Podcasts about SOC

  • 1,486PODCASTS
  • 4,779EPISODES
  • 43mAVG DURATION
  • 2DAILY NEW EPISODES
  • Sep 16, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about SOC

Show all podcasts related to soc

Latest podcast episodes about SOC

The Tech Blog Writer Podcast
3422: Meet Symphion and the Print Fleet Cybersecurity as a Service

The Tech Blog Writer Podcast

Play Episode Listen Later Sep 16, 2025 21:57


I've spent years talking about endpoint security, yet printers rarely enter the conversation. Today, that blind spot takes center stage. I'm joined by Jim LaRoe, CEO of Symphion, to unpack why printers now represent one of the most exposed corners of the enterprise and what can be done about it. Jim's team protects fleets that range from a few hundred devices to tens of thousands, and the picture he paints is stark. In many organizations, printers make up 20 to 30 percent of endpoints, and almost all of them are left in a factory default state. That means open ports, default passwords, and little to no monitoring. Pair that with the sensitive data printers receive, process, and store, plus the privileged connections they hold to email and file servers, and you start to see why attackers love them. We trace Symphion's path from a configuration management roots story in 1999 to a pivot in 2015 when a major printer manufacturer invited the company behind the curtain. What they found was a parallel universe to mainstream IT. Brand silos, disparate operating systems, and a culture that treated printers as cost items rather than connected computers. Add in the human factor, where technicians reset devices to factory defaults after service as second nature, and you have a recipe for recurring vulnerabilities that never make it into a SOC dashboard. Jim explains how Symphion's Print Fleet Cybersecurity as a Service tackles this mess with cross-brand software, professional operations, and proven processes delivered for a simple per-device price. The model is designed to remove operational burden from IT teams. Automated daily monitoring detects drift, same-day remediation resets hardened controls, and comprehensive reporting supports regulatory needs in sectors like healthcare where compliance is non-negotiable. The goal is steady cyber hygiene for printers that mirrors what enterprises already expect for servers and PCs, without cobbling together multiple vendor tools, licenses, and extra headcount to operate them. We also talk about the hidden costs of DIY printer security. Licensing multiple management platforms for different brands, training staff who already have full plates, and outages caused by misconfigurations all add up. Jim shares real-world perspectives from organizations that tried to patch together a solution before calling in help. The pattern is familiar. Costs creep. Vulnerabilities reappear. Incidents push the topic onto the CISO's agenda. Symphion's pitch is straightforward. Treat print fleets like any other class of critical infrastructure in the enterprise, and measure outcomes in risk reduction, time saved, and fewer surprises. If you are commuting while listening and now hearing alarm bells, you are not alone. Think about the printers scattered across your offices and clinics. Consider the data that passes through them every day. Then picture an attacker who finds default credentials in minutes and uses a printer to move across your network.  Tune in for a fast, practical look at a risk hiding in plain sight, and learn how Symphion's Print Fleet Cybersecurity as a Service can help you close a gap that attackers know too well. ********* Visit the Sponsor of Tech Talks Network: Land your first job  in tech in 6 months as a Software QA Engineering Bootcamp with Careerist https://crst.co/OGCLA  

Packet Pushers - Full Podcast Feed
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 15, 2025 29:41


Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »

Packet Pushers - Network Break
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok

Packet Pushers - Network Break

Play Episode Listen Later Sep 15, 2025 29:41


Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »

Packet Pushers - Fat Pipe
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok

Packet Pushers - Fat Pipe

Play Episode Listen Later Sep 15, 2025 29:41


Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »

Skype of  Cthulhu
951 - Curse of Nineveh 03

Skype of Cthulhu

Play Episode Listen Later Sep 14, 2025


Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. July, 1925 London The investigators met the detestable owner of an antiques shop but one member of the team finds he is more than he seems. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics

The Cybersecurity Defenders Podcast
#246 - Defender Fridays: AI in the SOC with Matt Bromiley from Prophet Security

The Cybersecurity Defenders Podcast

Play Episode Listen Later Sep 12, 2025 32:45


Matt Bromiley breaks down how AI is transforming (and should be transforming) SOC workflows. Whether you're already using AI tools or wondering where to start, this is the conversation you don't want to miss. Matt is a security engineer at Prophet Security, refining Prophet AI to enhance automated alert triage, investigation, and response. His work ensures that customers can cut through the noise and focus on real threats - without getting bogged down by manual analysis. Learn more at prophetsecurity.aiMatt is a cybersecurity leader and educator with over 14 years of experience leading incident response efforts and advancing detection and response capabilities across enterprise environments. His career has spanned hands-on operations, high-pressure breach response, and the strategic development of scalable cybersecurity programs.Matt also serves as an instructor with the SANS institute, delivering advanced training in incident management and host- and network-based incident response. On Defender Fridays we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.Join the live discussions by registering at limacharlie.io/defender-fridays

Cyber Security Headlines
Week in Review: Qantas penalizes executives, UK cyberlegislation delayed, SonicWall VPN flaws

Cyber Security Headlines

Play Episode Listen Later Sep 12, 2025 37:26


Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Rob Teel, CTO, Oklahoma Department of Commerce and Howard Holton, CEO, GigaOm Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta.Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. All links and the video of this episode can be found on CISO Series.com        

Cyber Security Headlines
SonicWall VPM exploits, Fed cyberchief's priorities, U.S spyware investment triples

Cyber Security Headlines

Play Episode Listen Later Sep 12, 2025 8:18


SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com.    

InfosecTrain
SOC Analyst Masterclass: Threats, Response & Career Roadmap Part - 2

InfosecTrain

Play Episode Listen Later Sep 12, 2025 86:39


Dreaming of a career as a SOC Analyst? This InfosecTrain masterclass is your ultimate guide to understanding threats, mastering response tactics, and mapping out your career path in cybersecurity's frontline role—the Security Operations Center (SOC).Inside the SOC, analysts are the first line of defense against cyberattacks. But to thrive in this role, you need more than just technical skills—you need to understand the threat landscape, respond effectively under pressure, and strategically plan your career. This session blends real-world insights, structured learning, and expert advice to help you get there.

Cyber Security Headlines
npm update, Cursor Autorun flaw details, Microsoft probe over Ascension hack?

Cyber Security Headlines

Play Episode Listen Later Sep 11, 2025 8:03


The npm incident: nothing to fret about? Cursor Autorun flaw lets repositories execute code without consent Senator Wyden urges FTC to probe Microsoft over Ascension hack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.  

What the Tech
Building, Scaling, and Protecting with Tony Pietrocola

What the Tech

Play Episode Listen Later Sep 11, 2025 9:48


In this episode of What The Tech, FIT's VP of Client Partnerships Becky Cross welcomes Tony Petricola, President of AgileBlue and longtime Cleveland tech entrepreneur. From working on Apple's translucent iMac launch to scaling startups and driving global growth, Tony shares the pivotal lessons that shaped his leadership and outlook. Plus, FIT Technologies is proud to announce our partnership with AgileBlue as our preferred AI-based SOC provider, bringing next-level threat detection and risk mitigation to our clients.

InfosecTrain
SOC Analyst Masterclass: Threats, Response & Career Roadmap Part - 1

InfosecTrain

Play Episode Listen Later Sep 11, 2025 91:51


Thinking about starting a career in a Security Operations Center (SOC)? This InfosecTrain session is your complete introduction to SOC fundamentals—from analyst roles to the tools and frameworks that drive modern cyber defense.

Paul's Security Weekly
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412

Paul's Security Weekly

Play Episode Listen Later Sep 10, 2025 71:11


With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven report provides spending benchmarks and recommendations that will help you budget for an unpredictable near term while enabling the business and mitigating the most critical risks facing your organization. If you're preparing your 2026 budgets, don't miss this interview where you'll learn where to invest, divest, and experiment. From the buzzing floors of BlackHat 2025 in Las Vegas, CyberRisk TV brings you an exclusive sit-down with Danny Jenkins, CEO & Co-Founder of ThreatLocker. In this high-energy interview, host Doug White dives deep into the real-world challenges of FedRAMP compliance, the million-dollar prep lessons, and the critical importance of secure configurations. Danny shares unfiltered insights into Defense Against Misconfigurations — ThreatLocker's new approach that helps organizations lock down endpoints, enforce application control, and spot hidden risks before attackers do. From Russian-made 7Zip to Chinese coupon clippers lurking in browsers, the conversation reveals shocking examples of threats hiding in plain sight. Whether you're a cybersecurity pro, IT leader, or compliance specialist, this interview offers a rare, behind-the-scenes look at the pain, process, and payoff of operating at the highest security standards in the industry. Segment Resources: https://threatlocker.com/platform/defense-against-configuration?utmsource=cyberriskalliance&utmmedium=sponsor&utmcampaign=blackhat25q325&utmcontent=blackhat25&utm_term=podcast This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerbh to learn more about them! Live from the CyberRisk TV studio at Black Hat 2025 in Las Vegas, host Matt Alderman sits down with Matt Muller, Field CISO at Tines, for a deep-dive into how Security Operations Centers must evolve. From blowing up the outdated tier system to empowering junior analysts with AI, this conversation uncovers the real strategies driving next-gen cyber defense. Muller explains why traditional SOC models create burnout, how AI can flatten team structures, and why measuring the right metrics—like Mean Time to Detect—is critical for success. They tackle the balance of human + AI orchestration, the security challenges of non-human identities, and how to rethink access controls for a machine-augmented future. If you care about SOC transformation, AI-driven security workflows, and cyber resilience at scale, this is the conversation you can't afford to miss. Watch until the end for practical insights you can start applying today in your own security operations. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesbh to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-412

SECURE AF
Mastering Incident Response: Essential for SOC Success

SECURE AF

Play Episode Listen Later Sep 10, 2025 8:41


Got a question or comment? Message us here!

Cyber Security Headlines
Blood center attack details emerge, Electoral Commission recovers, Plex suffers password breach

Cyber Security Headlines

Play Episode Listen Later Sep 10, 2025 7:23


Thousands had data leaked in blood center ransomware attack UK Electoral Commission recovers, 3 years after China hack Npm packages with 2 billion weekly downloads targeted in supply chain attack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.  

