changing and it can be difficult to keep up. As businesses and individuals, it’s important to remember to keep your software up to date and apply patches as they are released. Today’s guest is John Hammond. John is a cybersecurity researcher, educator, and content creator. As part of the Adversary Tactics Teams at Huntress, John spends his days analyzing malware and making hackers earn their access. He is an online YouTube personality showcasing program tutorials, malware analysis, dark web threats, and other cybersecurity content.
Top 5 Supply Chain Risks with Kevin Kumpf

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.
Advances in Crypto with Bam Azizi

There are so many things to learn about utilizing crypto, understanding the benefits as well as the benefits. It can be used to save time and money, but you need to be careful and only interact with reputable companies. Today’s guest is Bam Azizi. Bam is a tech entrepreneur and the co-founder and CEO of Mesh, which provides FinTech companies with a seamless and secure one-click system for users to transfer their assets for deposit, payment, and payout. He previously founded No Password, a cybersecurity identity company acquired by LogMeIn in 2019.
Preventing and Reporting Cyber Attacks with Robert Karas

Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks and products. Today’s guest is Robert Karas. Rob came to the Cybersecurity and Infrastructure Security Agency in 2010. He has over 30 years experience in the information security field and significant experience in building nationally recognized security platforms. At CISA, Rob built the Cyber Hygiene Program, risk and vulnerability assessments, and penetration testing programs. He has also created the Cyber Defense Education training programs to address industry challenges. Rob was also recognized by Cyber Patriot as Mentor of the Year.
5 Ways to Stay Safe Online with Patrick McNamara

Staying safe online requires you to be an active participant. You need to do your own research and not rely entirely on other people’s tools, some of which are intended to actually take advantage of you. Today’s guest is Patrick McNamara. Patrick holds a bachelor’s degree in cybersecurity from University of Maryland Global along with multiple certifications. He operates the cyber awareness site DIYSecurityTips.com and is currently a cybersecurity engineer for a software company.
Intersection of AI and Cybersecurity with Paul Valente

AI creates opportunities as well as challenges. We may need to become more skeptical about what we see and hear knowing that images and words can be generated without transparency of its creation. Today’s guest is Paul Valente. Paul is the CEO and co-founder of VISO Trust, a former CISO of Restoration Hardware, Lending Club, and ASAPP with over 20 years of technology, financial services, ecommerce, and information security innovation. Paul holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM) and ISO 27001 Lead Implementer.
Predicting Network Vulnerability with Hari Ravichandran

If AI knows your data patterns, it can help keep families safe online by preventing cyber security incidents from happening rather than just reacting once they do. Today’s guest is Hari Ravichandran. As an engineer by trade and entrepreneur by nature, Hari has a track record of founding successful businesses in technology and security. After a painful personal experience with identity theft, Hari founded Aura, a way to simplify digital security for consumers. He has since grown Aura into a business worth over 2.5 billions dollars dedicated to creating a safer internet for everyone through an intelligent, proactive platform.
The Importance of Testing Your Cybersecurity Response with Steve Orrin

Cyberattacks can happen to an individual computer or an entire network. It’s vital to have well-tested plans in place before ransomware rears its ugly head. Today’s guest is Steve Orrin. Steve is Intel’s Federal CTO and Senior Principal Engineer. He leads public sector solutions architecture, strategy, and engagement and has held technology leadership positions at Intel. Steve was previously CTO, CSO, and co-founder of several successful security startups and is a recognized expert and frequent lecturer on enterprise security.
3 Steps to Take After a Data Breach with Robert Anderson Jr.

Today’s guest is Robert Anderson Jr. Robert is a national security expert, author, and business leader dedicated to helping companies improve cybersecurity and reduce business risk. As Chairman and CEO of Cyber Defense Labs, he brings decades of executive leadership and operational experience in cybersecurity, counterintelligence, economy espionage, and critical incident response.
Cybersecurity Leadership is Broken with Richard Brinson

Today’s guests are Richard Brinson and Rachel Briggs. Richard is an experienced executive, board advisor, and global top 100 Chief Informations Security Officer. He has been providing strategic guidance to many of the world’s largest global organizations for over 20 years with core expertise in cybersecurity, technology infrastructure, and enterprise architecture. Richard leads Savanti’s cybersecurity practice, helping large organizations to transform and modernize their security functions for the digital age.
Rachel is a leading expert on security and has advised governments and multinational corporations on security, resilience, terrorism, and responses to extremism. She is an Executive Advisor with Savanti and founder and CEO of The Clarity Factory, which provides and arranges services to its clients including research, consultancy, and thought leadership.