Business Security Weekly (Audio)
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412

Business Security Weekly (Audio)

Play Episode Listen Later Sep 10, 2025 71:11


With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven report provides spending benchmarks and recommendations that will help you budget for an unpredictable near term while enabling the business and mitigating the most critical risks facing your organization. If you're preparing your 2026 budgets, don't miss this interview where you'll learn where to invest, divest, and experiment. From the buzzing floors of BlackHat 2025 in Las Vegas, CyberRisk TV brings you an exclusive sit-down with Danny Jenkins, CEO & Co-Founder of ThreatLocker. In this high-energy interview, host Doug White dives deep into the real-world challenges of FedRAMP compliance, the million-dollar prep lessons, and the critical importance of secure configurations. Danny shares unfiltered insights into Defense Against Misconfigurations — ThreatLocker's new approach that helps organizations lock down endpoints, enforce application control, and spot hidden risks before attackers do. From Russian-made 7Zip to Chinese coupon clippers lurking in browsers, the conversation reveals shocking examples of threats hiding in plain sight. Whether you're a cybersecurity pro, IT leader, or compliance specialist, this interview offers a rare, behind-the-scenes look at the pain, process, and payoff of operating at the highest security standards in the industry. Segment Resources: https://threatlocker.com/platform/defense-against-configuration?utmsource=cyberriskalliance&utmmedium=sponsor&utmcampaign=blackhat25q325&utmcontent=blackhat25&utm_term=podcast This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerbh to learn more about them! Live from the CyberRisk TV studio at Black Hat 2025 in Las Vegas, host Matt Alderman sits down with Matt Muller, Field CISO at Tines, for a deep-dive into how Security Operations Centers must evolve. From blowing up the outdated tier system to empowering junior analysts with AI, this conversation uncovers the real strategies driving next-gen cyber defense. Muller explains why traditional SOC models create burnout, how AI can flatten team structures, and why measuring the right metrics—like Mean Time to Detect—is critical for success. They tackle the balance of human + AI orchestration, the security challenges of non-human identities, and how to rethink access controls for a machine-augmented future. If you care about SOC transformation, AI-driven security workflows, and cyber resilience at scale, this is the conversation you can't afford to miss. Watch until the end for practical insights you can start applying today in your own security operations. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesbh to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-412

Business Security Weekly (Video)
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Danny Jenkins, Matt Muller - BSW #412

Business Security Weekly (Video)

Play Episode Listen Later Sep 10, 2025 71:11


With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven report provides spending benchmarks and recommendations that will help you budget for an unpredictable near term while enabling the business and mitigating the most critical risks facing your organization. If you're preparing your 2026 budgets, don't miss this interview where you'll learn where to invest, divest, and experiment. From the buzzing floors of BlackHat 2025 in Las Vegas, CyberRisk TV brings you an exclusive sit-down with Danny Jenkins, CEO & Co-Founder of ThreatLocker. In this high-energy interview, host Doug White dives deep into the real-world challenges of FedRAMP compliance, the million-dollar prep lessons, and the critical importance of secure configurations. Danny shares unfiltered insights into Defense Against Misconfigurations — ThreatLocker's new approach that helps organizations lock down endpoints, enforce application control, and spot hidden risks before attackers do. From Russian-made 7Zip to Chinese coupon clippers lurking in browsers, the conversation reveals shocking examples of threats hiding in plain sight. Whether you're a cybersecurity pro, IT leader, or compliance specialist, this interview offers a rare, behind-the-scenes look at the pain, process, and payoff of operating at the highest security standards in the industry. Segment Resources: https://threatlocker.com/platform/defense-against-configuration?utmsource=cyberriskalliance&utmmedium=sponsor&utmcampaign=blackhat25q325&utmcontent=blackhat25&utm_term=podcast This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerbh to learn more about them! Live from the CyberRisk TV studio at Black Hat 2025 in Las Vegas, host Matt Alderman sits down with Matt Muller, Field CISO at Tines, for a deep-dive into how Security Operations Centers must evolve. From blowing up the outdated tier system to empowering junior analysts with AI, this conversation uncovers the real strategies driving next-gen cyber defense. Muller explains why traditional SOC models create burnout, how AI can flatten team structures, and why measuring the right metrics—like Mean Time to Detect—is critical for success. They tackle the balance of human + AI orchestration, the security challenges of non-human identities, and how to rethink access controls for a machine-augmented future. If you care about SOC transformation, AI-driven security workflows, and cyber resilience at scale, this is the conversation you can't afford to miss. Watch until the end for practical insights you can start applying today in your own security operations. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesbh to learn more about them! Show Notes: https://securityweekly.com/bsw-412

Paul's Security Weekly
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347

Paul's Security Weekly

Play Episode Listen Later Sep 9, 2025 77:09


Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-347

Skype of  Cthulhu
950 - The Rat King 02

Skype of Cthulhu

Play Episode Listen Later Sep 9, 2025


Skype of Cthulhu presents a Call of Cthulhu scenario. The Rat King from Children of Fear by Lynne Hardy and Friends. September 21, 1923 Peking, China In an alternate universe, the investigators find the missing missionary to their everlasting regret. Dramatis Persone: Jim as The Keeper of Arcane Lore; Randall as Timur Stepanovich Repin, White Army Refuge Meredith as Chang Mei, Linguist Steve as Charles Lockhart, Diplomat Sean as Michael Li, Missionary Gary as Dr. Eudora Lockhart, Archaeologist Edwin as Sofian Bazaz-Wain, Photojournalist Download Subcription Options Podcast statistics

THE LONG BLUE LEADERSHIP PODCAST
One Leader - One Million Acts - Lt. Col. Steven "Meathead" Mount '08

THE LONG BLUE LEADERSHIP PODCAST

Play Episode Listen Later Sep 9, 2025 53:10


People matter more than position, and leadership starts with taking care of others. Doing that right means a million acts. SUMMARY Those are lessons Lt. Col. Steven “Meathead” Mount '08 shares with listeners in the Season 4 premier of Long Blue Leadership. For Col. Mount, becoming a pilot was a major milestone, but becoming a husband and father had the biggest impact. Don't wait, listen today and become a better leader tomorrow.   SHARE THIS PODCAST FACEBOOK  |  LINKEDIN   COL. MOUNT'S TOP LEADERSHIP TAKEAWAYS Adoption shaped my understanding of support and love. Leadership is about lifting others to achieve their best. Mentorship plays a crucial role in personal and professional growth. Balancing family and career is a continuous challenge. It's important to have tough conversations as a leader. Resilience is key to overcoming setbacks in life and career. Listening more than talking is essential for effective leadership. Recognizing the importance of support systems can enhance leadership effectiveness. Leadership is defined by consistent, everyday actions. The military community thrives on teamwork and mutual support.   CHAPTERS 00:00 Introduction to Leadership Lessons 06:43 The Impact of Adoption on Leadership 14:53 Navigating Challenges at the Academy 22:49 Career Path and Opportunities in Aviation 33:31 Balancing Family and Military Career 44:18 Continuous Improvement as a Leader     ABOUT COL. MOUNT BIO Lt. Col. Steven “Meathead” Mount is a decorated officer in the United States Air Force with a career marked by leadership, operational excellence, and a deep commitment to mentoring the next generation. A command pilot with thousands of flight hours, he has served in a variety of demanding roles across multiple aircraft and theaters, bringing a wealth of experience in both combat and peacetime operations. Beyond the cockpit, Lt. Col. Mount is widely recognized for his ability to lead diverse teams through complex challenges, foster innovation, and develop leaders at every level. His career reflects not only technical expertise but also a people-first leadership philosophy that emphasizes accountability, resilience, and service. Known by his call sign “Meathead,” he brings both humility and humor to the serious business of leading Airmen. His story is one of dedication to mission and country, but also of shaping culture, inspiring others, and leaving a lasting impact on the Air Force community.   CONNECT WITH THE LONG BLUE LEADERSHIP PODCAST NETWORK TEAM Send your feedback or nominate a guest: socialmedia@usafa.org Ted Robertson | Producer and Editor:  Ted.Robertson@USAFA.org    Ryan Hall | Director:  Ryan.Hall@USAFA.org  Bryan Grossman | Copy Editor:  Bryan.Grossman@USAFA.org Wyatt Hornsby | Executive Producer:  Wyatt.Hornsby@USAFA.org      ALL PAST LBL EPISODES  |  ALL LBLPN PRODUCTIONS AVAILABLE ON ALL MAJOR PODCAST PLATFORMS     TRANSCRIPT SPEAKERS Guest, Lt. Col. Steven Mount '08  |  Host, Lt. Col. Naviere Walkewicz '99   Naviere Walkewicz Welcome to the first episode of Season 4 of Long Blue Leadership, the podcast where we share insights on leadership through the lives and experiences of Air Force Academy graduates. I'm Naviere Walkewicz, Class of '99. We're kicking off this season with a story that shows how our earliest experiences can shape the kind of leaders we become. Lt. Col. Steve Mount, Class of 2008, call sign “Meathead,” didn't fully realize that truth until later in life. Adopted as an infant, he came to understand that love and support aren't guaranteed. They're gifts. Over his 17-year career, Col. Mount has flown missions across a wide range of aircraft, from the C-130 to special operations to the U-2. And today, he's in command. But through every stage, one belief has stayed with him: People succeed not only through their own efforts, but because someone believed in them. In this conversation, we'll talk about how those early lessons have shaped criminal mom's approach to leading airmen, mentoring the next generation of pilots, balancing mission and family and building teams that are rooted in trust. His story is a powerful reminder that leadership isn't about the me game, it's about lifting others so they can achieve their best. So what better way to start our new season? Col. Mount, welcome to Long Blue Leadership. Lt. Col. Steven Mount Thank you so much, ma'am for having me. I really do appreciate this opportunity to at least try to share some of my stories, experiences and honestly, if anything touches base with those who listen in and resonates, that's why I'm glad to be here. Naviere Walkewicz Well, let's start right with a way for them to connect with you. You mentioned your call sign is Meathead. Let's start there. Lt. Col. Steven Mount OK, I'll do my best to tell the story as quickly as I can. And the fun thing about being a pilot — but also I think this plays true in any type of storytelling environment — is, you know, only 10% of the story has to be true when it comes to your call signs. So to start… Oh my gosh— I know there's some friends out there who are going to laugh at this, especially of mine. Going through pilot training… The last part of the pilot training, when I was in the T-1s, when you get to that last part, you know, after you've gone through all the ups and downs, you kind of celebrate a little bit more. And that's what I've done. I had gone out with a couple of my rugby brothers that I played with at the Academy, and we'd gone out to just a country, a little country dance hall, and, you know, we're just enjoying and celebrating. And one of my rugby brothers introduced me to one of his friends through his wife, and this individual, who I didn't know much about at the time, had said— I said, “Yeah, I'm starting T-1s here and all that good stuff. And I immediately, immediately — especially in the celebratory mood I was in — thought, “Oh, this is another awesome student that's coming through. Like, hey, let me start giving you the tidbits. Let me start laying out what to expect.” And that's how I treated this individual for the rest of that evening. You know, we're dancing and having fun and just talking it up. And it was a good evening. It was really good evening. Come Monday morning, I get the word I'm flying with this new instructor in the T- 1s. And I had no idea who this individual was. I did not recognize the name at all. And I asked our flight schedule, like, “Who's this?” Is like, “Oh, it's a new person coming in. I think you're one of his first flights back in the T-1s training wise.” And I was like, “Well, OK, I'm ready to go.” And I sit down, and then this instructor sits down right across from me, and it's a major and sure enough, it's this, the person I thought was a student at the Texas dance, the country dance hall that we were at.   Naviere Walkewicz Oh boy!   Lt. Col. Steven Mount He looks me up and down. Oh, it was one of those moments of shock, of like, “What do I… Where do I go from here?” And he looks me up and down, he goes, and he laughs, and he goes, “Man, you are just such a meathead.” And so that's where it started. And call signs and nicknames— sometimes, some people like, wanna try change it throughout their careers and try to like, “No, that's not who I am. I don't want that to define me.” So as I'm leaving pilot training at Laughlin Air Force Base, Del Rio, I'm heading towards my first assignment in Tucson, Arizona for the EC-130 and I'm like, “OK, here we go. I'm gonna start fresh. I'm not that meathead that went through the Academy playing rugby. I'm not that meathead in pilot training to I just like to have fun. Just like to have fun. I do my own thing, and I'm gonna start fresh.” And I get out, and one of the very first meetings I had in the new squadron was with the DO, Lt. Col. Reimer. He sits down with me, and he says, “Come on in, because I'm in blues. He goes, come on in. Sit down. And then he's just quiet. I'm like, this is interesting. He looks me up and down and goes, “Yeah, you definitely look like a meathead.” And I'm like, “Whoa.” So sure enough, the major that I flew with was really good friends and had flown with this squadron, told this DO about me, and the DO got through his spiel, introduced me to my first flight commander before I deployed in Afghanistan, and goes, “Hey, this is Meathead. Take care of him. He's a good one.” I was like, “No, no, everyone, please, let's stop.” And then throughout the years, things kept happening that just reinforced the call sign, Meathead. I got into U-2s, me and a buddy, also pilots. We popped both tires on a T-38 at Long Beach Airport, and we closed down the airport for about five hours. It was on the local news. Not happy about that. And then there were multiple times where I tried to, like, get rid of the Meathead persona, the callsign, but I think it was finally solidified on a CNN interview on one of my U-2 deployments, where the lady interviewing us goes, “OK, we can't use your real name. So what name should we use? And before I could even say anything, one of my buddies just pops up and goes, “ It's Meathead.CNN lady, use Meathead.” And I was like, “OK.” And then international news in that interview, I am Capt. Meathead. And I never got away from the call sign, Meathead.   Naviere Walkewicz We are gonna find that clip of Capt. Meathead.   Lt. Col. Steven Mount It is out there, just U-2… I think the article under CNN: “U-2 spy plane carries out the mission against terrorist organizations.” You know, not that I didn't remember what it was called.   Naviere Walkewicz Well, I would say you heard it here first, but you didn't. You heard it maybe, if you heard it in the U-2 world or what have you. But we're gonna find it again. And so we're gonna resurrect here first, but we're so glad you're here. Yes, yes, this is awesome. And you know, I think one of the things I really enjoyed in our early conversation, and what we're gonna share today is how you kind of look back and you are very grateful and thankful for the upbringing you have. And so let's kind of go back to the fact, you know, not a lot of our guests share kind of their background, and the fact that you share that you were adopted. What did that kind of, what role did that play in your life? And, you know, was it insignificant? Or, you know, what did you glean from that? Lt. Col. Steven Mount Yeah, I really appreciate that question. And honestly, I really appreciate you giving the opportunity to kind of share that. It has played a huge role in my life. Adopted 11 months. And what it did for me is set the foundation of the family. It may not necessarily be one you have, it's the one who who's there for you, who supports you, who loves you. And then, honestly, the other part about being adopted, which I kind of— there were struggles, like, it wasn't perfect, but there were struggles in my mind where I wanted to show that those who adopted me, I wanted to show them that I could be more and thank them, you know, on a daily basis, for everything they had done for me, supporting me. So that drove me, that motivated me to get into the Academy, or even— back up, even like, do well in high school, get into the Academy, become a pilot. All of that was the basis of— I want to show that in a weird way, I want to show that your investment was worth it. You know, you found me, you gave me the love and support. So I'm going to give back to you by showing you what you were able to, you know, give a second chance, small, little child. And then the— but the other side of that, and I don't know how many of those who are adopted, who feel like this sometimes. Can't be the only one, but I can at least convey it here. There's a sense of, you know, “Why? Why was I adopted?” You know, what really happened in the sense that those who biologically brought me into this world, was I not worthy enough? Was I just a bad situation. And so there's that part I keep motivational wise to be like, “Well, I'm going to show them what they're missing out on.” And I know that's more of the negative kind of side of the whole internal conflict of being adopted. But I would be lying if I didn't say that that was part of the drive that kept me going throughout those years.   Naviere Walkewicz Something that came to my mind when you were saying that was, you know— when did you find out? And how old were you to kind of start having those, those thoughts and questions, you know, not only why, but how do I show that I am worthy?   Lt. Col. Steven Mount Yes, so my mother and father did an amazing job of, I remember, I can't remember the name of this particular book, but there was a book that she had given me that she read to me, and that, throughout the years, as I she utilized, helped me start reading and whatnot. And the basis of the book was, you know, cartoon with a little bit of words, is, “You were not purchased, you know, you were not bought at a store. You know you were, you were brought in and chosen and to be a part of a family.” So she, she wanted to have this idea that I always knew, that was adopted. She never wanted to surprise me, or she never wanted to be like, one day, like, “Hey, just so you know…” She did an awesome job of leading into that, Hey, you were adopted. But don't look at it as this, ‘We went to the store and we picked out the one we liked.' It's more of a, ‘We wanted you in our family.' And that's where it started.” It started, “We wanted a bigger family.” Whether they were, at the time, not able to grow or have themselves, they decided that, “We still want to grow a family. So let's look through adoption as a means.” So she had that book, I remember that book, and then the other book, which I still love to this day, and I got a copy for my kids, I Love You Forever, and how she would read that book to me every single night with the words, “…and I love you forever, like you for always. As long as you're living, my baby, you'll be.” That showed me that it didn't matter where I came from. This was my mom, you know, this was my family. So she did a really good job laying that foundation for me, for who I've become to be.   Naviere Walkewicz So would you put your parents in that bucket of inspirational leaders for you that have shaped you? And are there others?   Lt. Col. Steven Mount One-hundred percent. Like I said, the foundational piece of being that inspirational leader, to me in the sense of working on it all the time, right? It's not simple but accepting people for who they are. Where they're at in life. Accept them for their faults, accept them for the things that they don't like about themselves, but just accepting them and giving them the support, giving them the love that they need to show them, that they can do anything, I like to think for the most part, I'm an example of that because of what my parents did for me.   Naviere Walkewicz So, as a young boy, and you talked a little bit about this, you wanted to prove to them. So Was that something you feel over time, you continue to develop this desire to show your worth? And where have you seen that show up I guess even throughout your going— maybe even at the Academy, how has that kind of formed you as a leader individually?   Lt. Col. Steven Mount Yes, yes. So the showing the worth, the showing the value, or paying it back and showing my parents, once again, I use the word “investment” like it was good— I was good investment. Like I was a good return on investment. But it's helped when I've gone through those struggles, when I've gone— because the first time I put in for the Academy and… back up just a little bit. My dad likes to tell a story that I even told my fifth-grade teacher that she was, you know, “What do you want to do?” I was like, “I'm gonna be a pilot.” I said nothing else. Like, I want to be pilot. I want to fly. And then I had had an awesome mentor whose son, at the time, was going through the process of the Academy, sophomore year in high school, and she helped me with that. Good ol' Mrs. Williams, amazing. When I first initially applied for the Academy, I did not get it. I got a “Sorry, you are not competitive at this time.” Here starts some of those moments in your life to where, like, “OK. How can I bounce back? Do I accept the rejection, or do I find another means?” And even when that happened, that first time, my parents, they were like, “It's OK, it's OK. You don't need to…” They were always like, “You don't need to prove anything else. We love you, regardless.” I was like, “No, I need to prove this.” So I found other means, and I was, I will say, blessed in the sense that at that time, my running back coach for the high school reached out to the Academy. This happened early my senior year, and reached out and was like, “Hey, we have, I have someone who I think might do well for your program.” And then, sure enough, I got invited to come out for a football recruiting visit and I sat down with Fisher Deberry, and he just goes, “Would you like to play for this program?” And once again, I was like, “Wait a minute. No, no. I already got rejected. You know, I already gotten the…” But obviously I was going through my head, but all I said was, “Yes, sir, I would love to play for this program. I'd love to go the Academy.” And he made it happen. And I got recruited, and I got the invite to come out, to go the United States Air Force Academy. Wow. And once again, that only happened because my parents, they said, “Hey, we don't care what happens. We love you. Support you. You make the decision and we're here behind you.” And then I had a coach who was like, “I got you. I've seen what you do. I support this.” And went out on a limb for me. And then, in a sense, I guess Fisher DeBerry was also like, “I'm taking this football recruit, I hope he makes it through the Academy. So the love and support is, was there throughout.   Naviere Walkewicz What a path, I mean, that is quite unique. And, yeah, that's something to just kind of sit in a little bit, right? You know, the path of to your point, it just comes from support. And obviously you have to do the things to make sure that when the opportunity presents itself, you're ready to take that step, but what an incredible story of those who have supported you. Let's talk about a little bit before we kind of get into I think, what I think is the next real moment in your life — when you talk about becoming a father in your family. But while you're at the Academy, I'm just curious what more you learned about yourself as a leader, because you no longer had to prove to your parents that you were worthy of their investment, right? Like this is investment, right? Like this is a new season of your life. What did that look like for you as a leader?   Lt. Col. Steven Mount The challenges and the experiences I had the Academy — and I know I talked about this in one of my interviews previously with the foundation — was that I had to I went through my sophomore year and the rigors of academics, of the military side, of sports. It was taking this toll. I will say this many times. I'll continue to say I'm not the smartest crayon in the shed.   Naviere Walkewicz Wait, did you say crayon in the shed?   Lt. Col. Steven Mount I did. A little mixture of the sharpest tool in the box, exactly. I love it! I'm glad someone caught it. That's perfect! But yes, hard work was probably the foundation of what the Academy taught me was you persevere by hard work. You do the day in; you do the day out. You get after it. Because I was not getting after it after sophomore year. My GPA was not the best, and I had to approach my sophomore year, which very fortunate, because I had done my best to put in the time with the football program. But obviously I was losing ground in the academic side and that came back to almost biting, in the sense that I could have failed out. So I had had one of those— Once again, my father being an amazing mentor himself, whether he knows it or not. And I talked to him, and I said, “Dad, I think I have to quit football. I don't think I can continue with this, the rigors of all of this with the Academy.” And he goes, “Well, what was your dream?” I was like, “My dream was to fly.” He goes, “Well, did you go there to play football? Or did you go there to fly?” And that was an easy answer. But then I was thinking about all those coaches and mentors and those who helped me get to where I was, and I never really quit at something, and that's what it felt like. It really felt like I was quitting. I was quitting my teammates. I was quitting my coaches. And that weighs heavy on your soul, for all those out there who just are struggling, like, “Should I continue?” But my dad was right. My priorities weren't to become a football player, because I wasn't gonna be. I wasn't going to be. I wasn't going to become, you know, some — who can I name drop? — Chad Hall, you know, going to the NFL, doing amazing things. I wasn't going to be out there starting on, maybe third if they still have fourth string… maybe fourth string. So my dad helped me with those priorities by, once again, just being supportive. He never said one way or the other. He said, “What do you want to do?” And so I had that hard conversation with him, and went down to the Field House, and I said, “I apologize. I have to quit so I can concentrate on what I want to do for my dreams.” And once we had that was hard, that was very difficult. So that was one of the challenges at the Academy presented, and how I bounced back from that was you always go two ways. You always go into the woe is me and you know, just kind of beat yourself up and just hold on to that, that pride and ego being shattered. Or you can find a community, a support group, that will be there with you. And I found that almost immediately with my rugby brothers. They're just like me. They're like, “Hey, we just like to hang out at our own little table at Mitchell Hall. We like to just come out, play the sport, do what you love to do, athletic wise, and you'll have some more free time, obviously, for academics.” Not that I'd utilize that correctly still, but that's what it took to get me through those next couple years, that and my amazing roommates. I think all of us Academy grads and those who are going through right now, a support of a good roommate is huge. I that, uh, I appreciate the question, because now it's just dawning on me how much I just really appreciate my roommates at the Academy for their support as well. Very similar to my parents, it's like, “Hey, I don't care what you do, but I'm here to support you, love you regardless.” So I got a lot of that the Academy, and that's what helped get me through.   Naviere Walkewicz That's amazing. I think there's a couple of things I want to dig into a little bit. The first one is, you know, I think deciding to have that tough conversation where, one, you felt like you're already prideful, and you're having to, I'm putting in air quotes, “quit.” Can you talk about how you approached that, other than, I know you went and did it. But I think sometimes one of the most challenging things we can do as leaders is have a tough conversation when it involves us either stepping back or taking a step down from what seems to be the trajectory of what's next. And so I'm just— if you could just share a little bit more about that, I think that would be helpful.   Lt. Col. Steven Mount So, and I just want to clarify: As leaders, we have to recognize and we have to have the courage to have the tough conversations, because that wouldn't be the first time that I'd have to make a decision in that regard, or have the tough conversations to where it was gonna affect me personally or those around me. You deal with it understanding, one, give yourself a little bit of grace. Give yourself a little bit of grace in the sense that whatever tough decision you have to make, you're not alone. And I imagine you might not always be the first person who had either to make that decision or was going through something like that. I was not the only one going through something at that time like that. I didn't know that. And so I've had other conversations where others were like, “Yeah, I also, you know how to make that type of call to not play anymore or give up something, because my priority was this...” You know, what was driving me to succeed was something else, and that followed me well throughout my career, because I've had many, many tough conversations. I've had the tough talk as a leader. I've had to tell someone that, “I'm sorry, your dreams to become a pilot…” It's not going to happen because of their performance. I've had conversations on how to get through those tough moments and said how to get on the other side. And I know it's like a broken record, but it just comes through with the support of being there for that individual or being there to guide them to the next step. And I had that. I had that when I made that tough decision. I had someone want to give myself grace. Two, I realized I was not alone. And three, I had the support to get from this side of that tough decision bridge to the other side. And because that support was there, I learned that, and I learned to pass that on from all my leadership opportunities, to be like, “Let me be the one who guides you over this bridge. It's not gonna be fun. There's gonna be parts are gonna hurt. It's gonna be painful. But I will be next to you to get to the other side, to where we can get back to a good place. We get back to what really matters and get back to succeed in maybe another sense.” So the tough convos as leaders, you have to have those tough convos. Do not shy away from them. They're gonna happen, whether you like it or not.   Naviere Walkewicz I'm really glad you shared it that way, because I think it created a pathway to how to approach it, to your point. You know, it they're not comfortable, they're not designed to be that way. But if you start it with, you know, being that support in mind, and how to get someone, even if you're giving the worst news, the worst news where, “This was your dream, you're not gonna be able to do it because of this. And here's now where we're at, and how can I help you succeed through that?” I think that's what a wonderful lesson you just shared. And so I want to dive now into your career, because you had a really broad career, one that's not a traditional path, and I want to understand why it looked that way. So C-130, EC-130, Special Ops, you— talk a little bit about how you navigated that and what was the driving reasons behind that navigation?   Lt. Col. Steven Mount Yes, ma'am. So something you said earlier, which I really liked, I really love to try to convey to those around me, and actually, I've gone through some of these conversations over the last month and a half with younger instructor pilots. Luck is just the crossroad of opportunity and being prepared, and I'm pretty sure someone super smarter than me said that. I barely remembered. But the opportunities that present themselves to me for what I wanted to do, for my goals in the Air Force. So thankfully, even getting through pilot training, that was, in itself, amazing, transformational. Getting those wings, right? Getting those wings because pilot training, just like my Academy career, I had some ups and downs and some challenges but was able to get through because the sense of me becoming a pilot was first and foremost to fly. I want to be up there in the sky. I want to rush past the clouds. I want to touch the highest point I can. I want to be a pilot's pilot. And then right behind that was I want to accomplish the mission for whatever platform or whatever weapon system I'm given, aircraft wise. So those are my two biggest priorities. And that helped me understand that I had some failures of pilot training when I got to my first assignment, EC-130s. But that was perfect for me. That was— I never knew that. I never knew that in pilot training, that the EC-130 would fulfill me in that sense of my sense of purpose as much as it did. And I'm and getting out there, like said, four or five deployments to Afghanistan, as well as multiple TDYs. I was doing the mission, and I was happy, because I was— that's exactly what I wanted to do. That's exactly what young Meathead Mount was built for. But there were parts of me that still wanted to do more. Like, I felt like I could do more. I could be— I could help out more. I could— it's just itching, or not itching, but just burning in the back. It's like, “Hey, you are built for so much more. You can do more. Let's look for those opportunities.” So, funny enough, the first opportunity I had at that time, or I thought I had, was I reached out to— it's no longer around — but the 6th Special Operations Squadron at Duke Field. It was a combat aviation advisory mission. These individuals got to travel the world. I got to learn languages. Literally, they were sent to school to learn languages, to embed with other nations, to build those relationships, to be on the ground but still flying multiple different aircraft. I was like, “That's awesome. That sounds like me. That sounds like something I can do, and I can bring value to the table, and all the above.” So I put in my application; it was immediately rejected. In their eyes, I did not have the experience yet. I did not have what they were looking for, understandable. So here I am in another situation to where, like, “OK, well, what do I— is there any other means or ways that I can continue to fulfill my purpose as a pilot and get after the mission? Because that's what I really wanted to do, get after mission, whatever that looks like. I thought the sticks was an opportunity. They had said no to me, that's fine. And then I had an amazing friend reach out. He goes, “Hey, I heard you're getting a little long winded out there at EC-130s. You should put an application in for the U-2.” And I was like, “What are you talking about? I have no jet experience, other than the T-1. I don't have that background to be that type of caliber pilot.” He goes, “Nope, nope. They're looking for good guys and girls. They're looking for those who are motivated to do the mission. And if you could fly, you can fly, if you can't, well, you know, they'll figure that out, and they'll send you home.” And I was like, “OK.” And so I submitted for the U-2, put my application in, they call me out, and it's a two-week interview. The first week they have you in service dress, and you meet all the leadership, and you meet all the other pilots, and just have conversations. That's all, they just wanna get to know you. You know, “What's your true motivation for being here?” And I explained it, just like I've explained to you: “I wanna fly. I wanna do the mission. I wanna be a pilot's pilot. I wanna do all the cool stuff.” And they go, “OK.” Well, week two, they put you in U-2, a two-seater. They have two-seater trainers. They put you in a U-2. They give you all the weekend prior to study, and they say, “Cool, let's see what you got.” And they have an instructor, he instructs, he does his best to give you tidbits on how to safely land the U-2. And you have three days. You have two training flights and then a sort of assessment evaluation flight on that third day, and oh my gosh, did I ever humble myself as a pilot when I realized how horrible I truly was. I felt like I could not land the U-2 safely. I felt like I was messing everything up. I felt like— as soon as we got done with that third day of flying, and we got back into the squadron, and I remember the IP just being like, and then, you know, walks away because they have to talk to the squadron commanders. They have to go talk to the other leadership there. And once again, I find myself like, “OK, I 100% failed. I mean, I gave it my best. I gave it everything I had. But, you know, here I am gonna fall short again.” And they do this. And I realized this afterwards, that they do this, they do that like wait game, you know, they keep you in suspense for a reason. And I waited, it felt like hours and hours and hours. I imagine it probably might only be like hour, hour and a half. And a squadron commander called me in. He goes, “Yeah, the IP definitely didn't like some of this, some of these, these type of landings, some of this airmanship you're showing. I didn't really like this. But overall, he says you're a nice enough guy, so do you want the job?” And I was like, “Whoa.” And it blew my mind. And that was awesome. That was awesome because once again, leading up to that moment, it was the support of my friend who reached out. It was the support of my wife being like, “Yeah, I think you can do this.” And I had even called, my parents were like, “I had this opportunity to fly this really unique aircraft. It's going to be challenging. What do y'all think?” They're like, “Hey, we love you. Go get it.” And I was like, no other words of advice, no other like, inspiring — you know, my dad, a Florida farm man, was just like, “No, I think he'll do fine. We love you and just let us know how it goes.” I was like, man, I'm really missing out in motivational speeches. But you know what? The sentiment is there, and that's all I need. So I got that position, did a few years with the U-2. And then towards the end of the U-2 career, I got word from another friend saying the 6th Special Operations Squadron is growing. “We are looking for readily qualified and experienced people.”   Naviere Walkewicz And this is the one that rejected you.   Lt. Col. Steven Mount Yes, ma'am, I got rejected last time. He goes, “It's OK. Put in another application. You know, you're a little more experienced now, you've got a little bit more under your belt.” And I said, “OK,” and I put in an application, it got rejected again, and here I am, like, “What is going on?” My buddy reached out to me—   Naviere Walkewicz Your name is blacklisted in that group across the board. Like, “Oh, there's that Mount guy. Cross it out.”   Lt. Col. Steven Mount But I think that ended up being somewhat of a blessing. It was like, “Wow, This guy is motivated to come out here.” Because they had seen the last application years ago. They'd seen this one. And I think the word finally got around that's like, “Hey, he's actually really motivated to come try out, at least for this mission.” And so once again, from good mentors, they're like, “Go ahead, try it out. Put the application in one more time, see what happens.” I did, got picked up for assessment selection. It's another week, week and a half interview. They challenge you mentally, they challenge you physically. They put you in situations to see how you react. I don't wanna give too much away for that process, even though, you know, unfortunately that process is not there anymore. But after that grueling week, they once again, here I am in front of another squadron commander, and here they are opening my life in front of them, and they're saying, “Well, we don't like this. We definitely don't like this. Tell us a little more about this,” you know. And that was about an hour interview, sit down, and it's not just the squadron commander. It was leadership — four or five individuals. It was an Army lieutenant colonel's flight doc behind them, you know, kind of doing that very watching, waiting, assessing, and another one of the situations, I'm like, oh, “Here we go. I don't think it's gonna happen.” But then at the end of that interview, they sit down, squadron commander stands up and goes, “Welcome to the 6th.” And the only things I can think of — and I know a lot of listeners or viewers out there do the same thing, and I tell this to my young when they get their wings, I tell them this as well — think of that first person, or persons, that when something amazing happens to you, you immediately reach out to them and you tell them, “Thank you for the support, thank you for the love, thank you for believing in me when others didn't.” And that's exactly what I did after that one. I called my wife, and I called my parents. I said, “It happened. We got it. I got it,” you know, because it wasn't just me, and I know those experiences going from one mission to the next, and those setbacks have— I get to share these stories all the time with these young instructor pilots that I'm with, as well as students, because I get to utilize it as a leadership tool to be like, “Don't give up on yourself. That's first and foremost. And then even if you believe you might give up on yourself, trust me, there's someone like me or your family members or your squadmates, they won't give up on you. And just remember that.” And that's why I get to share these stories throughout my career, of like, “Hey, I failed at this. Look where I'm at now, because I had the support and because I kept going, Hey, I failed at this. Look how it played out. I'm here.” So a lot of my transition from different platforms and different experiences has helped shape that leadership side of me to say, simply put, “It's OK to fail, all right?” I mean, you're never going to succeed if you have this tried and failed a couple times, right? So, right,   Naviere Walkewicz Wow. Well, I want to go into— because you've mentioned this a couple times. We've talked about your parents, but you know, to have a career that's successful and to navigate that, you talked about your wife. So I'm curious if you can share with listeners who have to maybe the word is not choose between. But how do you navigate the importance of your marriage and that relationship with your profession, and trying to succeed in that trajectory, whatever that trajectory is for you. So maybe you can talk a little bit about how that, how that worked throughout all of those transitions.   Lt. Col. Steven Mount Oh, OK. I usually do better at this from a better half nearby, which she is, in a sense. She's trying to work out and give me her working space right now, which I love. I'm gonna start with this. It's not easy. It is work. It is reps, the day in, the day out. It's not easy. I don't believe I've ever had a convo with someone when they're trying to balance the work and family life to where it's like, “Oh, that was easy, you know, I just do this and they do this, and we're good to go.” No, it is constant conflict of schedules. It is sharing what's going on. It's the ups and downs. So I'd like to start with that: It's not easy. And if anyone ever tells you it is easy, please ask them how they're doing it, and then spread their wise words of wisdom to all of us. Because that's probably the first thing: It's not easy. Once you recognize that you can get past understanding like, “OK, I'm not alone in this, that this is not easy, and I can start talking and sharing my experiences and seeing from those who seem to have it together. What are they doing to make it work? So I start there. It's not easy. Second, you have to be a team. I think there's a lot of us that think that, and my wife definitely did initially, and that was on me, that she thought that my career was the most important, that what I did and how I executed the mission and where I was going, that that was the No. 1 priority. And I found it that's not the case. I found that's not the case, because, sure, when we didn't have kids yet, and we were in Tucson, it's a little easier, because I would go on my deployments, and she would go to the job, she would go to work, and she had and she supported that, because I was out there, you know, fighting the good fight, accomplishing a mission, doing everything the Air Force needed me to do. And that's what she knew was important for me. So she supported that through and throughout, and she supported it to where I imagined, to the sense of she didn't feel like she could speak to say things that maybe I would like in the sense of me doing my mission, or coming home from Afghanistan with some of my experiences. Ahe felt that maybe sometimes, that she didn't have a word to convey to like, “Hey, this really scared me.” Or, “Hey, when you were gone, I saw the news and I was frightened. And you know, when I saw this happen, I just wanted to reach out to you, and I just want to make sure you're OK.” And she never felt initially like that she could convey those feelings, because it might affect me. It might affect my, you know, mentality while being overseas and down range. So she held that in, she held it in. She kept strong. She put on the “I'm here to support you” and I feel bad, you know, thinking back on that, that I should have given her the space to like, “Tell me what you're feeling. Tell me what you're going through. I don't want you to, I don't want you to struggle in silence. If you know you see something or there's something that scares you, let me know.” And unfortunately, I didn't learn that lesson until way, way later in my career, because she'd always kept that strength in and even when we started having kids, she still did. I kick myself all the time now that— we got to California, in the U-2s, we had an incident down range to where they needed me to bump up my deployment out there, to get out there to take care of the situation. And I'd asked, I was like, “Well, how much sooner do you need me?” Because we had just had our first son. You know, the dynamic's changing. The family dynamic is changing, and especially with your first born. And they said, “We need you to leave in about a week.” Here I was once again. And I know we have kind of kind of mentioned that I was I was in the mean mentality I was in. I was gonna be a pilot's pilot. I was gonna get the mission done. I was going to do everything I could to prove myself, and if my country needs me to be out there in a week to take care of this mission, that my family and my wife will understand. And that was that was not the way I should look at it. It really wasn't. But because I was not seeing her as a teammate, and she held it in — and thank goodness we had her mother-in-law. We had some family come out and support with a new baby. But I could tell that was one of the first times to where looking back on it now that maybe I could have said, “Can you find someone else?” You know, maybe I should have what I'm doing, hopefully you're doing now and teaching others. You have to balance that family with mission and the prioritize what is truly important at that moment. And that's something I failed to do at that time. It would happen again later on, but thankfully— so when I got to the 6th Special Operations Squadron, and at this time, especially after we had our second child in California, the wife had mentioned more. She started coming out of the shell like, “Hey, I do need you a little bit more now. I need you, and I need to be able to express and convey what I do and don't like.” And I was listening, but I was not listening the way she needed me to listen. I was not being that teammate on my side. So I heard, “Hey, I just need more support with the family. So whatever career decision we make next, let's align that.” And I was in my head, I was like, “Yes, you're absolutely right.” That's why the 6th Special Operations Squadron, when I got that interview and I picked up, it was so important, because I had family in that area, and family could get to us easier. So I was thinking, “Awesome. I have the support system for you there. I got the assignment. You're going to be taken care of.” I can tell that's not yet what she was wanting. And I will credit good old Col. Valentino. I was spinning up to go to Lebanon with the team, and we're about to have our third child. And here I was once again, like, “Yep, gotta get back to the mission. Gotta show my value. Gotta get in there, do it.” And the wife understands. We have two kids already. We're gonna have a third. So we've already had two. We kind of know how this goes. We're good to go. But I could tell, once again, looking back, everything's— that she wasn't happy, but she was ready to put up that wall again, to be like, “OK, I have to support him. Have to support what he does, and I have to, because that's what the military is asking me. That's what this new community…” And then Col Valentino, he came down. He goes, “Hey, are you about to have another child?” And I was like, “Yes, sir.” He goes, “When?” And I gave him the date. And he goes, “Your deployment date is like, a month after that.” I was like, “Yes, sir. This is our third child. We'll be good to go. I have the support system for the wife now, and she'll be taken care of. Good to go.” And he goes, “No, you're staying home. I don't need you.” He goes, “Did you want to ask me if there's anyone else wants to go so you can be there for your wife and your family?” And that blew my mind, that just, I don't know. It came out of nowhere for someone in a leadership role to say, “No, I'm not gonna send you on this deployment. I want you to be there with your family.” And that held in tight, and from then on, everything changed, and how I led and how I would push the mission. But I wouldn't do it to the extent of, could I not help someone balance their family life with their mission? And that took too long for me to realize. So what I say to everyone out there, it's not easy, but you come home from a long day and you're mentally exhausted and the mission is not going good, or you're getting ready for deployment, take a moment, sit down and just talk with your teammate at home. You have to look at it as teammates. They are your partner. They will be just like I mentioned before. They will be your support system through thick and thin, because they've probably seen you at your worst, and they want you to be at your best. But you can't do that unless you take care of that home front and treat them as your teammate. Because I am still, to this day, trying my best to become the man that I hope that she sees in me and that she wants me to be one day, but I had to fail in seeing it back then so that could see it now. And I think that's one of these things I want to convey. Not easy, and they have to be your teammates.   Naviere Walkewicz Thank you for sharing that. And I think to have a leader that showed you that, which is, now you've imprinted that in your leadership style. You're thinking about the airmen that you come across and how to help them navigate some of those tough choices, but doing it with a, you know, a bigger view of not just the mission, but, like, how do you fit in that with your family? I think that's so powerful, and I'm really glad you shared that, because I know that some of our listeners and our viewers, that's gonna resonate with them as well, because they're gonna remember a time when, “Wow, I didn't even ask if I didn't have to go, or if I didn't have to do this, just because I'm so used to jumping when you say, jump,” right? And I think sometimes it's OK. It's OK. Just a question, like, I'm willing and ready to jump. I just want to make sure is someone else able to do it too because of these reasons, right? So I love that you share that.   Lt. Col. Steven Mount And those leaders have to know their people enough in that regard to also know because ultimately, when you get the mission, then yes, that's what we signed up for, yes. But those leaders know their people, and they know what situation they're in. For example, there's a few times in Special Operations to where we're going on another deployment. But we knew our people, and we knew that some did not have the balance at home, and things were not looking the best they could. “Hey, we can help you out. We can give you all the resources you need. We don't need you on this deployment.” But that takes good leaders, recognizing and taking care of their people and understanding that these individuals cannot be effective down range or where they go if their home life is not taken care of. So, I know that is something that's been talked about for all my leadership training for all the years, but actually applying it is going to start with our future leaders coming up to realize, know your people, know where you can take care of them so that they can take care of the mission.   Naviere Walkewicz That's right. That's right. So this has been incredible. I think the underlying lesson that you shared with us is, obviously having belief in yourself and doing the work and proving your worth, so to speak. But I think it's also recognizing that support network. So if I may ask, you, I have two questions. The first one is, what are you doing to be a better leader every day? Yourself, like, what is something you are actually doing to be a better leader?   Lt. Col. Steven Mount Oh my gosh. Well, I'm recognizing I know I'm not doing it right. Knowing that I'm about taking command already has the underlying nervousness and anxiety, and I realized taking command, why I have these emotions is because I'm afraid to fail, which that makes sense. That makes sense to any logical human being out there. That's like, yeah, I get that. But I have to realize, in that same token, it's OK to fail. It's OK to make mistakes. It's OK that some days you go in there, you're not gonna get it all right. This last year as a director of operations, I've walked out of that building, and there's days been like I didn't accomplish anything. I've messed things up. I didn't do this right. Why am I here? They could have found someone better. And then there were days where, like, yes, I did it, right? I got something accomplished. And on those days, I realized it's because I was taking care of the people and people's needs. And once again, when that happened, they were able to take care of the mission. And that's one of the things that every day I go into work and I ask myself, “Who can I help out? Who needs the motivational kick? Who needs someone to just talk with them? Who needs to share their story?” Because that's what leaders, ultimately, are. We take care of the people. And if I can go in there and just help one person every single day, I would like to think that that's a small success. So that's one thing I'm constantly working on. And it is an effort. It's not easy. It's not easy because you are taking so much and leaders, I don't care what level you're on, all the way from your very first flight command, all the way to your mission command, aircraft commander, all the way to where I am now. You're going to take a lot on your shoulders. You're going to bear, you know, the burden of others, pains, their grief, their successes, their failures. So I guess that's also answer that question. Get ready for that. OK? Because a good leader will do that. They will bear they will help hold the weight. They will support those who need it the most. And we got to do it day in, day out, the reps they have to. So I think I answered the first question, I apologize, was it was.   Naviere Walkewicz The second question is coming. So you're good, you're good. OK. What's something that you know now after having your 17-plus years in the in the military, but also just your life experience — but what's something you know now that you would share with a leader to kind of shorten that timeframe of, like learning those painful things to be better, right? So what would be something you'd share?   Lt. Col. Steven Mount Something I'd share to close that learning gap? Because once again, my call sign is Meathead— I learned lessons the hard way. Do your best to listen more than you talk. Do your best to just take the experiences of others, talk to others, but just listen. Just hear them. Just hear them. I believe that a lot of the things that I could have prevented may have already been told to me, or may have already been, you know, mentored to me, but I just didn't listen. Maybe they said something and “I was like, well, that doesn't jive with being cool or being a pilot, so I'm not gonna listen to that.” I'm pretty sure all of these lessons that hopefully either conveying or passing on, in a sense, I think I learned them early on. I just, I just didn't listen. So for all the leaders out there, do your best to listen, listen more than you talk. It will be wonders. Naviere Walkewicz Oh my gosh, that's just outstanding. And I what I really appreciate about that is, you know, you talked about how you're doing things to get better every day, but even just in the moment, you recognize like that's such an important piece of that is taking the time to listen and reflect so that you can actually really pick up on those cues, maybe, that someone needs your support. So yes, well, this has been incredible. As we wrap up today's episode, I keep coming back to something you said, which was all someone needs to do is just support you. Yeah. So here's the takeaway, leadership is found in how we show up for our people and how we believe in them, and how we remind them that they are capable for more than what they think they are. The question we can always ask ourselves today is, who needs me to believe in them right now? And you actually said that really well. So Col. Mount, I just want to thank you for joining us for this episode of Long Blue Leadership. Is there anything else you want to leave with our listeners today? Lt. Col. Steven Mount Yes. I don't think I'll ever be that leader that does one great act, and everyone's like, that's a great leader. I don't think I'll ever be that leader that gives like, one great speech, like, that's it. He nailed it. He's a great leader. No, if I'm gonna leave something with all of those you know at the Academy and the leaders in the Air Force now — which, by the way, thanks all of you. Me too, man, thank you for your service. You have no idea how much the world needs us right now, so you get out there and see it. So sorry. That was an aside. But thank you to everyone who's at the Academy now, who have served, whose families have served and will continue to serve. But one thing I'll leave to all those young leaders: Your leadership is defined by the acts, the million acts every day, not just by one act, not just by, like I said, not just by one amazing thing that you do. It's defined on you being there, and a million acts per day over a lifetime of your career, of showing up, showing that you care. That's huge, showing that you're fair and consistent. And they will see that your people will see that that those million acts day in day out, of how you treat them, and how you present yourself as a leader. And they will watch. They will watch, and if they can see that you care, and if they can see that you are doing those million acts day in, day out, and you're in there and you're in the grind and you're in the mud with them, they will give you everything, they will, and it's amazing to see, it really is, but that starts with you as the leader. So yeah, that's it, it's those million acts every day of a lifetime career that shows that you're a leader.   Naviere Walkewicz Well, we are so glad that you're out there leading and influencing so many. We're grateful for all of your years and more that you will do. Thank you so much.   Lt. Col. Steven Mount Thank you so much for the opportunity. I really, really enjoyed this. Thank you.   Naviere Walkewicz Good. Thank you for joining us for this edition of Long Blue Leadership. The podcast drops every two weeks on Tuesdays and is available on all your favorite podcast apps. Send your comments and guest ideas to us at socialmedia@usafa.org, and listen to past episodes at longblueleadership.org.   KEYWORDS Leadership, Resilience, Mentorship, Adoption / Family Foundation, Support Network, Perseverance, Tough Conversations, Mission & Family Balance, Trust, Listening       The Long Blue Line Podcast Network is presented by the U.S. Air Force Academy Association & Foundation      

Cyber Security Headlines
GhostAction campaign, scam centers grow, GPUGate hits IT

Cyber Security Headlines

Play Episode Listen Later Sep 9, 2025 7:44


GhostAction campaign targets GitHub Scam centers see huge growth in Myanmar GPUGate targets IT firms Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.  

Application Security Weekly (Audio)
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347

Application Security Weekly (Audio)

Play Episode Listen Later Sep 9, 2025 77:09


Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-347

Application Security Weekly (Video)
Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347

Application Security Weekly (Video)

Play Episode Listen Later Sep 9, 2025 77:09


Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Show Notes: https://securityweekly.com/asw-347

Cloud Security Podcast by Google
EP242 The AI SOC: Is This The Automation We've Been Waiting For?

Cloud Security Podcast by Google

Play Episode Listen Later Sep 8, 2025 34:01


Guest: Augusto Barros, Principal Product Manager, Prophet Security, ex-Gartner analyst Topics: What is your definition of “AI SOC”? What will AI change in a SOC? What will the post-AI SOC look like?  What are the primary mechanisms by which AI SOC tools reduce attacker dwell time, and what challenges do they face in maintaining signal fidelity? Why would this wave of SOC automation (namely, AI SOC)  work now, if it did not fully succeed before (SOAR)? How do we measure progress towards AI SOC? What gets better at what time? How would we know? What SOC metrics will show improvement? What common misconceptions or challenges have organizations encountered during the initial stages of AI SOC adoption, and how can they be overcome? Do you have a timeline for SOC AI adoption? Sure, everybody wants AI alerts triage? What's next? What's after that? Resources: “State of AI in Security Operations 2025” report LinkedIn SOAR vs AI SOC argument post  Are AI SOC Solutions the Real Deal or Just Hype? EP236 Accelerated SIEM Journey: A SOC Leader's Playbook for Modernization and AI EP238 Google Lessons for Using AI Agents for Securing Our Enterprise EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025 RSA 2025: AI's Promise vs. Security's Past — A Reality Check “Noise: A flaw in human judgement” book “Security Chaos Engineering” book (and Kelly episode) A Brief Guide for Dealing with ‘Humanless SOC' Idiots  

Cyber Security Headlines
SVG phishing campaign, Anthropic piracy lawsuit, Qantas penalizes executives

Cyber Security Headlines

Play Episode Listen Later Sep 8, 2025 8:45


New malware phishing campaign hidden in SVG files Anthropic agrees to pay $1.5bn in book piracy lawsuit Qantas penalizes executives for cyberattack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com.  

Across Acoustics
A New Way to Diagnose Osteoporosis

Across Acoustics

Play Episode Listen Later Sep 8, 2025 28:23 Transcription Available


Ultrasonic tomography has been applied in many fields, from geophysics to engineering, and now to medicine. In this episode, we talk with Aaron Chung-Jukko and Peter Huthwaite (Imperial College London) about their work to develop an ultrasonic tomography algorithm that can be used to assess fracture risk in bones, and, as a result, be used as a noninvasive way to diagnose osteoporosis.Associated paper:- Aaron Chung-Jukko and Peter Huthwaite. "Virtual initialised ray tomography: Towards contact-free realistic ultrasonic bone imaging." J. Acoust. Soc. Am. 158, 276-290 (2025). https://doi.org/10.1121/10.0036902Read more from The Journal of the Acoustical Society of America (JASA).Learn more about Acoustical Society of America Publications.Music Credit: Min 2019 by minwbu from Pixabay. 

Hacker Valley Studio
The Rise of the Autonomous Blue Team with Vineet Edupuganti

Hacker Valley Studio

Play Episode Listen Later Sep 4, 2025 37:24


What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers? In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally broken, why exposure management matters more than ever, and how Cogent is building an “AI Task Force” to give defenders the edge. From his early days in machine learning to reshaping the future of cyber defense, Vineet breaks down the urgent need for automation, context-driven insights, and explainable AI in security. Impactful Moments: 00:00 - Introduction 02:00 - Vineet's journey into AI and cyber 04:30 - Why vulnerability management is broken 06:10 - Generative AI as a defender's edge 08:20 - Why AI agents outperform brittle automation 09:45 - The first use cases for Cogent's agents 12:00 - Rethinking tier-one SOC analyst roles 13:30 - The rise of exposure management (CTEM) 17:10 - Cogent's vision for an AI task force 18:30 - Early wins and insights with Cogent 20:00 - Biggest misconceptions about AI in security 23:00 - What enterprises should demand from vendors 25:00 - Why explainability is essential in AI systems 27:00 - Startups vs incumbents in cybersecurity innovation 29:30 - Why enterprises must invest in AI now   Links: Connect with our guest, Vineet Edupuganti, on LinkedIn: https://www.linkedin.com/in/vineetedupuganti Learn more about Cogent Security: https://www.cogent.security    Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/    

Skype of  Cthulhu
949 - Curse of Nineveh 02

Skype of Cthulhu

Play Episode Listen Later Sep 4, 2025


Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. July, 1925 London The investigators begin to interview key informants and one member makes a shocking discovery. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics

Skype of  Cthulhu
948 - The Rat King 01

Skype of Cthulhu

Play Episode Listen Later Sep 4, 2025


Skype of Cthulhu presents a Call of Cthulhu scenario. The Rat King from Children of Fear by Lynne Hardy and Friends. September 20, 1923 Peking, China In an alternate universe, the investigators went to the town of Khotan and volunteered to help find a missing missionary. Dramatis Persone: Jim as The Keeper of Arcane Lore; Randall as Timur Stepanovich Repin, White Army Refuge Meredith as Chang Mei, Linguist Steve as Charles Lockhart, Diplomat Sean as Michael Li, Missionary Gary as Dr. Eudora Lockhart, Archaeologist Edwin as Sofian Bazaz-Wain, Photojournalist Download Subcription Options Podcast statistics

Investing In Florida Technology
All Gas, No Brakes: Scott Price on Building A-lign into a Cybersecurity Powerhouse

Investing In Florida Technology

Play Episode Listen Later Sep 4, 2025 38:59


A-lign founder and CEO Scott Price joins Tom Wallace and Saxon Baum to unpack the “all gas, no brakes” journey behind building a category leader in cybersecurity compliance. Scott traces his roots from Arthur Andersen and the Enron fallout to bootstrapping through 2009, landing the first clients, and evolving from SOC 2 mainstay to a broader, tech-enabled platform. He shares candid lessons from a re-traded 2017 deal, why outside capital served as market validation, and how partnering with FTV and later HG set the stage for scale enterprise expansion, European growth, and smart M&A. We dig into frameworks over tools for AI risk, the rise of CMMC and federal standards, and how Tampa's defense ecosystem fuels elite cybersecurity talent. Plus, leadership chemistry with a CFO, why second acts aren't automatically easier, and a lightning round on Bitcoin, AI's job impact, and the China tech challenge. A masterclass in grit, governance, and growth forward. Hosted on Acast. See acast.com/privacy for more information.

Risky Business
Risky Business #805 -- On the Salesloft Drift breach and "OAuth soup"

Risky Business

Play Episode Listen Later Sep 3, 2025 61:55


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: The Salesloft breach and why OAuth soup is a problem The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed Google says it will stand up a “disruption unit” Microsoft writes up a ransomware gang that's all-in on the cloud future Aussie firm hot-mics its work-from-home employees' laptops Youtube scam baiters help the feds take down a fraud ring This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please! This episode is also available on Youtube. Show notes The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security Salesloft: The Leading AI Revenue Orchestration Platform Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive The impact of the Salesloft Drift breach on Cloudflare and our customers China used three private companies to hack global telecoms, U.S. says CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense | CyberScoop Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News Storm-0501's evolving techniques lead to cloud-based ransomware | Microsoft Security Blog The Era of AI-Generated Ransomware Has Arrived | WIRED Between Two Nerds: How threat actors are using AI to run wild - YouTube Affiliates Flock to ‘Soulless' Scam Gambling Machine – Krebs on Security UK sought broad access to Apple customers' data, court filing suggests ICE reactivates contract with spyware maker Paragon | TechCrunch WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch Safetrac turned staff laptops into covert recording devices to monitor WFH Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media

Atlanta Business Radio
Fintech South 2025: Mike Morris with Wipfli

Atlanta Business Radio

Play Episode Listen Later Sep 2, 2025


Mike Morris, with Wipfli, oversees projects, including Service Organization and Control (SOC) reports (SOC 1 and SOC 2), Sarbanes Oxley IT 404 testing, network vulnerability and penetration testing and IT general control reviews for FinTech companies, banks, and insurance companies. He is a member of the Information Systems Audit and Control Association (ISACA) and is an […] The post Fintech South 2025: Mike Morris with Wipfli appeared first on Business RadioX ®.

Choses à Savoir TECH
L'iSIM succède déjà à l'eSIM avant même d'être généralisé ?

Choses à Savoir TECH

Play Episode Listen Later Sep 2, 2025 2:33


Alors qu'Apple s'apprête à généraliser l'eSIM en Europe avec son prochain iPhone, une autre technologie pourrait bien bousculer encore davantage nos téléphones : l'iSIM. Plus discrète, plus intégrée, elle promet tout simplement de faire disparaître la carte SIM telle qu'on la connaît. Mais attention, ne la confondez pas avec l'eSIM.Avec l'eSIM, la carte reste une petite puce soudée sur la carte mère du smartphone. L'iSIM, elle, va beaucoup plus loin. Elle s'intègre directement au cœur du processeur, dans le SoC, ce “System on Chip” qui regroupe déjà le CPU pour les applis, le GPU pour les images, le NPU pour l'intelligence artificielle… et demain, peut-être, votre forfait mobile. En clair, la carte SIM devient une simple zone sécurisée dans la puce principale.Et ce n'est pas de la science-fiction. Dès 2023, Thales, Qualcomm et Vodafone ont présenté des prototypes fonctionnels, et la GSMA – l'organisme qui définit les standards mobiles – a commencé à délivrer ses premières certifications de sécurité. Les objets connectés ouvrent déjà la voie : montres, capteurs, appareils miniaturisés… pour eux, chaque millimètre carré gagné compte. Plus d'espace pour la batterie, plus de place pour de nouvelles fonctions, sans changer la taille des appareils. L'iSIM présente aussi un intérêt majeur côté sécurité. En étant intégrée au cœur du processeur, elle bénéficie des protections matérielles les plus avancées, rendant le piratage ou le clonage quasi impossibles sans accès direct au silicium. Et sur le plan industriel, la suppression du tiroir SIM, des connecteurs et même de la puce eSIM réduit les coûts de fabrication.Mais attention, tout n'est pas si simple. Pour les opérateurs, l'iSIM impose de moderniser leurs systèmes de gestion. L'activation et la gestion des profils se font avec les mêmes protocoles que l'eSIM, mais les diagnostics techniques deviennent plus complexes en cas de problème. Reste une certitude : après avoir enterré la carte SIM physique, l'iSIM pourrait bien redessiner le futur du smartphone. Et cette fois, ce n'est plus qu'une question d'années. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.

Skype of  Cthulhu
947 - Curse of Nineveh 01

Skype of Cthulhu

Play Episode Listen Later Sep 1, 2025


Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. July, 1925 London The newest members of the Wentworth Club join in a memorial service and receive a strange request. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics

Friends & Fellow Citizens
#179: Dialoguing a World in Candid Conversation on Race, Ethnicity, and Culture feat. Dr. Laurie Mulvey, Dr. Sam Richards

Friends & Fellow Citizens

Play Episode Listen Later Sep 1, 2025 73:47


Watch the episode on Youtube!In a polarized political environment, people on the right and left may have knee-jerk reactions that fit their biases when they hear "race, ethnicity, culture." But at Penn State and beyond, these concepts represent something bigger: a world in conversation about how people connect with racial, ethnic, and cultural groups.Two Penn State sociology professors Dr. Laurie Mulvey and Dr. Sam Richards join the podcast to discuss what makes civil dialogue so valuable in understanding people's social identities around the world. Dr. Mulvey is the Director of the World in Conversation Center for Public Diplomacy, which has engaged in open inquiry and non-partisan engagement with more than half a million participants over two decades. Dr. Sam Richards teaches publicly broadcasted SOC 119, the world's largest race and ethnicity course with 800 students enrolled per semester and nearly 400,000 Youtube subscribers.Learn more about World in Conversation! https://worldinconversation.psu.edu/Watch and subscribe to SOC 119! https://www.youtube.com/@SOC119Check out the PBS documentary about SOC 119! https://www.youtube.com/watch?v=x4KLSR-oxuQSupport the showVisit georgewashingtoninstitute.org to sign up for our e-mail list! The site is the one-stop shop of all things Friends & Fellow Citizens and George Washington Institute!JOIN as a Patreon supporter and receive a FREE Friends & Fellow Citizens mug at the $25 membership level!IMPORTANT NOTE/DISCLAIMER: All views expressed by the host are presented in his personal capacity and do not officially represent the views of any affiliated organizations. All views presented by guests are solely those of the interviewees themselves and may or may not represent the views of their affiliated organizations, the host, Friends & Fellow Citizens, and/or The George Washington Institute.

KuppingerCole Analysts
Analyst Chat #267: ITDR & Machine Identities (NHIs) - Rethinking IAM for Security at Scale

KuppingerCole Analysts

Play Episode Listen Later Sep 1, 2025 66:12


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger and special guest Felix Gaehtgens to explore two of the hottest (and most debated) topics in identity today: Identity Threat Detection & Response (ITDR) and Non-Human / Machine Identities (NHI). Together, they gothrough the buzzwords to reveal what’s real, what’s hype, and how organizations should approach these fast-evolving areas of IAM. From visibility vs. observability, to governance challenges and the future of machine identity management, this episode delivers sharp insights and practical recommendations from three IAM veterans. So tell us — are ITDR and NHI just marketing buzzwords, or essential must-haves for modern identity security? Key topics covered: ITDR explained: buzzword or meaningful evolution in IAM? Why visibility and observability are not the same The missing “R” in detection & response IAM vs. SOC responsibilities for ITDR Machine identities: terminology, challenges, and governance Ephemeral vs. static machine identities How IAM teams can prepare for the future of identity security

Cyber Security Headlines
Salt Typhoon expands, AI-powered ransomware, Anthropic warns of vibe-hacking

Cyber Security Headlines

Play Episode Listen Later Aug 28, 2025 7:39


FBI warns of expanded Chinese hacking campaign AI-powered ransomware is a thing now Anthropic warns about “vibe-hacking” Huge thanks to our sponsor, Prophet Security SOC analyst burnout is real - repetitive tasks, poor tooling, and constant alert noise are driving them out. Prophet Security fixes this. Their Agentic AI Analyst handles alert triage and investigation - work that 69% of cybersecurity leaders say is the best use for AI in the SOC. Say goodbye to burnout, and hello to efficiency. Check out prophetsecurity.ai.  

AWS for Software Companies Podcast
Ep137: AI Without Borders - Extending analyst capabilities across the modern SOC

AWS for Software Companies Podcast

Play Episode Listen Later Aug 27, 2025 31:09


Gagan Singh of Elastic discuses how agentic AI systems reduce analyst burnout by automatically triaging security alerts, resulting in measurable ROI for organizationsTopics Include:AI breaks security silos between teams, data, and tools in SOCsAttackers gain system access; SOC teams have only 40 minutes to detect/containAlert overload causes analyst burnout; thousands of low-value alerts overwhelm teams dailyAI inevitable for SOCs to process data, separate false positives from real threatsAgentic systems understand environment, reason through problems, take action without hand-holdingAttack discovery capability reduces hundreds of alerts to 3-4 prioritized threat discoveriesAI provides ROI metrics: processed alerts, filtered noise, hours saved for organizationsRAG (Retrieval Augmented Generation) prevents hallucination by adding enterprise context to LLMsAWS integration uses SageMaker, Bedrock, Anthropic models with Elasticsearch vector database capabilitiesEnd-to-end LLM observability tracks costs, tokens, invocations, errors, and performance bottlenecksJunior analysts detect nation-state attacks; teams shift from reactive to proactive securityFuture requires balancing costs, data richness, sovereignty, model choice, human-machine collaborationParticipants:Gagan Singh – Vice President Product Marketing, ElasticAdditional Links:Elastic – LinkedIn - Website – AWS Marketplace See how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

Telecom Reseller
SmarTrak.ai: Driving Double-Digit Growth for Cisco Partners and Beyond, Podcast

Telecom Reseller

Play Episode Listen Later Aug 27, 2025 12:07


“We are an absolute recurring revenue engine,” says Ted Lee, co-founder of SmarTrak.ai, in a new podcast interview with Doug Green, Publisher of Technology Reseller News. Speaking from Cisco GSX and VMware Explore, Lee describes how SmarTrak.ai is enabling partners to transform data into growth, helping some global players reverse declines and generate new momentum in just 12 months. Founded with a multi-vendor vision, SmarTrak.ai began by solving a central challenge in the Cisco ecosystem: partners struggling to manage renewals and subscriptions at scale. The platform pulls data from 30–40 sources across Cisco, partners, customers, and distributors—then applies AI to generate actionable, prescriptive insights. Instead of static dashboards, SmarTrak.ai tells partners what to sell, when to sell it, and how to grow adoption. “We're beyond BI,” explains Lee. “Our AI is building presentations, highlighting opportunities, and giving sellers the recommendations that turn renewal data into recurring revenue.” Key highlights from the conversation: Recurring revenue growth: Partners are using SmarTrak.ai to drive hardware, software, subscription, and managed services sales. Executive-level visibility: Daily insights reveal whether a business is growing or in decline—and why—empowering leaders to take corrective action. Speed of innovation: As an AI-first platform with no legacy “technical debt,” SmarTrak.ai deploys new functionality in weeks, with measurable revenue results in days. Secure AI adoption: SOC 2 compliance ensures sensitive customer data stays safe—unlike dropping files into public AI tools. Multi-vendor future: While rooted in Cisco, SmarTrak.ai is rapidly expanding to support VMware and other leading IT vendors. Lee says partners see SmarTrak.ai as their “competitive advantage machine”—so much so that few will provide references, fearing competitors will catch on. For Cisco, for partners, and ultimately for customers, the result is a healthier ecosystem and stronger long-term value. To learn more, visit smartrak.ai.

This Week in Startups
xAI's App Store lawsuit, Intel shares vs. grocery stores, and Netskope's IPO | E2169

This Week in Startups

Play Episode Listen Later Aug 26, 2025 74:28


Today's show:On an upbeat and optimistic new TWiST, Jason and Alex are debating why any new innovation or technology gets hit with a wave of bitter cynicism.PLUS Jason defends the government taking shares of Intel, explains the importance of interoperability, and predicts how AirBnB's Joe Gebbia will upgrade the US government's website design.All that PLUS thoughts on the Netskope IPO, Perplexity offering publishers actual revenue share, a deep dive on the new AI-based PAC, thoughts on open-source LLMs, and much much much more.Timestamps:(0:00) Cynicism vs. Optimism and why Jason thinks cynics go after any interesting new technology(10:02) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(11:04) Show Continues…(14:37) Why Jason supports the Intel deal but worries it will become a trend(20:46) Public - Take your investing to the next level with Public. Build a multi-asset portfolio and earn 4.1% APY on your cash—with no fees or minimums. Start now at public.com/twist.(22:00) Show Continues…(27:02) Is it hypocritical to oppose socialist grocery stores but support the Intel deal? Jason says NO.(29:41) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWIST(30:58) What does xAI hope to get out of this OpenAI/Apple lawsuit? Jason and Alex theorize…(39:12) Why Jason thinks interoperability is so important and how App Stores OUGHT to work(41:12) How AirBnB's Joe Gebbia could potentially upgrade the US government's websites(49:27) What does Netskope do exactly? SASE?! Producer Claude explains…(58:32) Alex and Jason celebrate Perplexity rev sharing with publishers(01:10:02) Jason's thoughts on the Leading the Future PAC, and US AI policySubscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpFollow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: ⁠https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(10:02) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:46) Public - Take your investing to the next level with Public. Build a multi-asset portfolio and earn 4.1% APY on your cash—with no fees or minimums. Start now at public.com/twist.(29:41) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWISTGreat TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916

The Cybersecurity Readiness Podcast Series
Beyond Passwords: Making Identity-Based Attacks Impossible in the Age of AI

The Cybersecurity Readiness Podcast Series

Play Episode Listen Later Aug 26, 2025 35:58


In this episode, Dr. Dave Chatterjee sits down with Jasson Casey, CEO & Co-Founder @ Beyond Identity, to dissect the growing threat of identity-based attacks, which now account for nearly 80% of breaches. Casey explains how adversaries increasingly “log in” instead of breaking in, leveraging techniques such as MFA fatigue, session hijacking, and phishing kits. He shares lessons from his professional journey—ranging from building telco networks to advising the U.S. Government and launching Beyond Identity—and explains how his team's identity defense solution eliminates root causes of credential theft while reducing SOC workloads. The discussion also addresses why traditional human training cannot withstand adversaries armed with deepfakes and agentic AI, underscoring the need for technology to carry the defensive burden. Together, Chatterjee and Casey explore the double-edged role of AI, strategies for phased deployments (“ring deployments”), and the importance of embedding identity defense into board-level governance through the Commitment–Preparedness–Discipline (CPD) framework.To access and download the entire podcast summary with discussion highlights -https://www.dchatte.com/episode-89-beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai-2/Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications & Press Releases:“Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity,” Chicago Tribune, February 24, 2025."Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," Forbes, February 21, 2025.Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparednessDr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness,...

Relating to DevSecOps
Episode #080: Patch Me If You Can: Compliance, SLAs, and Other Fairytales

Relating to DevSecOps

Play Episode Listen Later Aug 25, 2025 34:05


Send us a textIn this no-punches-pulled return from hiatus, Ken and Mike dig deep into the messy middle of vulnerability management, SLA fatigue, and the illusion of compliance. Are we building secure systems or just passing audits? From legacy cruft to exploitable CVEs, this episode unpacks the real-world pressures of SOC 2, the auditor dance, and whether fixing every “critical” is even feasible.Perfect for practitioners trying to balance the checkbox culture with actual risk reduction, this one's got stories, strategies, and spicy takes. Bonus: tips on managing auditors without losing your mind—or your security posture.

Hacker Valley Studio
Mentorship to Mastery: AI and Community Lessons with Ron Eddings

Hacker Valley Studio

Play Episode Listen Later Aug 21, 2025 32:22


AI might analyze your logs in seconds, but only the community can put you in the room that changes your career. In this solo episode, Ron Eddings discusses the powerful balance between human connection and artificial intelligence in shaping the future of cybersecurity and beyond. From the sacrifices that sparked his career to the mentors who opened doors, Ron shares personal stories that show why community will always be your ultimate competitive edge, even as AI advances into the SOC. He also runs live AI experiments on ransomware response and log analysis, revealing what AI can (and can't) do for practitioners right now.   Impactful Moments: 00:00 - Introduction 02:00 - Why community is your first advantage 03:30 - The sacrifice that launched Ron's career 04:40 - Meeting mentor Marcus Carey 06:00 - Early opportunities in cybersecurity 07:00 - The power of hacker spaces 09:00 - How mentors open hidden doors 10:00 - RSA and Black Hat as career accelerators 13:00 - The most underrated LinkedIn feature 15:00 - The HVS mastermind community 16:00 - Reality check on GPT-5 18:00 - AI builds an IR playbook 20:00 - Critical do's and don'ts in incident response 23:00 - Why hallucinations matter in cybersecurity AI 25:00 - AI makes sense of raw logs 28:00 - Can AI replace tier one analysts? 30:00 - Where AI still falls short 31:00 - Final challenge: Strengthen your community     Links: Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/ Register for our livestream with Gerry Auger: https://www.linkedin.com/events/7359290642633539586/ Check out the links to the OpenAI ChatGPT threads here: Incident Analysis Summary: https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01 Ransomware Incident Playbook: https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/  

Detection at Scale
Tines' Matt Muller on AI-Assisted Security Operations and Modernizing the SOC

Detection at Scale

Play Episode Listen Later Aug 21, 2025 29:25


Matt Muller, Field CISO at Tines, knows all about revolutionizing security operations through strategic AI integration and intelligent automation. In his conversation with Jack, Matt explores how traditional SOC models create problematic feedback loops where junior analysts make critical decisions while senior practitioners handle escalations, limiting learning and growth opportunities.  Instead, Matt envisions AI-assisted workflows where senior expertise gets encoded into intelligent systems that teach junior team members while they work, transforming security operations from reactive alert-chasing to proactive strategic defense. He also emphasizes communication skills, relationship building, and moving beyond being perceived as the team of no to become strategic enablers. Topics discussed: Evolution from banning ChatGPT to strategic AI integration in security operations, emphasizing augmentation over replacement strategies. Model Context Protocol implementation challenges and the importance of safe-by-default approaches when integrating emerging AI technologies into production. Traditional SOC tier models create problematic feedback loops where junior analysts make critical decisions but lack learning opportunities. AI-assisted workflows can transform security operations by encoding senior expertise into systems that teach while automating routine tasks. Practical approaches to AI adoption including demystification techniques, validation methods, and breaking complex problems into manageable components. Strategic implementation of AI agents in security workflows, particularly for non-deterministic tasks like phishing investigation and alert triage. Importance of maintaining human oversight and guardrails when deploying AI systems in critical security operations and incident response. Communication skills and relationship building as fundamental competencies for security practitioners working with both AI systems and human stakeholders. Safe experimentation with AI technologies through controlled environments and understanding system limitations before production deployment. Listen to more episodes:  Apple  Spotify  YouTube Website

CrimeScience
CrimeScience – The Weekly Review – Episode 215 Ft. Chris Henningsen

CrimeScience

Play Episode Listen Later Aug 21, 2025 41:10


In this episode of the LPRC CrimeScience Podcast, Cory Lowe speaks with Chris Henningsen, Manager of the Real-time Crime Center in Scottsdale, Arizona. They discuss how to set up a SOC, technology upgrades in the field, and the continued collaboration with the Real Time Crime Center Association. Listen in to learn a little bit more about Real Time Crime Center strategies!

The CyberWire
Inside Intel's internal web maze.

The CyberWire

Play Episode Listen Later Aug 19, 2025 26:18


A researcher uncovers vulnerabilities across Intel's internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the PipeMagic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android banking trojan was leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency. On this week's Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bayle for a no holds barred look at context switching in the SOC. A UK police force fails to call for backup. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Security analysts are drowning in tools, alerts, and tabs. On today's Threat Vector segment from Palo Alto Networks, we offer a snapshot from host⁠ David Moulton⁠'s conversation with⁠ Liz Pinder⁠ and⁠ Patrick Bayle⁠⁠. Together they take a no holds barred look at context switching in the SOC, what it costs, why it's getting worse, and how smarter design can fix it. You can listen to David, Patrick, and Liz's conversation⁠ here⁠. It's a must-listen for anyone building or managing a modern SOC. New episodes of⁠ Threat Vector⁠ drop each Thursday on the N2K CyberWire network and in your favorite podcast app. Selected Reading Intel data breach: employee data could be accessed via API (Techzine Global) North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware (GB Hackers) Internet-wide Vulnerability Enables Giant DDoS Attacks (Dark Reading) Drug development company Inotiv reports ransomware attack to SEC (The Record) UK ‘agrees to drop' demand over Apple iCloud encryption, US intelligence head claims (The Record) Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft (The Record) ERMAC Android malware source code leak exposes banking trojan infrastructure (Bleeping Computer) Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme (Bleeping Computer) South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence  (Infosecurity Magazine) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

BLUEPRINT
Leading by Example: Confidence and Responsibilty in Cybersecurity with Zak Stufflebeam

BLUEPRINT

Play Episode Listen Later Aug 19, 2025 66:23


Click here to send us your ideas and feedback on Blueprint!In this episode, we sit down with Zak Stufflebeam, Director of Cybersecurity at a publicly traded insurance company. Zak shares his unique journey from the military to leading security operations, emphasizing essential leadership principles learned along the way. From his early days in basic training to leading complex cybersecurity teams, Zak's story is one of perseverance, adaptability, and unwavering commitment. He delves into vital leadership lessons, the importance of confidence, and strategies to maintain focus and calm under pressure. This episode is packed with insights for aspiring SOC analysts and leaders looking to make an impact in their field.Check out John's SOC Training Courses for SOC Analysts and Leaders: SEC450: SOC Analyst Training - Applied Skills for Cyber Defense Operations LDR551: Building and Leader Security Operations Centers Follow and Connect with John: LinkedIn

Business of Tech
Navigating Client Uncertainty: AI, Cybersecurity, and Women in Leadership in MSPs with Jennifer Roy

Business of Tech

Play Episode Listen Later Aug 19, 2025 12:05


Jennifer Roy, CEO of Nucleus Networks, discusses her transition from COO to CEO and the broader responsibilities that come with the role. She emphasizes the shift from a narrow focus on operations to a more comprehensive involvement in various business areas, including sales, marketing, finance, and HR. Despite the turbulent market conditions, particularly in the Canadian landscape, Nucleus Networks continues to thrive, with a full sales funnel and ongoing projects. Clients are increasingly inquiring about AI and cybersecurity, reflecting a cautious yet proactive approach to technology adoption.Roy highlights the importance of understanding clients' businesses to effectively implement AI solutions tailored to their specific needs. Her team, particularly the business transformation office, plays a crucial role in assessing readiness and executing projects. On the cybersecurity front, clients are primarily concerned about preventing breaches and ensuring they meet industry standards, such as SOC 2 Type 2 compliance. This process has revealed the significance of robust internal policies beyond just security measures, including HR practices and employee development.The conversation also touches on the state of women in leadership within the tech industry. Despite stagnant statistics over the past five years, Roy believes that cultural shifts are paving the way for more women to assume leadership roles. She actively participates in initiatives aimed at promoting diversity and inclusion, such as mentoring young professionals and advocating for inclusive hiring practices. Her own organization reflects this commitment, with a significant representation of women in the C-suite.As the discussion wraps up, Roy shares her key takeaways from the ChannelCon event, emphasizing the value of networking and personal interactions outside formal sessions. Looking ahead, she expresses a keen focus on employee and client retention, recognizing the competitive nature of the market. By enhancing the employee experience, she believes that client loyalty will naturally follow, ensuring the continued success of Nucleus Networks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Identity At The Center
#367 - RSM & IDAC Present - The Intersection of Attack Surface Management and Identity

Identity At The Center

Play Episode Listen Later Aug 18, 2025 51:47


Join hosts Jeff Steadman and Jim McDonald as they explore the critical intersection of attack surface management (ASM) and digital identity with Dan Lauritzen, Director with RSM Defense - RSM's Managed Security Team. This episode dives deep into how identity has become a key component of your organization's attack surface and why breaking down silos between identity teams and Security Operations Centers is more crucial than ever.Dan brings a unique perspective from his military background as a human intelligence collector to his current role in detection and response. Learn about the cyber kill chain, understand when you might have too much data, and discover practical strategies for treating identities as assets that need continuous protection.Whether you're an identity practitioner looking to expand your security knowledge or a cybersecurity professional wanting to better understand identity's role in attack surface management, this conversation offers valuable insights and actionable takeaways.Key topics include XDR platforms, ITDR tools, the evolution from legacy SIEM to modern detection systems, and why the future of security requires collaboration between traditionally separate teams.Chapter Timestamps00:00 - Introduction and Industry Trends01:00 - AI and Technology Disruption Discussion02:00 - Upcoming Conference Schedule and Discount Codes04:00 - Podcast Milestone - Approaching One Million Downloads06:30 - Introducing Dan Lauritzen and RSM Defense Team09:00 - Dan's Background - From Military to Cybersecurity12:00 - What is Attack Surface Management?14:00 - Treating Identities as Assets16:00 - The Cyber Kill Chain Explained18:00 - Why Identity and SOC Teams Operate in Silos21:00 - The Role of Data in Modern Security Operations23:00 - Continuous Identity Management and Shared Signals Framework26:00 - Can You Have Too Much Data?29:00 - Breaking Down Silos Between Identity and SOC Teams32:00 - Practical Collaboration Strategies34:00 - SIEM vs XDR vs ITDR - Understanding the Tool Landscape41:00 - Pragmatic Security Strategies and Metrics44:00 - Biggest Misconceptions About Attack Surface Management45:00 - Military Background - Human Intelligence Collection48:00 - Communication Tips for Better Information Gathering51:00 - Closing and Contact InformationConnect with Dan: https://www.linkedin.com/in/daniel-lauritzen-67545045/Cyber Kill Chain: https://en.wikipedia.org/wiki/Cyber_kill_chainLearn more about RSM:RSM Defense Managed Security: https://rsmus.com/services/risk-fraud-cybersecurity/managed-security-services.htmlRSM Digital Identity: https://rsmus.com/services/risk-fraud-cybersecurity/cybersecurity-business-vulnerability/identity-and-access.htmlConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comKeywordsIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Dan Lauritzen, RSM, attack surface management, cybersecurity, digital identity, SOC, Security Operations Center, XDR, ITDR, SIEM, cyber kill chain, detection and response, identity security, human intelligence, military cybersecurity, continuous identity management, shared signals framework, UEBA, threat detection, zero trust, privileged access management, identity governance, security metrics, vendor management, cloud security, endpoint security, data correlation, security silos, collaboration strategies, identity assets, orphaned accounts, entitlement creep, attack surface reduction, security automation, AI in security, machine learning security, identity sprawl, security tools, cybersecurity consulting, managed security services, security monitoring, incident response, threat hunting, vulnerability management, risk assessment, compliance, security architecture, defense strategy

This Week in Startups
GPT Psychosis is spreading, the NYT is Super-Doxxing Zuck, and Trump is wetting his beak on Chinese chip exports | E2163

This Week in Startups

Play Episode Listen Later Aug 12, 2025 76:27


Today's show:On an all-new Monday TWiST, Lon joins Jason and Alex to talk about a whole bunch of stories at the intersection of tech, business, and pop culture.First up, is GPT Psychosis real? And if so, what are the warning signs that your loved ones have been ONESHOTTED.Then, why did Jason get so upset at the NY Times piece about Mark Zuckerberg's Palo Alto compound?PLUS we're discussing Trump's export fees on AMD and Nvidia, Jason's pitch for why the president should work more closely with Congress, a new tool in the search for rare-earth minerals, just how many self-driving trucks are on Chinese roads today, and much much more!Timestamps:(0:00) INTRO, Why Jason hated the NYT story about Mark Zuckerberg's compound.(09:54) Vouched - Trust for agents that's built for builders like you. Check it out at http://vouched.id/twist(11:14) Show continues…(19:54) Coda - Empower your startup with Coda's Team plan for free—get 6 months at https://www.Coda.io/twist(21:01) Show continues…(27:25) GPT Psychosis: Is it real and how widespread is it?(29:13) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(30:16) Show continues…(45:45) What it means to get “One-Shotted”: is Sam Altman doing this on purpose?(53:56) Jason says working multiple jobs at once is STEALING… is that fair?(01:04:53) Are Trump's Chinese export fees for AMD and Nvidia a justified licensing process? Or a shakedown?(01:09:22) Jason's pitch for working closer with Congress, and why Alex has concerns about clarity(01:12:02) PolyMarket: Will tariffs generate >$250b in 2025?Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpFollow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: ⁠https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(09:54) Vouched - Trust for agents that's built for builders like you. Check it out at http://vouched.id/twist(19:54) Coda - Empower your startup with Coda's Team plan for free—get 6 months at https://www.Coda.io/twist(29:13) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twistGreat TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916